Overhead vs Underground

Putting cables (electrical, coax, fibre – whatever) on existing poles, or even putting up new poles to carry a new service, seems like such an obviously cheaper and easier way to go. But is it really? Let’s look at some of the reasons why underground is almost always better than overhead – even though overhead looks cheaper.

Continue reading

Digital tear-gas

A discussion started on a network operators list I frequent, about a case where an apparently innocent party, Melbourne Free University, had had its website blocked. Aside from a terse “yes it’s blocked” from one provider concerned, no further information was forthcoming. Here’s one report about it. Continue reading

Malware and the question that never gets asked

Just read this article on the ABC website, about securing your enterprise against malware. They gave great advice – “detect and block at the perimeter and inside the network”, “assess and protect endpoints”, “analyse threats through context”, “eradicate malware and prevent reinfection”, “remediate attacks with retrospective security” and “be sure to implement integrated rules on the perimeter security gateway”. But one important bit of advice was missing.

Continue reading

Unforgettably yours?

On a mailing list that I frequent, someone recently posted a set of statements which gave me pause for thought. I thought about the millions (billions?) of personal details stored in private collections of personal details, also known as contact lists. And I thought about how little care we take about how we treat that information.

I will summarise the statements as follows:

  • I have a large address book of contacts, which is growing fast
  • I’m a member of multiple social sites, like Facebook, Twitter…
  • my contacts currently live in Google Apps
  • I want my contacts available in each service
  • I could import my address book into each service
  • but I’d like to automate it

Which led me wonder what details the writer might have collected about his numerous contacts. Name, address, phone, email, birthday…? And without asking all these people whether it’s OK with them, the writer is wanting and planning to dump their details (automatically if possible) into multiple privacy-hostile service providers’ databases. For the sake of convenience.

Given the state of privacy laws in Australia and their near-total lack of meaningful enforcement, no-one can stop this person doing whatever they like with whatever data they collect.

But if you are like this person, and think that my personal details are yours to do as you please with, and specifically yours to share with large commercial third parties whose avowed intention is to collect all the data in the Universe, I do have a request.

Please – forget me. Before you make me unforgettable.

A new direction

After much time thinking about it, I have kicked off a new business venture – Into6. The new venture specialises in IPv6 – training, analysis, consultancy, technical support, you name it. If you are interested in IPv6, do check out the Into6 website, because that is where I will be doing all my future blogging about IPv6. Over time I will move or copy the IPv6-related blog entries from this site to the Into6 site, too.

As part of starting up Into6, I’ve also set up a Twitter account (@intosix) and you are cordially invited to become a follower by clicking on the button below 🙂 The Facebook page is pretty much a placeholder for now.