Create an Account
username: password:
 
  MemeStreams Logo

Ramblings of an Partially Deaf Girl in a Selectivly Deaf Society

search

Palindrome
Picture of Palindrome
Palindrome's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Palindrome's topics
Arts
  Movies
  Photography
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
  Atlanta
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Wi-Fi Gmail and Flickr Enabled LCD Frame
Topic: Technology 10:29 pm EST, Dec 30, 2006

The eStarling frame is a standalone Wi-Fi LCD photo frame that connects to a wireless network and automatically displays photos e-mailed to it in a slideshow format. Additionally you can specify an RSS photo feed from Flickr based on your own tagged keywords. You can even shoot photos on your mobile phone then e-mail them directly to your eStarling frame for display.

They are not taking orders right now but this rocks. It reminds be of an entrancing LED sign with up to the minute headlines

Wi-Fi Gmail and Flickr Enabled LCD Frame


ABC News: NASA Plans First Night Launch Since Columbia Disaster
Topic: Technology 6:07 pm EDT, Oct  1, 2006

NASA said it hopes to launch space shuttle Discovery on its next mission on Dec. 7, a week earlier than previously planned.

If the liftoff happens then, it would take place at 9:38 p.m. ET, the first nighttime launching of a shuttle since the Columbia disaster in 2003.

Road Trip!

Night launches are suppose to be even more awesome then regular launches!!! Definately a must see

ABC News: NASA Plans First Night Launch Since Columbia Disaster


Time Machine - Discover Magazine - science news articles online technology magazine articles Time Machine
Topic: Technology 7:49 pm EDT, Oct 24, 2005

SOMETIMES, WHEN THINGS GET SUFFICIENTLY WEIRD, SUBTLETY NO longer works, so i'll be blunt: The gleaming device I am staring at in the corner of a machine shop in San Rafael, California, is the most audacious machine ever built. It is a clock, but it is designed to do something no clock has ever been conceived to do—run with perfect accuracy for 10,000 years.

Time Machine - Discover Magazine - science news articles online technology magazine articles Time Machine


The Gadgets Page - Gadget news and reviews for the real world
Topic: Technology 10:59 pm EDT, Sep 18, 2005

Holy Shit!!!

What do you get if you cross an IPod, a Winter Jacket, and James Bond???!!!

Wow

The Gadgets Page - Gadget news and reviews for the real world


Apple blunder gives Gates iPod royalty
Topic: Technology 7:39 pm EDT, Aug 14, 2005

Apple Computer may be forced to pay royalties to Microsoft for every iPod it sells after it emerged that Bill Gates's software giant beat Steve Jobs' firm in the race to file a crucial patent on technology used in the popular portable music players.

Apple blunder gives Gates iPod royalty


Mike Lynn is a Whistleblower, he should be protected
Topic: Technology 10:09 pm EDT, Jul 28, 2005

The EFF should support Mike Lynn in his defense against ISS and Cisco. If security researchers are not protected as Whistleblowers when they uncover major flaws, our critical communication infrastructure will be at serious risk. These are the Good Guys.

Mike has taken on enormous personal risk to do the right thing. So far, the general impression in the blogs is that he is doing the right thing. The mainstream media coverage has been good as well. This is a departure from the past, and a good one at that. The headlines contain words like "Whistleblower" and "Coverup"..

It is quite ironic that Cisco & ISS are taking the "Intellectual Property" tactic. Just to add some irony to it, here is a a post of Mike Lynn here on MemeStreams proving CherryOS stole OSS code from the PearPC project:

just incase anyone didn't believe them already here goes the analysis (I do this sort of thing for a living) first off CherryOS.exe is what we call in the security industry "packed", that means that they have taken a compiled binary and run it through an obfuscator to make it hard to reverse engineer (or at least with hard if all you're doing is strings)...this is common for virus writers, worm writers, 31337 bot net kiddies, and on the legitimate side, game developers do this a lot...its not very common among the commercial (or free) legitimate software market (mostly because it doesn't work and doesn't do any good) so, the easiest way to defeat the packing is simply to let it start up (this one has several annoying checks for debuggers so its easiest to just attach after its loaded)...

the eula for this thing says its a violation to reverse engineer it, but if you do disassemble it you find they never had the rights to license it in the first place, so I don't feel worried to put this here...

