|
Monday, August 26, 2002 |
Hackers catch World Cup fever: Brazil's triumph in the football World Cup may have spurred the country's hackers to emulate the success in cyber-space. Brazilian hackers are now the most prolific in the world, taking over from Eastern European groups which dominated cyber-attacks in the 1990s, according to security firm mi2g. [Terrorism RealNews] I always wonder where they get their numbers from. It turns out, that they only counted Web Defacements. When attrition.org was still in the defacemnet mirror buisenes most "internet security statistics" where just the numbers plainly taken from attrition.org.
23:35
#
G!
| |
Der Chaos Computer Club Cologne (C4) veranstaltet am 31. August eine Party zu seinem 5j...hrigen Bestehen. [Chaos Computer Club] ... im Rahmen der Demo-Party evoke. Nett, aber auf der falschen Rheinseite.
22:58
#
G!
| |
Recently I found a link by Ed
Felten to an article on the problems "intellectual property"
creates for Academics. The Article
was written by Siva Vaidyanatha and was published in "Chronicle
of Higher Education".
I have a concrete example of "intellectual property" decreasing
the quality of scientific research or at least the communication
of research results:
I am writing my Ph.D. Thesis on computer crime. That brings me to
a situation where I have do document hundreds of computer crime
cases. The most information about computer crime cases is found
on the Internet. And most of the information on the Internet is
not as stable as one would wish.
On of the key points in scientific work in the field of
humanities is that your research should be reproducable by
others. So somebody using my research should be able to easily
access the same sources. That's what citations, bibliographies
and university libraries are for.
So how could I ensure that others have access to the same online
resources that I have used? There is an very easy solution: Hack
an little program that goes over my bibliographic database,
downloads all online resources mentioned and and puts them in a
folder of my homepage. (This technique is commonly referred as
"mirroring"). I could put a note in my Thesis stating that any
references on the Web which are inaccessible can also be found
"mirroring"). I could put a note in my Thesis stating that any
references on the Web which are inaccessible can also be found
at "http://md.hudora.de/archive/diss/" or something. This all in
all would take me less than 20 minutes and the additional effort
to keep this single URL stable over the years.
By doing so I would be happy, my thesis advisor would be happy
an my readers would be happy. Possibly most authors of the
online-resources would be happy, too. I found out most like it,
when they are deemed to be "important enough to be included in
scientific work". Other resources I would mirror are by
anonymous entities or government bodies which both shouldn't
subject to being mirrored. Some resources are online magazines
which might like it not that much because they might fear loosing
advertising revenue.
But basically with twenty minutes of work I could raise the
scientific use of my thesis considerably.
The problem is I can not take an mirror and publish it. German
"Urheberrecht" allows me to take a mirror for my own use (so
called "Eigengebrauch") but I am not allowed to publish it. I
could ask all authors of online resources if they allow me to
mirror their resource but this would take weeks instead of twenty
minutes and I would have to build a databases of whom exactly
allowed me to mirror what and republish under which conditions.
So I will simply do what all others do: take a mirror for my own
use, keep it for myself and give out single documents in an
informal way to fellow researchers asking me explicitly. Not a
very satisfying solution.
22:43
#
G!
| |
Japanese phones vulnerable to hackers?
So far, no serious virus attacks have been reported in Japan--or anywhere else -- but tech security companies say cell phones could become targets as they turn into sophisticated, high-tech devices like PCs, allowing people to send e-mail, surf the Internet and shop online. [c|net] "FUD" spreaders seem to be obsessed with the dangers of mobile cracking and viruses. See SMS-Viruses which are just simple DoS-Attacks. Beware of a mobile Pearl Harbour!
22:01
#
G!
| |
Nicky war heute beim Zahnarzt und bekam eine F[florin]llung. Von dem zahnarzttypischen L...rm ist unser armes Zwezzle aufgewacht und war sehr unruhig - verst...ndlich.
Zweezle ist der Arbeitstitel f[florin]r unser ungeborenes ... zumindest wis wir das Geschlecht wissen. Neal war das Beezle.
21:46
#
G!
| |
via [heise online news]: Die Geschichte zeigt erneut, dass es anscheinend unm[ring]glich ist legel eine vern[florin]nftige Musikauswahl online anzubieten. qui bono?
21:42
#
G!
| |
Nachdem das "Familientagebuch" ja nun ienige Wochen brach liegt, ein neuer Versuch etwas aus unserem Leben niederzuschreiben. Diesmal mit neuer - hoffentlich praktischerer - Technik.
Diesmal verwende ich Radio Userland, ein Tool mit dem ich auch Material f[florin]r meine Dissertation strukturiere. Hoffentlich gelingt es damit besser, gelegentlich eine kleine Nachricht aus unseren Familienleben niederzupinnen.
Unsere Neuen Geschichten finden sich unter http://md.hudora.de/dornet/blog/.
Gru§
Max
20:25
#
G!
| |
A Seattle lawyer has launched a challenge over a sting operation by the FBI that led to the arrest last year of two Russian hackers . The FBI apparently broke Russian laws by breaking into a computer system as part of the operation. Seattle defense attorney John Lundin said he will use the same argument Russia's state security service FSB has used--that the FBI acted criminally in its attempt to nab his client Vasiliy Gorshkov--in an appeal he expects to file after Gorshkov... [bplog]
9:28
#
G!
| |
The Daily Telegraph reports on a new book about Australia's DSD intercepting phone calls to the Norwegian freighter Tampa . Both the book and the article appear to have very little new information. Phone calls were tapped by the Defence Signals Directorate when Norwegian ambassador Ove Thorsheim visited the freighter during the stand-off. A book, Tampa, to be published in Norway in October, recounts the events which triggered Australia's Pacific Solution and... [bplog]
9:27
#
G!
| |
Wary Customers Don't Trust Businesses To Protect Privacy: People are becoming increasingly cynical about how businesses use the data they collect about their customers, according to six years of consumer surveys conducted for Privacy & American Business, a privacy newsletter. The survey asks consumers whether they agree with three statements about data privacy: Consumers have lost control over how companies collect and use personal data; businesses handle consumer data properly and confidentially; and existing laws reasonably protect consumer privacy.
[TechWeb: Security]
0:17
#
| |
Secret Service hosts tech managers meeting to tighten security, city by city: Businesses in large U.S. cities soon will be able to send their information technology specialists to quarterly government-sponsored meetings to compare notes with their peers on the subject of cybersecurity.
Companies need not worry about exposing secrets about their systems or successful attacks against them, says the government organization facilitating the meetings. That organization is the Secret Service, which prides itself on confidentiality.
[.:[ Security-Protocols ]:.]
0:12
#
| |
virus-writing-HOWTO-..> This document describes how to write parasitic file viruses infecting ELF executables. Though it contains a lot of source code, no actual virus is included. Every mentioned infection method is accompanied with a practical guide to detection.
[Packet Storm Files]
0:04
#
| |
Hackers, crackers and ethics: Dear Editor,
I read the story of ForensicTec hacking into military computers. Their stated intent, apparently, was to show security flaws. However, I think a more selfish reason was to give them instant credibility. They are, after all, a company that is only several months old and need to make a name for themselves. ...
[SecurityFocus]
0:03
#
| |
Maximillian Dornseif, 2002.
|
|
|