Friday, November 30, 2007
Fasthosts customers blindsided by emergency password reset
The Gloucester-based webhosting firm yesterday performed the emergency reset of control panel, PCP, FTP and SQL passwords that were not changed by customers when the intrusion was revealed.
Fasthosts customers blindsided by emergency password reset | The Register
Thursday, November 29, 2007
New Software Detects Web Interference
The San Francisco-based digital rights group Electronic Frontier Foundation hopes the program, released Wednesday, will help uncover "data discrimination" _ efforts by Internet providers to disrupt some uses of their services _ in addition to the cases reported separately by EFF, The Associated Press and other sources.
"People have all sorts of problems, and they don't know whether to attribute that to some sort of misconfiguration, or deliberate behavior by the ISP," said Seth Schoen, a staff technologist with EFF.
The new software compares lists of data packets sent and received by two different computers and looks for discrepancies between what one sent and the other actually received. Previously, the process had to be done manually.
Schoen compared the software to a spelling checker.
New Software Detects Web Interference | Chron.com - Houston Chronicle
Friday, November 23, 2007
United Airlines exploits tragedy in Brazil
I'm sure you've all heard the tragic story of Tony Harris by now...the son/son-in-law of a loving wife, a soon to be born child, a devoted step-father and his wife... Tony Harris goes to Brazil to play basketball and life takes a tragic turn... But...is United Air Lines hospitable? Sympathetic? NO! instead of giving the grieving step-father...
Digg - United Airlines exploits tragedy in Brazil
Wednesday, November 21, 2007
16 year-old 'hacker' designs Internet policy
Tom Wood has now become the subject of a slanging match between the Labor and Liberal parties.
Liberal Communications Minister, Helen Coonan, denies that Wood "hacked" the software filters, saying he bypassed them by gaining access to the administrator account on his computer.
16 year-old 'hacker' designs Internet policy - The INQUIRER
Thursday, November 15, 2007
Did NSA Put a Secret Backdoor in New Encryption Standard?
But one of those generators -- the one based on elliptic curves -- is not like the others. Called Dual_EC_DRBG, not only is it a mouthful to say, it's also three orders of magnitude slower than its peers. It's in the standard only because it's been championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.
If this story leaves you confused, join the club. I don't understand why the NSA was so insistent about including Dual_EC_DRBG in the standard. It makes no sense as a trap door: It's public, and rather obvious. It makes no sense from an engineering perspective: It's too slow for anyone to willingly use it. And it makes no sense from a backwards-compatibility perspective: Swapping one random-number generator for another is easy.
TAZ Forum :: A Computer, Gaming, and Social Network Community of Friends :: TAZForum :: View topic - Did NSA Put a Secret Backdoor in New Encryption Standard?
Saturday, November 10, 2007
Computer scientist fights threat of ‘botnets’
In a test comparing Nemean against a current technology on the market, both had a high detection rate of malicious signatures — 99.9 percent for Nemean and 99.7 for the comparison technology. However, Nemean had zero false positives, compared to 88,000 generated by the other technology.
“The technology we’re developing here really has the potential to transform the face of network security,” says Barford, whose research is supported by the National Science Foundation, the Army Research Office and the Department of Homeland Security. “Our objective is to build this company into a world leader in network securty solutions.”
Wednesday, November 7, 2007
The Opposite of Backup
In the early 1980s, George C. was IT support on a team overseeing a large installation of workstations. At the time, this was a pretty novel concept. Several Unix site managers applied to help out but wanted "too much money," according to management. Instead, the IT manager rounded up a bunch of recent college graduates (who were much cheaper). Problem solved.
There were roughly 80 workstations that were being installed, each with two 70MB drives. One drive kept the operating system files (which the users couldn't modify), the other was the user drive for work files. Each system was backed up and updated nightly with a three step process:
- Back up all files that have changed on each client's user drive.
- Replace old files on each client's system drive.
- Delete files that are no longer needed from each client's system drive. For this step it'd just remove any files from the system drive on the client's machine that didn't exist on the server so everyone had a consistent system drive.
The Opposite of Backup - Worse Than Failure
Saturday, November 3, 2007
Cross-Selling Online Scams and Security Issues
Slashdot | Cross-Selling Online Scams and Security Issues
Caveat Emptor - Use of Credit Cards On-Line « The 12 Angry Men Blog