Shared posts

24 Mar 22:19

3050995 - Improperly Issued Digital Certificates Could Allow Spoofing - Version: 2.0

Revision Note: V2.0 (March 26, 2015): Advisory rereleased to announce that the update for supported editions of Windows Server 2003 is now available. See Microsoft Knowledge Base Article 3050995 for more information and download links.
Summary: Microsoft is aware of improperly issued digital certificates coming from the subordinate CA, MCS Holdings, which could be used in attempts to spoof content, perform phishing attacks, or perform man-in-the-middle attacks. The improperly issued certificates cannot be used to issue other certificates, impersonate other domains, or sign code. This issue affects all supported releases of Microsoft Windows.
16 Mar 21:23

You Don't Need to Start as a Teen to be an Ethical Hacker (Video)

by Roblimo
Meet Justin Whitehead. While a lot of his contemporaries were going to college, he became an Airborne soldier. After that he went to college, became an IT technian, got some experience as a Computer Forensic Analyst, and met people who looked like they were having a good time as penetration testers. So he took some recommended classes,got hired by One World Labs, and last week at B-Sides Austin, he and coworker Antonio Herraiz gave a talk titled 'Spanking the monkey/How pen testers can do it better. Justin is 40, an age where a lot of people in the IT game worry about being over the hill and unemployable. But Justin's little video talk should give you hope -- whether you're a mature college student, have a stalled IT career or are thinking about a career change but want to keep working with computers and IT in general. It seems that there are decent IT-related jobs out there even if you're not a youngster; and even if you didn't start working with computers until you were in your 20s or 30s.

Share on Google+

Read more of this story at Slashdot.








04 Mar 20:45

One Year Later, We're No Closer To Finding MtGox's Missing Millions

by Soulskill
itwbennett writes: When Mt. Gox collapsed on Feb. 28, 2014, with liabilities of some ¥6.5 billion ($63.6 million), it said it was unable to account for some 850,000 bitcoins. Some 200,000 of them turned up in an old-format bitcoin wallet last March, bringing the tally of missing bitcoins to 650,000 (now worth about $180 million). In January, Japan's Yomiuri Shimbun newspaper, citing sources close to a Tokyo police probe of the MtGox collapse, reported that only 7,000 of the coins appear to have been taken by hackers, with the remainder stolen through a series of fraudulent transactions. But there's still no explanation of what happened to them, and no clear record of what happened on the exchange.

Share on Google+

Read more of this story at Slashdot.








12 Jan 20:25

Cable lobby says Google Fiber doesn’t need Title II to get pole access

by Jon Brodkin

The top cable lobby group says Google is blowing smoke when it comes to Title II and pole attachment rights.

Google told the Federal Communications Commission that reclassifying broadband providers as common carriers under Title II of the Communications Act would help Google and other companies gain access to infrastructure controlled by utilities. Section 224 of Title II covers pole attachments, and Google urged the FCC to enforce this section if it does move broadband under Title II.

But that isn't even necessary, the National Cable & Telecommunications Association (NCTA) argued in a filing today, saying that "Google already can avail itself of pole attachment rights under Section 224, notwithstanding its assertions to the contrary. Google’s letter states that Google Fiber 'lacks federal access rights pursuant to Section 224' because it offers an 'Internet Protocol video service that is not traditional cable TV.' But as NCTA has explained on numerous occasions... the law is clear that facilities-based providers of Internet Protocol television ('IPTV') services do qualify as cable operators under the Communications Act of 1934, as amended ('the Act'). The Act defines 'cable operator' as one who 'provides cable service over a cable system,' without any reference to the technology (IP-based, QAM-based, or otherwise) used to provide such service."

Read 7 remaining paragraphs | Comments








12 Jan 17:43

Supreme Court asks DOJ to weigh in on Google-Oracle API copyright flap

by David Kravets

The Supreme Court on Monday asked the Obama administration for its views on an appeals court's conclusion that Oracle's Java application programming interfaces are protected by copyright.

The move (PDF) by the justices indicates that the high court is interested in the hotly contested intellectual property dispute. But whether the Supreme Court will enter the legal thicket won't be announced until after the administration responds in the coming months.

