Create an Account
username: password:
 
  MemeStreams Logo

Worthersee's MemeStream

search

Worthersee
Picture of Worthersee
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Worthersee's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
A Chronology of Data Breaches for 2007
Topic: Technology 5:18 pm EDT, Jul 30, 2007

The real danger is the gradual erosion of individual liberties through the automation, integration, and interconnection of many small, separate record-keeping systems, each of which alone may seem innocuous, even benevolent, and wholly justifiable.
-----U.S. Privacy Protection Study Commission, 1977

The Privacy Rights Clearinghouse (PRC) is a nonprofit consumer organization with a two-part mission -- consumer information and consumer advocacy. It was established in 1992 and is based in San Diego, California. It is primarily grant-supported and serves individuals nationwide.

The PRC's goals are to:
* Raise consumers' awareness of how technology affects personal privacy.
* Empower consumers to take action to control their own personal information by providing practical tips on privacy protection.
* Respond to specific privacy-related complaints from consumers, intercede on their behalf, and, when appropriate, refer them to the proper organizations for further assistance.
* Document the nature of consumers' complaints and questions about privacy in reports, testimony, and speeches and make them available to policy makers, industry representatives, consumer advocates, and the media.Advocate for consumers' privacy rights in local, state, and federal public policy proceedings, including legislative testimony, regulatory agency hearings, task forces, and study commissions as well as conferences and workshops.

A Chronology of Data Breaches for 2007


Halvar Flake tossed by U.S. Customs on way to BlackHat
Topic: Society 11:30 am EDT, Jul 30, 2007

U.S. Customs needs a 24/7 process where their agents can escallate a disagreement to someone who is not a complete fucking moron.

Policies like this are only hurting the digilantis' out there and other security professionals like Halvar.

Digilanti
n. Combining digerati expertise with vigilante initiative, the digilanti anonymously police the Internet, exposing scams and fighting spam in the interest of making the Web safe without government intervention.

Hopefully some better policies come out of the EU discussion on cyber-crime.

Because what Germany is doing would be comparable to a U.S. State banning guns. "Guns don't kill people; people kill people"

I say "Hacker tools don't hack systems; hackers hack systems."

Halvar Flake tossed by U.S. Customs on way to BlackHat


Google Code for Educators - Introduction to Web Security
Topic: Technology 10:47 am EDT, Jul 30, 2007

Nice to see a corporation reaching out to academia in this fashion. I'm sure part charity, part if you want something done right (in this case developer education), do it yourself.

Lectures

Coding Projects

Google Code for Educators - Introduction to Web Security


The Coming Software Patent Apocalypse
Topic: Technology 10:06 am EDT, Jul 30, 2007

Sounds MAD! Mutual assured destruction (MAD) is a doctrine of military strategy in which a full-scale use of nuclear weapons by one of two opposing sides would effectively result in the destruction of both the attacker and the defender.

Software patent does not have a universally accepted definition. One definition suggested by the Foundation for a Free Information Infrastructure is that a software patent is a "patent on any performance of a computer realized by means of a computer program".

There is intense debate over the extent to which software patents should be granted, if at all. Criticisms of software patents include:

* Whether software is patentable; and
* Whether the inventive step and non-obviousness requirement is too easily satisified for software.

The Coming Software Patent Apocalypse


Insourcing AJAX Programmer to Iraq?
Topic: Miscellaneous 11:03 am EDT, Jul 26, 2007

Summary:A principal Department of Defense agency is looking for programmers, developers or coders to code, support field deployment and maintenance of a new database application which will be used by Army units in Iraq. Scope These are full-time positions (12/7) located at one of the major US Bases in IRAQ. Deployment will be period of 6-12 months. Training on the application software will begin prior to deployment and will take place in Virginia. These positions are available for full time employment or for independent contractors. These positions are available now.

Seriously? There are so many things wrong with this. Guarantee DoD is mis-using AJAX. Could this be the first programmer to die for Web 2.0? Couldn't they just telecommute?

Insourcing AJAX Programmer to Iraq?


Apple anti-theft system would leave thieves powerless—literally
Topic: Miscellaneous 10:07 am EDT, Jul 26, 2007

The patent, titled "Protecting electronic devices from extended unauthorized use," outlines a technique that would allow a particular device to authenticate itself with certain, user-approved power supplies and devices so that it can only be charged by those devices. In a lot of ways, it's a lot like DRM, but for electronic devices.

Apple anti-theft system would leave thieves powerless—literally


Rockstar Sperm: For Sale
Topic: Technology 11:07 am EDT, Jul 23, 2007

The only thing better than Genius Sperm is Rockstar Sperm:

Rockstar Sperm: For Sale


Genius Sperm
Topic: Miscellaneous 12:36 pm EDT, Jul 22, 2007

Twenty years ago, on an outbuilding of his Southern California estate, tycoon Robert K. Graham began a most remarkable project: the Repository for Germinal Choice, a sperm bank for Nobel Prize winners. Part altruism, part social engineering, part science experiment, the repository was supposed to help reverse the genetic decay Graham saw all around him by preserving and multiplying the best genes of his generation. By the time Graham's repository closed in 1999, his genius sperm had been responsible for more than 200 children.

Genius Sperm


The Honor System
Topic: Business 2:28 pm EDT, Jul 17, 2007

Just about everything in civilization works on the honor system.

No armed guards at the local grocery store, no pat down as you leave the library. Most people cross the street without fear of crazed hit and run assassins.
...
When we move online, though, two things happen. First, word among the black hats spreads fast. One person starts ripping you off and suddenly it's a hundred.

Worse, the ripoffs and bad actions can scale. Sure, only one in a thousand email users is a spammer. But one spammer, aided by a computer, can send a million or more emails in a day. Suddenly, the people who violate the honor system are able to drown out the good guys.

Just like the real world, though, if you spend all your time preparing for and defending against the black hats, you'll never accomplish anything. If you assume that every single interaction online is fraudulent until proven otherwise, people will just move on to the competition.

So, online, you're between a rock and a hard place. The first opportunity is to treat your friends better than ever, because word of mouth online is incredibly powerful. The Net brings significant leverage--you can spread ideas farther and faster.

The Honor System


RE: The SPI laboratory : SPI Labs advises avoiding iPhone feature
Topic: Technology 1:37 pm EDT, Jul 17, 2007

Acidus wrote:

For example, an attacker could determine that a specific website visitor “Bob” has called an embarrassing number such as an escort service. An attacker can also trick or force Bob into dialing any other telephone number without his consent such a 900-number owned by the attacker or an international number. Finally, an attacker can lock Bob’s phone forcing Bob to either make the call or hard-reset his phone resulting in possible data loss.

Told you it would mention an escort service.

Should of said:
For example, an attacker could determine that a specific website visitor “Dick” has called an embarrassing number such as an escort service.

RE: The SPI laboratory : SPI Labs advises avoiding iPhone feature


(Last) Newer << 7 ++ 17 - 18 - 19 - 20 - 21 - 22 - 23 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0