Welcome

(Contact Info: larry at larryblakeley.com)

Important Note: You will need to click this icon to download the free needed to view most of the images on this Web site - just a couple of clicks and you're "good to go." For reasons why - go here.

A listing and access link to all:
song lyrics and mp3 audio files http://www.royblakeley.name/larry_blakeley/songs/ (all of which are a part of this Web site) can be accessed simply by selecting the "htm" file for the song you want;

poetry http://www.royblakeley.name/larry_blakeley/poetry.htm;

quotations http://www.royblakeley.name/larry_blakeley/quotations.htm; and

essays written by Larry Blakeley http://www.royblakeley.name/larry_blakeley/articles/articles_larry_blakeley.htm,

all of which are used to tell the story in this Web site, can be accessed by going to each respective link set out above.

My son, Larry Blakeley http://www.royblakeley.name/larry_blakeley/larryblakeley_photos_jpeg.htm manages this Web site.

Major Roy James Blakeley (December 10, 1928 - July 22, 1965) - USAF (KIA)

When I was young my dad would say
Come on son let's go out and play

No matter how hard I try
No matter how many tears I cry
No matter how many years go by
I still can't say goodbye

- "I Still Can't Say Goodbye," Performer: Chet Atkins

MP3 audio file/lyrics http://www.royblakeley.name/larry_blakeley/songs/still_cant_say_goodbye.htm

For a larger image click on the photograph.


File Name: email_to_winkler20041015_2.txt

Subject:
Re: FW: "On Hiring a Virus Writer" vs. "Reflections on Trusting Trust"
From:
Larry Blakeley <larry@larryblakeley.com>
Date:
Fri, 15 Oct 2004 07:48:26 -0500
To:
"McAlearney, Shawna" <smcalearney@infosecuritymag.com>

Is that right? Well, maybe it needs to go "up-top" where it should be obvious to the "over 50 group of folks (and, big letters, with 1-1/2 spacing!)."

I have some wording at the bottom of my Web page, also. Have you seen it?

"For the attorneys:

All trademarks and registered trademarks contained in this Web site are the property of their respective owners. Besides, I'm poor - so leave me alone. I'm giving away the only thing I have of value to others."

And, yes - the term "giving away" does mean - FREE.

And, a large part of that "giving away" is interpreting just what the hell Mr. Winkler is professing, as he is spitting out his disdain for an 18-year old - youth.

I include my name, physical address, and email address - not an "interpreter" or intermediary's.

Besides, this is the least aspect of this problem being discussed? Or argued? Or, whatever this has grown into?

- Larry Blakeley (this is me - nobody to relay through. If I don't like what you say, I will just use my "delete" key. Nobody is too busy to talk to the troops, and keep the morale up - nobody, not even Mr. Winkler.)

***********************************************

File Name: email_search_security_blakeley_1_20041015.txt

Subject:
Re: FW: "On Hiring a Virus Writer" vs. "Reflections on Trusting Trust"
From:
Larry Blakeley <larry@larryblakeley.com>
Date:
Fri, 15 Oct 2004 01:28:46 -0500
To:
"McAlearney, Shawna" <smcalearney@infosecuritymag.com>

I am in a hurry. - Winkler

Maybe you need to lighten up a little, Mr. Winkler - or, you're liable to catch a "stroke."

This is what I get when I click on the link:

"You must be a registered /searchWindowsSecurity.com/ member to create a Sound Off handle."

In other words, "what good are you to the rest of us within the Pyramid of Knowledge chain of transferring the truth to others, if we cannot even get in touch with you?"

I wonder if by pissing you off - you felt compelled to answer?

******************************************************

"Frankly, I do not know what arguments you are making." - Winkler

And, I am not making any argument, but rather posed a question, as follows:

My question is "who is to be trusted, here?"

"Thompson, whoever he is ..... Ken Thompson, co-inventor (with Ritchie) of Unix http://www.cs.bell-labs.com/who/ken/ <http://www.cs.bell-labs.com/cm/cs/bib2html/ken.html>

******************************************************

"It is clear that they are completely unaware of the seriousness of their acts." - Ken Thompson

Mr. Winkler - Possibly, SecurePoint wants to learn how to combat others from repeating this 18-years old's virus creation abilities. They can probably hire him much cheaper than hiring you - and, besides, he may, in fact, know something you don't. And, your soooooo busy! I don't think the act of hiring him should piss you off so much - it seems a bit unrealistic to be so accusatory of the actions of some 18-year old, for goodness sakes. I mean, come on, do you open all attachments you get? But, what about the public - is there any responsibility on their part to be aware of what they are doing wrong to help propel these pesky viruses? And, are they, in fact, creating something much more damaging than it should be. And, just think - in a few more years, when everyone is "connected" 24/7 what it will be like. And, what about Microsoft and their failure to focus on security issues and holes in their software? What responsibility should Microsoft assume in reducing the damage done? Should Microsoft be billed for the enormous costs to American companies due to the loss of time, etc. as a direct result of their failures to deliver software that is less susceptible to these viruses. Or, since they, for the most part, know fully well that their software is extremely susceptible to these viruses - should some of them be put in jail, as well? Right next to the 18-year old that you bash. There's no way an 18-year old could come close to analyzing how fast and wide spread a virus can become when you combine faulty software with poor public "online practices.

