Create an Account
username: password:
 
  MemeStreams Logo

Spontaneous Sociability and The Enthymeme

search

Rattle
Picture of Rattle
Rattle's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Rattle's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
  Music
Business
  Tech Industry
  Telecom Industry
Games
Health and Wellness
Holidays
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
Recreation
  Travel
Local Information
  SF Bay Area
   SF Bay Area News
Science
  Biology
  History
  Nano Tech
  Physics
  Space
Society
  Economics
  Futurism
  International Relations
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Security
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Cyber-Culture
   PC Hardware
   Computer Networking
   Macintosh
   Linux
   Software Development
    Open Source Development
    Perl Programming
    PHP Programming
   Spam
   Web Design
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

New Sobig Variant May Be Circulating
Topic: Computer Security 4:23 am EDT, Aug 28, 2003

] Romanian researchers claim to have discovered a variant
] of the Sobig.F virus that looks to mail and domain name
] servers at Time Warner Telecom for information about how
] to modify its behavior.

According to this, the new virus may be able to receive program updates by performing certain DNS queries or SMTP sessions to compromised servers.

New Sobig Variant May Be Circulating


Hackers cut off SCO Web site | CNET News.com
Topic: Computer Security 12:33 am EDT, Aug 26, 2003

] This weekend, a denial-of-service attack took down the
] Web site of The SCO Group, which is caught in an
] increasingly acrimonious row with the open-source
] community over the company's legal campaign against
] Linux.

Most under reported story of the day...

Hackers cut off SCO Web site | CNET News.com


Analysis of an Electronic Voting System
Topic: Computer Security 5:28 pm EDT, Aug 23, 2003

] Recent election problems have sparked great interest in
] managing the election process through the use of
] electronic voting systems. While computer scientists, for
] the most part, have been warning of the perils of such
] action, vendors have forged ahead with their products,
] claiming increased security and reliability. Many
] municipalities have adopted electronic systems, and the
] number of deployed systems is rising. For these new
] computerized voting systems, neither source code nor the
] results of any third-party certification analyses have
] been available for the general population to study,
] because vendors claim that secrecy is a necessary
] requirement to keep their systems secure. Recently,
] however, the source code purporting to be the software
] for a voting system from a major manufacturer appeared on
] the Internet. This manufacturer's systems were used in
] Georgia's state-wide elections in 2002, and the company
] just announced that the state of Maryland awarded them an
] order valued at up to $55.6 million to deliver touch
] screen voting systems.

The press claims this paper is discredited because Avi Rubin was involved with an electronic voting company. Read it for yourself and see what you think.

Analysis of an Electronic Voting System


ajc.com | Metro | Dare accepted on electronic voting machines
Topic: Computer Security 5:27 pm EDT, Aug 23, 2003

] Roxanne Jekot, a 51-year-old computer program developer from
] Cumming, said she and a few expert friends could crack Georgia's $54
] million touch-screen voting system in a matter of minutes.
]
] Bring it on, said state election officials.

Well, that's a nice change from the we-will-sue-you-into-quiet-submission thing that so in vogue these days..

ajc.com | Metro | Dare accepted on electronic voting machines


'Good' Worm Fixes Infected Computers (TechNews.com)
Topic: Computer Security 9:17 pm EDT, Aug 18, 2003

] A new Internet worm emerged today that is designed to
] seek out and fix any computer that remains vulnerable to
] "Blaster," the worm that attacked more than 500,000
] computers worldwide last week.

'Good' Worm Fixes Infected Computers (TechNews.com)


InformationWeek | Microsoft Stymies Blaster Attack
Topic: Computer Security 6:38 pm EDT, Aug 15, 2003

] Confirming the elimination of the address and the
] unlinking is easy. Entering www.windowsupdate.com in a
] Web browser results in a "The page cannot be found" error
] message within Internet Explorer, for instance. Earlier,
] typing in that address would have brought users to the
] WindowsUpdate site.
]
] The WindowsUpdate service, which is actually at the
] address of windowsupdate.microsoft.com, is still
] functioning. It's this URL, which Windows refers to when
] the Update Windows icon is selected from the operating
] system's Start menu. Users can thus reach WindowsUpdate
] either by typing in the windowsupdate.microsoft.com
] address manually, or as Microsoft recommends, selecting
] the icon from within Windows.

] "The worm's maker could have made it harder to do this,"

] That led him to speculate that the real goal of the worm's
] writer was not to do damage, but only to embarrass
] Microsoft. Other evidence, he said, including the fact
] that the attack was scheduled to begin exactly one month
] after the vulnerability was first disclosed.

