Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  (Computer Security)
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Optical Emission Security FAQ
Topic: Computer Security 12:20 pm EST, Dec  2, 2004

I'm sure I saw this when it came out, but its a good hack. The glow from your monitor can probably be seen out of your window. If you slowed things down really slow it wouldn't appear as a glow, but rather a strobe, as the electron gun in your monitor sweeps across rows of phosphorus. If you recorded the flashes, and knew the rate at which the gun was sweeping, you could reproduce the image displayed on the screen. Nice...

Optical Emission Security FAQ


Inmarsat zapping
Topic: Computer Security 10:52 am EST, Nov 19, 2004

] Pirates are the heroes of age-old adventure stories, but
] most of us forget that whole regions still depend on
] modern pirates. The coast around Malacca in Malaysia is
] such a spot, together with the Bay of Thailand and the
] Southern Chinese Sea. In South America the coast of
] Northern Brazil is another centre of pirate activity. On
] average every other day sees an attack, and whenever
] pirates strike they leave good manners at home. Typically
] all people on board of a ship are killed, unless they
] manage to escape with a rescue boat. Most pirates know in
] advance if the ship and its cargo is worth an attack,
] because they use state of the art equipment to monitor
] Inmarsat communications and even fax transmissions
] listing every single cargo item.

An interesting article on snooping Inmarsat

Inmarsat zapping


Slashdot | Can Reverse Engineering Help In Stopping Worms?
Topic: Computer Security 11:20 am EST, Nov 15, 2004

] The paper is organized into five sections and two
] appendixes. Section 1 is the introduction. Section 2
] reviews basic x86 concepts, including registers,
] assembly, runtime data structures, and the stack. Section
] 3 gives a brief introduction to viruses, their history,
] and their types. Section 4 delves into the Beagle virus
] disassembly, including describing the techniques and
] resources used in this process as well as presenting a
] high level functional flow of the virus. Section 5
] presents the conclusions of this research.

The answer is yes.

Slashdot | Can Reverse Engineering Help In Stopping Worms?


Treemap: Home page
Topic: Computer Security 10:53 am EDT, Oct  7, 2004

] Treemap is a space-constrained visualization of
] hierarchical structures. It is very effective in showing
] attributes of leaf nodes using size and color coding.
] Treemap enables users to compare nodes and sub-trees even
] at varying depth in the tree, and help them spot patterns
] and exceptions.

A very interesting way to visualize a large amount of data on screen at one time.

Smarrtmoney.com has a realtime interactive graph of the stock market using this technology, but its a premium feature.

Treemap: Home page


MercuryNews.com | 09/20/2004 | AOL offers doubly secure log-ons
Topic: Computer Security 10:05 am EDT, Sep 21, 2004

] Passwords alone won't be enough to get onto America Online
] under a new, optional log-on service that makes AOL the
] first major U.S. online business to offer customers a
] second layer of security.

This is odd. AOL rolls out two factor authentication. I've been wondering when the banks would start doing this.

MercuryNews.com | 09/20/2004 | AOL offers doubly secure log-ons


CLASSIC ANTI-PIRACY ADS
Topic: Computer Security 6:42 pm EDT, Aug 28, 2004

Old school british anti software piracy ads. One encourages you to rat out your school teachers for cash.

CLASSIC ANTI-PIRACY ADS


Electronic Jihad predicted on the 26th
Topic: Computer Security 12:28 pm EDT, Aug 25, 2004

This is interesting, but let me quote another story:

] A coordinated online strike against Internet servers
] by terrorists, dubbed "electronic jihad," may or may
] not strike this week, security experts said. One
] security researcher in Moscow warned that Thursday
] would be the day in question.

A coordinated arial strike against corn silos by blue aliens, dubbed "Centauri Bebop," may or may not strike this week, SETI experts said. One SETI researcher in Arkansas warned that Thursday would be the day in question...

Electronic Jihad predicted on the 26th


Followup on SHA-1 break
Topic: Computer Security 9:51 am EDT, Aug 18, 2004

] Eli Biham announced new results in cryptanalyzing SHA-1,
] including a collision in a reduced-round version of
] SHA-1. The full SHA-1 algorithm does 80 rounds of
] scrambling. At present, Biham and Chen can break
] versions of SHA-1 that use up to about 40 rounds, and
] they seem confident that their attacks can be extended to
] more rounds. This is a significant advance, but it's
] well short of the dramatic full break that was rumored.
]
] Where does this leave us? MD5 is fatally wounded; its
] use will be phased out. SHA-1 is still alive but the
] vultures are circling. A gradual transition away from
] SHA-1 will now start. The first stage will be a debate
] about alternatives, leading (I hope) to a consensus among
] practicing cryptographers about what the substitute will
] be.

Answer, not a 5 alarm fire, but if you write or maintain cryptography code you can still expect some work coming up.

Followup on SHA-1 break


Wired News: Security Cavities Ail Bluetooth
Topic: Computer Security 12:20 pm EDT, Aug  6, 2004

] But experiments, one using a common laptop and another
] using a prototype Bluetooth "rifle" that captured data
] from a mobile phone a mile away, have demonstrated that
] such attacks aren't so far-fetched.
]
] Then, German researcher Herfurt developed a program
] called Bluebug that could turn certain mobile phones into
] a bug to transmit conversations in the vicinity of the
] device to an attacker's phone

Wired News: Security Cavities Ail Bluetooth


CoreLabs: Vulnerability in PuTTY
Topic: Computer Security 12:05 pm EDT, Aug  5, 2004

] We have found that by sending specially crafted packets
] to the client during the authentication process, an
] attacker is able to compromise and execute arbitrary code
] on the machine running PuTTY or PSCP.

CoreLabs: Vulnerability in PuTTY


(Last) Newer << 5 ++ 15 - 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0