5 Dec 2005
(updated 6 Dec 2005 at 03:43 UTC) »
Public Notice: An Error Received at a US Military Recruiting Site
Pieces of following message sent to webmaster. Most trimmed with a link provided back to here due to a 255 character limitation in their web data entry form. I guess due to funding limitations they are reducing bandwidth requirement and total ascii reading volume sufficient to meet their mandated coordination with citizens or sovereigns at large on an individual basis. I wonder if they know Wikiversity is available for access to online expert volunteers interested in life long education?
I received this error message:
Web Site Certified by an Unknown Authority
* Possible reasons for this error:
- Your browser does not recognize the Certificate Authority that issued the site's certificate.
- The site's certificate is incomplete due to a server misconfiguration.
- You are connected to a site pretending to be www.cool.army.mil, possibly to obtain your confidential information.
Please notify the site's webmaster about this problem.
Before accepting this certificate, you should examine this site's certificate carefully. Are you willing to to accept this certificate for the purpose of identifying the web site www.cool.army.mil?
o Accept this certificate permanently.
o Accept this certificate temporarily for this session
o Do not accept this certificate and do not connect to this site
<button>OK</button> <button>Cancel</button> <button>Help</button>
Title: Certificate Viewer:"www.cool.army.mil"
Common Name (CN) www.cool.army.mil
Organization (O) U.S. Government
Organizational Unit (OU) USA ou=PKI ou=DoD
Serial Number 02:51:4D
Common Name (CN) DOD CLASS 3 CA-7
Organization (O) U.S. Government
Organizational Unit (OU) DoD
Issued On 11/3/2005
Expires On 11/3/2008
SHA1 Fingerprint 97:2C:8B:9A:EA:46:51:DO:A1:CF:C7:A4:49:AB:E3:58:80:5A:C2:92
MD5 Fingerprint 5A:68:FB:3F:35:2B:6E:EA:FF:D0:71:4B:F2:7C:43:95
-DOD CLASS 3 CA-7
| |--Serial Number
| |--Certifcate Signature Algorithm
| | |
| | |--Not Before
| | |
| | --Not After
| --Subject Public Key Info
| |--Subject Public Key Algorithm
| ---Subject's Public Key
| ---Certificate Authority Key Identifier
| ---Certificate Subject Key ID
| ---Certificate Key Usage
| ---CRL Distribution Points
| ---Certificate Policies
| ---Certificate Issuer Alt Name
|--Certificate Signature Algorithm
---Certificate Signature Value
For later maybe hacker lingo lesson Note to self, due to self lameness and/or laziness or self alleged learning deficiency with regard to computer languages, puns, relative merits, etc. simply make some money and/or pay brainiac if really a space freak really needs this level of specificity to complete a tech app. Remember to learn only enough of it to delegate effectively (hopefully little or none) and make the call. We are now going water skiing while the frackers (friendly hackers)(packers, green bay, political hackers, ph'd, political hackers divine) do it first (prototype to functional specifications) and then do it with us later in user orientation.
raph regarding Wikiversity and your frustration at lack of visible progress ... Wikipedia trust metric has been on hold primarily because we have been learning how to handle information categorization, filtering, censorship and dynamic allocation of write access to increasingly responsible persons of all ages, tongues, nations, oceans and religions. As useful groupings are found or proposed for testing and the educational value fades of overwriting graphiti someone reliable and respected (R&R) probably NOT associated with the anti cabal (ac) formed by direct collaboratory (ac) greenSpace faction allies ("24" is not A.C. Green, at least I do not think he/she/it is A.C. Green, much the same staying power but the English usage and primary interest seem markedly dissimilar) I suspect a slow phasin of current page edit access might be implemented between all the various interwiki infosphreres via an advogato style trust metric. Might lead to messy politics but hey, that human condition is better fought with ruthless abandon within an infosphere than on our precious and delicate oceans, deserts, mountains, valleys, forrests and plains. Maybe when the nanotech gets good enough to clean it up we can go back to depleted uranium thunderbolts at all scales and elevations.