Berkeley CSUA MOTD:Entry 25139
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/09 [General] UID:1000 Activity:popular
7/9     

2002/6/18-19 [Computer/SW/OS/Windows] UID:25139 Activity:high
6/18    http://msnbc.com/news/768401.asp
        dwallach says windows is not all that bad. <shrug>
        \_ "In the last 15 years alone, software defects have wrecked a
        \_ "In the last 15 years alone, software failures wrecked a
           satellite launch, delayed an airport opening for a year, destroyed a
           Mars mission, killed four Marines in a helicopter crash, induced a
           U.S. Navy ship to destroy a civilian airliner, and shut down
           ambulance systems in London, leading to as many as 30 deaths."  Are
           these all true???
           \_ Arianne was the mislaunched satellite. The US ship Vincennes
              fired at an Iranian airliner over the gulf.
           \_ Yes.
              The 2 above;
              - 4 marines were in a Blackhawk during a routine check-out flight
                prior to full production;
              - the airport (I shouldn't have to tell anyone here) was
                Denver/Boulder;
              - the Mars Mission was the one that smashed into the surface (as
                opposed to Surveyor, which likely burned up in the atmosphere);
                \_ The Mars Global Surveyor is safely in orbit around Mars. You
                   mean Mars Climate Orbiter. The lander was Mars Polar
                   Lander. --dim
                   \_ Thanks.
                \_ Vincennes is very debatable. Captain is ultimately
                   responsible and he was rewarded for the shootdown.
                   [ reformatted - motdformatd ]
                   http://serendipity.magnet.ch/more/lockerb.htm
                \_ http://catless.ncl.ac.uk/Risks/7.46.html#subj2
                   Risks on the Vincennes incident.
              The ambulances I don't know about.
           \_ I'm sure human error accounts for a greater percentage.
              \_ Sure, but, as the article says, simple typos shouldn't
                 cause lethal mistakes.  I hear this argument from coders here
                 all the time.  "If they put in garbage, of course it won't
                 work."  Yes, but if they put in garbage, does your code have
        \_ The idea that software is getting worse is ludicrous.  Even Microsoft
           is getting better.  Who would take NT3 over windows 2000?
                 to die a horrible flaming death?  Or does it take too much
                 time to write an exception handler?
                 \_ hmm...  possible research area?
2025/07/09 [General] UID:1000 Activity:popular
7/9     

You may also be interested in these entries...
2013/3/25-5/18 [Computer/SW/OS/Windows] UID:54639 Activity:nil
3/25    It's strange that only every other Windows version is a hit.
        NT 4.0: hit
        2000:   flop
        XP:     hit
        Vista:  flop
        7:      hit
	...
2013/2/19-3/26 [Computer/SW/OS/OsX] UID:54611 Activity:nil
2/19    I program a lot by sshing to a Linux cluster.  So I'm used to using
        Xemacs to code.  This works fine from a Linux or Windows workstation,
        but sometimes I have to use a Mac.  On Mac, the meta is usually
        bound to option, but that often doesn't work over ssh for some reason.
        This makes using emacs a real pain.  Any suggestions on how to fix it?
        (Other than "use vi")
	...
2012/3/15-6/1 [Computer/SW/Languages, Computer/SW/OS/Windows] UID:54340 Activity:nil
3/15    Why does MS put double-quotes around the '8' in Windows Server 8, like
        the following?
        - Windows 8
        - Windows Server "8"
        \_ Because when they didn't do it, code didn't see the '\0'
           and went over?  Looks better than '8','\0' *shrug*
	...
2012/2/23-3/26 [Computer/SW/OS/Windows] UID:54312 Activity:nil
2/23    fixboot wrote FAT boot sector to my WinXP hard drive.  How can I convert
        the drive back to NTFS?
        \_ Does C:\WINDOWS\system32\convert.exe work?
	...
2011/12/21-2012/2/6 [Computer/HW/Laptop, Computer/SW/Editors/Emacs] UID:54269 Activity:nil
12/21   In Emacs, how do I make it so that it will resize its screen
        when the maximum resolution of my monitor changes? When I
        use my laptop, my emacs is too big (and I can't resize it
        because the bottom-right corner is not accessible).
