Showing posts with label earth shattering kaboom. Show all posts
Showing posts with label earth shattering kaboom. Show all posts

Saturday, November 12, 2022

Country Joe McDonald - Save The Whales

52 years ago today, the Oregon Highway Division tried to remove a whale carcass.  With dynamite


Now there's a country music song for just about anything, but not this.  The closest I could find was this one from Country Joe McDonald (front man for Country Joe and the Fish).  It's very 1970s earnest but that makes it a bit of a time capsule.  Looking back, you can see just how much has changed in the last half century.



Friday, August 26, 2022

The best argument in favor if a Taurus Judge

Dragon's Breath .410 Flame Thrower shotshells. Now I always considered the Judge to be a bit gimmicky, and these incendiary shotshells seemed that way, too - until I watched this video and saw a unique application for property defense come the End Times:


So you put some gasoline in some metal bottles (Bud Lite, anyone?) and hit it up with one of these rounds.  It seems to me that this would be pretty effective against groups looking to loot your place.  Spread the bottles around where you expect two legged varmints to congregate.

This is a very specific use case for what otherwise seemed gimmicky.  The downside is that these rounds look like they're $5 per round (ouch!).  Still, it's a use case that seems hard to get any other way.

Thoughts?  Weirdly, this seems to be illegal in Florida and Alaska, as well as the Usual Blue States.  What's up with FL and AK?

Tuesday, November 26, 2019

So we're finally out of Internet Addresses

Well, IPv4 addresses.  I think that this time it's for sure.  Maybe.

It doesn't look like it's making much - or any - difference.  For sure, nobody wants to run IPv6 - no doubt that most vendors "support" IPv6 only if you also run IPv4.  And at no time do their fingers leave their hands ...

The good news is that if everyone had to switch to IPv6, it would probably go decently well.  Sure a few things would break but they'd get fixed toute suite.  I mean, it's the Internet.  You bet they'd fix it.

The whole thing has been billed as an Earth Shattering Kaboom but has turned out to be a damp firecracker.

Thursday, July 25, 2019

Ten years ago on this blog

This cracked me up.

Give 'til it hurts

Ready to head out to the Goodwill store? Better go over the checklist of items to drop off:

Clothes the kids have outgrown? Check.

Ugly Father's Day neckties? Check.

Claymore landmine? Check.

A land mine recently left at a thrift store was authentic -- but luckily inert.

...

A Goodwill employee familiar with military explosive devices found the land mine. An area strip mall was evacuated and a bomb squad called in.
I blame the Gun Show Loophole. We clearly need some "Common Sense" Landmine Control laws.

Sunday, July 1, 2018

Fourth of July Classical Music

This is a post I put up a long time ago, but which captures the sense of classical music for Independence Day pretty well.

--------------------------

Canons and Cannons

[Originally posted June 26, 2011]

Row, row, row your boat ...

Every American child knows this song by heart.  Technically, it's called a "round", where different groups start singing the same things at different times.  It's simple enough to get large groups of children to do it at school concerts - and well done!  Having been to my share of school concerts (as both performer and listener), this is A Very Good Thing Indeed for teaching our children the basics of music.  It's a very old music form, dating from the High Middle Ages.  Keep the Dream alive, everyone!

But what happens if you complicate things just a bit?  Say, by adding an extra (and new) melodic theme to the plain, old, boring Round?  You get this:



It's called a "Canon", and Johan Christoph Pachelbel created what is undoubtedly the most famous version, composed in the 17th Century. Surprisingly, it was lost, and only re-discovered after World War I. I say "surprisingly" because this piece is hugely popular today. You've probably heard it.

But "Canon" is not the same as "Cannon", which involve not a chamber quartet, but black powder, but may involve a repeated theme (shelling the enemy).  It took until the 19th Century and Tchaikovsky to write a piece for orchestra and Field Artillery, but this is a doozy.  It's another piece that you've almost certainly heard before, the 1812 Overture, written to celebrate the defeat by the Russian Empire of Napoleon's Grand ArmeĆ© in 1812.  Literally, it was scored for orchestra and field artillery.  In other words, cannons.



