Well, we did the Puzzlehunt thing. What a ride. You can see all of the pictures and puzzles at the Puzzlehunt site.
Contrary to the way things must seem, overt.org is alive and kicking! We got back from MS, started another busy semester at UT, and now I’m focusing web-development efforts on the upcoming UT Puzzlehunt.
Well, we left M$ for good. We’re now in a Best Western in Spokane, about to hit the sack. the trip page has a few pictures. Tired now… must sleep.
I snapped a few pics at the intern party and stuck them in the “In Redmond” section of the trip page. Check them out.
I just wanted to let the millions of faithful visitors to overt know that I’m not neglecting my site. I’m simultaneously trying to master some photoshop kung-fu and rewrite the picture database for more convenient access (and to allow me to deliver it as a package for other sites to use). Keep your browsers peeled.
I’m trying to slim down things while making them richer. Part of the slimfast diet for overt is the addition of delicious multiple categories for pictures. That’s right! A picture can now be part of, say, “Climbing” AND “In Redmond.” The results can be seen immediately on the Trip page with the above combination. My eventual goal is to use one dynamic page to display all pictures, with user selectability in what pictures are viewed. So, if you want to see all the pictures from Little Si in a certain date range, that could be arranged. Whee.
More Climbing pics and a documentation of the NIN concert last night are up in the “In Redmond” pics area of the trip site.
Check them out.
We are still trying to identify the cracker who defaced peace-loving overt.org several days ago. While we do not have a complete description, we are fairly certain that he or she is an 31337 mAs73r and should be treated as potentially able, as one of our analysts put it “to hack his way out of a paper bag.” The ultra-high assurance security storage system for posting updates to overt (which relies primarily on such techniques as hard-coding passwords into public scripts and choosing hard-to-crack passwords such as the first name of a significant other) was compromised by the networking expert, who used the access to post confidential information about the personal relations of site administrators. Since the cracker went to great lengths to protect his identity and overt.org has a policy against IP logging, details on the attacker are sketchy at best. “We only know that his name is Jonathan Waltz, a resident of Houston, Texas pursuing two degrees at the University of Texas at Austin, with an affinity for creating swank-ass desktops with the gimp. We will have to do further research to determine what, if anything, he ate for breakfast this morning. He is a slippery one.”