Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

Newsday.com - Technology
Topic: Computer Security 2:32 am EST, Feb 22, 2005

] The virus could wirelessly infect nearby phones.
] Susceptible devices are certain smartphones, a
] combination of a handheld computer and cell phone. The
] phones must have Bluetooth, wireless data transfer.

] Recipients would have to manually accept the infected
] file when a message appears on the phone's screen. The
] phone would then display text Caribe-VZ/29A, identifying
] the author's intended name for the virus, the author's
] initials and the hacker group.

] There's good news: So far it appears the worm hasn't
] penetrated the Big Apple.

Coming soon: "Someone in the area has a virus!" shouts coming from around you.

AND.. "Do you use protection?" jokes when transferring photos between phones.

Newsday.com - Technology


New York Post: New Yorkers find new way to be forcibly inconsiderate
Topic: Computer Security 3:13 am EST, Feb 21, 2005

] Illegal gizmos that interfere with signals and cut off
] reception are selling like hotcakes on the streets of
] New York.
]
] "I bought one online, and I love it," said one jammer
] owner fed up with the din of dumb conversations and
] rock-and-roll ringtones.
]
] "I use it on the bus all the time. I always zap the
] idiots who discuss what they want from the Chinese
] restaurant so that everyone can hear them. Why is that
] necessary?"

Eye spy with my little eye a store on 3rd that's going to be the site of a very public bust by a federal agency tasked with allocating and protecting the radio spectrum.

New York Post: New Yorkers find new way to be forcibly inconsiderate


Morris's Internet Worm Source Code
Topic: Computer Security 2:50 am EST, Feb  8, 2005

The complete commented source code of Robert Morris's worm, which brought the Internet to its knees in 1988

Morris's Internet Worm Source Code


Shmoo DNS attack
Topic: Computer Security 3:54 pm EST, Feb  7, 2005

Essentially the issue is that you can register domain names using international character sets that look exactly like English, and obtain SSL certificates for them, and it is extremely difficult for the end user to be able to tell that he/she isn’t dealing with the English website. Working example of https://www.paypal.com/ demonstrated.

Shmoo DNS attack


SecurityFocus - Hacker penetrates T-Mobile systems
Topic: Computer Security 4:19 pm EST, Jan 12, 2005

A sophisticated computer hacker had access to servers at wireless giant T-Mobile for at least a year, which he used to monitor U.S. Secret Service e-mail, obtain customers' passwords and Social Security numbers, and download candid photos taken by Sidekick users, including Hollywood celebrities, SecurityFocus has learned.

This might be the reason that my GPRS Bluetooth Internet does not work anymore. Their network appears to be riddled with holes and bad design. Apparently the only reason I had Internet dial-up access was because they expect the phones to be the point that authorizes access to the network, as opposed to some method that isn't inherently flawed. I can still find ways to get traffic through their current firewalls, although any way a full net connection could be established would require methods that would make it way more inefficient then it was when it worked normally. Right now, imaps and DNS look ups work for instance. That's both a UDP and TCP way to funnel a tunnel right there... Or you could just pay $19 a month for less then 19.2k worth of dropped TCP connections and spotty connectivity you'll use about once every three months.

Lets hear it for major telecommunication providers with ass backwards security. Phbttt..

SecurityFocus - Hacker penetrates T-Mobile systems


Hydan: Information Hiding in Program Binaries
Topic: Computer Security 6:44 pm EDT, Aug 12, 2004

] Hydan steganographically conceals a message into an
] application. It exploits redundancy in the i386 instruction
] set by defining sets of functionally equivalent instructions.
] It then encodes information in machine code by
] using the appropriate instructions from each set.

Hydan: Information Hiding in Program Binaries


Wired News: A Gathering to Hack the System
Topic: Computer Security 5:37 pm EDT, Jul 12, 2004

] An ominous drawing of a face sporting Hitler's moustache
] and a vampire's coif was emblazoned on the bright red
] banners that hung behind the speakers' podiums. Printed
] underneath the grim visage was a warning: "Big Brother Is
] Watching You."

Wired on this year's Hope.

Wired News: A Gathering to Hack the System


Hackers spread hostage video
Topic: Computer Security 4:07 pm EDT, Jun 18, 2004

] The origin of the video was traced to Silicon Valley Land
] Surveying Incorporated, a California land surveying and
] mapping company, said Spiegel online, the internet
] service for the respected German weekly.
]
] The magazine said that according to its research the move
] was the first time al-Qaeda had "hijacked" a website to
] broadcast its propaganda.
]
] The network usually spreads its message through Islamist
] sites but this time, Spiegel maintains, hackers created a
] special file at the company's web address at least an
] hour before global news agencies broke word of the video.

First report of Al'Q hackers

Hackers spread hostage video


Symantec Security Response - EPOC.Cabir
Topic: Computer Security 7:33 pm EDT, Jun 15, 2004

] EPOC.Cabir is a proof-of-concept worm that replicates on
] Nokia Series 60 phones. This worm repeatedly sends itself
] to the first Bluetooth-enabled device that it can find,
] regardless of the type of device. For example, even a
] Bluetooth-enabled printer will be attacked if it is
] within range.
]
] The worm spreads as a .SIS file, which is automatically
] installed into the APPS directory when the receiver
] accepts the transmission.

This one effects my phone. According to this, you have to accept the connection to be infected.

Symantec Security Response - EPOC.Cabir


Google Search: akamai
Topic: Computer Security 6:17 pm EDT, Jun 15, 2004

From isc.incidents.org:
] Starting at around 8:30 am EDT (12:30 UTC), a number of
] sources started to report a widespread Akamai DNS issue.
] Large web sites, which use Akamai for its DNS service, no
] longer resolved in DNS, and became inaccessible to their
] users. The affected sites were Yahoo, Google, Microsoft,
] FedEx, Xerox, Apple
and likely many others. The situation
] improved around 10:30 EDT, mainly because some of the
] affected domains temporarily switched from using Akamai
] DNS servers to their own DNS servers.
]
] The problems seem to be attributable to a DDoS attack on
] Akamai's DNS servers, though we do not presently have the
] information to make a definitive assessment. According to
] the Akamai spokesperson, the problem was not limited to
] Akamai. He attributed the outage to an attack on the
] Internet infrastructure on a larger scale. We do not
] currently know of any sites that were affected by the
] attack without using Akamai's services.

At least it wasn't the Roots/GTLDs..

According to Netcraft, it also effected antivirus update services for Symantec and TrendMicro.

Google Search: akamai


(Last) Newer << 6 ++ 16 - 17 - 18 - 19 - 20 - 21 - 22 - 23 - 24 - 25 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0