And so, a single character makes a difference, but you'll get great music whichever way you like to spell canon/cannon.  I kind of think that my High School music teachers would be appalled reading this, but it's true.

Oh, and for a very politically incorrect and a totally awesome version of Earth Shattering Kaboomdone to the 1812 Overture, here's nuclear detonations to replace the puny 105 mm cannons.



Thursday, May 24, 2018

It's a beautiful day to dig up some mortar rounds

Tim Woler excavates some World War I munitions.  I can see why construction crews call in the archaeologists before building on what was the Western Front.


Quite a change from Hadrian's Wall, Tim.  I expect that if the Legionnaires on the Rhine Limes in 406 had some of these the whole history of the West might have been different.

Thursday, September 29, 2016

This is not the future I was promised

Samsung exploding washing machines.

I literally do not have anything to add to that, and all y'all know how wordy I usually get.

Friday, September 23, 2016

Doofus of the Day

Are you running late for a flight?  Worried that you're going to miss it?  Don't do this:
A Canadian idiot has been sentenced to a year behind bars after he was found guilty of calling in a bomb threat because he was running late for his flight. 
Michael Howells, 37, pleaded guilty to two counts of criminal mischief and received 12 months in jail along with a fine of CA$3,844.88 (US$3,000, £2,200). 
Howells was sentenced for the 2014 hoax when, running late for a flight from Kelowna, BC, he phoned in an anonymous bomb threat to the airport claiming the Calgary-bound plane he was due to fly on had been rigged with explosives. His plan was to cause takeoff to be delayed so he'd make the flight.
Good idea, Einstein.  Click through to read the hilarious story about how Officer Friendly apprehended Our Hero.  Snerk.

(Hat tip to Peter)

Thursday, September 15, 2016

Now you can kill any device with a USB port

There's all sorts of mischief you could do with one of these:
Once a proof-of-concept, the pocket-sized USB stick now fits in any security tester's repertoire of tools and hacks, says the Hong Kong-based company that developed it. It works like this: when the USB Kill stick is plugged in, it rapidly charges its capacitors from the USB power supply, and then discharges -- all in the matter of seconds.
On unprotected equipment, the device's makers say it will "instantly and permanently disable unprotected hardware".
I guess it's worth repeating my advice to be very suspicious of any USB stick you find lying in the parking lot.

The only good news about this is that the Bad Guy has to have physical access to the target device, but still ...

Wednesday, January 14, 2015

Computer attack wrecks steel mill

Joe emails to point out the large dollar losses that can be inflicted with the click of a mouse:
Amid all the noise the Sony hack generated over the holidays, a far more troubling cyber attack was largely lost in the chaos. Unless you follow security news closely, you likely missed it.
I’m referring to the revelation, in a German report released just before Christmas(.pdf), that hackers had struck an unnamed steel mill in Germany. They did so by manipulating and disrupting control systems to such a degree that a blast furnace could not be properly shut down, resulting in “massive”—though unspecified—damage.
There are other types of plants where the consequences would be equally grave - Plexiglas polymerization in the piping would be a Very Bad Thing Indeed, for example.  Chemical plants might even go boom.

And it doesn't look like the Security Team were asleep at the switch, either.  The plant wasn't exposed to the Internet like a lot of the Power Grid:
The report, issued by Germany’s Federal Office for Information Security (or BSI), indicates the attackers gained access to the steel mill through the plant’s business network, then successively worked their way into production networks to access systems controlling plant equipment. The attackers infiltrated the corporate network using a spear-phishing attack—sending targeted email that appears to come from a trusted source in order to trick the recipient into opening a malicious attachment or visiting a malicious web site where malware is downloaded to their computer. Once the attackers got a foothold on one system, they were able to explore the company’s networks, eventually compromising a “multitude” of systems, including industrial components on the production network.
My feeling is that the future will see the segmenting of networks into "ordinary business users" and "mission critical" with no connections whatsoever between them - exactly like the DoD unclassified and classified networks.  While this is no panacea, it makes it much, much more difficult to penetrate, and very likely requires physical access.  And a shout out to the retail industry: your Point Of Sale terminals should be separated from the rest of the network in exactly this way to avoid a repeat of the Target credit card breech.

