Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  (Computer Security)
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Do You Email Under the Influence? Try ‘Mail Goggles’ » The StartUp Blog at PartnerUp
Topic: Computer Security 12:11 pm EDT, Oct 20, 2008

Google’s new test feature, “Mail Goggles,” part of the free Gmail service, can save those who send the occasional (or frequent) tipsy (or inebriated) email a whole lot of regret and an even bigger headache in the morning.

When the goggles are active, they will require you to solve a few easy math problems before you hit “send.” Basically Google’s logic is that if you’re sober enough to solve the problems, then you’re sober enough to deal with the repercussions of your actions.

Ha!

Do You Email Under the Influence? Try ‘Mail Goggles’ » The StartUp Blog at PartnerUp


Verisign and DNS Sec
Topic: Computer Security 10:12 am EDT, Oct  9, 2008

VeriSign, often criticized for trying to exercise too much control over the net, counter-proposes that its role be enlarged. Under its proposal (.pdf), the root zone file will be signed using keys it distributes to the root server operators and if enough of them sign the file, then it is considered official.

For some reason Verisign thinks they should be able to sign the root keys instead of ICANN. I can see absolutely no reason why that would be a good idea.

Verisign and DNS Sec


DNSSEC-bis for complete beginners (like me)
Topic: Computer Security 5:48 pm EDT, Sep 24, 2008

Below you will find explained all concepts of DNSSEC-bis in a way that furthers understanding.

A quick primer on DNSSEC, which you will need to understand shortly, I think.

DNSSEC-bis for complete beginners (like me)


Feds tighten security on .gov - Network World
Topic: Computer Security 2:33 pm EDT, Sep 22, 2008

All federal agencies are deploying DNS Security Extensions (DNSSEC) on the .gov top-level domain, and some expect that once that rollout is complete, banks and other businesses might be encouraged to follow suit for their sites.

Feds tighten security on .gov - Network World


More on BGP Attacks -- Updated | Threat Level from Wired.com
Topic: Computer Security 11:17 am EDT, Aug 27, 2008

you can read how Anton Kapela and Alex Pilosov conducted their interception of the DefCon network traffic in the slides from their talk (.ppt). Their DefCon presentation, by the way, was an unscheduled, last-minute talk that occurred at the end of the last day of the DefCon conference, so it hadn't appeared on the conference schedule.

Worth a look.

More on BGP Attacks -- Updated | Threat Level from Wired.com


Federal Judge Throws Out Gag Order Against Boston Students in Subway Case | Threat Level from Wired.com
Topic: Computer Security 3:18 pm EDT, Aug 19, 2008

U.S. District Judge George A. O'Toole, Jr., vacated the temporary 10-day restraining order that another judge had instituted last Saturday against the students and which was scheduled to expire today.

Federal Judge Throws Out Gag Order Against Boston Students in Subway Case | Threat Level from Wired.com


Slashdot | Evidence of Russian Cyberwarfare Against Georgia
Topic: Computer Security 4:48 am EDT, Aug 11, 2008

Many of Georgia's internet servers were under external control from late Thursday,' before the actual war began.

Slashdot | Evidence of Russian Cyberwarfare Against Georgia


Neosploit exploit kit shutters operations? | Zero Day | ZDNet.com
Topic: Computer Security 11:06 am EDT, Jul 29, 2008

“Unfortunately, supporting our product is no longer possible. We apologize for any inconvenience, but business is business since the amount of time spent on this project does not justify itself.

We tried hard to satisfy our clients’ needs during the last few months, but the support had to end at some point. We were 1.5 years with you and hope that this was a good time for your business.

Now we will not be with you, but nevertheless we wish that your businesses will prosper for a long time! Good luck all, The Neosploit Team!”

"We're legitimate business men!"

Neosploit exploit kit shutters operations? | Zero Day | ZDNet.com


Dutch chipmaker sues to silence security researchers | Tech news blog - CNET News.com
Topic: Computer Security 8:09 am EDT, Jul 13, 2008

Dutch chipmaker NXP Semiconductors has sued a university in The Netherlands to block publication of research that details security flaws in NXP's Mifare Classic wireless smart cards, which are used in transit and building entry systems around the world.

Dutch chipmaker sues to silence security researchers | Tech news blog - CNET News.com


Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com
Topic: Computer Security 11:32 am EDT, May 30, 2008

The computer attackers who took down Comcast's homepage and webmail service for over five hours Thursday say they didn't know what they were getting themselves into.

In an hour-long telephone conference call with Threat Level, the hackers known as "Defiant" and "EBK" expressed astonishment over the attention their DNS hijacking has garnered. In the call, the pair bounded freely between jubilant excitement over the impact of their attack, and fatalism that they would soon be arrested for it.

Neither hacker would identify their full names or locations. Defiant's MySpace profile lists him in Cashville, Tennessee, but he says that's incorrect. His girlfriend lists herself in New York. Threat Level expects both hackers' names and locations will emerge shortly.

This is entertaining... One of those cases where you really gotta sympathize with the perps. It was a prank - fairly innocent. Egg on Comcast's face for getting outsmarted by a couple of teenage pot heads. Hope they don't throw the book at them. This isn't the mafia here.

Comcast Hijackers Say They Warned the Company First | Threat Level from Wired.com


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 ++ 16 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0