A place of Bile & other Humours.
BlogRoll
Bloglines Blogroll feed currently *broken*
Subscribe to
Posts [Atom]bloglines
"... most blogs involve kids talking about their dates, people posting pictures of their cats, or lefties raging about the right (and vice versa)."
Security is orthogonal to functionality. Security has nothing to with what the product does, or how well it does it, or how good the user interface is.
You can't give a product to a thousand random people, have them beta test it for a month and really learn anything about the security. They can tell you if it works and how functional it is, but they can't tell you if it's broken or not.
Generally, to test security, at least in the real world, you just put the product out there and experienced security professionals, either working for industry, or in academia, or working on their own (commonly known as hackers), find flaws and alert the New York Times and you get your feedback that way. Not terribly useful. But it's where we've ended up.B. Schneier, "Security in the Real World: How to Evaluate Security Technology," Computer Security Journal, v 15, n 4, 1999, pp. 1-14.
Spam 101
I'm going to take a bit of a risk here and go on record as saying that this will not solve comment spam at all; in fact, it'll probably make the problem worse. The reason for this is that there are currently two kinds of spammers:
* One kind, let's call them "Group A", spam weblogs and discussion forums for the PageRank bonuses.
* The other kind, "Group B", spam because they want their address or brand name to be seen by as many people as possible. They don't care about PageRank, they just care about the (fairly constant) percentage of people who will hit their site after seeing the address or name. This is the same motive and method we're all familiar with from USENET and email spam.
Obviously this can stop Group A in its tracks if widely implemented (and the Google announcement sports an impressive list of weblogging tools which are already on board, with more likely to follow), but it does nothing about Group B. What's more, the Group A spammers are unlikely to say "Aw, shucks" and give up; they're probably just going to become Group B spammers, because the marginal gain of visibility is better than nothing.
An attempt to hack into the website of the Disasters and Emergency Committee (DEC) that was set up after the Asian tsunami, is being investigated.
Officers from the Metropolitan Police's Computer Crime Unit have begun an inquiry after BT blocked the attempt on New Year's Eve.
A 28-year-old man from east London was arrested and released on bail in connection with alleged offences.
Police are examining computer equipment seized during a search.
A Londonder (sic) made a tsnuami-relief donation using lynx -- a text-based browser used by the blind, Unix-users and others -- on Sun's Solaris operating system. The site-operator decided that this "unusual" event in the system log indicated a hack-attempt, and the police broke down the donor's door and arrested him. From a mailing list:
For donating to a Tsunami appeal using Lynx on Solaris 10. BT [British Telecom] who run the donation management system misread an access log and saw hmm thats a non standard browser not identifying it's type and it's doing strange things. Trace that IP. Arrest that hacker.
Armed police, a van, a police cell and national news later the police have gone in SWAT styley and arrested someone having their lunch.
Out on bail till next week and preparing to make a lot of very bad PR for BT and the Police....
So just goes to show if you use anything other than Firefox or IE and you rely on someone else to interogate access logs or IDS logs you too could be sitting in a paper suit in a cell :(
In the last six months alone, the nine-nation survey of leading taxi companies in Australia, Denmark, Finland, France, Germany, Norway, Sweden, Great Britain, and the U.S. indicated tens of thousands of digital devices were left behind inadvertently. The U.S. company polled in the survey, a major Chicago cab company, reported the highest number of losses per taxi of all firms studied, both in mobile phones (3.42 per cab) and PDAs/Pocket PCs (0.86 per cab).
Based on the large size of the Chicago company's fleet, the statistics indicate a staggering 85,619 mobile phones, 21,460 PDAs/Pocket PCs, and 4,425 laptops left in the firm's licensed cabs during the six months covered in the study. Only London, with 0.21 laptop PCs lost per cab versus the Chicago firm's 0.18, was higher in any category.
"I got in front of her and let their truck hit the back of mine."That's over 50 tonnes of barely controlled machinery! He's certainly a driver who is worth his weight in diff-oil!
Mr Mahuta then gradually applied his brakes until the following truck hit.
"There was a bang and a bit of a nudge."
Slowly he tried to bring the two trucks, each about 16m long, to a halt as they drove locked together down the motorway.
Post Links
Previous Posts
... not a complete waste if taxes then!
Stupid Charges are not customer service.
The first Sacrifice of Spring.
Apparently it's what separates men from women ...
Archives
May 2004
June 2004
July 2004
August 2004
September 2004
October 2004
November 2004
December 2004
January 2005
February 2005
March 2005
April 2005
May 2005
June 2005
July 2005
August 2005
September 2005
October 2005
November 2005
December 2005
January 2006
February 2006
March 2006
April 2006
May 2006
June 2006
July 2006
August 2006
September 2006
October 2006
December 2006
January 2007
February 2007
March 2007
April 2007
May 2007
June 2007
July 2007
August 2007
September 2007
November 2007
January 2008
February 2008
March 2008
April 2008
May 2008
July 2008
August 2008
October 2008
January 2009
February 2009
April 2009
June 2009
November 2009
December 2009
January 2010
March 2010
April 2010
May 2010
August 2010
October 2010
November 2010
December 2010
January 2011
February 2011
March 2011
April 2011
May 2011
June 2011
July 2011
August 2011
September 2011
October 2011
April 2012
July 2012
August 2012