TidBITS#695/01-Sep-03
=====================
Is the Internet susceptible to terrorist attack? We talk to an
expert about Internet vulnerabilities and strengths. In lighter
news, we're happy to announce the rebirth of DealBITS, starting
with a Tom Bihn bag giveaway! Also in this issue, Macworld
Expo heads back to Boston (without Apple), Bare Bones releases
Mailsmith 2.0.1, Virtual PC 6.1 becomes part of Office X despite
not working on the Power Mac G5, and Adam is interviewed on
The User Group Report.
Topics:
MailBITS/01-Sep-03
Trying New Revenue Sources
DealBITS Drawing: Tom Bihn Laptop Bags
The Vulnerability of the Internet to Terrorists
Hot Topics in TidBITS Talk/01-Sep-03
<http://www.tidbits.com/tb-issues/TidBITS-695.html>
<ftp://ftp.tidbits.com/issues/2003/TidBITS#695_01-Sep-03.etx>
Copyright 2003 TidBITS Electronic Publishing. All rights reserved.
Information: <[EMAIL PROTECTED]> Comments: <[EMAIL PROTECTED]>
---------------------------------------------------------------
This issue of TidBITS sponsored in part by:
* Make friends and influence people by sponsoring TidBITS!
Put your company and products in front of tens of thousands of
savvy, committed Macintosh users who actually buy stuff.
For more information and rates, email <[EMAIL PROTECTED]>.
* READERS LIKE YOU! Help keep TidBITS great via our voluntary <------ NEW!
contribution program. Special thanks this week to David Illig,
Emko Witteveen, and Michael House for their generous support!
<http://www.tidbits.com/about/support/contributors.html>
* SMALL DOG ELECTRONICS: Great Deals on PowerBooks!
PowerBook G4/1 GHz 17in w/SuperDrive Only $3049! PB G4/867 with
SuperDrive Only $1645! PB G4/867 with Combo Drive Only $1479!
Visit: <http://www.smalldog.com/tb/> 802-496-7171
* SIX DEGREES puts your email back to work for you. It eliminates <-- NEW!
the need to refile email or search for that elusive message.
Your email isn't going away, so you may as well put it to work.
========> <http://www.creo.com/sixdegrees/index.asp?id=tidbits>
* MAC OS X DISASTER RELIEF: When we're trying to troubleshoot Mac <-- NEW!
OS X, we turn to Ted Landau's 660 pages of techniques, tips,
and ways of diagnosing crashes, freezes, and wacky behavior.
30% OFF/FREE SHIPPING! <http://www.tidbits.com/tbp/osxdr.html>
* Get Started with Adam's 10 Quick Steps Guides! PDF or MP3: $9.99 <- NEW!
Avoid Spam and Junk Email! <http://www.10quicksteps.com/spam/>
Make a Wi-Fi Connection Now <http://www.10quicksteps.com/wifi/>
---------------------------------------------------------------
MailBITS/01-Sep-03
------------------
**Adam Interviewed on The User Group Report** -- Tune in (via
streamed QuickTime or downloadable MP3) to the most recent edition
of The User Group Report to listen to host Chuck Joiner, who also
serves as the chairman of the Apple User Group Advisory Board,
interview me about the history of TidBITS, our involvement with
user groups, how we encourage user group publications to reprint
articles from TidBITS, and more. [ACE]
<http://www.mugcenter.com/usergroupreport/2003/313.html>
**Macworld Expo 2004 Set for Boston** -- Boston has certainly seen
its share of conflicts (see "American Revolution, The"), but for
today's Macintosh users the city remains the focus of a tug-of-war
between Apple Computer and Macworld Expo organizer IDG World Expo
(see "Apple, IDG World Expo Play Hardball Over Macworld Expo" in
TidBITS-652_). Last week, IDG World Expo announced that the East
Coast 2004 event will definitely be held in Boston instead of New
York City, from 12-Jul-04 through 15-Jul-04. Shortly after the
announcement, Apple issued a statement to MacCentral reiterating
that it will not participate in a Boston show.
