American Le Mans at Laguna Seca

Saturday’s ALMS 6-hour endurance race at Monterey’s famous Laguna Secs was fantastic. The GT class was the most closely contested race I’ve seen in a long time, where the lead changed between the last turn and and the start finish, right in front of the main grandstands! Talk about excitement!

Watching, and photographing racing at night was a first for me. A learning experience, and despite this being my first attempt, I’m still happy with some of the images I was able to capture. Most of that I need to attribute to Canon’s fantastic 200mm f2.8 L glass (which I obtained from the L.A. Times a few years back).

So.. without further yammering, here are just a few of the shots that I’ve processed so far, that I like. Keep in mind that Word Press re-compresses the images so you lose clarity… when I get unlazy enough to replace Word Press with a better CRM (when.. maybe never…) this sort of thing will not be such an irritation to me.

In the mean time, it is what it is, and these are the results:


Astin Martin 007 - The name is Bond, James Bond.
Class champion M3 passing an LMP car entering Turn 2
Porsche 911 GT3 R Hybrid - it completely dominated GT.
One of two Patron Ferraris, this one entering turn 2
LMP entering Turn 2 under the lights
///M3 between turns 1 and 2
Corvette attempting an honorable mention finish, enters turn 2

American Le Mans – a few shots from qualifying

I shot over 500 photos yesterday at ALMS qualifying and practice. Here are few of those shots:

One hot car!

This happened early in the first qualifying session. The British, known for finding ways to make things leak, make the Jaguar, which dumped most of it’s oil on the track in the first turn:

British Fire - oil leak catches fire exiting turn 1.

Start Finish line into Turn 1

American Le Mans - Laguna Seca Turn 1

Turn 2 Action

American Le Mans - Turn 2 at Laguna Seca
Prototype enterting Turn 2
Ferrari self recovery - Turn 2
Patron Ferrari - Turn 2

Photos from the Paddock

American Le Mans - 911 GT3 Cup
Paddock - Volvo Touring Car

Important Browser Security Updates – CA revocation for DigiNotar

Over that last couple of days, most (hopefully all) of the Web clients (browsers) are being updated to revoke the CA (Certificat Authority) for DigiNotar. It’s important that you perform this update.

The reason is simple. They were hacked last week, and several bogus CERTs (SSL private/public key generated certificates used in secure HTTP communications) were issued for some very high profile websites.

You can read the gory geeky details on a recent Slashdot thread [ HERE ]. Additional information about the CA revocation can be read [ HERE ].

If you hadn’t already manually deleted the CA from your mail and web browsing applications, be sure to apply this update. If you have not been automatically notified of an update (SeaMonkey, Firefox and Thunderbird have all updated in the last 72 hours) I recommend you head to the home website of your favorite browser and see if a security update is available.

Helpful Browser Download Links

Safari

Google Chrome

FireFox

SeaMonkey

Opera

Internet Explorer

If you are still reading, you must be asking yourself, “Why is this important?”. It’s quite simple really (and actually rather complex, but I’ll try not to baffle with technobabble).

Hopefully, any time you communicate with a website that uses any type of password, you are ensuring you are communicating using SSL (Secure Socket Layer), which applies a certain degree of security by encrypting your traffic. The mechanics of this required that the website you are communicating with has a valid SSL Certificate issues for, and properly installed on their website.

Now, anyone can create their own SSL certificate by running a couple of X509 / keygen commands, and with a few lines of coded added to their web-browser, get it installed. Sounds simple enough still, right? The problem with that is, unless there is a centralized repository of people trusted to make these certificates, *anyone* could create a certificate for say.. BankofAmerica.com install it on *their* webserver, and apply some other social engineering techniques to fool you into thinking you are securely communicating with the bank, when in fact you are sending your data to, or even through (also known as a Man-in-the-Middle attack) some third party. With a few other hacks, they might even take over full DNS control of the BankofAmerica.com domain (this happened to UPS.COM just this past weekend, in case you wonder how that can happen). Bottom line, you want to know for CERTAIN that the site you are communicating with has a good, valid CERT issued by a reputable CERT issuing authority, not just some no-name criminal somewhere in Eastern Europe.

This trust is based on vetted, trusted, Certificate Authorities. If you want to look at he list of these trusted CA’s on your browser, it’s going to look at little mind boggling. Anyone on that list that issues a CERT for a website is automatically trusted by your software (and everyone else’s software too, unless you manually remove / revoke CA’s yourself, like I’ve done), so if anyone in that list has a compromised SSL signing system, then any CERT generated by that authority can no longer be trusted. This is the case with DigiNotar.

People far better at writing than I explain this further here: DigiNotar certificate authority breach: Why it matters [ link ]. I recommend you read it and learn a little something about how the web really works. I also suggest that if you are in business and depend on your website, you get some PROTECTION for your DNS with a product like this!: ActiveTrust DNS