I think I have made it clear beyond a shadow of a doubt that CherryOS.exe, shipped as the core of cherryos is nothing but a recompiled version of PearPC...it has at most minor changes, most to strip attribution, hide the theft, or remove debugging output...

The only way we can fault Mike's research is with petty things like not consistently using upper case letters in his posts. The technical end of his work is flawless.

Both Cisco and ISS are attempting to spin Mike's research and make it look incomplete, but the truth of the matter is he demo'ed his technique in front of a room of people, and no one has found fault with it.

If this tactic continues, it will approach a very transparent form of character assassination. It will backfire on Cisco.

In the field of Security Research, Whistleblowing has always been a controversial issue. It is not a black and white thing. This article at CNET covers a number of the issues with disclosure of security problems that often come up. If you compare the ideas expressed in the article with what Mike actually did, you should come away thinking that Mike handled this ethically.

Mike Lynn is a Whistleblower, he should be protected


SecurityFocus | Researcher breaks ranks to out Cisco router weakness
Topic: Technology 7:08 pm EDT, Jul 27, 2005

Brushing off threats of legal action and a broad effort to delete his presentation from conference materials, a security expert told Black Hat attendees on Wednesday that attackers can broadly compromise Cisco routers.

Mike has a number of good quotes in this story:

"I feel I had to do what's right for the country and the national infrastructure," he said. "It has been confirmed that bad people are working on this (compromising IOS). The right thing to do here is to make sure that everyone knows that it's vulnerable."

Lynn outlined a way to take control of an IOS-based router, using a buffer overflow or a heap overflow, two types of memory vulnerabilities. He demonstrated the attack using a vulnerability that Cisco fixed in April. While that flaw is patched, he stressed that the attack can be used with any new buffer overrun or heap overflow, adding that running code on a router is a serious threat.

"When you attack a host machine, you gain control of that machine--when you control a router, you gain control of the network," Lynn said.

During his presentation, Lynn outlined an eight step process using any known, but unpatched flaw, to compromise a Cisco IOS-based router. While he did not publish any vulnerabilities, Lynn said that finding new flaws would not be hard.

"People aren't looking at this because they don't think gaining control of a router is doable, but there are a lot of bugs to find," he said.

In a presentation that had all the hallmarks of good theater, Lynn stated several times that the information that he was presenting would likely result in legal action against him.

"What I just did means that I'm about to get sued by Cisco and ISS," Lynn said, joking later that he may be "in Guantanamo" by the end of the week.

However, Lynn argued that the seriousness of the attack left him no choice but to let people know the existence of the weakness in the software. Cisco plans in the future to abstract the architecture of the router operating system in the future, which could have a side effect of making a single attack work against all routers. Rather then knowing the various memory addresses, or offsets, needed to compromise systems, a single offset could work, Lynn said.

"What politicians are talking about when they talk about the Digital Pearl Harbor is a network worm," he said. "That's what we could see in the future, if this isn't fixed."

SecurityFocus | Researcher breaks ranks to out Cisco router weakness


Abaddon, still up to no good.
Topic: Technology 4:12 pm EDT, Jul 27, 2005

Even more of Abaddon being up to no good.

Abaddon, still up to no good.


Folksonomy conversation
Topic: Technology 3:02 pm EST, Mar 16, 2005

] a conversation between Clay Shirky, Stewart "Flickr" Butterfield,
] Joshua "Delicious" Schachter and Jimmy "Wikipedia" Wales at the
] O'Reilly Emerging Technology Conference in San Diego. Folksonomy
] is the process of letting users generate and apply their own tags
] to shared items and then discovering which tegs users share with
] one another. Unlike previous ventures into this field, the tags
] aren't "controlled"

This is an interesting conversation

Folksonomy conversation


CBS 2 Chicago: Protect Your Computer From Wi-Fi Spies
Topic: Technology 1:54 pm EST, Mar  2, 2005

] CHICAGO (CBS 2) Wireless Home Computer Networks, called
] Wi-Fi (Wireless Fidelity), are very popular. Internet
] access without wires sounds like a good idea, but you'd
] better protect your computer network from Wi-Fi Spies.

Short but accurate and easy to understand article about how mainstream America needs to protect their home wi-fi networks. The attached video features the reporter doing a wardrive around Chicago with Mike Dahn, who some of the Memestreams regulars may recognize from Def Con and PhreakNIC.

CBS 2 Chicago: Protect Your Computer From Wi-Fi Spies


(Last) Newer << 1 - 2 - 3 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0