<http://www.macworldexpo.com/>
<http://db.tidbits.com/getbits.acgi?tbart=06966>
<http://maccentral.macworld.com/news/2003/08/29/macworldboston/>
As with this year's New York Macworld Expo, which saw drops in the
numbers of vendors and attendees, it will be interesting to see if
an East Coast expo can survive (see "Macworld Expo New York 2003:
Highly Concentrated" in TidBITS-689_). Of course, the Boston event
is still eleven months away, so it's possible that Apple may
convince IDG World Expo to head back to New York, as it did after
a Boston show was announced in 1999 (see "Follow the Bouncing
Expo" in TidBITS-468_). It's even conceivable that IDG World Expo
would dangle sufficient enticements to convince Apple to attend.
In the meantime, we're looking ahead to the less-contentious
Macworld Expo 2004 in San Francisco, 05-Jan-04 through 09-Jan-04.
[JLC]
<http://db.tidbits.com/getbits.acgi?tbart=07279>
<http://db.tidbits.com/getbits.acgi?tbart=05290>
**Mailsmith 2.0.1 Adds Secure SSL** -- Bare Bones Software has
released Mailsmith 2.0.1, an update to its powerful email client
(see Matt Neuburg's "True Confessions of a Mailsmith Switcher" in
TidBITS-690_). At the top of the list of changes is support for
checking and sending email using secure (SSL) connections to POP
and SMTP servers. Also new in this version is the capability to
perform tests against group memberships in Apple's Address Book
application, more terms for use in Mailsmith's advanced filters
(see our series on Mailsmith distributed filtering), and a number
of tweaks and bug fixes. Mailsmith 2.0.1 also now includes a copy
of Michael Tsai's SpamSieve (see "Tools We Use: SpamSieve" in
TidBITS-667_). Mailsmith 2.0.1 is a 13 MB download, requires Mac
OS X 10.1.5 or later, and is free for owners of Mailsmith 1.5
and later. [JLC]
<http://www.barebones.com/products/mailsmith/>
<http://db.tidbits.com/getbits.acgi?tbart=07289>
<http://db.tidbits.com/getbits.acgi?tbser=1227>
<http://db.tidbits.com/getbits.acgi?tbart=07076>
**Virtual PC Resurfaces in New Office, with a Catch** -- Microsoft
last month revamped its Office X lineup, adding the recently
acquired Virtual PC to a new professional configuration. Office X
Standard Edition, which includes Word, Excel, PowerPoint, and
Entourage, drops to $400 (or $240 for those upgrading from Office
98 or Office 2002). A comparable $150 Student and Teacher Edition
allows licensed installation on up to three computers. The Office
X Professional Edition adds Virtual PC 6.1 for Mac, with Windows
XP Professional pre-installed, and costs $500, roughly $100 off
what the products would have cost separately before. Microsoft
says Virtual PC 6.1 adds no new functionality and is just a
rebranding of the 6.0.2 version released by Connectix. An upgrade
to Virtual PC 6.1 from earlier versions costs $100. Virtual PC
is also available as a $150 stand-alone product; for $220 it
includes Windows XP Home, and for $250 it comes bundled with
Windows XP Pro.
<http://www.microsoft.com/mac/products/virtualpc/virtualpc.aspx>
Unfortunately, these changes come with news that Virtual PC 6.1
for Mac will not work on Apple's new Power Mac G5. Unlike the
PowerPC G3 and G4 chips, the PowerPC G5 processor does not support
a feature known as pseudo little-endian mode, which Virtual PC
uses to emulate a Pentium processor. Microsoft is reportedly
working on a fix, but it requires significant engineering work,
and no time frame has been given. [MHA]
<http://maccentral.macworld.com/news/2003/08/27/virtualpc/>
Trying New Revenue Sources
--------------------------
by Adam C. Engst <[EMAIL PROTECTED]>
As I'm sure you've realized over the last year or two, the slow
economy has affected almost everyone, including TidBITS, since
our primary source of income is our corporate sponsorship program.
We've seen MacFixIt move to a subscription model, and Ric Ford
of MacInTouch recently wrote about his site's difficulties and
announced that he would be taking donations along the lines of
our contribution program.
<http://www.tidbits.com/about/support.html>
<http://www.macintouch.com/future.html>
Contributions from readers have proven extremely welcome in
softening the financial blow for us, and a bit of a rebound for
the sponsorship program might be coming in the final quarter of
2003, but in the meantime, we've decided to broaden our revenue
sources. Here's what we're doing, and I hope you'll find these
changes sufficiently interesting to help make them successful
ways of keeping TidBITS solvent.
