| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
| | | | |
Lifehacker today (and 1000's of others) posted how to break into my house???
While I appreciate them giving me job security in the IT front .... I do not know why posting these kinds of threats are not a national security issue?
Yes we should report it and discuss, but giving 'how to' editorials is a threat.
From Lifehacker How to Crack a Wi-Fi Network's WEP Password
You already know that if you want to lock down your Wi-Fi network, you should opt for WPA encryption because WEP is easy to crack. But did you know how easy? Take a look.
Today we're going to run down, step-by-step, how to crack a Wi-Fi network with WEP security turned on. But first, a word: Knowledge is power, but power doesn't mean you should be a jerk, or do anything illegal. Knowing how to pick a lock doesn't make you a thief. Consider this post educational, or a proof-of-concept intellectual exercise.
Dozens of tutorials on how to crack WEP are already all over the internet using this method. Seriously—Google it. This ain't what you'd call "news." But what is surprising is that someone like me, with minimal networking experience, can get this done with free software and a cheap Wi-Fi adapter. Here's how it goes.
Abstract. In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works for all the keys and has complexity 2119, while the recent attack by Biryukov-Khovratovich-Nikolic works for a weak key class and has higher complexity. The second attack is the first cryptanalysis of the full AES-192. Both our attacks are boomerang attacks, which are based on the recent idea of finding local collisions in block ciphersboomerang switching techniques to gain free rounds in the middle. and enhanced with the
In an e-mail, the authors wrote: We also expect that a careful analysis may reduce the complexities. As a preliminary result, we think that the complexity of the attack on AES-256 can be lowered from 2119 to about 2110.5 data and time.
We believe that these results may shed a new light on the design of the key-schedules of block ciphers, but they pose no immediate threat for the real world applications that use AES.
Agreed. While this attack is better than brute force -- and some cryptographers will describe the algorithm as "broken" because of it -- it is still far, far beyond our capabilities of computation. The attack is, and probably forever will be, theoretical. But remember: attacks always get better, they never get worse. Others will continue to improve on these numbers. While there's no reason to panic, no reason to stop using AES, no reason to insist that NIST choose another encryption standard, this will certainly be a problem for some of the AES-based SHA-3 candidate hash functions.
Read more from Bruce:The old timesharing model arose because computers were expensive and hard to maintain. Modern computers and networks are drastically cheaper, but they're still hard to maintain. As networks have become faster, it is again easier to have someone else do the hard work. Computing has become more of a utility; users are more concerned with results than technical details, so the tech fades into the background.
You don't want your critical data to be on some cloud computer that abruptly disappears because its owner goes bankrupt . You don't want the company you're using to be sold to your direct competitor. You don't want the company to cut corners, without warning, because times are tight. Or raise its prices and then refuse to let you have your data back. These things can happen with software vendors, but the results aren't as drastic.Trust is a concept as old as humanity, and the solutions are the same as they have always been. Be careful who you trust, be careful what you trust them with, and be careful how much you trust them. Outsourcing is the future of computing. Eventually we'll get this right, but you don't want to be a casualty along the way.
This essay originally appeared in The Guardian.
Yesterday's Tomorrows: Past Visions of the American Future
"There are so many things you can't anticipate when you create a new technology," he says. "Who would have predicted that the Internet would be taking down shopping malls and wiping out newspapers?''
"Even then, people had a misplaced faith in the power of inventions to make life easier, Americans' faith in the power of technology to reshape the future is due in part to their history. Americans have never accepted a radical political transformation that would change their future. They prefer technology, not radical politics, to propel social change."
"I'm a guy who doesn't see anything good having come from the Internet," said Sony Pictures Entertainment chief executive officer Michael Lynton. "Period." , Lynton wasn't just trying for a laugh: He complained the Internet has "created this notion that anyone can have whatever they want at any given time. It's as if the stores on Madison Avenue were open 24 hours a day. They feel entitled. They say, 'Give it to me now,' and if you don't give it to them for free, they'll steal it." Read more here
"If you have something that can happen, and something that won't necessarily happen, it's going to either happen or it's going to not happen, and so the best guess is 1 in 2.""I'm not sure that's how probability works, Walter."