And, you can write all the articles you want, but there are some of us that bridge the gap between folks like you and the general public that really need to understand "that what they don't know will hurt someone else."

I am as important in the chain of transferring information as you are - for I can listen to experts like you, make sure I understand it, analyze and summarize it, and then try to put it into more easily understandable language and situational examples for your messages of information to be distributed to a much wider audience then you could possibly do.
So, you need to lighten up on people like me that are actually serving more of your purposes than you have come to realize. Don't believe me? Just review my Web site at http://www.larryblakeley.com

My "pet-peeve" is getting conflicting messages from the commanders of knowledge and having to spend "extra" time to get a hold of them for an explanation.

Take your blood pressure and relax on the couch for a few moments, before becoming "very busy," again.

Larry Blakeley
Dallas, Texas

***********************************************
File Name: email_from_winkler20041015.txt

Subject:
FW: "On Hiring a Virus Writer" vs. "Reflections on Trusting Trust"
From:
"McAlearney, Shawna" <smcalearney@infosecuritymag.com>
Date:
Fri, 15 Oct 2004 00:08:44 -0400
To:
<larry@larryblakeley.com>

Hi Larry,

Please see the response below from Ira Winkler.

Shawna McAlearney
News Editor
SearchSecurity.com
Information Security magazine
TechTarget Security Media Group

http://www.SearchSecurity.com <http://www.searchsecurity.com/>
http://www.infosecuritymag.com <http://www.infosecuritymag.com/>

781-657-1676
_____

Frankly, I do not know what arguments you are making. In the quotes you use below, Thompson, whoever he is, states 20 years ago that hackers are improperly being portrayed by the media as some sort of geniuses. I basically claim that SecurePoint is trying to gain cheap publicity off the fact that an 18 year old, who is completely untrustable, is being portrayed as a genius because of the mere willingness to create hundreds of millions in dollars. SecurePoint, as a security company should know better, and should be held responsible by the security community. Both articles are completely consistent.

Concerning being "reachable," the article you refer to had a link to send messages. Just clicking that would get a message to me. Instead you want to be "coy" and do a lot of unnecessary work of just googling me. In addition to that, have you ever heard of spam prevention? Spam, probably the most dispicable computer crime outside of virus writing, has made many people remove direct contact info from the Internet. That is on top of the nuts and malicious mail I get from the self proclaimed hackers I have to deal with, because of my extensive writings on the subject. I am also deluged by product vendors trying to show me their one of a kind, revolutionary products. And yes, with all my writings, working, etc. I am very busy.

Which leads to the implication you make of mentoring the masses. There are easily over 100 articles by me on the Internet on many sites. Some are opinion pieces like this. Others are How-tos. Some are how to progress in the profession. Several of my works have been described as seminal works in the field, including my first book, Corporate Espionage.

So, I know this message is kind of pissy, but I believe the points you make are not correct, I am in a hurry, and if you did google me to find an address, you should have also found many of my contributions to the field that you don ' t seem to acknowledge. A pet peeve of mine, is getting messages from people saying "why don't I do more to mentor criminals and the like?" There is a great deal of my materials on the Internet, and if people want to learn there is more than enough information to keep them busy for years. Any person who wants someone to spend time mentoring them, should first prove they are worthy of mentoring and pay their dues in some way, that is especially not criminal. They should not expect to be spoon fed just because they have a passing interest in something. There are many people that I actively mentor, who worked hard to learn basic skills before coming to me and I will gladly make time for them as they have demonstrated a great willingness to put in long term effort.

Ira

***********************************************

File Name: email_to_winkler20041008.txt

Subject:
"On Hiring a Virus Writer" vs. "Reflections on Trusting Trust"
From:
Larry Blakeley <larry@larryblakeley.com>
Date:
Fri, 08 Oct 2004 09:52:42 -0500
To:
Ken Thompson <ken@entrisphere.com>, Ken Thompson <info@entrisphere.com>, Ira Winkler <info@isag.com>
CC:
Professor Michael Lesk <lesk@acm.org>

My question is "who is to be trusted, here?"