<http://www.tidbits.com/about/support/contributors.html>
**DealBITS Drawings** -- Many years ago and for a relatively short
time, we published another newsletter called DealBITS, whose goal
was to attract and publish product discounts for readers, with
companies paying to be included. It wasn't a huge success, in
part because it came too early, and companies hadn't realized
the utility of the Internet for raising awareness and increasing
sales with limited-time discount offers.
Now we're reviving the DealBITS name and aspects of the concept,
though not as a separate newsletter. The end goal remains the
same - to attract discounts for TidBITS readers while raising some
money for TidBITS, with the added bonus that the company providing
the discount will also donate a prize to be awarded randomly to
one of you. To be eligible to win the prize, you will need to
sign up (no purchase necessary, yada yada yada) on a Web form
and explicitly agree to the rules. At the end of the week, we'll
pick a random name from the entries to win the prize; everyone
else who entered will receive the discount code. We'll notify
all entrants and publish the name of the winner in the next
issue of TidBITS (that's an important requirement of the laws
surrounding these sort of drawings).
We've discussed this project a bit on TidBITS Talk, and here are
a few answers to the common questions:
* We must collect email addresses to be able to notify the winner.
However, all personal information is covered by the TidBITS
Privacy Policy and will not be shared with the company providing
the prize or any other company. That said, we must publish the
name of the winner, and we will share the name and email address
of the winner with the company donating the prize for fulfillment
purposes.
<http://www.tidbits.com/about/privacy.html>
* Although we can't be responsible for any wacky local laws that
may make you ineligible, international readers are welcome to
enter unless we specifically note otherwise. The lawyer says
you must be over 18, though.
* Shipping costs shouldn't be an issue because we anticipate
either the prize being a registration code to a downloadable
product or the sponsor bearing the costs, even to international
addresses. The winner will be responsible for any taxes, fees,
or duties.
<http://db.tidbits.com/getbits.acgi?tlkthrd=2008>
Our first DealBITS drawing appears in this issue; future
drawings will occur as we find companies that are interested
in participating. Any company that wants to learn more about
what's involved should send me email at <[EMAIL PROTECTED]>.
So take a look, and for those of you who don't always get around
to reading TidBITS right away, remember that DealBITS drawings
are active only for the week following the issue in which they're
announced. You snooze, you lose.
**Spotlight on Peachpit Books** -- With the trend toward fewer and
slimmer manuals that I identified more than five years ago in
"The Death of Documentation" in TidBITS-428_ continuing unabated,
technical books have become ever more important sources of tested,
organized, and well-presented information. There are times I've
struggled in vain to search the Web for the solution to some
problem, only to find it quickly in a book on my shelf.
<http://db.tidbits.com/getbits.acgi?tbart=04865>
So we're starting a partnership with our friends at Peachpit Press
to spotlight one book a week in the sponsorship area at the top
of each issue. These are recent books we find the most interesting
or useful, and the ones we think you'll want to know about.
They'll all be 30 percent off the cover price, and InformIT
(the fulfillment arm of Peachpit's parent company) offers free
UPS Ground shipping within the U.S., making the overall price
cheaper than most online sources. The only downside is that
their international shipping is usuriously expensive, so we
recommend international readers investigate other methods.
It remains to be seen how helpful this program will be to our
bottom line, since our experience is that affiliate programs
seldom generate significant income. My hope this time is that
by recommending a different book each week, it will prove
sufficiently popular with TidBITS readers to be financially
worthwhile.
**Google AdSense** -- One of the major problems that anyone who
attempts to fund a business via advertising quickly discovers
is that attracting advertisers is extremely difficult. Ad sales
is a specialized field that few people do well. So, what if there
was a service that would go out and find appropriate ads for you?
As you've no doubt realized by now, the search engine company
Google earns money by selling keyword-based ads that appear when
you perform searches - the AdWords program. Since the ads are
(at least theoretically) targeted to match your search, they're
more relevant and thus more successful than standard banner ads.
Google has done a good job of making it easy for businesses to
promote themselves by buying these ads via a process of bidding
to pay a certain amount for each click-through. The higher an
advertiser bids, the higher in the listing their ad appears.
<https://adwords.google.com/>
Google is now making it possible for almost any Web site to
display these appropriately targeted keyword ads via the AdSense
program. Basically, all you, as a site owner, have to do is sign
up with Google and then put a small bit of JavaScript in eligible
pages on your site. Google then compares the text on those pages
with its search database and returns two or four ads to display.
