Experienced Points: Piracy Numbers

By Shamus Posted Friday Feb 26, 2010

Filed under: Column 184 comments

I have to admit I’m suffering from a little DRM Discussion Fatigue. For the past few weeks I’ve said to myself, “That’s it, let’s talk about something else now.” And then I end up authoring another one of these things. Another chance to put a few more whip-marks on the festering horse carcass that is the piracy debate.

It’s not that this stuff isn’t important, it’s just that I’m saddened that it can’t go anywhere. Pirates won’t stop doing their thing. Publishers won’t stop escalating their DRM efforts. People like me aren’t going to just shrug our shoulders and stop caring about the rights and privacy concerns that have made us so cantankerous these last few years. While we continue to exchange information and in some cases we even come dangerously close to understanding one another, we never approach anything that might be called an agreement.

Next week I will do my utmost to talk about something else. Hopefully something frivolous.

 


 

Stolen Pixels #172: Gotham’s Latest Superhero

By Shamus Posted Friday Feb 26, 2010

Filed under: Column 46 comments

It’s the gosh-darn Batman!

 


 

Shamus Plays LOTRO: Part 6

By Shamus Posted Wednesday Feb 24, 2010

Filed under: Column 33 comments

When Boromir got turned into an Orcish pincushion, the rest of the party didn’t really have time to give him a proper burial. In their haste, the best they could do was put him gently into a boat, arrange the weapons of his foes around him, and send him downriver while Legolas and Aragon sang him about four pages worth of poetic tribute.

That’s what a half-assed funeral looks like in Middle-Earth.

Boromir was lucky they didn’t have time to give him a “proper” funeral.

 


 

Stolen Pixels #171: Probe Away

By Shamus Posted Tuesday Feb 23, 2010

Filed under: Column 33 comments

To be fair, I wrote today’s strip before you people beat the joke to death in the comments. But yeah. You’ve probably made the joke yourself by this point.

(The title is intended to be a notification, not an invitation. Just so you know.)

 


 

Spoiler Warning:
Mass Effect Part 7

By Shamus Posted Tuesday Feb 23, 2010

Filed under: Spoiler Warning 74 comments

Thanks to Krellen, Neothoron, and Dr_Zanzabar for adding commentary to the previous installments. I always look forward to seeing the white dots appear and reading what everyone has to say. This is odd, I know. We get lots of feedback here on the site in the form of comments. But seeing them attached to a timestamp gives them a context that makes them feel more like collaboration than a response.

I did find this part of the game to be kind of frustrating. After having everyone make such a big deal out of how important and powerful a Spectre is, it felt pretty stupid to wander around a hotel, being jerked around by the staff and getting involved in their petty infighting. Can you imagine Saren putting up with this crap?

 


 

PAX East

By Shamus Posted Monday Feb 22, 2010

Filed under: Personal 80 comments

To answer the dozen or so people who have asked if I was going to PAX East:

I waited too long and planned too little and didn’t save enough and it’s just not going to happen for me this year. Alas. I was looking forward to meeting a lot of people. Some are professional contacts and some are just fellow game enthusiasts. In both cases, I’m sorry I’ll won’t get to meet you this year.

But!

Next year. Next year there will be planning ahead. In fact, the planning has begun now. Looks like most of my gaming group will be going.

Observations:

1) We live about eleven hours away, which is an annoying distance. If we were just a couple of hours closer or a couple of hours further away then deciding how to travel would be easy. At eleven hours, it’s kind of too close to justify the expense of flying, and yet too far to drive. Flying means an hour and a half drive to the airport, two hours at the airport, about an hour in their air, a half hour to escape the place with our belongings, and another hour to secure transport and reach the hotel. So, about six hours. If we drive we’ll save hundreds of dollars and we’ll have our vehicle available when we get there. On the other hand, it would be really difficult to leave early enough to avoid missing the opening ceremonies.

2) If we were just a couple of hours away it might make sense to do just one day, but at this distance it’s an all-or-nothing deal. (Which is why this year we’re doing nothing.)

3) The door price is preposterously low. $50 for all three days. You’ll spend more than that on food in that time. It’s a fraction of what you’ll spend on travel, and almost nothing compared to what you’ll spend on accommodations.

Just curious: How many people here are going? (Or made it to PAX West last year?)

