Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
Technology
  (Computer Security)
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

What happened to Fringeware?
Topic: Computer Security 12:25 pm EST, Mar 10, 2004

] Security experts are expressing alarm at the company's
] plans for the product, set for release at month's end.
]
] Mike Erwin, Symbiot's president, and Paco Nathan, its
] chief scientist, are preparing for the release by posting
] a set of "rules of engagement for information warfare" on
] the company's Web site. They say such rules should be
] part of corporate security policy to help companies
] determine their exact response to an incoming attack.

Is that the same "Paco Nathan" who used to run Fringeware Review?

What happened to Fringeware?


My day as an election judge - Avi Rubin
Topic: Computer Security 10:56 am EST, Mar  3, 2004

] It is now 10:30 pm, and I have been up since 5 a.m. this
] morning. Today, I served as an election judge in the
] primary election, and I am writing down my experience
] now, despite being extremely tired, as everything is
] fresh in my mind, and this was one of the most incredible
] days in my life.

My day as an election judge - Avi Rubin


AP Wire | 02/12/2004 | State: Touchscreen ballots don't have to be recounted
Topic: Computer Security 2:37 pm EST, Feb 14, 2004

] "We're working very hard to educate the voters, to build
] the comfort level and to get rid of some of the myths out
] there," Hood said. "I think these things are raised for
] political purposes and distractions. Any effort to
] undermine that public confidence is a tactic that is
] wrong and I believe it weakens our democracy by causing
] voters to doubt if their vote has been counted."

The more elections commissions managers claim that its not important to think critically about this the more likely I think it is that they are hiding more then the fact that they spent tax payer dollars on vulnerable equipment.

AP Wire | 02/12/2004 | State: Touchscreen ballots don't have to be recounted


Javascript based MD5 'cracking' project
Topic: Computer Security 9:34 pm EST, Feb  5, 2004

I think this is mostly interesting because of the way that it works rather then what it does. I'm not convinced that if you find one collision in the hash space through a distributed computing effort you've ruined MD5. I don't think that this property is critical in most applications. But this is still interesting...

Javascript based MD5 'cracking' project


How We Are Fighting the War on Terrorism / IDs and the illusion of security
Topic: Computer Security 1:06 pm EST, Feb  3, 2004

] People who know they're being watched, and that their
] innocent actions can result in police scrutiny, are
] people who become scared to step out of line. They know
] that they can be put on a "bad list" at any time. People
] living in this kind of society are not free, despite any
] illusionary security they receive. It's contrary to all
] the ideals that went into founding the United States.

A fairly good article on why profiling doesn't work.

How We Are Fighting the War on Terrorism / IDs and the illusion of security


New virus infects PCs, whacks SCO | CNET News.com
Topic: Computer Security 9:27 pm EST, Jan 26, 2004

] A mass-mailing virus quickly spread through the Internet
] on Monday, compromising computers so that they attack the
] SCO Group's Web server with a flood of data on Feb. 1,
] according to antivirus companies.

That annoying virus in your inbox is an attack on SCO. Can someone tell the angry virus writing youth that as much as we understand their feelings this actually isn't helpful to anyone.

New virus infects PCs, whacks SCO | CNET News.com


Why NAT Isn't As Bad As You Thought
Topic: Computer Security 1:34 pm EST, Jan 16, 2004

] Now, this would leave you wondering, why on earth does
] anyone use this restrictive technology? The usual,
] superficial -- and incorrect -- answer is that it
] alleviates a shortage of public IP addresses caused by
] the original 32-bit address space conceived in an era
] before the Internet exploded in popularity. This has been
] repeatedly shown as bunkum.

The IETF anti-nat crowd has always struck me as odd. If you had IP6 you'd have real IPs in your internal network, which would mean that you won't have to think in order to manage IP allocation in a VPN. Thats nice. No one is going to replace the internet for it though. You're still going to have a firewall. People don't WANT end to end connectivity. Not even at home. It means you've got to lock down the security of every computer you own.

Why NAT Isn't As Bad As You Thought


2600 NEWS: A NEW HOPE ON THE HORIZON
Topic: Computer Security 11:47 am EST, Jan 16, 2004

] The brand new HOPE site has begun to take form. Our fifth
] conference is scheduled for July 9th through 11th in New
] York City at the Hotel Pennsylvania (where the last
] conference was).

Anyone want to hit a hacker con in NYC this summer?

2600 NEWS: A NEW HOPE ON THE HORIZON


News: AMD, Intel put antivirus tech into chips
Topic: Computer Security 4:08 pm EST, Jan 12, 2004

] Execution Protection by AMD, technology contained in
] AMD's Athlon 64 chips, prevents a buffer overflow, a
] common method used to attack computers.
]
] With Execution Protection, data in the buffer can only be
] read and, therefore, is prevented from doing its dirty
] work, John Morris, director of marketing at AMD, said in
] an interview Thursday at the Consumer Electronics Show
] here.

News: AMD, Intel put antivirus tech into chips


A Secure and Verifiable Voting System
Topic: Computer Security 1:58 am EST, Nov 26, 2003

] The cryptographer David Chaum, through discussion with
] top cryptographers such as Ron Rivest, has designed a secure and
] verifiable voting system.

I haven't read this yet, but Chaum rocks...

A Secure and Verifiable Voting System


(Last) Newer << 7 ++ 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 - 26 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0