Monthly Archives: April 2013

Letter to Google Headquarters in CA, May of 2012 The freedom of communication, implied by the academic ideal of the Internet, is not as total as people commonly suppose. If you own a domain (large or small,) you could find … Continue reading

Link | Posted on by | Leave a comment

Letter to Google headquarters, August, 2012. Ad Revenue metrics are a legitimate digital security concern. In August 2012, it was my privilege to write Google’s headquarters in Mountainview, California, citing concerns that the hit counts used to determine advertising revenues, … Continue reading

Link | Posted on by | Leave a comment

Exponentiation (only) using integer arithmetic

To raise an integer “k” to the “n”th power: (Pseudocode) Input to the routine: k n set result = 1 // (Any integer raised to the “0” power = 1.) if the power is greater than 1 loop n times … Continue reading

Posted in Uncategorized | Tagged , , | Leave a comment

Exponentiation with modulo arithmetic

To raise base “base number” to the power of “exponent” modulo “modulus,” (Pseudocode) input to routine: base number exponent modulus Set result = 1 loop from 1 to exponent iterations result = result * base mod modulus Return result Iterate … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Family VPN gambit – a variation on the “Personal Cloud.”

“Personal Cloud” has been defined by usage as a person’s own slice of the world wide cloud. If a network administrator ran a family VPN on a private basis, he would be able to control the family’s own data and … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Predatory A.P.T.’s can corrupt backup systems.

In a research environment, where two companies are competing to build a proof of concept, or a prototype, a dirty trick an A.P.T. can employ, is to corrupt the backup stream. It is standard to do backups on a cycle. … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Why are backups hard to do?

Backups are hard to do because the reciprocal process of restoring data is complicated. A backup that cannot be restored is worse than no backup at all, since it has counterfeited peace of mind, with complacency. . Amateur administrators may … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment