Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
(Technology)
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

OSX Homeland Security Advisor
Topic: Technology 5:55 pm EDT, Sep 24, 2002

"Homeland Alert displays the current Homeland Security Advisory status for the entire country in the menu bar. Homeland Alert checks continuously for changes in this status of homeland security and updates the display as needed. [Mac OS X Only]"

Macs always have entertaining warez...

OSX Homeland Security Advisor


Roomba Floor Vac Robot
Topic: Technology 11:09 am EDT, Sep 23, 2002

"Roomba dancing robot vacuums and sweeps automatically -- even when you're asleep or out of the house."

Roomba Floor Vac Robot


My comments on the optical keys
Topic: Technology 11:04 am EDT, Sep 23, 2002

"A transparent token the size of a postage stamp and costing just a penny to make can be used to generate an immensely powerful cryptographic key."

Marie asked for my comments on this.

The fact that the token cannot be copied doesn't mean the ones and zeros read from it cannot be copied, so this actually doesn't make a very good "cryptographic key." All you need to open cryptography is the ones and zeros. Not a card. Furthermore, the articles talk about reading the key from multiple angles, but cryptographic systems only have one password, so this is a capability mismatch again.

In an environment like an ATM machine where you are fairly certain that you are actually reading from a physical card this might be a more secure (albeit expensive) replacement for a magnetic strip. It may also find its way into door locks. However, you won't find such a reader in your computer nor for scanning credit cards, as in such environments there is no way to be sure that the "key" is actually coming from such a card and not from something else.

So in sum, the technology is interesting, but its not all that useful.

My comments on the optical keys


Cheap trick secures secrets
Topic: Technology 4:04 pm EDT, Sep 20, 2002

"The glass spheres scatter laser light so that it falls in a speckle pattern on a surface on the far side that is divided into a grid of pixels. The intensity of light in each pixel is the fingerprint that is compared against a pre-recorded version to verify the token. "

Cheap trick secures secrets


CharisMac - Hubzilla
Topic: Technology 4:13 pm EDT, Sep 19, 2002

This is the ULTIMATE firewire hub!

CharisMac - Hubzilla


The interaction of urbanism and information technology
Topic: Technology 12:30 pm EDT, Sep 19, 2002

"Much of the form and function of cities, in both a social and physical sense, is designed to minimize the time and cost of searching for people and information. The whole host of wireless applications will dramatically change the 'cost structure' of the city."

The interaction of urbanism and information technology


IDing districts in Congressional Email
Topic: Technology 6:16 pm EDT, Sep 17, 2002

"The key was XML tags, data-field identifiers that are communicable across platforms. The private vendors coded their software to define the name, address and other identifying information into distinct fields so that e-mail can be sent directly into correspondence software. Even the sorting could be done electronically - staff assistants direct an incoming message directly to the LC handling that issue, all electronically. "

IDing districts in Congressional Email


Unmask
Topic: Technology 11:44 am EDT, Sep 17, 2002

Unmask is a python script that allows you to break the anonymity of e-mail or other text. It works by doing basic statistical matching against stored "signatures." It may require some tweaking to fit your particular use to it (un-anonymizing IRC chats, email, web pages on FreeNet, etc). Another fun parlor game use is using it to distinguish between two groups of any kind. Male/Female, Engineers/Computer Scientists, Scientists/Liberal Arts Majors, etc. If you improve it in some way, please send me (dave@immunitysec.com) a note. Unmask is released under the GNU GPL v2.0.

Unmask


Linux worm creating P2P attack network - Tech News - CNET.com
Topic: Technology 1:51 pm EDT, Sep 16, 2002

"A new worm that attacks Linux Web servers has compromised more than 3,500 machines, creating a rogue peer-to-peer network that has been used to attack other computers with a flood of data, security experts said Saturday. "

Fun Fun... Patch you stuff...

Linux worm creating P2P attack network - Tech News - CNET.com


Bruce Schneier on possible weaknesses in encryption systems
Topic: Technology 1:44 pm EDT, Sep 16, 2002

"AES may have been broken. Serpent, too. Or maybe not. In either case, there's no need to panic. Yet. But there might be soon. Maybe."

Bruce Schneier on possible weaknesses in encryption systems


(Last) Newer << 51 ++ 61 - 62 - 63 - 64 - 65 - 66 - 67 - 68 - 69 ++ 79 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0