Tuesday, May 29, 2007
Monday, May 28, 2007
Sunday, May 27, 2007
Why Are CC Numbers Still So Easy To Find?
Tool TIme - Drobo
This thing seems way cool to me, watch a demo here.
Drobo is a four drive array that connects via USB and employs "intelligent" software to handle all of the data management and disk swapping: one drive goes down? No problem, Drobo's already on it. Wanna swap out drives while you listen to music? Drobo keeps the tunes going even when you're down to one disk.
Friday, May 25, 2007
"Between Silk and Cyanide: A Codemaker's War"
Between Silk and Cyanide: A Codemaker's War, 1941-1945
Hardcover: 624 pages
Publisher: Free Press (June 9, 1999)
Language: English
ISBN-10: 0684864223
ISBN-13: 978-0684864228
Friday Fun - A Fair(y) Use Tale
- Had to of been a lot of work...
Thursday, May 24, 2007
The 14th episode of The Silver Bullet Security Podcast
Wednesday, May 23, 2007
Hack My Son's Computer, Please
Can an elderly father give police permission to search a password-protected computer kept in his adult son's bedroom, without probable cause or a warrant? In April, a three judge panel of the 10th Circuit Court of Appeals said yes.
This week, the son's attorney, Melissa Harrison, an assistant federal public defender in Kansas City, will ask the court to reconsider the panel's ruling. At stake is whether law enforcement will have any responsibility to respect passwords and other expressions of user privacy when searching devices which contain the most sensitive kinds of private information.
Tuesday, May 22, 2007
Sending Encrypted Emails With S/MIME Protocol
Sunday, May 20, 2007
Friday, May 18, 2007
Friday Fun - Tandy Computer Whiz Kids Comics
Thursday, May 17, 2007
New Site for Data Loss Statistics - etiolated
Surveilance Basics
3. Murphy's Law
4. Surveillance Room: Policies and Procedures
5. The Observer's Instinct, or "JDLR"
10. False Reports
11. Confidentiality
12. Teamwork Part I
13. Assisting Casino Management
15. Shift Checklist
16. Teamwork Part II: The Surveillance Room Team
17. Job Descriptions
by Gary Powell and Jim Goding
Wednesday, May 16, 2007
eBay Scammer on Judge Judy
Somthing to Think About
- John Vorhaus
Tuesday, May 15, 2007
Sunday, May 13, 2007
Reminder: Monday is Wiretap the Internet Day
May 14th is the official deadline for cable modem companies, DSL providers, broadband over powerline, satellite internet companies and some universities to finish wiring up their networks with FBI-friendly surveillance gear, to comply with the FCC's expanded interpretation of the Communications Assistance for Law Enforcement Act.
Congress passed CALEA in 1994 to help FBI eavesdroppers deal with digital telecom technology. The law required phone companies to make their networks easier to wiretap. The results: on mobile phone networks, where CALEA tech has 100% penetration, it's credited with boosting the number of court-approved wiretaps a carrier can handle simultaneously, and greatly shortening the time it takes to get a wiretap going. Cops can now start listening in less than a day.
Saturday, May 12, 2007
Sex Toy Threatens Cyprus's National Security
Story source.
Friday, May 11, 2007
Friday "Fun"
A man cut off his own head with a chainsaw after stabbing his 70-year-old father to death in their apartment in the German city of Cologne, police said.
The body of the offender, 24, was found headless when police raced to the apartment after an emergency call, apparently from the dying father, had been broken off in mid-sentence.
Body found in bed after seven years
The decomposed corpse of a German man has been found alone in his bed after nearly seven years, police in the western city of Essen said today.
The police said in a statement the man was 59 and unemployed at the time of his death. He most likely died of natural causes on November 30, 2000, the date he received a letter from the Welfare Office found in the flat, police said.
Thursday, May 10, 2007
The Attacks Against Estonian Servers
Russia's aggressive displays towards Estonia of late, in the wake of the moving of the "Bronze Soldier" Soviet war memorial, have not been confined to rioting by nationalists on the streets of Tallinn or the blockading of the Estonian Embassy in Moscow.
Estonian government websites and others have been the victims of denial-of-service attacks since Friday of last week [April 27th, the day the statue was moved, following a night of rioting that left one man dead].
Wednesday, May 09, 2007
Fed Worker Sues over Googling
When: U.S. Court of Appeals for the Federal Circuit rules on May 4.
Outcome: Unanimous three-judge panel says no harm was done by using search engine.
More
Tuesday, May 08, 2007
Anti-Violence Electrode Shock Gun
Multi-Functions
1.With Cartridge of probes
Fire two probes up to a distance of 3.5M , which transmits pulsed energy that temporarily overrides the central nervous system of the target causing immediate incapacitation
2.With Cartridge of pepper powder
Pepper powder spray out up to a distance of 3 ~ 5M , and swells the veins in the which will cause a few people swells the mucous membranes to make breathing difficult,eyes, causing the tears dropped and the eyes to close
3. With Cartridge of rubber bullet
Used especially by military personnel and law enforcement officers in crowd control.10 ~ 15M effective distance
4. With Cartridge of paint bullet
Used especially by military personnel and law enforcement officers in crowd control.10 ~ 15M effective distance.
5.With Extended electric stick
For extending defense range to around 50cm
6.Capable of drive stun with or without cartridge of probes installed
7.Deployed Power ful Xenon light
Blind Man's Bluff
Don't try to dupe Kent Parker just because he's blind and operates a deli in the Hamilton County Courthouse.More here.
Every once in a while, somebody tries to cheat him despite the security cameras trained on the cash register and about a dozen sheriff's deputies a few steps away.
In the past two weeks, two women offered bills smaller than they claimed and were arrested within minutes.
Sunday, May 06, 2007
TJX was it Wardriving?
There, investigators now believe, hackers pointed a telescope-shaped antenna toward the store and used a laptop computer to decode data streaming through the air between hand-held price-checking devices, cash registers and the store's computers. That helped them hack into the central database of Marshalls' parent, TJX Cos. in Framingham, Mass., to repeatedly purloin information about customers.
More here.
Friday, May 04, 2007
Thursday, May 03, 2007
Tools to Really Erase a HD
Here is info on how really erase hard drive data:
Tutorial on Disk Drive Data Sanitization
Gordon Hughes - CMRR Secure Erase Page
Another alternative is an open source external block overwrite utility called Darik's Boot and Nuke ("DBAN").
Wednesday, May 02, 2007
Gartner: Hacking contests bad for business
The research manager of TippingPoint, the company that paid $10,000 for the QuickTime vulnerability and its associated exploit, rebutted by saying that at no time was there any danger of the vulnerability escaping from responsible parties.
"Public vulnerability research and 'hacking contests' are risky endeavors and can run contrary to responsible disclosure practices, whereby vendors are given an opportunity to develop patches or remediation before any public announcements," said analysts Rich Mogull and Greg Young in a research note published by Gartner on Monday.
Full InfoWorld story.
Certainly starts to blur the lines between the good guys, the bad and "responsible disclosure". How long before company A puts a bounty on "security research" of company B - their competitor?