When visitors click the Google ad links, the site owner earns
some money for the click-through.
<https://www.google.com/adsense/>
We've redesigned our home page to make room for the Google ads,
and we're testing to see if our traffic and click-through rates
will make it worthwhile to add the Google ads elsewhere on our
site. Anecdotal reports from friends indicate that sites with a
lot of traffic can generate tidy sums of money. I'm not positive
that our site meets the ideal profile, but it's an easy test, and
remember, every time you click one of those ads, TidBITS earns
some money, somewhere between 3 and 65 cents to judge from what
we've seen in testing.
**Try 'Em Out!** All of these efforts are quite new for us, so be
sure to let us know what you think in TidBITS Talk. Here's hoping
they work out, both in terms of providing useful services for you
and helping keep TidBITS in the black.
DealBITS Drawing: Tom Bihn Laptop Bags
--------------------------------------
by Adam C. Engst <[EMAIL PROTECTED]>
Want your PowerBook or iBook to have a well-padded home to
protect it from the cruel outside world? It's worth checking out
the laptop bags, backpacks, and briefcases from Tom Bihn, a maker
of high-quality bags in the Pacific Northwest. (If you're in
downtown Seattle, be sure to check out the first Tom Bihn retail
store, located at 609 Second Avenue near Pioneer Square.) Tom Bihn
himself has been designing bags for over 30 years, and
manufacturing and selling them for over 20 years.
<http://www.tombihn.com/>
In this week's DealBITS drawing, you can enter to win a Tom Bihn
Brain Bag, worth $130, and your choice of either a Monolith ($40)
or Brain Cell ($50) laptop protector. Along with the one lucky
winner, entrants will receive discounts on any Tom Bihn products
when we announce the winner, so you have everything to gain by
entering at the DealBITS page linked below. Be sure to read and
agree to the drawing rules on that page, and rest assured that
all information gathered is covered by our comprehensive privacy
policy.
<http://www.tidbits.com/dealbits/tom-bihn.html>
<http://www.tidbits.com/about/privacy.html>
We'll announce the winner in next week's issue of TidBITS,
and we'll also notify everyone who enters individually.
The Vulnerability of the Internet to Terrorists
-----------------------------------------------
by Adam C. Engst <[EMAIL PROTECTED]>
With terror alert color codes coming and going, and the constant
presence in the news of both terrorist activities and anti-
terrorist efforts, it's hard not to wonder what the vulnerability
of the Internet might be to terrorists. To answer that question,
I turned to Chuck Goolsbee, Vice President of Technical Operations
at the large Web hosting and server colocation firm digital.forest
(where the servers that maintain much of our Internet presence
have lived for years). Founded in 1994, digital.forest has all
the large-scale data center amenities - redundant fiber, multiple
backbone connections, redundant power, secure facility, and so
on - but with the advantages of a small-scale ISP - friendly,
knowledgeable tech support who understand multiple platforms,
personal service, reasonable pricing, and more. digital.forest
also is the oldest and largest Mac-savvy hosting and colocation
facility, housing many well-known Macintosh Internet sites. And
as vice president of technical operations, Chuck pays a lot of
attention to anything that could cause interruptions in
digital.forest's service.
<http://www.forest.net/>
* Adam: Chuck, is there any way terrorists could physically attack
the Internet?
Chuck: In terms of physical locations go, there are so many places
that "are" the Internet that attacking one, or even several at
once, would have negligible overall affect to the entire network.
My point here is that unlike 20 years ago, the Internet is no
longer a bunch of interconnected wires. It is in many ways,
everywhere.
That said, there are a handful of places where too much stuff
is concentrated in one physical location. An inhabitant of the
network operations lists I subscribe to, Sean Gorman, has written
his dissertation documenting the Internet and other infrastructure
items in the U.S. It represents the first ever complete "physical
map" of much of the Internet, and now has been deemed a "security
risk" by some government people who fear exactly what your
question asks about. They see Sean's dissertation as a guide
for attacking the Internet.
<http://www.washingtonpost.com/wp-dyn/articles/A23689-2003Jul7.html>
The irony here is that everything Sean used to make his map is
public information. Some of these places are even geek tourist
spots! I'll admit that I have visited a few locations where
transoceanic cables make landfall, and yes, my wife thought I
was nuts when we drove out to Land's End in the UK to see what
she properly interpreted as a "nondescript concrete box."
