Create an Account
username: password:
 
  MemeStreams Logo

Worthersee's MemeStream

search

Worthersee
Picture of Worthersee
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

Worthersee's topics
Arts
Business
Games
Health and Wellness
Home and Garden
Miscellaneous
Current Events
Recreation
Local Information
Science
Society
Sports
Technology

support us

Get MemeStreams Stuff!


 
Formula 1 Racing to Go Hybrid from 2009-2013
Topic: Sports 2:04 pm EDT, Apr 22, 2008

It’s not quite the same type of hybrid drive-train you’d see in street vehicles, but in an exciting announcement, Max Mosely of F1 has announced that all cars will become hybrid by 2013, along with other changes to the vehicles.

The hybrid system that will be phased in is known as KERS, which stands for Kenetic Energy Recovery System. KERS doesn’t store as much energy as a traditional hybrid system, but it only weighs 55 pounds and the limited energy storage capacity is well suited for Formula-style racing.

The biggest difference between KERS and a regular battery-electric hybrid is that KERS stores recovered waste energy in a rotating flywheel. Instead of converting waste energy into electricity and than back into useful energy again with an electric motor, KERS simply transfers the kenetic energy to a ~5kg flywheel in the F1 car’s transmission. The energy stored in the flywheel can then be used by the driver by pushing a “boost” button.

Just what F1 cars need... More boost.

Formula 1 Racing to Go Hybrid from 2009-2013


RE: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications
Topic: Technology 3:00 pm EDT, Apr 19, 2008

Key Design Points
The most important design question for constructing the constraint formula is to figure out what instructions to include in the formula. We need to include all the instructions for an exploitable path for the solver to generate a candidate exploit. However, the number of exploitable paths is usually only a fraction of all paths to the new check. Should the formula cover all such execution paths, some of them, or just one? We consider three approaches to answering this question: a dynamic approach which considers only a single path at a time, a static approach which considers multiple paths in the CFG without enumerating them, and a combined dynamic and static approach.

This is a really good example of combining Static Analysis and Dynamic Analysis to find and verify security vulnerabilities. Come see my Summercon presentation for more on this topic.

RE: Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications


Mascots vs 4th Graders
Topic: Sports 11:24 am EDT, Apr 18, 2008

Wanna see a 7ft tall Bearcat mascott stiff arm a bunch of 10 year old kids into the ground? These mascots sure don't seem like they're taking it easy on the kids.

LTMQ

Mascots vs 4th Graders


Dowd’s Inhuman Flash Exploit
Topic: Miscellaneous 9:52 am EDT, Apr 16, 2008

The evidence is now overwhelming that Mark Dowd was, in fact, sent back through time to kill the mother of the person who will grow up to challenge SkyNet. Please direct your attention to Dowd’s 25-page bombshell on a Flash bytecode attack.

Some context. Reliable Flash vulnerabilities are catastrophes. In 2008, we have lots of different browsers. We have different versions of the OS, and we have Mac users. But we’ve only got one Flash vendor, and everyone has Flash installed. Why do you care about Flash exploits? Because in the field, any one of them wins a commanding majority of browser installs for an attacker. It is the Cyberdyne Systems Model 101 of clientsides.

So that’s pretty bad-ass. But that’s not why the fate of humanity demands that we hunt down Dowd and dissolve him in molten steel.

Look at the details of this attack. It’s a weaponized NULL pointer attack that desynchronizes a bytecode verifier to slip malicious ActionScript bytecode into the Flash runtime. If you’re not an exploit writer, think of it this way: you know that crazy version of Super Mario Brothers that Japan refused to ship to the US markets because they thought the difficulty would upset and provoke us? This is the exploit equivalent of that guy who played the perfect game of it on YouTube.

Big upz and mad Respekt for Mark Dowd.

Dowd’s Inhuman Flash Exploit


Oklahoma isn't the only one
Topic: Technology 2:49 pm EDT, Apr 15, 2008

[sigh]. Now I have a good answer to the statement "Surely no one is stupid enough to put raw SQL into a URL!"

The best part if that the "blurring" of the email address is horrible and you can easily see many of the email addresses of register sex offenders.

Want to see who else is an idiot?

...

allinurl:?= SELECT FROM WHERE AND (sql|q|query)

... and watch the silliness.

Please don't INSERT me into the table as a registered sex offender.

Oklahoma isn't the only one


Request for Papers | summercon 2008
Topic: Miscellaneous 2:08 pm EDT, Apr 15, 2008

We're hoping to have a great crowd this year!

Request for Papers | summercon 2008


Summercon 2008 Official Announcement | summercon 2008
Topic: Miscellaneous 2:08 pm EDT, Apr 15, 2008

Please keep checking the site. We plan to have preregistration up soon. We're updating it everyday!

Summercon 2008 Official Announcement | summercon 2008


The Office TV Show Series on NBC Is Back 04.10.2008 9PM EST
Topic: Miscellaneous 4:48 pm EDT, Apr 10, 2008

DINNER PARTY
9/8c TV-PG
04.10.2008

GUESS WHO'S COMING TO DINNER - Pam (Jenna Fischer) and Jim (John Krasinski) find they have run out of excuses and are forced to go to Jan (Melora Hardin) and Michael's (Golden Globe winner Steve Carell) house for dinner. When Andy (Ed Helms) and Angela (Angela Kinsey) are also invited to dinner, Dwight's (Rainn Wilson) jealousy gets the best of him. Leslie David Baker, Brian Baumgartner, Kate Flannery, Oscar Nunez, Phyllis Smith, Paul Lieberstein, Mindy Kaling and Creed Bratton also star.

It's Back!

The Office TV Show Series on NBC Is Back 04.10.2008 9PM EST


SANS Internet Storm Center - Advanced obfuscated JavaScript analysis
Topic: Technology 7:08 pm EDT, Apr  9, 2008

When we got contacted by ISC reader Greg in Hungary, whose web server had been hacked and adorned with a couple of obfuscated JavaScript files, we expected a variant of the "nmidahena" injection and a closed case. JavaScript is an interpreted language, and while the obfuscation attempts we see are getting more creative, the scripts can usually still be coerced quite easily into divulging their secrets. ISC handler Lenny Zeltser teaches the SANS course on malware analysis, and ISC handler Bojan Zdrnja wrote the portion on JavaScript analysis for that course, so we are usually able to make short work of bad stuff.

Cool example of self-defending javascript malware.

SANS Internet Storm Center - Advanced obfuscated JavaScript analysis


European Deli & Market in Atlanta - 2008 HOT LIST
Topic: Local Information 9:31 am EDT, Apr  8, 2008

Polish , Czech, Slovak, Hungarian , German style of food. Sausages, meats, cheese, breads, rolls, struedels, popy seed rolls, dumplings, pierogies. Imported jar products, mineral water, juices. Czech and Polish beer. Take-out catering, European style sauerkraut, Goulash, Soups, Fleish salad, Cod fish salad and more.

550 S Main St Ste.100 Woodstock GA 30188
Tel: 678-238-0567
Hours: Thue-Sat 11 - 7 pm.

And we'll make a good goulash baby. Dio time to go!

Tenacious D - Dio

European Deli & Market in Atlanta - 2008 HOT LIST


(Last) Newer << 5 - 6 - 7 - 8 - 9 - 10 - 11 - 12 - 13 - 14 ++ 24 >> Older (First)
 
 
Powered By Industrial Memetics
RSS2.0