I recently received some digests from Dave Piscitello\u2019s Weblog and visited his site. I am delighted to report that Dave has put together a valuable and entertaining site that readers will much appreciate, not only for its pointers to interesting articles and Dave\u2019s intelligent commentary, but also - especially - for his off-the-wall humor.The site can be found at:https:\/\/hhi.corecom.com\/weblogindex.htmDave is a highly respected computer scientist and president of Core Competence. His bio tells us:\u201cDave has been involved in internetworking technology for over 25 years. Prior to founding Core Competence, Inc., David won a Bellcore President's Recognition Award for his contributions to SMDS, ATM and customer network management for switched data services. Dave has authored books on internetworking and remote access, and publishes articles regularly on a variety of subjects, including switched internetworking, ATM and Gigabit Ethernet, Internet security, and virtual private networking. He is also chairman of NetWorld+Interop and TISC Program Committees.\u201dIn his commentary on one article, Dave writes, \u201cThe term deep packet inspection firewall has a Star Ship Enterprise connotation. It suggests that this radically new security system goes where no firewall has never gone before, into the brave new world of application headers and data.\u201d He adds ironically, \u201cDeep. Deeper. Deepest! Ooooooh, it must be better.\u201dIn the following report, remember that the descriptions apply to what I saw when I visited; contents change several times a week.The Anecdotes section has some interesting \u201cRisks Forum Digest\u201d-like entries and also some goofy stuff that\u2019s just fun.The Articles page links to Dave\u2019s recent articles; for example, there were some fundamentals papers on TCP, a link to \u201cThe Sad and Increasingly Deplorable State of Internet Security, a BCR Article,\u201d and \u201cBlocking Public Instant Messaging,\u201d among others.The Books page had a link to \u201cForeword to Network Analysis, Architecture, and Design\u201d Dave wrote for \u201cthe 2nd Edition of Jim McCabe's book, Network Analysis, Architecture, and Design.\u201dThe Firewalls section started with an interesting entry from July 12, 2003:\u201cDesign Rule #1: \u2018When you pretend to sell a firewall, ensure that it blocks traffic which it is not able to inspect\u2019\u2026 If there ever were a definitive list of firewall design rules, you'd have to conclude that if this isn't design rule number one, it's got to be in the top five.\u201dThe Hacking section had a entry on SNP-based attacks and another on developing and publishing outlandish attack methodologies. The latter ends with, \u201cGo review some code. Find a buffer overflow. Be useful, not clever.\u201dThe Personal section had an interesting comment about free speech for corporations and a criticism of the widespread, abusive practice of claiming that every corporation is \u201cthe industry leader\u201d in whatever they do.\u201cRant\u201d is a selection of recent critical commentary on news items; for example, when I visited there was an interesting analysis of Microsoft\u2019s claim to be providing free downloads of eBooks. Turns out the Microsoft site provides many links to eBooks that are readily available elsewhere.I\u2019ll stop at this point to let readers explore the rest of the site. There\u2019s plenty more: sections on Recent Decent Reading, Security, Speaking, Useful URLs, VPNs, Viruses and Worms, WLANs, Web Security and \u201cWindow$.\u201dGood work, Dave!