Create an Account
username: password:
 
  MemeStreams Logo

Twice Filtered

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   (Computer Security)
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Current Topic: Computer Security

RE: Metered Pay-as-you-go Computing Experience USPTO 0080319910
Topic: Computer Security 6:55 pm EST, Dec 29, 2008

From the abstract of a recent Microsoft patent application:

A computer with scalable performance level components and selectable software and service options has a user interface that allows individual performance levels to be selected ... To support a pay-per-use business model, each selectable item may have a cost associated with it, allowing a user to pay for the services actually selected and that presumably correspond to the task or tasks being performed. An administrator may use a similar user interface to set performance levels for each computer in a network, allowing performance and cost to be set according to a user's requirements.

Acidus wrote:

... uhhhhh time sharing as prior art?

Oh, but you are neglecting this part:

All this is possible because the metering agents and specific elements of the security module 202 allow an underwriter in the supply chain to confidently supply a computer at little or no upfront cost to a user or business, aware that their investment is protected and that the scalable performance capabilities generate revenue commensurate with actual performance level settings and usage.

And, as Bill Joy recently explained to Malcolm Gladwell about his experiences on the time sharing system at the University of Michigan:

"The challenge was that they gave all the students an account with a fixed amount of money, so your time would run out. When you signed on, you would put in how long you wanted to spend on the computer. They gave you, like, an hour of time. That's all you'd get. But someone figured out that if you put in 'time equals' and then a letter, like t equals k, they wouldn't charge you," he said, laughing at the memory. "It was a bug in the software. You could put in t equals k and sit there forever."

RE: Metered Pay-as-you-go Computing Experience USPTO 0080319910


Microsoft Security Bulletin Advance Notification for October 2008
Topic: Computer Security 1:04 pm EDT, Oct 23, 2008

Things that make you go "hmmm..."

This is an advance notification of an out-of-band security bulletin that Microsoft is intending to release on October 23, 2008.

This bulletin advance notification will be replaced with the revised October bulletin summary on October 23, 2008. The revised bulletin summary will include the out-of-band security bulletin as well as the security bulletins already released on October 14, 2008.

Microsoft is hosting a webcast to address customer questions on this out-of-band security bulletin on October 23, 2008, at 1:00 PM Pacific Time (US & Canada). Register now for the Out-of-Band Security Bulletin Webcast. After this date, this webcast is available on-demand. For more information, see Microsoft Security Bulletin Summaries and Webcasts.

See here for more details:

This security update resolves a privately reported vulnerability in the Server service. The vulnerability could allow remote code execution if an affected system received a specially crafted RPC request. On Microsoft Windows 2000, Windows XP, and Windows Server 2003 systems, an attacker could exploit this vulnerability without authentication to run arbitrary code. It is possible that this vulnerability could be used in the crafting of a wormable exploit. Firewall best practices and standard default firewall configurations can help protect network resources from attacks that originate outside the enterprise perimeter.

This security update is rated Critical for all supported editions of Microsoft Windows 2000, Windows XP, Windows Server 2003, and rated Important for all supported editions of Windows Vista and Windows Server 2008. For more information, see the subsection, Affected and Non-Affected Software, in this section.

The security update addresses the vulnerability by correcting the way that the Server service handles RPC requests. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.

Recommendation. Microsoft recommends that customers apply the update immediately.

Microsoft Security Bulletin Advance Notification for October 2008


Researchers disclose deadly cross-platform TCP/IP flaws
Topic: Computer Security 9:47 am EDT, Oct 14, 2008

Whatever "evil things," Sockstress does, it's apparently quite good at them.

Researchers disclose deadly cross-platform TCP/IP flaws


T hacking exposes a deeper clash
Topic: Computer Security 1:18 pm EDT, Aug 18, 2008

Front page, above-the-fold, of today's Boston Globe:

Where agency sees attack, MIT students talk of constructive exploration

This article doesn't really break any news, particularly for those who were at DEFCON or who followed the recent threads. But they did make room for this explanation:

"I've always been interested in electronics," said Anderson, who grew up scouring alleyways for discarded machines. "Ever since I was a little kid, I would take things apart to see how they work."

These days, he proudly calls himself a hacker.

"If a lot of people think hacker, they think of someone who illegally breaks into systems," he said. "I don't at all think that's what hacker means. I think hacking is a culture of curiosity and exploration and learning and building and creating new things."

From the archive:

The Craftsman continues an argument begun in the 19th century, when writers such as John Ruskin and William Morris extolled the crafts remembered in our surnames (Smith, Cartwright, Thatcher, Mason, Fletcher) while lamenting the mind-numbing and soul-destroying labour of the industrial process which was replacing them. A long line of thinkers, from Hegel and Marx to Sennett’s teacher Hannah Arendt, have sympathised with the argument. But Sennett does not think that craftsmanship has vanished from our world. On the contrary: it has merely migrated to other regions of human enterprise, so that the delicate form of skilled cooperation that once produced a cathedral now produces the Linux software system. Linux, for Sennett, is the work of a community of craftsmen “who embody some of the elements first celebrated in the (Homeric) Hymn to Hephaestus”.

The spread of Enterprise Systems has resulted in a declining emphasis on creativity and ingenuity of workers, and the destruction of a sense of community in the workplace by the ceaseless reengineering of the way businesses operate. The concept of a career has become increasingly meaningless in a setting in which employees have neither skills of which they might be proud nor an audience of independently minded fellow workers that might recognize their value.

The evidence suggests that from an executive perspective, the most desirable employees may no longer necessarily be those with proven ability and judgment, but those who can be counted on to follow orders and be good "team players."

