I am about quarter way into the project, and i don't feel like doing it any more ... I am actually ahead of the schedule that IT doesn't believe I can meet the deadline.
I've done almost no work since publishing my paper. Programmed a 3D-ish version of me old 2D program, but have been doing a steady round of website visits, watching/playing CS, and playing AC2 every now and again on campus. Plus this is the last week my advisor is going to be here at CMU, and he's been skipping out lately anyways hehe
It takes 43 muscles to frown and 17 to smile, but it doesn't take any to just sit there with a dumb look on your face.
So I've unloaded my old project that I was working on for the past six months onto the intern, so I've completely stopped working on that. That gives me time to work on Cedar Mill, though, which is fun. Cedar Mill is one of Intel's next desktop CPUs.
Dwindlehop wrote:So I've unloaded my old project that I was working on for the past six months onto the intern, so I've completely stopped working on that. That gives me time to work on Cedar Mill, though, which is fun. Cedar Mill is one of Intel's next desktop CPUs.
Clearly the solution to my problem is that I need an intern.
In other news, three of the computers in the sensor-based planning lab were compromised recently... (yes, the infamous rpc exploit which left ftp servers on port 48522. Refer to Dave for more info )
you know, exploit writers need to get their shit together and come up with a p2p message passing system for remote discovery of compromised boxes. that way you wouldn't have to leave a bloody ftp program on port 48522 every time you compromised a machine. static behavior makes it too easy to detect.
Dwindlehop wrote:you know, exploit writers need to get their shit together and come up with a p2p message passing system for remote discovery of compromised boxes. that way you wouldn't have to leave a bloody ftp program on port 48522 every time you compromised a machine. static behavior makes it too easy to detect.
If I remember correctly, quite a few of the advanced DDoS tools (TFN, etc) connect to IRC channels, presumably on random ports, since it's your computer initiating and not theirs. IRC channels make controlling contagious zombie machines all the easier.