| |
I am a hacker and you are afraid and that makes you more dangerous than I ever could be. |
|
RE: President Bush's Speech About Iraq - New York Times |
|
|
Topic: Current Events |
3:04 pm EDT, Jun 29, 2005 |
ibenez wrote: Sure dude. Your hatred for Bush makes you say really stupid things.
Oh really? -Rumsfield: “To my knowledge, I have not seen any strong, hard evidence that links the two.” (http://www.msnbc.msn.com/id/6180176/) -Lynne Jones, Labour Party (Tony Blair's party) lawmaker: any attempt to suggest that Iraq was a response to the September 11 attacks was "absolute nonsense." "There is absolutely no connection between Saddam Hussein and al Qaeda," (http://edition.cnn.com/2005/POLITICS/06/29/bush.intl/) And the grand trump of all, in Sept 2003: President Bush: "We have no evidence that Saddam Hussein was involved with the 11 September attacks," (http://news.bbc.co.uk/2/hi/americas/3118262.stm) Sure ibenez, Your Hatred of the Truth makes you say really stupid things. You can suck it now. RE: President Bush's Speech About Iraq - New York Times |
|
Most Significat Bit Labs :: AES-Crypt |
|
|
Topic: Technology |
12:05 pm EDT, Jun 29, 2005 |
AES-Crypt aes-crypt is a Java program to encrypt files using the AES algorithm with 128 bit keys. These keys are created by taking the MD5 hash of a word or phrase. It is part of a larger toolkit that will be released soon. aes-crypt requires Java Runtime Enviroment (JRE) 1.5 or greater to be installed. You may download the JRE from Sun's website. aes-crypt is released under the BSD License. See LICENSE for more details.
Fun Java project that I spun out of a Toolkit I'll be releasing at Phreaknic 9. Most Significat Bit Labs :: AES-Crypt |
|
President Bush's Speech About Iraq - New York Times |
|
|
Topic: Current Events |
10:38 am EDT, Jun 29, 2005 |
We did not expect Mr. Bush would apologize for the misinformation that helped lead us into this war, or for the catastrophic mistakes his team made in running the military operation. But we had hoped he would resist the temptation to raise the bloody flag of 9/11 over and over again to justify a war in a country that had nothing whatsoever to do with the terrorist attacks. We had hoped that he would seize the moment to tell the nation how he will define victory, and to give Americans a specific sense of how he intends to reach that goal - beyond repeating the same wishful scenario that he has been describing since the invasion. Sadly, Mr. Bush wasted his opportunity last night, giving a speech that only answered questions no one was asking. He told the nation, again and again, that a stable and democratic Iraq would be worth American sacrifices, while the nation was wondering whether American sacrifices could actually produce a stable and democratic Iraq.
President Bush's Speech About Iraq - New York Times |
|
RE: CNOOC: Unocal Bid Not About Politics - Yahoo! News |
|
|
Topic: Current Events |
10:16 am EDT, Jun 29, 2005 |
Rattle wrote: Two things that have been said often apply here. First, Chinese foreign policy consists of one word: oil. Second, its likely that any conflicts with China would be fought out on an economic battlefield. So what does everything think? Should we be concerned about this?
