Create an Account
username: password:
 
  MemeStreams Logo

It's always easy to manipulate people's feelings. - Laura Bush

search

Decius
Picture of Decius
Decius's Pics
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Decius's topics
Arts
  Literature
   Sci-Fi/Fantasy Literature
  Movies
   Sci-Fi/Fantasy Films
  Music
   Electronic Music
Business
  Finance & Accounting
  Tech Industry
  Telecom Industry
  Management
  Markets & Investing
Games
Health and Wellness
Home and Garden
  Parenting
Miscellaneous
  Humor
  MemeStreams
Current Events
  War on Terrorism
Recreation
  Cars and Trucks
  Travel
Local Information
  United States
   SF Bay Area
    SF Bay Area News
Science
  Biology
  History
  Math
  Nano Tech
  Physics
Society
  Economics
  Politics and Law
   Civil Liberties
    Internet Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
Sports
(Technology)
  Computer Security
  Macintosh
  Spam
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Junk Hacked... FPGA-based SHA-1 and MD5 bruteforce cracker...
Topic: Technology 2:14 am EDT, Sep 18, 2007

NSA@home is a fast FPGA-based SHA-1 and MD5 bruteforce cracker. It is capable of searching the full 8-character keyspace (from a 64-character set) in about a day in the current configuration for 800 hashes concurrently, using about 240W of power. This performance is equivalent to over 1500 Athlon FX-60 CPUs, which would take about 250kW.

This is a really cool project, and this website has an excellent graphical replacement for the "hit counter." Definately check this out. I will be speaking at Phreaknic about an idea Dan Moniz had for building a distributed computer on the internet with FPGAs. I think this is a concept which has a lot of potential, and projects like this hash cracker are just the tip of the iceberg.

Junk Hacked... FPGA-based SHA-1 and MD5 bruteforce cracker...


See the world, Asciified, with The Matrix Goggles
Topic: Technology 10:57 am EDT, Sep 16, 2007

Russian artists from Moscow presented in London a totally useless but somehow cool device: goggles that you can put on and feel like somebody from "cyberspace."

Click through for the video.

See also HasciiCam.

See the world, Asciified, with The Matrix Goggles


RE: Who Needs Hackers?
Topic: Technology 12:09 pm EDT, Sep 14, 2007

noteworthy wrote:

“Many times the problems you see that you try to correct are not the root causes of the problem,” he said.

We could be talking about a lot of things, but in this case, this is the CIO for the US Customs Agency, and he is talking about a faulty NIC at LAX.

I'm really growing tired of the use of the word "hacker" in this context. I talk about computer security issues with industry and the press on nearly a daily basis and I never, ever use the word hacker. It is deeply misleading to use the word hacker when you mean to say "computer intruder" or "computer criminal."

I recently saw an FBI agent present on computer security issues and it was "hacker" this and "hacker" that for 20 odd minutes. I came very close to saying something to him about it. Its like saying "hippie" when you mean to say "drug trafficers." Eastern European payment card fraud rings and Southeast Asian industrial spies have as much to do with "hackers" as Columbian narcoterrorists have to do with "hippies." By using the word "hacker" instead of using the word "computer criminal" the FBI makes it sounds as if they aren't really focused on computer crime so much as they are focused on people whose politics they don't like.

I think there is a need here for a website, perhaps organized as a non-profit, with form letters that people can send news media organizations that use the word "hacker" in a context that has nothing to do with the computer subculture that word refers to, and which has the ultimately goal of getting the AP style guide modified to prohibit the use of the word hacker where "computer intruder" or "computer criminal" is more appropriate, and includes a lot of text explaining where Eric Raymond went wrong in attempting to resolve this previously.

RE: Who Needs Hackers?


TrustPlus Inc.
Topic: Technology 2:12 pm EDT, Sep 12, 2007

By building a reputation with TrustPlus, members can use it anywhere on the Web. Now online sellers can aggregate their reputations in one place and leverage them everywhere they sell online. This allows online sellers to sell more, faster and at higher prices

TrustPlus Inc.


