Create an Account
username: password:
 
  MemeStreams Logo

encoded arbitrary binary sequences

search

dc0de
Picture of dc0de
dc0de's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

dc0de's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
  War on Terrorism
Recreation
Local Information
Science
Society
  Politics and Law
   Surveillance
  Media
   Blogging
  (Security)
Sports
Technology
  Biotechnology
  Computers
   Computer Networking
   Computing Platforms
    Linux
    Microsoft Windows
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Security

Cheap Hack - Border Security - Skypetunnel: A Horrifying Idea
Topic: Security 11:43 pm EDT, May 31, 2007

Jim Noble :

Why is skype getting all of this fear mongering?

The Onion Router (TOR - http://tor.eff.org) is a fantastic way of circumventing IT controls in just about ANY network. I can run TOR with my altirus software virtualization tool (free), and i can do it from my 4GB USB Thumbdrive.

I have worked in environments where the IT security and network staff felt that they knew exactly what was going on, however, since all of my outbound network traffic was tunneled over TOR, (at least the information that I didn't want them to see), I could still perform any feat or action that I desired on the internet.

My main point here is not to run away from these applications. They have their place. I use TOR primarily to surf competitors web sites, when I don't want my company's IP Address showing up in the web logs, however, when draconian rules are applied as described by the previous posters, these people need to understand that "tightening the screws" will only make people find these tools, and deploy them.

Sorry Larry, I had to set you straight... who still uses skype anyway?

Cheap Hack - Border Security - Skypetunnel: A Horrifying Idea


WorldNetDaily: Man arrested, cuffed after using $2 bills
Topic: Security 9:58 am EDT, May 30, 2007

Commenting on the incident, Baltimore County police spokesman Bill Toohey told the Sun: "It's a sign that we're all a little nervous in the post-9/11 world."

Ok, so, I'm missing the connection... can someone help me out?

You try to pay a bill, with legal tender, and Best Buys (stupid employees) think that they are fake, and this has what? to do with 9/11 and terrorism?

Where is the logic in this statement, and where is the law suit?

WorldNetDaily: Man arrested, cuffed after using $2 bills


U.S. still lacks disaster response plan: Coast Guard | U.S. | Reuters
Topic: Security 9:41 am EDT, May 30, 2007

The United States is better prepared to deal with a major disaster like Hurricane Katrina, which devastated the Gulf region in 2005, but still lacks a formal structure for coordinating a national response, the head of the U.S. Coast Guard said on Tuesday.

Surprise???!? nope. but hey, it must be a slow news day.

U.S. still lacks disaster response plan: Coast Guard | U.S. | Reuters


Federal agencies ordered to eliminate personal data | The Bryan-College Station Eagle
Topic: Security 11:26 am EDT, May 25, 2007

WASHINGTON - Plagued by regular breaches in the security of personal data, federal agencies were ordered Tuesday to eliminate the unnecessary collection and use of Social Security numbers by early 2009.

That order and several other new security measures against identity theft were outlined in a memo to all department and agency heads from Clay Johnson III, deputy director for management of the Office of Management and Budget.

Way to go OMB!!! now if we could only get legislators to agree that this is what is REQUIRED for the populous at large...

Federal agencies ordered to eliminate personal data | The Bryan-College Station Eagle


Vendor: Cisco IOS Server Backdoor May Have Been Planted
Topic: Security 10:20 am EDT, May 16, 2007

A security vendor is questioning whether the IOS FTP Server vulnerabilities Cisco reported on May 9 may constitute an intentionally planted backdoor, as opposed to a series of programming errors that inadvertently led to a backdoor.

Chris Eng, director of security services at Veracode, is suggesting that possibility given that a remote attacker would need one of the flaws—improper authorization checking in IOS FTP—in order to exploit the second flaw—an IOS reload when transferring files via FTP.