This is followed by clips of news shows taking the guy seriously.
Read full by schneierIf you did a Google search between 6:30 a.m. PST and 7:25 a.m. PST this morning, you likely saw that the message "This site may harm your computer" accompanied each and every search result. This was clearly an error, and we are very sorry for the inconvenience caused to our users.
What happened? Very simply, human error. Google flags search results with the message "This site may harm your computer" if the site is known to install malicious software in the background or otherwise surreptitiously. We do this to protect our users against visiting sites that could harm their computers. We maintain a list of such sites through both manual and automated methods. We work with a non-profit called StopBadware.org to come up with criteria for maintaining this list, and to provide simple processes for webmasters to remove their site from the list.
We periodically update that list and released one such update to the site this morning.
Technorati, the blog search engine, put out Part I of its sporadic (now-annual?) State of the Blogosphere report this week. This year, it conducted a random survey of 1,079 random bloggers (a statistically significant sample) to paint a more detailed picture of just who exactly is out there blogging. Technorati has indexed a total of 133 million blogs since 2002. In terms of how many are active, 7.5 million blogs have added a new post during the last four months, and 1.5 million have been updated during the last week.
And the average blog that runs ads, according to Technorati, is actually making money:
Among those with advertising, the mean annual investment in their blog is $1,800, but it’s paying off. The mean annual revenue is $6,000 with $75K+ in revenue for those with 100,000 or more unique visitors per month.
The $6,000 a year I can believe. The $75,000 figure is harder to swallow, especially with only 100,000 visitors a month. But directionally there is no doubt that blogs are bringing in more cash.
Who are these bloggers? Technorati breaks that down as well. The vast majority of all bloggers (79 percent) write about their personal interests. No surprise there.
But more than half of all bloggers also write about business. While only 12 percent identify themselves as official “corporate bloggers,” a full 46 percent consider themselves “professional bloggers” (meaning that they write about their industries, but not in an official capacity).
Blogs are also mostly a male affair: 57 percent in the U.S. are written by men, 42 percent went to graduate school, and 50 percent earn more than $75,000 a year, and 58 percent are over 35 years old. (Someone call the diversity police).
More than half have a separate full time job. More than half of survey respondents have been blogging for more than two years.Geographically, North America dominates, with 48 percent of respondents living here. San Francisco and the Bay Area has the most bloggers in the U.S., with New York City, Chicago, and LA also having a strong showing. Although, as the map below shows, the geographic distribution is actually pretty wide.
And blogs continue to be read: blogs in the aggregate now attract 77.7 million unique U.S. visitors per month according to Comscore, nearly double the number of people who visit Facebook.
This is just the first day of the report, so get ready for a lot of data over the next four days. Read full By Erick Schonfeld on Technorati
Stanford University has launched a series of 10 free, online computer science (CS) and electrical engineering courses. The courses span an introduction to computer science and an introduction to artificial intelligence and robotics, among other topics.
The free courses are being offered “to students and educators around the world” under the auspices of Stanford Engineering Everywhere (SEE). Each course comprises downloadable video lectures, handouts, assignments, exams, and transcripts.
The courses are nearly identical to what’s offered to enrolled Stanford students, according to the University. However, those taking courses through SEE are not eligible to receive Stanford credit for them.
Course participants do not register, and have no direct contact with Stanford instructors or professors. They do, however, have the ability to communicate online with other SEE students. A detailed SEE FAQ is available here.
The University says SEE’s initial courses include “one of Stanford’s most popular engineering sequences: the three-course Introduction to Computer Science taken by the majority of Stanford undergraduates, and seven more advanced courses in artificial intelligence and electrical engineering.”
Specifically, SEE’s first 10 courses are…