Posts

Showing posts from March, 2005

Best language for illicit code

Image
So public safety comes into my room last night while I'm sleeping with a fanfare of the head of public safety head of network security and 10+ other people. They're ready to shut off the power and seize my computer. So I sat with them in the living room to answer some questions. Here is the conversation between the network security guy (herein: NSG) and myself:


NSG: We're here to talk to you about illicit computer usage
ME: Oh wow, what specifically?
NSG: According to some information on one of your websites, we have reason to believe that you have gained unauthorized access to some of our servers and/or network equipment.
ME: And why is that?
NSG: Apparently you have the ability to see if and given student is at their computer at the time
ME: Hmm, yes I do
NSG: So it seems like you have illegally accessed our router table to get this information
ME: Why don't I pull up the site so we can be clear on what you're talking about
NSG: Ok
ME: (typing)
Computer:Please enter a stude…