But to reiterate, any such physical attacks, even on important
Internet connection points, would be devastating to the companies
directly involved, but the Internet would, as the cliche says,
route around the damage. Even if your packets had to travel three
times the physical distance, they'd still find an interconnect
point that would get them to their final destination.
* Adam: So in the short term, traffic to specific Web sites might
be cut off or at least slowed down by less efficient, but still
functioning, routes?
Chuck: Yes. The Internet is not a single network, it is many
networks, all interconnected, usually at multiple points. The
obvious attack targets are major exchange points where many of
these networks meet. Our local one here in Seattle is a building
downtown called the Westin Building (if I recall correctly, it
is the former headquarters of the Westin hotel chain).
<http://www.westinbuilding.com/>
Virtually every major Internet provider has some or all of their
Pacific Northwest presence there. It makes economic sense to
"meet" in a single location, but if you are thinking in defensive
terms, it is a weakness. Through some luck and a little planning,
only half of digital.forest's upstream bandwidth comes directly
through that building (via a Gigabit Ethernet connection); the
other half comes in via an OC-12/SONET ring from Verizon. The
latter originates in Everett, WA, mostly due to our location
northeast of Seattle. So even if the Westin Building were damaged,
we would have connectivity from alternate sources. In larger terms
the whole Internet works like this, with multiple paths to most
destinations. The routing protocols that manage the Internet's
traffic constantly update and change the pathways for data, so
that when a route disappears, alternatives are ready and traffic
still flows. But honestly, I fear a large scale natural disaster,
such as the earthquake that struck Kobe, Japan, more than I do a
terrorist attack.
* Adam: And how long would it take for more-or-less normal
operations to start up again?
Chuck: That would of course depend on the nature and scale of
the incident. Some operations could be up in just hours, and some
could take weeks. A major earthquake could cause widespread damage
that would make rebuilding that much harder. But since we're
talking about terrorist acts, the September 11th events serve as
a good example. The attack in New York caused significant damage
to major telecommunications facilities in lower Manhattan. Some
services were disrupted for a few hours, most were out for a
period of several days, and a few required weeks to replace or
repair fully. The services on which people depend for critical
communications, such as standard dial tone and 911 emergency
services were the first to be restored. Email and Web traffic
were (justifiably) further down the list. In this case, the
impact was highly localized, being confined to an area
immediately surrounding the World Trade Center.
* Adam: It doesn't sound like a physical attack would do much to
the Internet. What about terrorists releasing worms? What effect
might that have?
Chuck: Take two examples, MSBlaster and SoBig.F, which were
targeted at specific weaknesses in Microsoft Windows's RPC and
Outlook, respectively. The damage they caused as they spread was
basically a denial of service (DoS). MSBlaster was easily defeated
by Microsoft as they removed the target of the planned DoS attack.
SoBig.F's ultimate purpose is not yet known. What the press
thought was the attack was really just the spread... the massive
amount of traffic caused as these worms propagated through the
Windows machines connected to the Internet. No specific damage
happened other than to networks that were completely unprepared.
However, if core functionality such as DNS was disrupted in a
serious manner, the damage would be global in scale. Without DNS
the Internet loses its human-readable nature. I may know that
216.168.37.138 is www.forest.net but very few other people do;
DNS does the necessary lookups behind the scenes.
Also, those sorts of worms and viruses usually don't have a
political agenda behind them, beyond pointing out the flaws in
running code. I can't see them meeting the goals of a terrorist
organization - even if the worm displayed some sort of political
message, it would exist only for a relatively short time until
the anti-virus software and firewalls were updated.
* Adam: Let's focus on DNS then. How hard would it be to bring
down DNS?
Chuck: Very difficult, because DNS is a resilient system that was
designed from the start to be massively distributed. Also, one of
the frustrations of dealing with DNS is propagation time, the time
it takes for changes made to DNS to become usable across the whole
Internet. That built-in delay makes attacking the DNS system as
a whole extremely difficult.
* Adam: But as much as DNS is distributed, aren't there root
servers that are more important than any ISP's DNS servers?
