Create an Account
username: password:
 
  MemeStreams Logo

eltit

search

jlang
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

jlang's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Mobile virus infects Lexus cars
Topic: Technology 3:13 pm EST, Jan 27, 2005

Lexus cars may be vulnerable to viruses that infect them via mobile phones. Landcruiser 100 models LX470 and LS430 have been discovered with infected operating systems that transfer within a range of 15 feet.

Mobile virus infects Lexus cars


Wired News - New Sanborn Interview
Topic: Technology 12:58 am EST, Jan 22, 2005

] The novel The Da Vinci Code is renewing interest in
] solving the puzzle of a cryptographic sculpture located
] at CIA headquarters. Only three people know the solution,
] but the sculptor now says two of them only think they
] know it.

Big front-page top-link article on Kryptos at Wired. Coolness. :)

I've been working with the reporter on this article for awhile now, and she really did her homework. I helped her get in touch with both Jim Sanborn and Ed Scheidt for interviews, and we tried really hard to get interviews with William Webster, Jim Gillogly, and even Dan Brown. I'm also pleased that the reporter posted an actual transcript of her Sanborn interview, since that gives us more to work with on analyzing his comments!

- Elonka :)

Wired News - New Sanborn Interview


Optical Emission Security FAQ
Topic: Technology 11:49 am EST, Dec  3, 2004

I'm sure I saw this when it came out, but its a good hack. The glow from your monitor can probably be seen out of your window. If you slowed things down really slow it wouldn't appear as a glow, but rather a strobe, as the electron gun in your monitor sweeps across rows of phosphorus. If you recorded the flashes, and knew the rate at which the gun was sweeping, you could reproduce the image displayed on the screen. Nice...

Optical Emission Security FAQ


RE: Followup on SHA-1 break
Topic: Technology 6:33 pm EDT, Aug 20, 2004

Decius wrote:
] ] Where does this leave us? MD5 is fatally wounded; its
] ] use will be phased out. SHA-1 is still alive but the
] ] vultures are circling. A gradual transition away from
] ] SHA-1 will now start. The first stage will be a debate
] ] about alternatives, leading (I hope) to a consensus among
] ] practicing cryptographers about what the substitute will
] ] be.
]
] Answer, not a 5 alarm fire, but if you write or maintain
] cryptography code you can still expect some work coming up.

Hal Finney has posted a nice writeup of Joux's SHA-0 result to the cryptography list. The implications are pretty significant for CHF design...

"Nevertheless, Joux's results cast doubt on the very strategy of building hashes out of iterating compression functions. It appears that there is no hope of creating hashes in this way which approximate the theoretical model of a random function, which is the usual design goal for hash functions. This will probably further motivate researchers to explore new directions in hash function design."

http://www.mail-archive.com/cryptography%40metzdowd.com/msg02611.html

RE: Followup on SHA-1 break


An Elliptic Curve Cryptography (ECC) Primer
Topic: Technology 2:56 pm EDT, Jul 22, 2004

This lengthy and highly technical primer provides a gentle yet thorough introduction to elliptical key cryptography (ECC), said to be ideal for resource-constrained systems because it provides more "security per bit" than other types of asymmetric cryptography.

An Elliptic Curve Cryptography (ECC) Primer


'Black box' cam for total recall
Topic: Technology 3:16 pm EDT, Jun 15, 2004

The prototype SenseCam takes an instant snap every time it spots changes in movement, temperature or light.

[...]

The camera uses accelerometers to detect motion, passive infrared to detect another human being, and digital sensors for light and temperature monitoring.

'Black box' cam for total recall


Caltech Engineers Design a Revolutionary Radar Chip
Topic: Technology 1:32 pm EDT, Jun  5, 2004

PASADENA, Calif. -- Imagine driving down a twisty mountain road on a dark foggy night. Visibility is near-zero, yet you still can see clearly. Not through your windshield, but via an image on a screen in front of you.

Such a built-in radar system in our cars has long been in the domain of science fiction, as well as wishful thinking on the part of commuters. But such gadgets could become available in the very near future, thanks to the High Speed Integrated Circuits group at the California Institute of Technology.

The group is directed by Ali Hajimiri, an associate professor of electrical engineering. Hajimiri and his team have used revolutionary design techniques to build the world's first radar on a chip--specifically, they have implemented a novel antenna array system on a single, silicon chip.

Caltech Engineers Design a Revolutionary Radar Chip


Lost cost countermeasures against compromising electromagnetic computer emanations
Topic: Technology 7:19 pm EDT, May  4, 2004

United States Patent 6,721,423

Lost cost countermeasures against compromising electromagnetic computer emanations

Abstract

A set of methods is specified whereby software reduces compromising electromagnetic emanations of computers that could otherwise allow eavesdroppers to reconstruct sensitive processed data using periodic averaging techniques. Fonts for screen display of text are low-pass filtered to attenuate those spectral components that radiate most strongly, without significantly affecting the readability of the text, while the character glyphs displayed are chosen at random from sets that are visually equivalent but that radiate differently. Keyboard microcontroller scan loops are also furnished with random variations that hinder reconstruction of the signal emanated by a keyboard. Drivers for hard disks and other mass-storage devices ensure that the read head is never parked over confidential data longer than necessary.

Lost cost countermeasures against compromising electromagnetic computer emanations


SecurityDocs.com
Topic: Technology 5:35 pm EDT, Apr 14, 2004

SecurityDocs.com is a directory of information security articles, white papers, and other documents that information security professionals find useful.

SecurityDocs.com


NANOG Security Curriculum
Topic: Technology 9:52 pm EST, Mar 26, 2004

] NANOG actively works to produce sessions and seminars to
] help foster security on the Internet. All sessions are
] taped and converted to streaming media for all to use for
] their personal education. Slides are available for each
] session as well. Over time, this effort has generated a
] valuable online tutorial for engineers and others seeking
] to learn more about running a more secure network.

Wow. Nanog has developed an awesome collection of security presentations for previous conference.

NANOG Security Curriculum


(Last) Newer << 1 - 2 - 3 - 4 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0