| |
Current Topic: Computer Security |
|
What happened to Fringeware? |
|
|
Topic: Computer Security |
12:25 pm EST, Mar 10, 2004 |
] Security experts are expressing alarm at the company's ] plans for the product, set for release at month's end. ] ] Mike Erwin, Symbiot's president, and Paco Nathan, its ] chief scientist, are preparing for the release by posting ] a set of "rules of engagement for information warfare" on ] the company's Web site. They say such rules should be ] part of corporate security policy to help companies ] determine their exact response to an incoming attack. Is that the same "Paco Nathan" who used to run Fringeware Review? What happened to Fringeware? |
|
My day as an election judge - Avi Rubin |
|
|
Topic: Computer Security |
10:56 am EST, Mar 3, 2004 |
] It is now 10:30 pm, and I have been up since 5 a.m. this ] morning. Today, I served as an election judge in the ] primary election, and I am writing down my experience ] now, despite being extremely tired, as everything is ] fresh in my mind, and this was one of the most incredible ] days in my life. My day as an election judge - Avi Rubin |
|
AP Wire | 02/12/2004 | State: Touchscreen ballots don't have to be recounted |
|
|
Topic: Computer Security |
2:37 pm EST, Feb 14, 2004 |
] "We're working very hard to educate the voters, to build ] the comfort level and to get rid of some of the myths out ] there," Hood said. "I think these things are raised for ] political purposes and distractions. Any effort to ] undermine that public confidence is a tactic that is ] wrong and I believe it weakens our democracy by causing ] voters to doubt if their vote has been counted." The more elections commissions managers claim that its not important to think critically about this the more likely I think it is that they are hiding more then the fact that they spent tax payer dollars on vulnerable equipment. AP Wire | 02/12/2004 | State: Touchscreen ballots don't have to be recounted |
|
Javascript based MD5 'cracking' project |
|
|
Topic: Computer Security |
9:34 pm EST, Feb 5, 2004 |
I think this is mostly interesting because of the way that it works rather then what it does. I'm not convinced that if you find one collision in the hash space through a distributed computing effort you've ruined MD5. I don't think that this property is critical in most applications. But this is still interesting... Javascript based MD5 'cracking' project |
|
How We Are Fighting the War on Terrorism / IDs and the illusion of security |
|
|
Topic: Computer Security |
1:06 pm EST, Feb 3, 2004 |
] People who know they're being watched, and that their ] innocent actions can result in police scrutiny, are ] people who become scared to step out of line. They know ] that they can be put on a "bad list" at any time. People ] living in this kind of society are not free, despite any ] illusionary security they receive. It's contrary to all ] the ideals that went into founding the United States. A fairly good article on why profiling doesn't work. How We Are Fighting the War on Terrorism / IDs and the illusion of security |
|
New virus infects PCs, whacks SCO | CNET News.com |
|
|
Topic: Computer Security |
9:27 pm EST, Jan 26, 2004 |
] A mass-mailing virus quickly spread through the Internet ] on Monday, compromising computers so that they attack the ] SCO Group's Web server with a flood of data on Feb. 1, ] according to antivirus companies. That annoying virus in your inbox is an attack on SCO. Can someone tell the angry virus writing youth that as much as we understand their feelings this actually isn't helpful to anyone. New virus infects PCs, whacks SCO | CNET News.com |
|
Why NAT Isn't As Bad As You Thought |
|
|
Topic: Computer Security |
1:34 pm EST, Jan 16, 2004 |
] Now, this would leave you wondering, why on earth does ] anyone use this restrictive technology? The usual, ] superficial -- and incorrect -- answer is that it ] alleviates a shortage of public IP addresses caused by ] the original 32-bit address space conceived in an era ] before the Internet exploded in popularity. This has been ] repeatedly shown as bunkum. The IETF anti-nat crowd has always struck me as odd. If you had IP6 you'd have real IPs in your internal network, which would mean that you won't have to think in order to manage IP allocation in a VPN. Thats nice. No one is going to replace the internet for it though. You're still going to have a firewall. People don't WANT end to end connectivity. Not even at home. It means you've got to lock down the security of every computer you own. Why NAT Isn't As Bad As You Thought |
|
2600 NEWS: A NEW HOPE ON THE HORIZON |
|
|
Topic: Computer Security |
11:47 am EST, Jan 16, 2004 |
] The brand new HOPE site has begun to take form. Our fifth ] conference is scheduled for July 9th through 11th in New ] York City at the Hotel Pennsylvania (where the last ] conference was). Anyone want to hit a hacker con in NYC this summer? 2600 NEWS: A NEW HOPE ON THE HORIZON |
|
News: AMD, Intel put antivirus tech into chips |
|
|
Topic: Computer Security |
4:08 pm EST, Jan 12, 2004 |
] Execution Protection by AMD, technology contained in ] AMD's Athlon 64 chips, prevents a buffer overflow, a ] common method used to attack computers. ] ] With Execution Protection, data in the buffer can only be ] read and, therefore, is prevented from doing its dirty ] work, John Morris, director of marketing at AMD, said in ] an interview Thursday at the Consumer Electronics Show ] here. News: AMD, Intel put antivirus tech into chips |
|
A Secure and Verifiable Voting System |
|
|
Topic: Computer Security |
1:58 am EST, Nov 26, 2003 |
] The cryptographer David Chaum, through discussion with ] top cryptographers such as Ron Rivest, has designed a secure and ] verifiable voting system. I haven't read this yet, but Chaum rocks... A Secure and Verifiable Voting System |
|