Chuck: Yes, DNS does have a weakness in that all DNS servers defer
to a system of root servers that ultimately control which lower-
level DNS servers have authority over which domain names. Last I
checked there are 13 root servers distributed around the world in
obvious high traffic Internet exchange locations. The organization
that oversees their operation has made efforts to secure them by
making their operating systems and DNS software be more diverse,
and therefore less susceptible to attack. They have also built
mirrors and clones of root servers in physically diverse
locations. There have been distributed denial of service attacks
made on the root servers, but to my knowledge these attacks
have usually been stopped before they can do any real damage.
A successful attack on the root servers would be very difficult
to achieve, but significant in its effects.
<http://root-servers.org/>
* Adam: Interesting - running multiple operating systems increases
the overall resiliency of the system, since most attacks are
specific to an operating system or will affect different operating
systems differently.
Chuck: Precisely. The DNS system and others like it are resilient,
but I think that's mostly due to the nature of the people who
operate them. These are, for the most part, smart and resourceful
folks. Systems, when they are virtual in nature, can usually be
reconstructed swiftly when interrupted - there are always multiple
backups. Think about it, even a worst-case scenario: if every DNS
root server were destroyed, they would likely be replaced and
operational within a reasonable amount of time. It might be days,
or even a week or two at most, but that's it.
* Adam: What about denial of service attacks - could terrorists
use them successfully? I remember some a few years ago that caused
significant problems for Yahoo and a few other major Internet
companies for a while. And distributed denial of service attacks
wouldn't require nearly the same level of knowledge as attacking
root servers.
Chuck: Remember that DoS attacks are basically noise - high
volumes of traffic directed at a target to overwhelm it, or its
network connection, thus rendering it unusable or unavailable. It
is relatively easy, trivial even, to bring down even a major site
temporarily with a DoS attack. However they are also difficult to
sustain for long periods of time because network operators (those
smart and resourceful people I mentioned) have built and continue
to maintain loose, but well connected communication networks.
These human networks cooperate to identify and stop DoS attacks.
DoS attacks are ugly and frustrating, and just about all of us who
run networks have experienced them first-hand, so we do our best
to stop them when we can. One of the current worries in the
operational community is that SoBig.F is really designed to
turn infected Windows machines into zombies for carrying out
distributed denial of service attacks (which originate from many
machines all at once and are more difficult to combat that normal
denial of service attacks). But to answer your question: Sure a
terrorist could DoS somebody, but a DoS attack is probably not
the sort of highly visual, news-making media event that terrorists
use. It is devastating to the victim, but invisible to everyone
else.
* Adam: Let's go back to this concept of resilient systems. Is
a highly resilient system thus 100 percent reliable?
Chuck: No, not at all. Internet users have to understand that
the Internet's resiliency stems from its distributed and complex
interconnected nature. These sort of systems are never 100 percent
reliable. They are not designed to be. They _are_ designed to
continue to function while parts are not working. One of my
favorite quotes comes from a network operator named Sean Donelan,
who said, "Murphy's revenge: The more reliable you make a system,
the longer it will take you to figure out what's wrong when it
breaks." It's funny because it's true, resilient systems can
still function even when "broken."
Even the September 11th attacks, which caused the complete
disruption of air travel for a few days, couldn't really stop
air travel completely. The system adapted and continued. Security
screening is more stringent, some airlines and aerospace related
businesses are still feeling the effects, but we consumers can
still fly.
So even if there were some attack that successfully targeted some
core system of the Internet, it could not stop it for very long.
Some companies doing business on the Internet would suffer, and
users would probably be confused and irritated for a while, but
overall the incident would just be that, an incident.
* Adam: But many people have become accustomed to the Internet
just working all the time.
Chuck: Indeed. I work in the uptime business. I know that our
clients fully expect 24/7 uptime so their Web sites and email
servers are always online. We had an outage in March of 2003 that
lasted 55 minutes. It was the most agonizing 55 minutes of my
life, and many of our clients were furious about it. It was the
first serious unplanned outage we had experienced in over four
years, but it still cost us much in terms of money and credibility
with our clients. In the aftermath we have made many changes,
technical, staffing, and procedural, based on lessons learned.
I have spoken with many clients and appreciate why they require
that uptime.
The hardest part of my job is explaining to clients the definition
of uptime. Frequently the issue is something that we have no
control over, like a fiber cut in Utah that forces packets through
Dallas instead of Chicago. People assume that "It is the Internet,
it is always _on_, right?" The reality is that parts of it are
always _off_ at any given moment of every day, and that while
the Internet will route around damage, the result is that it
may take a while, or things may not work as they did even a few
moments ago.