InformationWeek | Microsoft Stymies Blaster Attack


Disclosure of Major Software Exploits by Students?
Topic: Computer Security 5:59 pm EDT, Aug  8, 2003

] "I am a U.S. university student who has recently come
] across 2 remote exploits for a homework program used by
] colleges nationwide. Both vulnerabilities allow students
] to give themselves arbitrary scores, and possibly execute
] arbitrary code. To further emphasize the scope of this
] vulnerability, I have written and -selftested
] proof-of-concept exploit code. Naturally, I want to share
] this information with their software engineers, and would
] even be nice enough and suggest a means to fixing it.
] However, with the state of current intellectual property
] and reverse-engineering laws, I hesitate to do so out of
] fear of litigation or academic disciplinary action. As an
] ethical geek, what do -you- do?"

this sounds familiar.

Disclosure of Major Software Exploits by Students?


Interz0ne Press Release - re: Blackboard Settlement
Topic: Computer Security 9:59 am EDT, Jul 16, 2003

From speech_freedom2002@yahoo.com Wed Jul 16 10:59:47 2003
Date: Wed, 16 Jul 2003 06:14:52 -0400
From: Rockit [speech_freedom2002@yahoo.com]
Reply-To: root@se2600.org
To: root@se2600.org
Subject: [se2600] Interz0ne Press Release re: Blackboard Settlement

Interz0ne Press Release:

Censorship via lawsuit wins again.

Lawyers working for Blackboard Inc., the maker of a card transaction, vending and ID system used by approximately 275 colleges and universities globally, as well as an undiscosed number of government and military installations, succeeded in silencing two college students who have found numerous flaws in Blackboard's flagship product over the last two years.

Georgia Tech student Billy Hoffman, along with University of Alabama student Virgil Griffith, initially kept the discoveries quiet while attempting to report them to Blackboard engineers, along with possible fixes. Traditionally, the discoverers of such flaws allow the vendors time to fix problems before going public; this provides the vendors with essentially free quality control labor while the discoverers get later bragging rights and items to pad their resumes. This unofficial system has worked well in the past, to the extent that Blackboard even boasts of working with the hacker community on their website.

Instead of taking an interest in news of these flaws, however, Blackboard engineers first dismissed Hoffman as a know-nothing "kid", then attempted to have him expelled from Georgia Tech after he voiced his concerns about Tech's Blackboard system to campus administrators and student organizations. Hoffman responded by first publishing his (and later Griffith's) findings, and then updating his articles via talks at various vendor and security conferences.

It was at such a conference, Interz0ne II in Atlanta, that Hoffman and Griffith were planning to discuss the most severe problems they had uncovered to date, including a demonstration of several easy-to-assemble hardware devices that could supposedly allow anyone with malicious intent free reign on a Blackboard system.

Hoffman and Griffith never gave their talk.

Instead, they and the convention organizers were served with both restraining orders and cease and desist orders. Court dates soon followed, along with legal threats. Several months after the convention, both Hoffman and Griffith settled out of court. They refuse to discuss the issue, so one can assume that the settlement includes an NDA.

Blackboard spokesdrone Michael Stanton stated to AP reporters on Monday, July 14th (a day before the settlement was officially filed) that "...the claims [Hoffman and Griffith] were making were silly," that "...they really didn't do a lot of the things they were claiming to [have done]" and that the settlement reaffirms that Blackboard's systems are secure.

Bullshit.

The settlement does nothing of the sort.

If Hoffman and Griffith's clai... [ Read More (0.4k in body) ]


The Register - Blackboard press release
Topic: Computer Security 7:25 pm EDT, Jul 15, 2003

] Blackboard said the settlement shows its systems are
] secure but the whole case is better understood as a
] successful attempt to protect the firm's reputation
] against the possibly exaggerated claims of a pair of
] student hacker/crackers

The register got caught up in the spin as well.

Since when is using the law an appropriate way to silence critics? Thats the very definition of censorship.

Can we accept that this is really the final word on the story, given that its coming from blackboard, and that Acidus and Virgil are injoined from responding?

Is Blackboard's technology secure?

We may never know. What we do know is that Blackboard has effectively silenced their critics, with extreme prejudice. My lawyer is bigger then your lawyer should not trump the first amendment. In this case it has. These student settled because they did not have the means to defend themselves.

Acidus and Virgil owe $20,000 in (clears throat) "legal fees." They are college students. They can't really afford this and they need help. If you would like to contribute, you can paypal the following email address: gte344p@prism.gatech.edu

(Above comments from Decius..)

I'll have more to say about this later, when I can sit down and type something up without the sound of truck stop poker video games ringing in my ears.

The Register - Blackboard press release


www.fuckblackboard.com
Topic: Computer Security 7:06 am EDT, Jul 14, 2003

Just caught this one in my inbox.. Psyiode has started up a site to keep track of the Blackboard case.

Its important to note that Psyiode has no connection to Acidus, Virgil, or any of the Interz0ne con staff. Blackboard may decide to come after him too.

I like the domain. :)

www.fuckblackboard.com


(Last) Newer << 10 ++ 20 - 21 - 22 - 23 - 24 - 25 - 26 - 27 - 28 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0