        \_ Which OS?  Can't you drag the top border (not a corner) to resize
           the height to be smaller?
	...
2011/12/23-2012/2/6 [Computer/Rants] UID:54271 Activity:nil
12/23   http://venturebeat.com/2011/12/22/uc-berkeley-google-apps
        Oh noes! What Would Bill Gates Do?
        \_ http://lauren.vortex.com/archive/000701.html
           Microsoft to Transition Corporate IT to Google Apps
	...
2011/11/27-2012/1/10 [Computer/HW/Drives] UID:54244 Activity:nil
11/27   CalMail has been down for a few days (hardware failure and database
        corruption -- sounds like fun!) and is starting to come back online.
        Looks like they're planning to outsource all campus mail to either
        Google Apps or Microsoft 365 as part of Operational Excellence.
        <DEAD>kb.berkeley.edu/jivekb/entry!default.jspa?externalID=2915<DEAD>
        \_ http://ist.berkeley.edu/ciocalmailupdates/november-30-2011
	...
2011/11/8-30 [Computer/SW/Security, Computer/SW/OS/Windows] UID:54218 Activity:nil
11/8    ObM$Sucks
        http://technet.microsoft.com/en-us/security/bulletin/ms11-083
        \_ How is this different from the hundreds of other M$ security
           vulnerabilities that people have been finding?
           \_ "The vulnerability could allow remote code execution if an
               attacker sends a continuous flow of specially crafted UDP
	...
2011/5/19-7/30 [Computer/SW/Security] UID:54110 Activity:nil
5/19    Uh, is anyone still using this? Please mark here if you post and
        haven't added this yet. I'll start:
        \_ person k
        \_ ausman, I check in about once a week.
        \_ erikred, twice a week or so.
        \_ mehlhaff, I login when I actually own my home directory instead of
	...
Cache (59 bytes)
msnbc.com/news/768401.asp -> msnbc.msn.com:80/?id=3053419&oldUrl=http://www.msnbc.com/filenotfound.asp
Our Web servers cannot find the page or file you asked for.
Cache (7848 bytes)
catless.ncl.ac.uk/Risks/7.46.html#subj2
First 10 Last 11 Copyright 12 RSS 13 Previous Issue 14 Index 15 Next Issue 16 Info 17 Searching 18 Submit Article 19 FTP 20 Do not even think about clicking on this button The Risks Digest Forum on Risks to the Public in Computers and Related Systems 21 ACM Committee on Computers and Public Policy, 22 Peter G. MOD development standards 24 Lorenzo Strigini 25 Vincennes: Rules of engagement violated by AI heuristic? Can anyone give a first-hand account of that lecture, or a more complete citation, or somehow shed more light on the issue? Lorenzo Strigini 39 --------------------------------------------- Vincennes: Rules of engagement violated by AI heuristic? EDU> Wed, 7 Sep 88 00:00:32 PDT A recent contribution noted that the Airbus shot down by the Vincennes had been within binocular range of the ship, and inferred that binoculars were superior to the Aegis system. He jumps to his feet and says 'possible comair,' for commercial aircraft, to the ship's commanding officer, Capt. It was not the Aegis giving bad data, but it was the Aegis giving a procedurally *conclusive* categorization, together with the duty-imposed rules of engagement, that caused what the military now boasts was a "prudent," albeit automatic, killing of 290 civilians. Thus: from the moment of take-off, the plane was formally characterized as hostile merely because the airfield was not wholly civilian, and this characterization would be definitively "correct" until disproven by the flight's obeying the ship's radioed warnings; The Aegis did its job and the Captain his mandated duty, and they conclusively saved the Vincennes from the risk posed by a lumbering Iranian Airbus that would not immediately respond to radioed warnings. JCS Chairman Crowe explained that all fault lay with Iran, because it was "unconscionable" for the Iranians to permit a civilian airliner to take off amid hostilities (which the air controllers are simply presumed to have known about) and to ignore warnings. According to the NYT, Crowe asserted that the plane would have been shot down IN ANY CASE given lack of proof that it was not hostile. Such "shoot-on-suspicion" rules of engagement Crowe claimed to be wise policy. That is, Rule Of Engagement number above was in violation of the declared Rules Of Engagement. One natural question naturally not commented on in the Pentagon's report is the applicability of the word "panic," although it notes: "At every opportunity when the ship's internal communication link is silent, an officer known as the tactical information co-ordinator calls the attention of the other officers to his belief that the plane is accelerating and descending. Interest has been expressed in the numerical/logical algorithms whereby computerized sensors declare a detection as hostile. It provides a comprehensive table of techniques, which include Bayesian, frequentist, maximum likelihood, evidential, pattern-matching, associative, syntactic, and