Wednesday, February 5, 2014

The day the Air Force nuked Georgia

Well, dropped a nuke on it.  It was on this day in 1958:
The Tybee Island B-47 crash was an incident on February 5, 1958, in which the United States Air Force lost a 7,600-pound (3,400 kg) Mark 15 nuclear bomb in the waters off Tybee Island near Savannah, Georgia, United States. During a practice exercise, the B-47 bomber carrying the bomb collided in midair with an F-86 fighter plane. To protect the aircrew from a possible detonation in the event of a crash, the bomb was jettisoned. Following several unsuccessful searches, the bomb was presumed lost somewhere in Wassaw Sound off the shores of Tybee Island.

The F-86 pilot survived, as did everyone on the B-47.  The Wiki article (no doubt somewhat tongue in cheek) says that the crew observed no explosion when the bomb hit the water.  I can believe that.

There was supposed to be an Earth-Shattering kaboom ...

And so not only did the Air Force nuke North and South Carolina, they nuked Georgia, too.  Coincidence?

Monday, January 13, 2014

Our energy infrastructure has Swiss cheese security

I've been posting for something like 4 years that the security of industrial control systems (SCADA) that run our energy and other infrastructure is lousy.  Here's the latest:
Researchers have found vulnerabilities in industrial control systems that they say grant full control of systems running energy, chemical and transportation systems.

The vulnerabilities were discovered by Russian researchers who over the last year probed popular and high-end ICS and supervisory control and data acquisition (SCADA) systems used to control everything from home solar panel installations to critical national infrastructure.

Positive Research chief technology officer Sergey Gordeychik and consultant Gleb Gritsai detailed vulnerabilities in Siemens WinCC software which was used in industrial control systems including Iran's Natanz nuclear plant that was targeted by the US Stuxnet program.

"We don’t have big experience in nuclear industry, but for energy, oil and gas, chemical and transportation sectors during our assessments project we demonstrated to owners how to get full control [of] industrial infrastructure with all the attendant risks," Gordeychik told SC Magazine.
The bad news?  You can make a big boom taking over a refinery.  The good news?  The industry may actually be paying attention now ("we demonstrated to owners ...").

It would actually be a good thing if the NSA monitored these systems.  Do the Country a favor, NSA - focus on an actual threat (i.e. not us).

Tuesday, December 24, 2013

Tech community strikes back at the NSA

The IETF  is the Internet Engineering Task Force, the ones who work on and publish all the technical specifications for Internet communications.  It's been around forever and has enormous respect from pretty much everyone in the tech community.

A request has just been made to the IETF to remove an NSA employee as co-chair of one of the groups:
Dear IRTF Chair, IAB, and CFRG:

I'd like to request the removal of Kevin Igoe from CFRG co-chair.

The Crypto Forum Research Group is chartered to provide crypto advice
to IETF Working Groups.  As CFRG co-chair for the last 2 years, Kevin
has shaped CFRG discussion and provided CFRG opinion to WGs.

Kevin's handling of the "Dragonfly" protocol raises doubts that he is
performing these duties competently.  Additionally, Kevin's employment
with the National Security Agency raises conflict-of-interest
concerns.

...

While much is unknown about these activities, the NSA is known to have
placed a "back door" in a NIST standard for random number generation
[ECDRBG].  A recent report from the President's Review Group
recommends that the NSA:
 - "fully support and not undermine efforts to create encryption standards"
 - "not in any way subvert, undermine, weaken, or make vulnerable
generally available commercial software" [PRESIDENTS]

This suggests the NSA is currently behaving contrary to the recommendations.
The whole email is worth reading.  It presents multiple examples of NSA attempting to weaken the standard.  And the conclusion (while polite) is nuclear:
While that's of course speculation, it remains baffling that an
experienced cryptographer would champion such a shoddy protocol.  The
CFRG chairs have been silent for months, and haven't responded to
attempts to clarify this.


Conclusion
----
The position of CFRG chair (or co-chair) is a role of crucial
importance to the IETF community.  The IETF is in desperate need of
trustworthy crypto guidance from parties who are above suspicion.  I
encourage the IAB and IRTF to replace Kevin Igoe with someone who can
provide this.
The Internet community is starting to interpret the NSA as the adversary, and is starting to route around it.

