Wednesday, August 30, 2006
Inventors: Ptacek;
Thomas Henry (Santa Clara, CA);
Newsham; Timothy Nakula (Kaneohe, HI);
Friedrichs;
Oliver (San Jose, CA)
Assignee: Networks Associates, Inc. (Santa Clara, CA)
Appl. No.: 235149
Filed: January 21, 1999
link to USPTO
“Although the foregoing is easy to describe in English, the programming task of actually sending two IP fragments that overlap each other can be extraordinarily tricky using commonly-available programming languages (e.g., the “C” programming language), and virtually impossible to implement in high-level languages like Perl. “
Filed in Digital Warfare
|
Comments Off on System and method providing custom attack simulation language for testing networks |
Permalink
Wednesday, August 30, 2006
Coming soon to an Enormous Room near you.
Wednesday, August 30, 2006
Bank of America has made their web services so secure that even I can not login. And I am the account holder! The failure for my login ability stems from the myriad secondary questions that are all very personal in nature. These “passwords” would read like a diary of your life from place of marriage, honeymoon, graduation, and birth. I tend to fill these answers with random gibberish so no one can simply research public records and gain access to my bank account. The new security features ensure that no one that can’t answer one of these random questions can gain access. This must be done with every new browser installation, computer setup, or possibly once per session (if certain browser protocols are followed).
I offer the application engineers that BoA hired these articles. Study them closely:
http://www.google.com/search?q=security+…
It is a self inflicted version of this “attack” discovered by a small independent security group.
Sunday, August 20, 2006
I have been quoted by Matasano’s blog:
I kicked off the discussion with my opinions of Simson Garfinkles ‘skepticism’ towards security research. Most of this stems from the comments made during Derek Bambauer’s last Berkman fellows talk.
Garfinkle’s labeling of security researchers as “extortionists” amused the group and his claim that the speakers at Blackhat don’t advance the state of the art baffled us all. The idea of making software companies liable was briefly discussed and discarded as an unworkable problem. We really should invite him to the next Beansec so he can illuminate us on these ideas.
The discussions then ranged from airport security (or lack thereof) to more policy related discussions such as liability of runinng Tor servers on Harvards network for research purposes. I think this was the most lively discussion of the night and we could have used some legal expertise (Phil Malone of the Berkman Center was invited and will hopefully show next time). Chris led a discussion on binary decompilation versus source code analysis. Around 9pm the DJs arrived and started to crank up the music really loud and thus ended the first ever Beansec. It was agreed that the venue was the right size and the 3 hour block was the right amount for the event.
I turned down the idea of setting up a mailing list but am reconsidering. I do want this to stay informal but agree (now) that it would be useful as a way to promote the event (which I obviously need to do a better job of).
Friday, August 11, 2006
As reported at Matasano the first ever BeanSec will take place this Monday
(how is that for short notice) in Central Square.
What
An informal meetup of information security professionals and academics
in Cambridge/Boston. Unlike other meetups, you will not be expected to
pay dues, “join up”, present a zero-day exploit, or defend your
dissertation to attend.
Where
Enormous Room
That’s in Central Square, Cambridge. You can take the red line on the T
to the Central Square stop and walk two blocks or park at any of the
nearby parking garages on Green Street. Look for the Central Kitchen
and enter the door with the elephant on it.
When
Beansec 1 is Monday, August 14, 2006 @ 6:00 pm. We will aim for the
middle of every other month to host this event. We will stay till ER
gets too packed or they kick us out. Plan for roughly three hours.
Why
Boston has enough formal events like ISSA and elite events like 2621.
This is just a way for locals in the field to get to know each other.
Monday, August 7, 2006
If you know how to create a great UI and you understand usability please consider helping the Tor project!
“The Tor project, affiliated with the Electronic Frontier Foundation, is running a GUI competition to develop a vision of how Tor can work in a user’s everyday anonymous browsing experience. Some of the challenges include how to make alerts and error conditions visible on screen; how to let the user configure Tor to use or avoid certain routes or nodes; how to learn about the current state of a Tor connection, including which servers it uses; and how to find out whether (and which) applications are using Tor safely.”
Saturday, August 5, 2006
These are the following tools that are used today for DVD ‘protection’. I will follow up with more on each of these in the near future. The most current scheme is to add blank or non referenced cells which is supposed to cause older DVD ripping programs to crash. Of course new tools have been written and defeat all of these schemes. The only people these programs really affect are legit consumers.