* Adam: Okay, but let's take the other point of view. How
important is uninterrupted Internet accessibility? I'm talking
about life and death stuff here, not just someone being unable
to check headlines on CNN or have customers come to a Web site.
Chuck: Much as it may not seem like it sometimes, uninterrupted
Internet accessibility is not really a matter of life and death.
Like other accoutrements of modern life - televisions, telephones,
and so on - the Internet is not something that is required to
sustain life, no matter what some geeks may think. Yes, it has
economic and social value, but it is not, as far as I know,
required to maintain life. So while damage that occurs from an
attack on the Internet can have real financial and even emotional
effects, it's important to maintain a sense of perspective.
* Adam: From what you're saying, it doesn't seem as though the
Internet makes a particularly attractive terrorist target.
Chuck: I guess that depends on the nature of the Internet as a
target. The September 11th attacks were aimed at targets with
high visibility and symbolic representations of U.S. economic
and government power. I have a hard time thinking of the Internet
in those terms. The Internet is really more of an infrastructure
item than a symbolic one, and terror's goal is visibility.
Infrastructure becomes a target when nation-states are at war
with one another; terror does not usually fall within that
definition. Bruce Schneier made this point well in an editorial
a few months ago.
<http://www.counterpane.com/crypto-gram-0306.html#1>
* Adam: What about defacement of Web sites? Would it be a problem
if the White House Web site, or other high profile sites like
Yahoo, Amazon, and eBay, were attacked and used to disseminate
political propaganda?
Chuck: Web site defacement is basically digital graffiti. It can
be an embarrassment, but it doesn't have any operational impact on
how packets move around the network. I also believe the Internet
is a secondary news source, meaning I doubt that most people
use it as their only source of news, especially news of their
government. Defacing, or changing the content of all media;
newspaper, TV, radio, Web sites, etc., borders on the impossible.
Web site defacement is more of a prank than a terrorist threat.
* Adam: So in the end, from the perspective of Internet users, the
worst the Internet is likely to suffer at the hands of terrorists
would be a major inconvenience attack. That's overly glib, of
course, since a physical attack could result in casualties, and
even these inconvenience attacks cost money to stop. Nonetheless,
Chuck, thanks for enlightening us about this situation.
PayBITS: If Chuck's interview helped put your mind at ease,
contribute to TidBITS so we can bring you great interviews.
<http://www.tidbits.com/about/support/contributors.html>
Read more about PayBITS: <http://www.tidbits.com/paybits/>
Hot Topics in TidBITS Talk/01-Sep-03
------------------------------------
by TidBITS Staff <[EMAIL PROTECTED]>
**Antenna coverage patterns** -- Most discussion of the coverage
area of antennas (such as WiFi-extending varieties) concerns
horizontal area, but what about vertical coverage such as between
floors in a house or office? (2 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2048>
**Salling Clicker and other stupid phone tricks** -- Joe Kissell's
article on Salling Clicker prompted this discussion of Bluetooth
proximity and how the wireless protocol affects battery life
in Bluetooth-enabled phones when used with Salling Clicker.
(5 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2047>
**Aliasing complex Unix commands** -- For those worried about
making mistakes with powerful Unix commands such as those
Kirk McElhearn explained in his article on command line file
manipulation, Unix-minded readers explain how to use a ".cshrc"
file to create safer versions of dangerous commands. (12 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2046>
**Serious data archiving** -- Data archiving doesn't revolve
entirely around backing up your computers. Readers talk about
making digital archives of paper data. (21 messages)
<http://db.tidbits.com/getbits.acgi?tlkthrd=2036>
$$
Non-profit, non-commercial publications may reprint articles if
full credit is given. Others please contact us. We don't guarantee
accuracy of articles. Caveat lector. Publication, product, and
company names may be registered trademarks of their companies.
This file is formatted as setext. For more information send email
to <[EMAIL PROTECTED]>. A file will be returned shortly.
For information: how to subscribe, where to find back issues,
and more, email <[EMAIL PROTECTED]>. TidBITS ISSN 1090-7017.
Send comments and editorial submissions to: <[EMAIL PROTECTED]>
Back issues available at: <http://www.tidbits.com/tb-issues/>
And: <ftp://ftp.tidbits.com/issues/>
Full text searching available at: <http://www.tidbits.com/search/>
-------------------------------------------------------------------