 


 

Malicious Spam Up 500% in 2009

By Shamus Posted Sunday Feb 21, 2010

Filed under: Random 176 comments

For the last several years malicious spam has held steady at around 600 million a day, but in 2009 it jumped up to 3 <carlsagan> billion </carlsagan> a day. (Malicious compared to simply unwanted. The “unwanted” numbers are much higher.) According to the report [pdf file] the increase was due to the increased proliferation and sophistication of botnets.

It’s interesting to note that Adobe Acrobat (and the Adobe product line in general) was by far the leading source of vulnerabilities. Which makes it humorously mysterious as to why the people who put the report together chose to package their findings inside of a pdf file. Okay, the report itself is not a source of infection, but the second biggest problem* with Acrobat is that people routinely use it for packaging information that would be more useful in simple HTML. Let us not further legitimize this practice using a document outlining the dangers of this practice.

Anyway. Botnets. Botnets is such a strange term. It makes it sound like there are these legions of networked robots, like the Geth all nestled into cold metal racks, ticking away the time thinking malevolent computer thoughts about the worthlessness of fleshbags. But the truth is that a botnet is simply a bunch of compromised machines owned by the clueless, the uneducated, the irresponsible, or the idiotic. When your friend asks you to come over and help fix their computer and you find the thing is overrun with mysterious and malicious processes, you’re not just looking at a hosed computer. The machine in front of you is most likely given over to the service of the baleful and dangerous machinery that poisons the network every day. People frequently gesture vaguely in the direction of Russia or China when speaking of mysterious cyber threats. But the real threat is coming from your buddy’s PC because he downloaded and ran a program he shouldn’t. The emails may have been authored in far-off lands (maybe) but they are being sent from his computer and millions of others like it.

My wife seems to be the go-to woman around here when computers go bad among friends and family. (People used to call me all the time for help with these sorts of problems, since I’m the “computer guy” to them. But every. single. person. owns a dog or a cat, and I’m very allergic. Which means I can safely and honestly refuse for health reasons instead of needing to invent some other excuse.) My wife is cursed with a rare form of perseverance and generosity that compels her to take on these sorts of jobs. She used to simply install AVG anti-virus and have it cleanse the machine, but over the years the threats have grown more sophisticated. She eventually encountered a machine that wouldn’t let her install SpyBot or whatever other tools she needed. The malware was purposefully defending itself. This, along with the risk of missing unidentified threats, caused her to adopt a scorched-earth policy: If you call Heather she will fix your computer. But she will do so by installing the operating system fresh. Oh? You’re disappointed that you lost all your settings and that cute little screensaver of the bunny you loved so much and now the machine has forgotten all your passwords and bookmarks? Well maybe next time you should think twice before downloading software from www.microsoft.f3gxq9i12p.com/totallylegit/trustus.html.

I kid. Sort of. It’s easy to get frustrated with people who fall into these traps, but the truth is that a lot of the knowledge we take for granted took years to acquire. How to spot a bogus URL. Or understand the difference between a link and the text that encapsulates it. Or spot a phishing email based on the lack of proper https. Or how to identify dangerous or potentially dangerous documents. (pdf files.) Or when a site or email is asking for information they should already have. Or how to tell that this popup window didn’t ACTUALLY scan your computer and find a bunch of viruses.

The truth is that you could spend many, many hours educating someone so that they don’t fall for these scams that seem to be so insultingly transparent to others. The problem is daunting. Most people don’t want to have to become computer literate in order to use the net. You don’t need to be “TV literate” or “phone literate” or “DVD player literate”. The knowledge you need to use these devices is small and the dangers of ignorance are small or nonexistent. But you can get yourself into a great deal of trouble with the internet, and if you screw up your problems become everyone else’s problem. What we’re seeing is a more perilous version of the “blinking 12:00” problem that we saw on all VCRs in the 80’s. The tech requires more education than 95% of the people are willing to acquire. (This isn’t just an age thing, either. There are plenty of young people who make these mistakes.) They see the PC as a piece of entertainment equipment (and for them, it largely is) and they just want to push the buttons and have it work. Historically, this isn’t an unreasonable thing to expect. Only now instead of having the VCR blink 12:00am to announce their lack of technical knowledge, their computer is conscripted into the service of people who are undeniably evil and destructive. It would be one thing if their computer just stole their credit cards and that was the end of it. But instead the machine begins sending out emails, posting comments to websites, co-opting the user’s Twitter and Facebook in order to ensnare their friends, and generally making a great deal of trouble for everyone else.

It’s a technical problem, but it seems to need a social solution.

* The biggest problem with Acrobat is the security vulnerabilities. The third is that it’s just plain awful software.