tonight marks my leap into cognac
the sweet smart flavor debut
mixed with a bitterness from my secret
for a night to never ensue
SCADA security references
NIST published their Critical Infrastructure Protection guidelines and I also noted the National Information Assurance Program (NIAP) Process Control Security Requirements Forum (PCSRF). Wish I had these references about four years ago. This is an especially interesting paper, which I think was done for the PCSRF and ISO/IEC 15408:
http://www.isd.mel.nist.gov/documents/falco/ITSecurityProcess.pdf
The Gas Technology Institute/American Gas Association Encryption page also has some good pointers and here’s the Department of Energy (DoE) guide to CyberSecurity.
Drinking Alone Under The Moon
by Li Bai
Among the flowers from a pot of wine
I drink alone beneath the bright moonshine.
I raise my cup to invite the moon, who blends
Her light with my shadow and we’re three friends.
The moon does not know how to drink her share;
In vain my shadow follows me here and there.
Together with them for the time I stay
And make merry before spring’s spend away.
I sing the moon to linger with my song;
My shadow disperses as I dance along.
Sober, we three remain cheerful and gay;
Drunken, we part and each goes his way.
Our friendship will outshine all earthly love;
Next time we’ll meet beyond the stars above.
Gopher eats Microsoft
Once upon a time, Georgi Guninski wrote AIX buffer overflows. Aleph One provided shellcodes. Now everyone hammers on Microsoft vulnerabilities and Bill Gates is retraining his employees for security awareness. That seems like a good idea as UNIX gopher servers could suddenly gain popularity again. Think your “internal” network is safe? Think again as one of your users might connect to a gopher site…oh, and all versions of IE are vulnerable. Go Minnesota!