heuristic methodologies. A basic division is into "hard" sensors, that declare an attack in binary form (yes/no), and "soft" sensors, that provide a probability estimate that a detection is hostile. I am confident that I quoted Cullyer, Leveson and others accurately; However --- - I should emphasize that skeptical comments regarding statistical reliability estimation were limited to the context of *a priori predictions* of the reliability of *software* - that is, predicitions of software reliability made prior to experience in the field. Regarding their opinions on statistical reliability estimation and life in general, I cannot say. I did note that Cullyer and others did remark that a priori estimates could be useful for *hardware* systems, where failure histories for the components were known. It is necessary to distinguish *validation* from *certification*. Validation is the technical process of determining whether a product conforms to its requirements. Nobody at COMPASS claimed that any validation technique was perfect, although people did claim that some techniques were better than others. Certification is the administrative act of releasing a potentially hazardous product for sale or use. The necessity for basing a yes-no decision on less-than-totally-conclusive technical information is the certifier's dilemma. Burleson faces up to 10 years in jail and a $5,000 fine if convicted in the trial, a first for the computer industry. Burleson was indicted on charges of burglary and harmful access sic to a computer in connection with computer damage at a securities firm, said Nell Garrison, clerk of the state criminal district court in Fort Worth. Through his lawyer, Jack Beech, Burleson denies the charges but has declined further comment. The firm has been awarded $12,000 in a civil lawsuit against Burleson. Pretrial motions were scheduled to be heard today, followed by jury selection, Garrison said. Burleson is accused of planting a piece of computer software known as a virus in the computer system at USPA&IRA Co. A virus is a computer program, often hidden in apparently normal computer software, that instructs the computer to change or destroy information at a given time or after a certain sequence of commands. USPA officials claim Burleson went into the comapny's offices one night and planted a virus in its computer records that would wipe out sales commissions records every month. The virus was discovered two days later, after it had eliminated 168,000 records. I was about ready to nod off (again), but someone was knocking rather rudely on the door. Someone had called 911, in fact they called 911 three times in a row. I assured them that I didn't call but they wanted to look around and make sure I did have any dead bodies lying around so i ran in and put some pants on and unhooked the chain on the door. They checked out the living room, then headed to the bed rooms. One bedroom is a bed room and one is a computer center, radio room (ham) and electronic scrap room (my play room). Why did they have their guns out, I had forgotten that I had 2 UZI water guns hanging on the wall in my play room, that along with the radio, flashing lights and other terrors looking electronic gimos in the room, It must have spooked them a little. Well they finally figured out that the guns were plastic and that I didn't have any real bombs in the room, they put away their guns. I have no phone on the line, so it must have been the computer calling someone. I call a site with a phone number of 891-11xx and from the logfile I had called the site 3 times a short time before the police arrived. It looked like MA Bell had take a little to long to give dialtone and the first digit was dropped. We have had a variety of cases just like this in the past. But it serves as another reminder of how easily it can happen. EDU> Tue, 6 Sep 88 22:41 MDT Our local county government just worked a deal whereby for a small fee added to each customer's phone bill, the county's centralized 911 emergency switchboard would be provided with a display of all incoming phone numbers and addresses. I'm rather glad that the next time I call 911 all that information will be communicated automatically (but I hope it will still be verified orally whenever possible). However, I suppose that once we pay for the installation of the necessary technology the local telco will be able to sell it as a service to other businesses. As previous notes have suggested, there are many privacy issues to consider here but there are benefits that also need to be considered as well. NET> Tue, 6 Sep 88 11:00:22 PDT This discussion has gotten pretty far from RISKS. Consider a world in which, when you wonder into a shop with an idle question, the shopkeeper can, without your permission, divine your identity. There's a world of difference between "Good afternoon, what's your name?