Friday, August 30, 2013

Nice web server you got there. Be a shame if anything happened to it.

The Gaijin email to point out this reddit thread on the best way to code PHP to let remote web suers create new users (!) on the web server:
I have a form that creates a user by entering the username and their password. The code I'm using in php is:
shell_exec("sudo useradd -p $encpass -g groupname -s /bin/bash $username");
I have used a whoami and have confirmed that it runs as http. In /etc/sudoers I have
http ALL=(ALL) NOPASSWD: ALL
root ALL=(ALL) ALL
%wheel ALL=(ALL) NOPASSWD: ALL
%sudo ALL=(ALL) ALL
I also added http to group wheel. The problem I am having is it's not setting the password correctly. The user is created, just the password isn't set. I know that $encpass has a value because I can display it. I also know the command works because it runs fine in command line. This was working before, but I had to reinstall Arch Linux, so does anyone have an idea for why this doesn't work?
Angels and Ministers of Grace, defend us ...

Since this is reddit, hilarity breaks out:
RichieSM 760 points  ago
This is some of the most dangerous code I've ever seen in my life.
[–]RichieSM 337 points  ago
I also added http to group wheel.
Are you actually serious?
[–]TheManCalledK 382 points  ago
Dude, obviously Apache needs root. How else is the web server supposed to take over?
I, for one, welcome our new Apache overlords.
[–]RommelTJ 133 points  ago
More like the Apache Trail of Tears.
For those not Linux heads, some of the more patient redditers explain it to Our Hero:
h2ooooooo 94 points  ago
If I actually said that my username is ; rm -rf /, then it'd first run the command
sudo useradd -p $encpass -g groupname -s /bin/bash (which would most likely fail)
and then run the following command:
rm -rf / which will delete your entire operating system (force remove files recursing through directories starting from the base of / (every file)). You might have to use sudo rm -rf /.
This all requires that $username and/or $encpass comes from the user in some way (through POST, GET, etc.).
You see, this is why we can't have nice things on the Internet.  Jimminy Cricket on a motorbike, this is maybe the most colossally boneheaded code I've ever seen.  And I've seen rather a lot, sad to say.  A number of the redditers accuse him of being a troll, but I think the query was legit.  After all, this sort of security fail is so epic that it has its very own xkcd:


Epic thread is epic.  Just know that code like this "escapes" into the wild, sometimes in production systems.  Be afraid.  Be very afraid.


Thursday, July 4, 2013

Celestial fireworks

On this day in 1054, Chinese astronomers observed a new star in the heavens.  Its brightness waxed until it was visible not just at night but in the day as well.  They recorded that the new star lingered for some months before fading away.

It was Taurus A, a star 6,500 light years distant, blowing itself to smithereens.  What's left is the Crab Nebula, visible if you have a very clear night and a good set of binoculars.  Err, or a space telescope:



Wednesday, April 17, 2013

Bad idea

Hilarious bad idea.  Kind of what you'd expect from a site called ExplodingWhale.com.

You're welcome.  And this is pretty funny, the TV show "COPS" in the Star Wars galaxy.


Saturday, January 5, 2013

Landscape construction gone horribly wrong

The BBC used to air a show called Ground Force, where a team of quasi-amateurs would do a makeover on someone's yard over a weekend.  It was one of our favorite shows, and while the link is a pale ghost of the late and very much lamented program, it will give you the flavor of what they'd do (no embedding because the BBC have no idea of marketing in the Internet age..


That was landscape construction gone right.  If you mix in the team from the BBC's excellent Top Gear, you get a hilarious comedy of errors.







We laughed until we cried.  Sure do miss Ground Force, though.

Friday, December 21, 2012

Huh. Still here.

Stupid Mayans*.

Now I guess I have to fill out my HR self-evaluation for my annual review. Oh, and it's winter now** too.  Yay.

* Yeah, yeah, "Maya" not "Mayans".  Keep that up and I'm going to start talking about "high capacity ammunition clips".  Still trying to figure out just wtf the "shoulder thing that goes up" is, though.

** Congratulations to  my readers from the Antipodes, where it's now summer.  Me, I blame Global Warming for all the hot weather you've been having lately.