|OpenDNS released a free tool today called fixmylinksys.com that lets Linksys users easily change their default password to protect themselves from the [DNS rebinding] hack Kaminsky will demo.
Kelly Jackson Higgins RSA Session Features Live Linksys Router Hack
I bet you still know people who use admin or 123456 as a router password. Let them know about DNS binding attacks.
|We rarely talk about people being “book addicts” – we say “book worms”, because reading a book is an activity we associate with intellectual exercise.
Bobbie Johnson, Addicted? Not quite
Lots of buzz lately about Internet addiction being a mental illness. I found it interesting that South Korea and China are often mentioned as countries having problems with this particular addiction. Hmmmm….aren’t they also two countries that have been accused of Internet censorship? Promoting the dangers of IAD (Internet Addiction Disorder) might be a good way for the government to protect people for their own good. I love conspiracy theories.
|“Many folks in the anti-virus and broader Internet security space say Damballa is trying to make a name for itself by hyping this threat, and that Kraken is nothing more than a renamed and repackaged “Bobax,” a worm of similar lineage and methods that was discovered several years ago.”
Brian Krebs, Kraken Spawns a Clash of the Titans
The Computer History Museum has put together a great series of video tours. Here’s a peek at the IBM 7030, the first “supercomputer.”
[kml_flashembed movie="http://www.youtube.com/v/HTs9JZ7OMYQ" width="425" height="350" wmode="transparent" /]
The product name is the Power 575. IBM is promoting is as a hydro-cluster supercomputer. To paint it green, the literature says the Power 575 requires 80 percent fewer air conditioning units and reduce total cooling costs by 40%. (It’s water-cooled).
[kml_flashembed movie="http://www.youtube.com/v/ioCZojN4A0g" width="425" height="350" wmode="transparent" /]
Key points discussed at last visit to IBM:
1. Water cooling is 4,000 times more efficient than air cooling.
2. Air cooling has become too expensive and there’s a finite limit to how much power you can bring in.
3. It’s tough to budget ahead for air cooling — power costs are a big unfriendly variable.
4. Heated water is easier to recycle than heated air.
|“Google could parlay its search and advertising technology, market dominance, and its infrastructure prowess into a powerful engine that runs and monetizes thousands or millions of externally developed applications.
Salesforce.com provides a more mature example today with its Force.com platform. It allows developers to write applications, mostly CRM-oriented, in a variety of languages that can run natively on the Salesforce.com software platform and data centers.”
Dan Farber, Web 2.5: The emergence of platforms-as-a-service
I like this analogy. Hadn’t thought of Salesforce this way before.
|“What is different is that we’re going to have comprehensive coverage across federal networks, and that all the information about potential intrusions or malicious code would flow to a central point, the U.S. Computer Emergency Readiness Team at the Department of Homeland Security.”
Scott Charbo, as quoted in Analysis: Einstein and U.S. cybersecurity
Mr. Charbo is the Chief Information Officer at the Department of Homeland Security. He’s talking about EINSTEIN, a federal government’s intrusion detection software application. It’s been available since 2004, but now the DHS is going to make it mandatory.
What took them so long, you ask? Well, apparently there wasn’t a single “business owner” with enough power to mandate EINSTEIN’s global use until February, when President Bush signed that multi-billion-dollar cybersecurity initiative. EINSTEIN has received its share of criticism. Some detractors point out that it’s not robust enough. Some worry that if everyone’s using the same software, everyone shares the same vulnerabilities. Some people just seem content to make Bush/Einstein jokes.
I’m not sure what I think about this yet.
See also: Einstein keeps an eye on agency networks
|“QoE measurement is about being able to reconstruct the voice signal in a measurement device, and to then run signal processing algorithms to determine the call quality. This type of QoE measurement will deliver a score that much more accurately reflects the true user experience than results by just watching the network packet characteristics.”
– John Bartlett Quality of Experience (QoE)
|Both finger prints and iris patterns can be more prone to copying by a third person. But finger veins are not directly visible to a third person, which makes them more suitable for security use.
Hitachi spokesman Atsushi Konno, as quoted in Vein recognition touted for ID systems
I wonder if the finger has to be attached to a live person for this technology to work? That makes it even MORE suitable.
|In a dig at VMware, Microsoft claims the reason less than 10% of servers are virtualized today is because the schemes available are too complicated and expensive. And in another dig at VMware, Microsoft suggested that Dell, Fujitsu, Fujitsu Siemens, Hitachi, HP, IBM, NEC and Unisys would be pre-installing the final Hyper-V code on their machines. IBM, Dell, HP and Fujitsu Siemens pledged a few weeks ago to pre-install VMware’s freebie ESX 3i bare metal hypervisor on some of their gear.
Maureen O’Gara, Hyper-V Virtually Done