Create an Account
username: password:
 
  MemeStreams Logo

Fickt nicht mit dem Raketemensch!

search

bucy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

bucy's topics
Arts
  Literature
  Movies
  Music
  TV
   Cartoons
Business
Games
  Video Games
   Console Video Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
  Environment
  Space
Society
  Politics and Law
Sports
(Technology)
  Computers
   Computer Security
    Cryptography
   Computer Networking
   Computing Platforms

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Microsoft Mum on Unix Licensing Move
Topic: Technology 4:01 pm EDT, May 19, 2003

] Microsoft Corp., which on Monday announced it was
] licensing the Unix source code and patent from the SCO
] Group, is remaining tight-lipped about its reasons for
] the move.

This keeps getting weirder and weirder...

Microsoft Mum on Unix Licensing Move


Game Over for Mod Chips?
Topic: Technology 12:20 pm EDT, May 15, 2003

] In February, the Feds seized the domain from David
] "krazy8" Rocci, a 22-year-old in Blacksburg, VA, who used
] the site to sell 450 Enigmah mod chips. After facing
] $500,000 in fines and five years in prison for allegedly
] violating the Digital Millennium Copyright Act, Rocci was
] sentenced in April to spend five months in the slammer
] and pay $28,500 in fines. That's an unprecedented ruling
] in the brief history of the DMCA. And it shows how this
] quirky gray market hardware is leaving so many companies
] and federal agents running scared.

Not really news at this point but anyway ...

Game Over for Mod Chips?


Wired News: Fraud Bust for 'Buffalo Spammer'
Topic: Technology 12:18 pm EDT, May 15, 2003

] NEW YORK -- The man known as the "Buffalo Spammer," who
] allegedly has sent 825 million unwanted e-mails, has been
] arrested and arraigned, New York State Attorney General
] Eliot Spitzer said Wednesday.

I'm somewhat wary of spam legislation but there's no question that it has become a colossal problem. At least 50% of the mail volume to my work mailbox is spam.

I think the fraud-oriented legislation is probably preferable to having the government define what spam is; spoofing mail headers, abusing other peoples' mail servers, etc, would be what the spammers might be prosecuted for. "Legitimate" spammers would have to have their own servers, not spoof and provide a real opt-out system. They'd probably also have a hard time getting connectivity.

Wired News: Fraud Bust for 'Buffalo Spammer'


Suit Settled for Students Downloading Music Online
Topic: Technology 1:43 pm EDT, May  2, 2003

] Settling lawsuits intended to strike fear in the hearts of
] college students who regularly download music over the
] Internet without paying for it, four students have agreed
] to pay the recording industry's trade association $12,000
] to $17,000 each over the course of the next three years.

Pffft.

Suit Settled for Students Downloading Music Online


Spam Sent by Fraud Is Made a Felony Under Virginia Law
Topic: Technology 3:23 pm EDT, Apr 30, 2003

] In the toughest move to date against unsolicited
] commercial e-mail, Virginia enacted a law yesterday
] imposing harsh felony penalties for sending such messages
] to computer users through deceptive means.

Lots of problems here; not clear what the right answer is.

Spam Sent by Fraud Is Made a Felony Under Virginia Law


Who knows the evil that lurks in the buffers of men? The Stack knows!
Topic: Technology 1:47 pm EST, Apr  1, 2003

] Firewalls, packet filters, intrusion detection systems,
] and the like often have difficulty distinguishing between
] packets that have malicious intent and those that are
] merely unusual. We define a security flag in the IPv4
] header as a means of distinguishing the two cases.

Who knows the evil that lurks in the buffers of men? The Stack knows!


IAB Concerns Regarding Internet Research and Evolution
Topic: Technology 10:51 am EST, Feb 26, 2003

This document discusses IAB concerns that ongoing research is needed to further the evolution of the Internet infrastructure, and that consistent, sufficient non-commercial funding is needed to enable such research.

This is a really cool ID ... and puts a finger on a trend that I've been vaguely aware of that the IETF seems to be spending more and more time designing SNMP MIBs and less time on fundamentals.

My boss (director of a lab at CMU) made a remark a few months ago
that sums up the problem: "Why should we work this if industry
can do it?" Academics are simply not interested in building
practical systems! They want to push the limits of the design space. They want to build something that is information-theoretically secure and completely useless in practice.

But industry doesn't seem to be able to do it either: they are
too often brain-damaged by a bean-counting, 6-month-returns mindset.

I would work on this stuff full-time if someone would pay me to do it but noone will since I don't have a PhD and if I did, I probably wouldn't want to anymore!

IAB Concerns Regarding Internet Research and Evolution


Xbox losses widen
Topic: Technology 1:08 pm EST, Feb  3, 2003

Losses at Microsoft Corp.'s Home and Entertainment segment, which includes the Xbox game console, nearly doubled in the last three months of 2002, the company disclosed in a regulatory filing Friday.

Xbox losses widen


Master-Keyed Lock Vulnerability
Topic: Technology 11:22 am EST, Jan 24, 2003

We describe weaknesses in most master-keyed lock systems, such as those used by offices, schools, and businesses as well as by some residential facilities (particularly apartment complexes, dormitories, and condominiums). These weaknesses allow anyone with access to the key to a single lock to create easily the "master" key that opens every lock in the entire system. Creating such a key requires no special skill, leaves behind no evidence, and does not require engaging in recognizably suspicious behavior. The only materials required are a metal file and a small number of blank keys, which are often easy to obtain.

Needless to say, the ability for any keyholder to obtain system-wide access represents a serious potential threat to the security of master-keyed installations. Individuals and institutions that depend on such locks to protect their safety and property should be aware of these risks and consider alternatives to eliminate or reduce their exposure to this threat.

Matt Blaze is at it again ... this paper has a Markus Kuhn / Ross Anderson flavor to it. (There is a news article in today's NYT about this paper.)

Master-Keyed Lock Vulnerability


Seattle Post Intelligencer Microsoft reveals secret source code to Russia
Topic: Technology 12:47 pm EST, Jan 20, 2003

This isn't really news; Windows source has been available to e.g.
academics for awhile, now.

Interesting to consider state governments adding their own spyware
to Windows, though.

Seattle Post Intelligencer Microsoft reveals secret source code to Russia


(Last) Newer << 9 ++ 19 - 20 - 21 - 22 - 23 - 24 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0