Create an Account
username: password:
 
  MemeStreams Logo

eltit

search

jlang
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

jlang's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
(Technology)

support us

Get MemeStreams Stuff!


 
Current Topic: Technology

Google's sparse_hash_map implementation available under BSD license
Topic: Technology 9:37 am EDT, Apr 20, 2006

The Google SparseHash project contains several C++ template hash-map implementations in use at Google, with different performance characteristics, including an implementation that optimizes for space and one that optimizes for speed.

Google's sparse_hash_map implementation available under BSD license


InformationWeek | Security | The Fear Industry | April 17, 2006
Topic: Technology 4:12 pm EDT, Apr 17, 2006

In January, a vulnerability in WMF surfaced that let attackers use the Windows' graphics rendering engine that handles WMF images to launch malicious code on users' computers via these images. A number of security researchers posted information about the vulnerability to their mailing lists. Within a few hours, researcher H.D. Moore posted a working example of a WMF exploit--a piece of code written to take advantage of a software flaw--on his Metasploit Web site. Some defended the action, saying it offered insight into the rules security pros needed to put on intrusion-detection systems to avoid getting hit. Others argued that what Moore did enabled the average hacker to more easily exploit the flaw.

Information Week published a long, sensational, and patently dishonest article on security research today. This text makes it seem as if malware authors used the information H.D. Moore published. The fact is that this vulnerability was being exploited by criminal organizations in the wild before anyone in the security research community knew about it. The article fails to make this fact clear because it doesn't fit into the narrative that the reporter is aiming for and undermines the questions the reporter is raising. Would any major news media organization be interesting in a peice that discusses whether intentially dishonest reporting is good or bad for society?

InformationWeek | Security | The Fear Industry | April 17, 2006


Exploiting RFID Readers -- Viral RFID Prototype Created
Topic: Technology 8:05 pm EST, Mar 15, 2006

The Vrije Universiteit team found that compact malicious code could be written to RFID tags after all. By replacing a tag's normal identification code with a carefully written message, the researchers found they could exploit bugs in a computer connected to an RFID reader. This made it possible to spread a self-replicating computer worm capable of infecting other compatible, and rewritable, RFID tags.

Exploiting RFID Readers -- Viral RFID Prototype Created


RFC 4270: Attacks on Cryptographic Hashes in Internet Protocols
Topic: Technology 5:09 pm EST, Dec  5, 2005

Abstract

Recent announcements of better-than-expected collision attacks in
popular hash algorithms have caused some people to question whether
common Internet protocols need to be changed, and if so, how. This
document summarizes the use of hashes in many protocols, discusses
how the collision attacks affect and do not affect the protocols,
shows how to thwart known attacks on digital certificates, and
discusses future directions for protocol designers.

RFC 4270: Attacks on Cryptographic Hashes in Internet Protocols


RFID, How it Works and What It Will Mean To You
Topic: Technology 3:32 pm EDT, Apr 25, 2005

May Meeting of The Atlanta UNIX Users Group (AUUG)

Topic: RFID, How it Works and What It Will Mean To You

Speaker: Lindsay Cleveland
Digital Systems Company
Atlanta, GA

Location: Hewlett-Packard Building
20 Perimeter Summit (directly across I-285 from Perimeter Mall)
Atlanta, GA

Date: Monday, May 2, 2005
Time: 7:30pm

(Our speaker has supplied the following)

Radio Frequency Identification (RFID) has been around for several
years, but new techniques are now being used to make it
inexpensively available on a large scale.

The FDA is requiring RFID on pharmaceuticals for tracking/recall
purposes. Vehicle tires are beginning to have RFID embedded in
their walls for the same reason (remember the Firestone flap?).
Some large retailers, such as Wal-Mart, will soon be requiring
them on every item they stock on their shelves.

This talk will detail the newer RFID 900Mhz technology and will
examine privacy implications and Information Technology
challenges. Will we be living in a "Brave New World" or will
this become "Big Brother Is Watching"?

