In praise of cheat sheets

While my days of being in engineering school are in the paleolithic era, I do remember a fondness for cheat sheets, especially when it came time to cram for exams. I was recently reminded of this while watching a movie about NASA’s mission control doings during the Apollo era. On the screen flashed the following handwritten cheat sheet, to be used when one of the spacecraft computers was showing a particular alarm code. I believe it was compiled by Jack Garman.

This struck me as fortuitous — as some of you might remember, when the Eagle lunar module from Apollo 11 was making its descent to the surface of the moon, it had set off a 1202 error code. The engineers had experienced this code in previous simulations, and within seconds were able to tell Armstrong and Aldrin to just ignore it and carry on: the code indicated that the computer was being overwhelmed with inputs. Given that computer had the processing power of today’s coffee pots (1 MHz processor with 150 kb of RAM), it wasn’t a show-shopper.

But it also struck me as somewhat amusing too. Here is NASA, spending billions of dollars inventing all this technology, and the success and failure of the first moon landing came down to some engineer putting this one-pager together that saved the day. Garman had memorized these error codes and was able to quickly respond to the flight controllers that the landing could continue.

If you want to read more about the circumstances around the moon landing, check out what I wrote about in 2009. There are some links to interesting web pages that show simulators for the guidance computers and also a real-time video and audio of the entire mission.

If you want to see some good examples of the cheat sheet genre, Peter Nikilow has collected hundreds of them on his Pinterest account. If you have your own favorites, put a link in the comments and say what makes it so.

Tech innovations we owe to HotOrNot

Nineteen years ago, I taught a high school computer networking class for ten boys. It was my first time in a classroom, which had a live network and Internet connection using a bunch of Windows 95 computers, hard wired via Ethernet. We had some fun times with the class, which lasted all year, and I am still in touch with many of the students today. I can’t imagine trying to teach a class like that via Zoom, but that isn’t why I am writing about the experience.

One of the more memorable moments was when some of the kids posted my picture on HotOrNot.com, a new website that just celebrated its 20th anniversary and got some mention in Mashable here. I would urge you to read the entire story, even if you are in a stable relationship and don’t have any use for dating or matching sites. The story notes the many places where HotOrNot was ahead of its time, and lay the foundation for many of the web technologies we have come to know and love today. For example, the site connected online and offline social interaction in new and useful ways. Now we take this kind of connection for granted. Some other ground-breaking things:

  • Gamified ratings of each participant’s photo, now enshrined in Likes and up-votes across all the social media platforms.
  • Word-of-mouth traction: traffic doubled every few hours in its first weeks. In the piece there is this charming story about how UC Berkeley engineers figured out the extra traffic was coming from one of their servers that had been connected without approval on the campus network.
  • They very quickly put in place a subscription model and became cash-positive by using auto-renewing subscriptions. That was a rarity then but now is so commonplace that you would be hard-pressed to find a website that doesn’t do this.
  • Outlandish promotional billboards. They put up one with the two founders mostly naked, strategically covered by their laptops with low scores. The founders were nerds, after all. This is way before Oracle and numerous other tech companies used similar tactics, not to mention every airport ad ever used by a tech vendor. Remember airport ads?
  • Something not seen currently were a series of anti-bullying measures, include great take-down response time if someone complained about their photo. It has taken many tech companies far too long to figure this out.
  • A real tagline: keeping the site “fun, clean and real.” Unlike other taglines (don’t be evil, say), they actually meant it and ran their company accordingly.
  • Eliminate needless clicks: when it was first conceived, there was a “click to submit” button. That was eliminated.
  • Virtual goods purchased through real money, typically with Western currencies that could retain their buying power if they lived in other parts of the world. Now we have Bitcoin.Not sure that is progress.
  • Mutual opt-in messaging, a precursor to many what many subscription and dating  sites do, and the model behind Twitter’s DMs.
  • Inclusive dating to the same-sex world. While not as inclusive as today’s alphabet soup of non-binary genders, it was still innovative in moving beyond hetero norms.
  • Speaking of gender, HoN also had several female managers way before it became a cause. Again, this has taken way too long to implement.