There is a book that talks about China's energy grabs. This book was written before 9/11, with half the book talking about oil, and half talking about water. The South China sea has the 3rd largest proven oil reserves in the world. The 1st is of course the Middle East (inside which the largest is on the "border" between Omar, Yeman, and Saudi Arabia. The 2nd largest in the gulf is in Iraq). The 2nd largest proven reserve in the world is the Caspian Sea. The book (remember, pre-9/11) mentions Hamid Karzai, and attempts by the US to build an oil pipeline across Afghanistan and Uzbekistan, including our deals with the Taliban. I'll come back to that, on to China. The UN has resolutions stating countries have mineral rights for 200 miles off their coasts. Lets look at that map here China has been claiming all these islands in the middle of the SCS, because they desire all this oil. These "islands" are covered by the tides for 3 months of the year! China basically claims the whole SCS. The author lists something like 13 or so military conflicts through 2000 between naval ships of the countries bordering the SCS. China has even invaded and controls some islands that belong to the Philippines. The author suggests that China isn't building its navy to invade Taiwan, but to control the SCS. Now, frame this in world politics. China is our largest enemy right now. They are advanced rapidly both technologically and economically. They have a huge standing army and their needs for oil are increasing at a very large rate, and their engery demands will surpass the US in 30 years. It is clear what the Iraq war is about: securing vital oil resources that we need to remain a super power. Human rights and "democracy" are just as worthless of an excuse as Germany saying it invaded Poland because of Polish saboteurs. RE: CNOOC: Unocal Bid Not About Politics - Yahoo! News |
|
Topic: Technology |
12:32 pm EDT, Jun 27, 2005 |
Sun Ultra 3 Mobile Workstations deliver all the performance and functionality of a Sun Blade workstation in a mobile form factor. Key Features * 64-Bit UltraSPARC Processors. * Solaris Operating Environment. * 802.11b wireless networking. * 15-inch and 17-inch TFT LCD displays. Specifications * Processor : 550 MHz or 650 MHz UltraSPARC IIi processor or 1.28 GHz UltraSPARC IIIi processor * Main Memory : Up to 2 GB DRAM, error correction SDRAM * Internal disk : 80 GB IDE or 73 GB UltraSCSI internal disk storage
Holy Christ! The battery life must blow! Sun Laptops |
|
CNN.com - Court: File-sharing services can be liable for music theft - Jun 27, 2005 |
|
|
Topic: Miscellaneous |
11:40 am EDT, Jun 27, 2005 |
Internet file-sharing services will be held responsible if they intend for their customers to use software primarily to swap songs and movies illegally, the Supreme Court ruled Monday, rejecting warnings that the lawsuits will stunt growth of cool tech gadgets such as the next iPod. The unanimous decision sends the case back to lower court, which had ruled in favor of file-sharing services Grokster Ltd. and StreamCast Networks Inc. on the grounds that the companies couldn't be sued. The justices said there was enough evidence of unlawful intent for the case to go to tria
Fuck! CNN.com - Court: File-sharing services can be liable for music theft - Jun 27, 2005 |
|
Topic: Miscellaneous |
11:10 am EDT, Jun 26, 2005 |
Google just added satellite view for most of the world. This link is something I found in the north east part of Austrailia. Its an insanely huge structure, and Google doesn't have any more zoomed in data. -Giant solar panel field? -Irrigation? -Eschalon listening post? Google Sightseeing: WTF? |
|
Topic: Current Events |
3:18 pm EDT, Jun 24, 2005 |
How can a man or woman who makes an eight-figure wage and lives in insane luxury really be a star in today's world, if by a "star" we mean someone bright and powerful and attractive as a role model? Real stars are not riding around in the backs of limousines or in Porsches or getting trained in yoga or Pilates and eating only raw fruit while they have Vietnamese girls do their nails. They can be interesting, nice people, but they are not heroes to me any longer
Ben Stein, author, actor, economist, speech writer, and pundt, column about how out of wack some of our perceptions are. Ben Stein's final column |
|
Exploitable Dialog Vulnerablity? Not really! |
|
|
Topic: Technology |
12:31 pm EDT, Jun 24, 2005 |
Secunia Research has discovered a vulnerability in various browsers, which can be exploited by malicious web sites to spoof dialog boxes. The problem is that JavaScript dialog boxes do not display or include their origin, which allows a new window to open e.g. a prompt dialog box, which appears to be from a trusted site.
Here is a full summary of the attack: -Standard Anchor tag in some original page has http://www.victim.com in HREF attribute. Clicking on it opens link as normal, in tab, new window, whatever. -Anchor tag also has an ONCLICK attribute, that runs some javascript when clicked -Javascript opens a very small attackwindow off the completely off the screen (varies with browsers). -The page opened in attack can be located anywhere on the Internet. It has a reference to original (which called it) gives original focus, thereby hiding attack from user's view. -attack uses timer to wait some specified value. Duringthis time http://www.victim.com finishes loading into normal. attack then opens a dialog box. -If the user hasn't gone crazy switching windows, tabs, etc. normal should be the top most window, with a dialog box from attack floating on it. attack is hidden off screen or under everything. -Any info user enters into this dialog can be processed by attack, since it spawned the box! Acidus' Assessment: Cool, but not dangerous. You are very limited in Javascript about the types of dialog boxes you can open for the user. None of them even remotely look like an authenication box, and only one input field can be on a dialog. To get a username password you would have to pop 2 windows sequentially. Very suspect. Exploitable Dialog Vulnerablity? Not really! |
|