T hacking exposes a deeper clash


Georgian president's Web site moves to Atlanta
Topic: Computer Security 9:12 am EDT, Aug 12, 2008

Atlanta is just as hosed as Georgia.

The Web site of the president of Georgia, the small nation that is battling Russian forces over a breakaway enclave, was moved to a US hosting facility this weekend after allegedly being attacked by Russian hackers.

Georgian president's Web site moves to Atlanta


Black Hat Talk on Apple Encryption Flaw Pulled
Topic: Computer Security 7:30 am EDT, Aug  6, 2008

A security researcher who was set to speak at Black Hat next week on a previously undiscovered flaw in FileVault has canceled his talk, citing confidentiality agreements.

Charles Edge had been slated to discuss his research on a weakness that could be used to defeat FileVault. But sometime last week, Black Hat organizers pulled his name and presentation listing from its schedule of talks.

... Update: Looks like yet another talk about Apple security will be canceled at Black Hat this year. Apple has pulled its security engineering team out of a planned public discussion on the company's security practices.

See also: Leave Steve Jobs Alone!!! (pnsfw audio)

From the archive:

Border searches of laptops; seizure

Unlocking FileVault

Laptop border searches OK'd

Faster PwninG Assured: Cracking Crypto with FPGAs

Circumventing Automated JavaScript Analysis Tools

DOMinatrix - The JavaScript SQL Injector

Richard Clarke leveled the harshest language on the Bush administration. "The Bush administration has systematically reduced the work to secure cyberspace."

Hacker Pranks at Defcon and Black Hat in Las Vegas Emphasize Computer Security, Abaddon causing a ruckus at Black Hat, and Mike Lynn's Glorious Escapades

HID Global statement on IOActive withdrawing their Black Hat presentation

Crime is sport in the US. All the way back to the black hat wearing cowboy to OJ and Scott Peterson, we have a love affair with criminals, and are addicted to punishment. It makes us feel tough and reinforces other false ideals in our culture (morality, justice for all, bravery, etc.).

Black Hat Talk on Apple Encryption Flaw Pulled


How Crypto Won the DVD War | Threat Level from Wired.com
Topic: Computer Security 6:23 am EST, Feb 27, 2008

Support from studios has been widely cited as the reason for Blu-ray's victory, but few consumers know that the studios were likely won over by the presence of a digital lock on movies called BD+, a far more sophisticated and resilient digital rights management, or DRM, system than that offered by HD DVD.

This is very interesting.

How Crypto Won the DVD War | Threat Level from Wired.com


Security Data Visualization: Graphical Techniques for Network Analysis
Topic: Computer Security 3:35 pm EST, Jan 25, 2008

Greg Conti published a book last October!

Information overload. If you're responsible for maintaining your network's security, you're living with it every day. Logs, alerts, packet captures, and even binary files take time and effort to analyze using text-based tools - and once your analysis is complete, the picture isn't always clear, or timely. And time is of the essence.

Information visualization is a branch of computer science concerned with modeling complex data using interactive images. When applied to network data, these interactive graphics allow administrators to quickly analyze, understand, and respond to emerging threats and vulnerabilities.

Security Data Visualization is a well-researched and richly illustrated introduction to the field. Greg Conti, creator of the network and security visualization tool RUMINT, shows you how to graph and display network data using a variety of tools so that you can understand complex datasets at a glance. And once you've seen what a network attack looks like, you'll have a better understanding of its low-level behavior - like how vulnerabilities are exploited and how worms and viruses propagate.

You'll learn how to use visualization techniques to:

# Audit your network for vulnerabilities using free visualization tools, such as AfterGlow and RUMINT
# See the underlying structure of a text file and explore the faulty security behavior of a Microsoft Word document
# Gain insight into large amounts of low-level packet data
# Identify and dissect port scans, Nessus vulnerability assessments, and Metasploit attacks
# View the global spread of the Sony rootkit, analyze antivirus effectiveness, and monitor widespread network attacks
# View and analyze firewall and intrusion detection system (IDS) logs

Security visualization systems display data in ways that are illuminating to both professionals and amateurs. Once you've finished reading this book, you'll understand how visualization can make your response to security threats faster and more effective

You can download Chapter 5, "One Night on my ISP", from the publisher.

Security Data Visualization: Graphical Techniques for Network Analysis


An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants
Topic: Computer Security 6:42 am EST, Dec  6, 2007

This paper studies an active underground economy which specializes in the commoditization of activities such as credit card fraud, identity theft, spamming, phishing, online credential theft, and the sale of compromised hosts. Using a seven month trace of logs collected from an active underground market operating on public Internet chat networks, we measure how the shift from “hacking for fun” to “hacking for profit” has given birth to a societal substrate mature enough to steal wealth into the millions of dollars in less than one year.

An Inquiry into the Nature and Causes of the Wealth of Internet Miscreants


WEIS 2008 - The Seventh Workshop on the Economics of Information Security
Topic: Computer Security 6:49 am EDT, Nov  2, 2007

Information security requires not only technology, but a clear understanding of risks, decision-making behaviors and metrics for evaluating business and policy options. How much should we spend on security? What incentives really drive privacy decisions? What are the trade-offs that individuals, firms, and governments face when allocating resources to protect data assets? Are there good ways to distribute risks and align goals when securing information systems?

While organizations and individuals face new and evolving technical challenges, we know that security and privacy threats rarely have purely technical causes. Economic, behavioral, and legal factors often contribute as much as technology to the dependability of information and information systems. The application of economic analysis to these problems has proven to be an exciting and fruitful area of research.

WEIS 2008 - The Seventh Workshop on the Economics of Information Security


(Last) Newer << 1 - 2 - 3 - 4 - 5 - 6 - 7 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0