Network Solutions blog: How to Counter Darkweb Threats With Proactive Security

Most of us tend to think about the web as a single destination, available through our browsers on our laptops and phones. But over the years there is a much more sinister portion of the web, called the dark web that isn’t easily discoverable by traditional search engines and could contains threats to your business operations and harm your reputation. I describe this shady underbelly and what kinds of information is available there, along with suggestions of tools that you can use to be more proactive about your security such as EchoSec Beacon,  Dark Owl ScannerSixGill’s DarkfeedRecorded FutureZeroFox and Digital Shadows’ Searchlight. These tools can help to provide near real-time access to threat data that is being shared on the darkweb on a variety of discussion forums and other places, again as a way to learn about the early stages of an attack.

Read my post on Network Solutions blog here.

Avast blog: Zerologon is a Nasty Windows Server Domain bug: Patch now!

A new vulnerability in Windows domain controllers has been discovered by security researchers at Secura. In a published paper in September, they found the cryptographic flaw and called it Zerologon. It takes advantage of the Netlogon Remote Protocol that is used in the authentication process. All that is to exploit this flaw – and compromise a wide variety of Active Directory identity services — is a TCP-level connection to the domain controller itself. Secura published a test tool on Github that can tell you whether a domain controller is vulnerable or not. Researchers have seen evidence of its use in the wild already, which is why you want to patch your servers asap.

You can read more about this scourge on my Avast blog post.

Internet Protocol Journal: Selling my IPv4 block

If your company owns a block of IPv4 addresses and is interested in selling it, or if your company wants to purchase additional addresses, now may be the best time to do so. For sellers, a good reason to sell address blocks is to make money and get some use out of an old corporate asset. If your company has acquired other businesses, particularly ones that have assets from the early Internet pioneers, chances are you might already have at least one range that is gathering dust, or is underused.

So began an interesting journey for me and my range of class C addresses. It took months to figure out the right broker to list my block and to work through the many issues to prove that I actually was assigned it back in the mid 1990s. Thus began my own journey to correct this information and get it ready for resale. The process involved spending a lot of time studying the various transfer webpages at ARIN, calling their transfer hotline several times for clarifications on their process, and paying a $300 transfer fee to start things off. ARIN staff promises a 48-hour turnaround to answer e-mails, and that can stretch out the time to prepare your block if you have a lot of back-and-forth interactions, as I did.

You can read my report in the current issue of the Internet Protocol Journal here. I review some of the historical context about IPv4 address depletion, the evolution of the used address marketplace, the role of the block brokers and the steps that I took to transfer and sell my block.

FIR B2B podcast episode #142: Why B2B marketers should care about “The Social Dilemma”

The movie The Social Dilemma is now streaming on Netflix. It’s been widely reviewed, and most of the reviews are positive.  (You can read my review for his Avast blog here.) It combines documentary-style interviews with leading minds formerly at Facebook, Twitter, Uber, Instagram and so on, along with star turns from Shoshana Zuboff, Jaron Lanier and Renee Diresta. The thesis is that the social giants have sold us and our data down the river, and we now are stuck with the results.

Paul Gillin and I discuss the wider implications about the movie for B2B marketers, particularly for the tech world that we both know so well. While neither of us learned anything new, the movie does portray a dark and dangerous situation situation developing. We feel that the time has come for advertisers to band together to acknowledge that this is a problem, to fight platforms’ tacit support for conspiracies and hate speech and to educate the public about how to be careful in their own consumption of social media posts and misinformation. There are several privacy suggestions in both the ending credits of the movie and on David’s post that could be starting places for a discussion.

Earlier this summer a group of advertisers banded together to boycott Facebook. The NY Times wrote about the results here. Basically, while many advertisers went dark, most of them came back in August. The revenue impact on Facebook wasn’t significant and many smaller businesses really have no choice but to use the platform.

We’d love to hear from you with other suggestions on how we can work together to improve the social media landscape. You can listen here for our podcast commentary about the movie.

What is QAnon and why should you care?

I am not a big fan of conspiracy theories. As my wife has suggested, this practical reason makes more sense to me: the number of folks that have to be in on the secret have to be a very large number. It is far easier to just explain the “theory” as baloney.

Let’s talk about one of the biggest conspiracies sweeping the world right now, QAnon. Its adherents are a very scary bunch. It has gotten so popular that now they have hijacked what were normally causes for good, such as using  the #SaveTheChildren hashtag (as explained by the NY Times) to organize and recruit new members. They are so popular that a software development conference with a similar name has received registrations from people who can’t code. Last summer the FBI identified QAnon as a potential domestic terrorism threat, linking the group to the Tree of Life shooter.

