DaVinci Code entertains despite reviews

Granted, I haven’t read the book, but I thought The DaVinci Code was a great movie. If I had to give it a rating on the usual 5-star system I’d probably give it 4 stars. Perhaps not reading the book has allowed me to be a bit more unbiased towards the movie? When I saw the horrible reviews the film was getting, I almost couldn’t believe it. I can’t remember ever seeing a Ron Howard film I didn’t like, so I thought I’d give it a shot. The film does a good job of presenting the story without demonizing the church. There are only 2, maybe 3 truly evil characters in the film. Obviously (to anyone who has read the book) the albino monk, as well as his boss at Opus Dei and a shadowy character know as the Teacher. Overall, I thought all of the actors played their roles extremely well. So, if you have an open mind, check it out and I’m sure you won’t be disapointed. And even if you don’t, it’s just a movie folks!

Wired posts full text of AT&T whistle-blower

Wired News: Whistle-Blower’s Evidence, Uncut

The online version of Wired magazine has posted one of the key documents in the AT&T wiretapping case. The document which I’ll mirror here goes into great detail about the history of the events in question. The implications of this document, if true, are pretty scary. If his claims are true, and they seem to be… AT&T and other major telecoms have been spying on us at the behest of the government since 2002.

Blue Security quits antispam biz

Blue Security folds under spammer’s wrath

Blue Security, the antispam service that automatically sent opt-out messages for its subscribers shutdown it’s service as it’s battle with the internet’s criminal underground escalated. What this highlights is the raw power held by internet criminals and the botnets they control. I think this is an example of why security professionals should avoid a direct response to internet attacks and rather use logging and filtering techniques. Instead of making yourself a target, you’ll block most of the harmful effects while at the same time gathering information on the attack that can be useful in prosecuting the offenders.