Is Mr. Thompson's remarks 2 decades ago obsolete today? Or, is the issue continually being muddied up by the media by publishing an article like Mr. Winkler's?

But, more importantly, in my opinion - do you point at the media for being misleading, or the experts, themselves? And, furthermore, are many of these "experts" becoming inaccessible to the folks up the "Pyramid of Knowledge http://www.larryblakeley.com/purposes_Web site.htm" that are trying to convey their messages (it has to be the truth, here, no substitutes) to others.

I have noticed a seemingly growing trend whereby the really "knowledge guys" are very, very, hard to get hold of. In fact, you really have to be pretty coy in your methods of reaching them by email.

Why does this seem to be happening today?

.".... what was the driving force of Tim Berners-Lee? http://www.larryblakeley.com/products/text_creation/office_suites.htm

What could be some of the reasons for some of the leaders of this field to abandoned this most respectable "higher calling?"

- "ulterior motives of self-interest at play? (http://www.larryblakeley.com/library_research_commercial/commercial_publishers_elibraries/20_front.jpg)

- just too busy, too many people pulling at their shirt-tails, and so on, and so forth.

And, is truth becoming an illusory concept today?

Is the method of warfare now "the scatter-gun" approach - in other words, it does not matter what you say, but rather how many poor souls you can reach through the internet, traditional media, or whatever, and convince that you are carrying the torch of "truth."

Those of us that have tried to learn and understand concepts and philosophies of life to pass on to others are left with no leaders of "truth" in order to carry-on their messages.

And, what's really bothersome is that this inaccessibility is happening in areas of social ills that truly have a resounding personal effect on people's quality of life. For instance, there are some "high-level" black Americans that are so far removed from being accessible to their grass roots people that I just wonder, "what good are they for the poor, despondent, etc.... that they supposedly represent?"

These are problems that need to be addressed and somehow resolved in a manner that is more in-tune with the new "information age."

In other words, "what good are you to the rest of us within the Pyramid of Knowledge chain of transferring the truth to others, if we cannot even get in touch with you?"

You can look at how I have addressed this email and tell I have mixed and matched names to go with the email addresses available, Neither Mr. Thompson, or Mr. Winkler are directly accessible. In fact, the email for Mr. Thompson is from his posting on his prior employer for so many years, Bell Labs.

Larry Blakeley
Dallas, Texas
http://www.royblakeley.name
http://www.larryblakeley.com
larry@larryblakeley.com

."...On top of all this, you have to ask why doesn't it (SecurePoint) hire one of the thousands of people deserving of getting a job first -- people whose only flaw is that they did not get a deluge of media attention by causing millions of dollars in damage.....

At the very least, hiring the virus writer demonstrates in advance that he is employable, and that he should be fully liable for all of the damage that he caused. ..."

- "On Hiring a Virus Writer," Ira Winkler, SearchWindowsSecurity.com, 08 October, 2004, http://searchwindowssecurity.techtarget.com/columnItem/0,294698,sid45_gci1012891,00.html

.".. The moral is obvious. You can't trust code that you did not totally create yourself. (Especially code from companies that employ people like me.) No amount of source-level verification or scrutiny will protect you from using untrusted code. In demonstrating the possibility of this kind of attack, I picked on the C compiler. I could have picked on any program-handling program such as an assembler, a loader, or even hardware microcode. As the level of program gets lower, these bugs will be harder and harder to detect. A well installed microcode bug will be almost impossible to detect.

After trying to convince you that I cannot be trusted, I wish to moralize. I would like to criticize the press in its handling of the "hackers," the 414 gang, the Dalton gang, etc. The acts performed by these kids are vandalism at best and probably trespass and theft at worst. It is only the inadequacy of the criminal code that saves the hackers from very serious prosecution. The companies that are vulnerable to this activity (and most large companies are very vulnerable) are pressing hard to update the criminal code. Unauthorized access to computer systems is already a serious crime in a few states and is currently being addressed in many more state legislatures as well as Congress.

There is an explosive situation brewing. On the one hand, the press, television, and movies make heroes of vandals by calling them whiz kids. On the other hand, the acts performed by these kids will soon be punishable by years in prison.

I have watched kids testifying before Congress. It is clear that they are completely unaware of the seriousness of their acts. There is obviously a cultural gap. The act of breaking into a computer system has to have the same social stigma as breaking into a neighbor's house. It should not matter that the neighbor's door is unlocked. The press must learn that misguided use of a computer is no more amazing than drunk driving of an automobile...."

- "Reflections on Trusting Trust," Ken Thompson, Reprinted from Communication of the ACM, Vol. 27, No. 8, August 1984, pp. 761-763. http://www.larryblakeley.com/index_of_contents.htm