[ Note that the AUUG web site does not yet have the May meeting announcement posted. ]

RFID, How it Works and What It Will Mean To You


The Downside of Biometrics
Topic: Technology 4:57 pm EST, Mar 31, 2005

Police in Malaysia are hunting for members of a violent gang who chopped off a car owner's finger to get round the vehicle's hi-tech security system.

The car, a Mercedes S-class, was protected by a fingerprint recognition system.

The Downside of Biometrics


Advanced binary analysis of CherryOS: proof of theft
Topic: Technology 11:03 am EST, Mar 31, 2005

just incase anyone didn't believe them already here goes the analysis (I do this sort of thing for a living) first off CherryOS.exe is what we call in the security industry "packed", that means that they have taken a compiled binary and run it through an obfuscator to make it hard to reverse engineer (or at least with hard if all you're doing is strings)...this is common for virus writers, worm writers, 31337 bot net kiddies, and on the legitimate side, game developers do this a lot...its not very common among the commercial (or free) legitimate software market (mostly because it doesn't work and doesn't do any good) so, the easiest way to defeat the packing is simply to let it start up (this one has several annoying checks for debuggers so its easiest to just attach after its loaded)...

the eula for this thing says its a violation to reverse engineer it, but if you do disassemble it you find they never had the rights to license it in the first place, so I don't feel worried to put this here...

if you want to follow along I downloaded a trial copy of CherryOS this morning and I got the latest version of pearpc as of this morning off of sourceforge (not from cvs, just the tarball), I am using windows XP with Interactive Disassembler (IDA)...

ready...here goes:

so the first thing we want to do is find some strings which are common to both, they will not in and of themselves give you the answer you're looking for but they will give us a good starting point, we will then use these to get a context on the code that uses these strings, we will then compare the functions (or in this case class methods) to see if they are similar (or in this case identical)

so, example number one lets look at something in the cpu emulation code (because that is the heart of the code)

direct your editor to cpu/cpu_jitc_x86/jitc.cc line 465 you will see the following small function

extern "C" void FASTCALL jitc_error_program(uint32 a, uint32 b) {
if (a != 0x00020000) { // Filter out trap exceptions, no need to report them
ht_printf("JITC Warning: program exception: %08x %08x\n", a, b);
}
}

first lets see if we can find the format string "JITC Warning: program exception: %08x %08x\n" somewhere in the core memory image of CherryOS

now if you're using IDA attach to an already running CherryOs.exe (not to be confused with mainCherryOs.exe) and regenerate strings or do a direct string search, and search for this exact string...

you will find it in the text segment located at .text:0040E890...now the fact that it exists alone is almost enough to pass summary judgment, but lets keep going so its painfully obvious...

in cherryos.exe at .text:0040E8C0 you will see a reference to the format string from pearpc the disassembled function at this address looks like this (don't worry details will be explained in a bit)

.text:0040E8C0 sub esp, 0Ch
.text:0040E8C3 cmp ... [ Read More (1.6k in body) ]

Advanced binary analysis of CherryOS: proof of theft


'Oracle' Computer Could Have All the Answers Built In
Topic: Technology 5:03 pm EST, Mar 21, 2005

Instead of waiting weeks for computers to grind out solutions to complex problems, scientists may someday get answers instantly thanks to a new type of "oracle" computer that will have all the answers built in, predict Duke University computer scientists and engineers. When a question is posed, the computer will provide the answer already paired with the question in the very structure of the computer's processing unit.

'Oracle' Computer Could Have All the Answers Built In


MD5 collision method published
Topic: Technology 11:55 pm EST, Mar 14, 2005

] At last, the secret of how to make MD5 collisions is out!

MD5 collision method published


RE: Publishing exploit code ruled illegal in france
Topic: Technology 11:03 am EST, Mar 10, 2005

bmitchell wrote:
] Researchers that reverse engineer software to discover
] programming flaws can no longer legally publish their findings
] in France after a court fined a security expert on Tuesday.

This is unfortunate if true. France has already shown little hesitation in suing american sites that violate french law. I wonder if they're going to start fining security companies anytime a new vunlerability is published?

RE: Publishing exploit code ruled illegal in france


(Last) Newer << 1 - 2 - 3 - 4 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0