“QAnon is a baseless internet conspiracy theory whose followers believe that a cabal of Satan-worshipping Democrats, Hollywood celebrities and billionaires runs the world while engaging in pedophilia, human trafficking and the harvesting of a supposedly life-extending chemical from the blood of abused children,” wrote The Guardian in a post earlier this summer. If you recall the whole PizzaGate fiasco a few years ago, that was their heretofore most infamous moment. (You can find references to that on your own.)

I will give you a lay of their landscape, and assure you that my hyperlinks go to legit sources that hopefully won’t amplify their messages of hate. And they have nothing to do with the delightful musical referenced in this image here.

Their membership, from various accounts, appears to be catching on. There are dozens of Republican congressional and local races with avowed QAnon supporters, including a couple running in safe districts that will most likely get elected. That is pretty depressing. One reason for their popularity is social media, which makes it easy for potential members to find like-minded individuals in their area to connect with. Facebook banned many QAnon groups in mid-August. When Twitter took similar action in July, it limited reposting features for approximately 150,000 accounts and banned more than 7,000 accounts outright.

But here’s the problem: banning this reprehensible speech isn’t the best solution. Unlike the “shouting fire in a crowded theater” (not that any theater right now is even close to crowded), these groups aren’t so easily silenced or adjudicated in a courtroom. The problem with an outright ban is that this almost always encourages the QAnon supporters to find other places to post their garbage and attract new followers. What is needed is to leave the original post (usually a video) and attach a piece debunking their claims. What Twitter did was to also downrank the Tweet and preventing any reposting. “This creates one location that can be used to offer debunking content, both as a pre-roll on the video and in the recommended next videos,” says Renee Diresta here. She goes into more detail in a Wired piece where she documents the path that many conspiracy adherents take, calling them Cult 2.0. She writes, “The social platforms are still behaving as if they don’t understand the dynamics at play.”.

Sadly, our cancel culture has made the problem worse. We need to operate with a more granular mindset if we want to prevent these hate groups from spreading. It is too bad that Facebook can’t seem to figure this out.

Avast blog: When not to accept cookies

Nearly any website you visit asks you to accept cookies, and most of us don’t even think about this choice — we just click “yes” to rid ourselves from the pain of the pop-up. But what are we really agreeing to? What is a cookie, anyway? These small text files were first used in browsers back in 1994 and soon became ubiquitous. Cookies can be used for both productive and evil reasons, and I try to sort them out and show you how to avoid them.

You can read more in my blog post for Avast here.

Avast blog movie review: The Social Dilemma

Earlier this month, Netflix started streaming the movie The Social Dilemma. It was first screened at Sundance earlier this year, and now is widely available. Since its release, it has been widely reviewed.

The film combines documentary-style interviews with leading nerds behind Facebook, Twitter, Uber, Instagram, etc. along with star turns from Shoshana Zuboff, Jaron Lanier and Renee Diresta. The thesis is that the social giants have sold us and our data down the river, and we now are stuck with them. The New York Times review is mostly positive, saying the interview subjects are “conscientious defectors from these companies who explain that the perniciousness of social networking platforms is a feature, not a bug.” The best interview subject is Tristan Harris, a former design ethicist at Google who now runs a non-profit called the Center for Humane Technology.

You can read my extensive review of the film on the Avast blog here. The film could be one small step to help understand the role that social media plays in our lives. It could  also help start some conversations with the less tech-savvy family members and friends.

You can also listen to my podcast as Paul Gillin and I discuss our reactions to the movie and what B2B marketers can takeaway from it.

Network Solutions blog: How to protect your organization from ransomware attacks

Ransomware attacks are still very much a threat, and the ease of perpetuating them is a big reason why. All it takes for a ransom attack to begin is for a single employee to click on a phishing email. Sadly, these attacks aren’t going away anytime soon. Your organization doesn’t have to be such a tempting target for ransomware attacks. There are a few simple ways to minimize your exposure and make it more difficult for attackers to gain a foothold.

You can read my post for Network Solutions blog here and review several practical suggestions on how to prepare your network for the eventual attack.