Tyromaniac : Truth will triumph in the end... after everybody has left
Updated: 10/20/05; 7:19:59 AM.

 

Click to see the XML version of this web page.

Subscribe to "Tyromaniac" in Radio UserLand.

Click here to send an email to the editor of this weblog.

 
 
Saturday, August 3, 2002



Trés cool trick for the terminal [From Jerry Kindall]
9:06:07 AM  What do you think? ( Thoughts) Who linked? []   



Turkey Abolishes Death Penalty. Turkey's parliament abolished the death penalty and legalized education and broadcasts in Kurdish today, moves aimed at improving the country's chances for joining the European Union. By The Associated Press. [New York Times: International]   Wow.  I have spent lots of time in Turkey, particularly during the Gulf War, and given my experience both of these actions are unexpected. [John Robb's Radio Weblog]
8:37:34 AM  What do you think? ( Thoughts) Who linked? []   



Markets Explained.

Forwarded via Tim Hiltabiddle via an unknown source, apparently initiating somewhere in Juniper Networks, here's a map of the unfolding scandals. (Click on the snippet below to see the entire illustration.)

[JOHO the Blog]
8:24:12 AM  What do you think? ( Thoughts) Who linked? []   



Old game machine gets hack trick. Two security researchers show attendees at the Defcon hacking conference how to reuse Dreamcast gaming consoles as stealthy network monitoring devices.

Higbee and his programming partner, consultant Chris Davis of RedSiren Technologies, created the software to turn a Dreamcast into a network bug. Their software, when burned onto a CD-R and placed in a Dreamcast that has a broadband network adapter, allows the game console to give a hacker access to the network to which it is connected.

Rather than teaching hackers in the audience how to monitor others' networks, Higbee and Davis said the demonstration was intended to alert network administrators to the danger that many innocent-looking devices could pose to network security.

"We are really attacking the concept of what computers are," he said, adding that many other devices could be used to monitor networks, including TiVo television recording devices, some new "intelligent" vending machines and even printers.

Walking into a company and dropping a device onto the network is a simple way to defeat much of the network security that businesses might erect to keep out attackers, Higbee said.

"Physical access is pretty easy to obtain," he said. "Especially for short moments of time."

[CNET News.com]

This is something I've been teaching people all along. Physical access is the first step for security. I know a case in which a hard disk was replaced, by bad guys, by a broken hard disk, the next day the user just thought his hard disk went south, call the sys admins they got his machine running threw away the broken hard disk and they never found out how the information in the original hard disk was stolen!


8:22:37 AM  What do you think? ( Thoughts) Who linked? []   

© Copyleft 2005 Alfredo Octavio.


August 2002
Sun Mon Tue Wed Thu Fri Sat
        1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Jul   Sep

Google


Search Web Search Tyromaniac

Dictionary

Enlace - HyperlinkDiccionario RAE (Click Here)
Webrolling:
Chase me ladies, I'm the Cavalry
Linux para Venezuela
ZonaGeek
Jerry Kindall
Recent Titled Posts
 10/16/05
 10/15/05
 10/14/05
 10/14/05
 10/14/05
 10/14/05
 10/14/05
 10/14/05
 10/14/05
 10/14/05
 10/13/05
 10/12/05
 7/28/05
 7/23/05
 7/23/05
 7/23/05
 7/21/05
 7/11/05
 7/8/05
 7/7/05
 7/6/05
 7/3/05
 7/1/05
 6/29/05
 6/27/05
 6/27/05