The legal fracas started when Google copied certain elements—names, declaration, and header lines—of the Java APIs in Android, and Oracle sued. A San Francisco federal judge largely sided with Google in 2012, saying that the code in question could not be copyrighted.

Read 13 remaining paragraphs | Comments








09 Jan 16:37

Asus Wireless Routers Can Be Exploited By Anyone Inside the Network

by timothy
An anonymous reader writes A currently unpatched bug in ASUS wireless routers has been discovered whereby users inside a network can gain full administrative control, according to recent research conducted by security firm Accuvant. Although the flaw does not allow access to external hackers, anyone within the network can take administrative control and reroute users to malicious websites, as well as holding the ability to install malicious software. The vulnerability stems from a poorly coded service, infosvr, which is used by ASUS to facilitate router configuration by automatically monitoring the local area network (LAN) and identifying other connected routers. Infosvr runs with root privileges and contains an unauthenticated command execution vulnerability, in turn permitting anyone connected to the LAN to gain control by sending a user datagram protocol (UDP) package to the router. In relevant part: The block starts off by excluding a couple of OpCode values, which presumably do not require authentication by design. Then, it calls the memcpy and suspiciously checks the return value against zero. This is highly indicative that the author intended to use memcmp instead. That said, even if this check was implemented properly, knowing the device’s MAC address is hardly sufficient authentication,” said Drake. Here are the technical details at GitHub.

Share on Google+

Read more of this story at Slashdot.








14 Nov 21:44

News Post: A Ring And A Prayer

by tycho@penny-arcade.com (Tycho)
Tycho: Gabriel’s Sonic Boom Verdict was similar to other Sonic Verdicts and ultimately resulted in us wondering to what extent we had manufactured the Sonic that we liked from whole cloth, and then just draped that engineered affection over new titles as they came out.  I don’t really believe it yet.  I feel like I remember having fun.  Maybe not everyone is.  I feel like there’s a gruesome career retrospective coming for this beleaguered hedgehog, one with heartfelt interviews interleaved with black and white reenactments.  I think he’s in a bad…
28 May 15:34

Comic: Harvest

by tycho@penny-arcade.com (Tycho)
New Comic: Harvest
20 May 16:09

Core i7-powered Surface Pro 3 sports 12-inch screen, is just 9.1mm thick

by Peter Bright

Calling it "the tablet that can replace your laptop," Microsoft announced today the Surface Pro 3. At 9.1mm thick, the company claims that it's the thinnest Intel Core-powered system ever made. It now sports a range of Core i3, i5, and i7 processors, instead of the i5 in the Surface Pro 2. It retains the Surface hinge, but it's been re-designed to be a friction hinge that looks able to hold in almost any position, up to 150 degrees.

In spite of the thinness, it's faster than the current Surface Pro 2. The screen is a 3:2 ratio 2160×1440 12-inch part, with the highest contrast ratios in the industry.

It's still not fanless, but with a newly designed fan that's apparently 30 percent more efficient than any other fan, owners should neither hear the fan nor feel the breeze from the vents around the edge. Battery life is said to be some 15 to 20 percent better than any other Surface. It's nonetheless light, at about 800 grams.

Read 6 remaining paragraphs | Comments








22 Aug 15:26

Preferred Chat System

If you call my regular number, it just goes to my pager.
06 Jul 16:55

Douglas Engelbart (1925-2013)

Actual quote from The Demo: '... an advantage of being online is that it keeps track of who you are and what you’re doing all the time ...'
03 Jul 21:34

How Facebook threatens HP, Cisco, and more with its “vanity free” servers

by Sean Gallagher
A test rack in Facebook's hardware electrical test lab filled with Facebook DIY hardware.
Sean Gallagher

MENLO PARK, CA—Building 17 of Facebook's headquarters sits on what was once a Sun Microsystems campus known fondly as "Sun Quentin." It now houses a team of Facebook engineers in the company's electrical lab. Everyday, they push forward the company vision of how data center hardware should be built. These engineers constantly bench-test designs for their built-in-house server hardware—essentially putting an end to server hardware as we know it.