Now I know that there are people here that

Vendor: Cisco IOS Server Backdoor May Have Been Planted


(ISC)2 Notice: Modifications to CISSP® Experience Requirements Beginning 1 October 2007
Topic: Security 6:02 pm EDT, May 15, 2007

As of that date, the minimum requirement for certification will be five years of relevant work experience in two or more of the 10 domains of the CISSP CBK® or four years of work experience with an applicable college degree or a credential from the (ISC)²-approved list. The current requirements for the CISSP call for four years of work experience in one or more of the 10 domains of the CISSP CBK, or three years of experience with an applicable college degree or a credential from the (ISC)²-approved list (up to two years can be waived). Also effective 1 October, CISSP candidates will be required to obtain an endorsement of their candidature exclusively from an (ISC) 2-certified professional in good standing. The professional endorsing the candidate can hold any (ISC) 2 certification – CISSP, Systems Security Certified Practitioner (SSCP®) or Certification and Accreditation Professional (CAP CM). Currently, candidates can be endorsed by an officer from the candidate’s organization if no CISSP endorsement can be obtained.

I'm happy to see that the CISSP certification will again mean something. Requirements for Information Security Experience will hopefully mean that less InfoSec basics will be ignored, and more people will be protected.

[I hope...]

(ISC)2 Notice: Modifications to CISSP® Experience Requirements Beginning 1 October 2007


Smart Card Alliance Says 2-D Barcode in Proposed Real ID Driver's License Would Be Inadequate for Security, Privacy - Government Technology
Topic: Security 10:40 am EDT, May 10, 2007

Barcode in proposed Real ID driver's license would be inadequate for security, privacy. According to the Smart Card Alliance, the Department of Homeland Security (DHS) should not rely on static 2-D barcode technology to store citizens' personal information on Real ID driver's licenses or identification cards due to its inherent security drawbacks.

So, one of the organizations have it right... Now, how about the RFID Alliance stepping up to do the same?

Smart Card Alliance Says 2-D Barcode in Proposed Real ID Driver's License Would Be Inadequate for Security, Privacy - Government Technology


Terms & Conditions - MySpace.com
Topic: Security 11:20 am EDT, Apr  1, 2007

This Terms of Use Agreement ("Agreement") sets forth the legally binding terms for your use of the MySpace Services. By using the MySpace Services, you agree to be bound by this Agreement, whether you are a "Visitor" (which means that you simply browse the MySpace Website) or you are a "Member" (which means that you have registered with Myspace.com). The term "User" refers to a Visitor or a Member.

So, just how many "MySpace visitors" are presented with this T&C document? How can this even be legally binding?

MySpace get's to redefine the term "User" to mean ANYONE who links, uses, remotely even farts in the general direction of a MySpace service?

You are only authorized to use the MySpace Services (regardless of whether your access or use is intended) if you agree to abide by all applicable laws and to this Agreement. Please read this Agreement carefully and save it. If you do not agree with it, you should leave the MySpace Website and discontinue use of the MySpace Services immediately. If you wish to become a Member, communicate with other Members and make use of the MySpace Services, you must read this Agreement and indicate your acceptance during the Registration process.

"Regardless of whether your access or use is intended", does this mean if someone links to one of my images for their stupid media packs, that if I change it, I have to abide by THEIR T&C's?

as Ladymerlin says, "Bite Me."

Terms & Conditions - MySpace.com


Reuters AlertNet - Nuclear terrorism risk grows more real - analysts
Topic: Security 10:59 am EST, Feb 12, 2007

And this is only NOW on the front pages?

This has been available to terrorists for some years, however, the difficulty in transporting any nuclear material has made this an unpopular choice.

However, when you take into account the lack of control this country has on it's borders, it's a wonder why this hasn't happened yet...

If illegal drugs can move into our country, why can't nuclear, biological, and/or chemical weapons?

Wouldn't a city like LA make a nice target? Mix up some Sarin, Anthrax, and some dirty nuke, to make it a trifecta?

But hey, that's my 2¢, YMMV.

Reuters AlertNet - Nuclear terrorism risk grows more real - analysts


The new Mossberg JIC M500 line
Topic: Security 1:27 pm EST, Jan  6, 2007

Finally, there is a company who knows that even if you don't like guns in your home, it pays to be prepared, Just In Case [zombies attack]--the new JIC M500 Cruiser, and the JIC M500 Mariner.

Both kits come in a watertight sealed tube containing a 12-gauge Mossberg 500 pump action shotgun, packed sealed in a watertight bag, just to be safe, and include various accessories like a multi-tool and a survival kit in a can (which oddly, contains not a single hand-grenade).

I am DEFINITELY buying the JIC500 Mariner! That's awesome!

The new Mossberg JIC M500 line


(Last) Newer << 1 - 2 >>
 
 
Powered By Industrial Memetics
RSS2.0