Hacker Marks 25th Anniversary of First Computer Virus
Topic: Technology 5:02 pm EDT, Sep  5, 2007

"Elk Cloner" — self-replicating like all other viruses — bears little resemblance to the malicious programs of today. Yet in retrospect, it was a harbinger of all the security headaches that would only grow as more people got computers — and connected them with one another over the Internet.

Hacker Marks 25th Anniversary of First Computer Virus


w00t!
Topic: Technology 10:10 am EDT, Aug 30, 2007

Someone sent me a link to woot.com this morning. I exclaimed that there is a special place in hell for the person who decided to use that domain for a commerical purpose. That hell involves having nothing to do but sit on efnet for millenia. Then I noticed the linked Thinkgeek page.

w00t belongs to gamers the world over. It seems to have been derived from the obselete 'whoot' which essentially is another way to say 'hoot' which itself is a shout or derisive laugh. But others maintain that w00t is the sound several players make while jumping like bunnies in Quake III. Still others want you to believe that it comes from the phrase 'wow loot' used in multiplayer RPGs many moons ago. And if you can believe it some folks even think it was derived from the gaming phrase, 'We Own the Other Team!' Fiction or fact? I suppose you'll just have to decide what 'w00t!' means to you...

Fiction you fucks. There is another special place in hell for people who think words like pwn and w00t are the recent inventions of multiplayer gamers. This word had become popular and then gone out of fashion long before Quake III was released. The first time I heard it was on efnet in a hacking related channel in 1992 or 1993. Its a combination of Woohoo and Root; as in "Woohoo, I got Root!"

Words like pwn and w00t are so obviously hacking related that its hard to understand why gamers would rationalize that they have something to do with quake. However, it is really interesting that these words have been appropriated by that scene and become extremely mainstream. When I saw Cartman say pwn on national television a few months ago I almost jumped out of my seat. I don't really know who invented the term, but that person is likely only one degree of separation from the folks who hang out at summercon.

w00t!


YouTube - Image Resizing by Seam Carving
Topic: Technology 11:46 am EDT, Aug 29, 2007

A new technique shows resizing of images while keeping the important features of the image undistorted, also allows you to protect or remove part of the image with anything removed being automagically and seamlessly filled in.

This is making the rounds in technical circles today. The technique simple and very effective! Apparently Adobe has hired this guy so hopefully we'll see commercial availability soon.

YouTube - Image Resizing by Seam Carving


Holding a Program in One's Head
Topic: Technology 12:23 pm EDT, Aug 24, 2007

There is a contradiction in the very phrase "software company." The two words are pulling in opposite directions. Any good programmer in a large organization is going to be at odds with it, because organizations are designed to prevent what programmers strive for.

Very true, particularly the last part of the essay.

Holding a Program in One's Head


El Paso Times - Transcript: Debate on the foreign intelligence surveillance act
Topic: Technology 9:21 pm EDT, Aug 22, 2007

The following is the transcript of a question and answer session with National Intelligence Director Mike McConnell.

This is one of the most significant public discussions of the actual surveillance program that has yet occurred, likely done in the context of the debate over the recent FISA authorization. See also this. Some good discussion here.

El Paso Times - Transcript: Debate on the foreign intelligence surveillance act


Lauren Weinstein's Blog: More Wikipedia
Topic: Technology 6:41 pm EDT, Aug 21, 2007

...that article tends to belie the underlying nature of a real problem -- the lack of accountability for most of what's written or edited in Wikipedia. The "Corporate Fingerprints" bit is cute -- but what about all of the other fingerprints smeared through virtually every byte of the Wikipedia database?

The single best thing that Wikipedia could do to lend itself genuine credibility would be to require that contributers identify themselves -- by name, not by handles or childish aliases.

Weinstein shoots off an anti-anonymity screed in response to Virgil's tool. I don't find this perspective reasonable, but then Weinstein has set me off in the past with his authoritarian insistence that everyone walk around the Internet with their driver's license taped to their forehead. I think it's notable, however, that Virgil's tool has now spawned a meta-controversy.

Lauren Weinstein's Blog: More Wikipedia


(Last) Newer << 4 - 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 ++ 23 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0