Ars recently visited Facebook's campus to get a tour of the server lab from Senior Manager of Hardware Engineering Matt Corddry, leader of Facebook's server hardware design team. What's happening at Facebook's lab isn't just affecting the company's data centers, it's part of Facebook's contribution to the Open Compute Project (OCP), an effort that hopes to bring open-source design to data center server and storage hardware, infrastructure, and management interfaces across the world.

Facebook, Amazon, and Google are all very picky about their server hardware, and these tech giants mostly build it themselves from commodity components. Frank Frankovsky, VP of hardware design and supply chain operations at Facebook, was instrumental in launching the Open Compute Project because he saw the waste in big cloud players reinventing things they could share. Frankovsky felt that bringing the open-source approach Facebook has followed for software to the hardware side could save the company and others millions—both in direct hardware costs and in maintenance and power costs.

Read 39 remaining paragraphs | Comments

03 Jul 19:11

Hackaday looking for a good home

by Caleb Kraft

hackaday

HackADay.com, an awesome maker community, is looking for a new home
——–

tl;dr: HackADay is a passionate community of hackers doing awesome stuff. It deserves more attention than I can give it right now, as I’m ultra-focused on the launch of Inside.com. So, we’re looking for a caring new owner with a stellar track record of not f@#$ing up brands to take it over.

——–

We created HackADay back in 2004 because one of Engadget’s awesome bloggers, Phil Torrone, wanted to do super-geeky projects every day and the Engadget audience wasn’t exactly into that frequency.

In a phone call with PT I said, “So you want to do a hack a day?”

He was like, “Yeah, a hack a day.”

And I was like, “OK, let’s do hackaday.com.”

When we sold Weblogs Inc. to AOL, we took HackADay out of the deal because it was doing stuff that a corporate parent’s legal arm might not feel comfortable with (e.g., hacking cable boxes!).

So, I bought it and kept it safe and warm inside of Mahalo.com for the past couple of years. However, since I’m super focused on the Inside.com launch, I need to find a new home for it.

It’s doing over $14k a month in advertising without a sales force (just AdSense mainly), and it’s got an amazing stable of bloggers. Given its 6m pageviews a month and with an advertising sales force doing a modest $15 RPM, Hackaday could do $90k a month.

We’ve got 5,674 members of our email list after just five months (should have started it 10 years ago, would have been at 100k+ by now!).

We’ve started doing some epic videos on YouTube. Collectively the videos have over 5m views and 31k subscribers: www.youtube.com/hackaday

This awesome video broke 1m views: http://youtu.be/LZkApleQQpk

Our Twitter handle has 29k followers.

We’re hoping someone like Maker, DemandMedia, InternetBrands, AOL (without Time Warner involved!), Gawker or another publisher can carry on this awesome, profitable and limitless brand.

If you’re interested, send a note to jason@inside.com.

Also, HackADay is looking for a new editor-in-chief. Please send sample projects, posts and whatever else you got to neweditor@hackaday.com.

Thanks for allowing me this and for your help with any new home ideas.

best @jason


Filed under: news
03 Jul 19:08

Bullet time with a ceiling fan

by Brian Benchoff

freaking awesome

Bullet time has been around since at least the first Matrix movie (actually there was a Gap ad before that), and despite it being an oft-used cinematic technique, it still hasn’t gotten old. [Jeremiah] wanted to tap into the awesomeness of bullet time, and managed to come up with a great camera rig using only a GoPro and a ceiling fan.

The build really relies on only two components: a GoPro camera and a ceiling fan. In [Jeremiah]‘s videos, a ceiling fan is mounted between two trees on a sturdy piece of lumber. The GoPro is suspended from one of the fan blades with the help of a piece of wood, a hinge, and a short bit of cable. After [Jeremiah] wired up the fan to a dimmer switch he could control the speed of the fan and Bob’s your uncle.

This isn’t the first time a GoPro has been used for a bullet time rig. In fact, our buddy [Caleb] did a similar build by spinning the camera around on a lazy suzan. Gotta love the high frame rate available on the GoPro, huh?

Vidias after the break.


Filed under: digital cameras hacks
03 Jul 18:53

I've Joined the EFF Board

by Bruce Schneier

I'm now on the board of directors of the EFF.