1. For the system administrator or parent that has everything, how about a RAT?

    27 February 2007

    'Remote access tool', that is - a little beastie (usually considered malware, though there are legit incarnations of this sort of software) that hides itself inside a workstation and lets someone connect remotely at any time and go through the system and silently monitor what the user is doing. Crackers have been using them for years for recon before an infiltration attempt, but only recently are the white hats finding uses for them. Such as watching what your kids are up to. Presenting Snoopstick, an all in one package for infecting someone's box with a RAT that lets you keep an …

    Read more...

  2. One of life's little mysteries - insurance.

    26 February 2007

    Lyssa and I are having new and exciting adventures in the world of health insurance this week. Lyssa needs to see a specialist for her eye, but unfortunately the nearest one to us doesn't work with her insurance company, and the out of pocket expense is more than either of us can front right now. Her appointment this morning wound up being a wash.. well, more like a spray of snow and slush on the roads because the state of Virginia, ever prepared for the snow, only cleared and salted the major roadways of the area, but no others.

    In …

    Read more...

  3. Dell finally caves to customer pressure and offers systems with Linux pre-installed on them.

    26 February 2007

    Back in the late 90's, Dell offered computers for sale with Linux installed on them instead of Microsoft Windows, a move which got them sued and pressured to stop this practice. On 16 February 2007 they set up a website called Dell Ideastorm to gather suggestions from their users and customers so that they could better work within the marketplace.

    Well, guess what the thousands of requests they recieved included - I'll give you a hint, the site got flattened by the influx of traffic and is still getting hammered.

    In response to these requests they started adding lines of desktops …

    Read more...

  4. Snowed in for the second time this month, and this time it's not so bad. (out of order stream of consciousness post)

    25 February 2007

    I knew that something was going to happen when I spoke to my mom, and she mentioned getting ready for an ice storm in Pittsburgh on Saturday night.

    That meant only one thing: It was headed toward DC.

    Early this morning, I was awakened by the sound of snowflakes merrily ticking against the window above the bed that Lyssa and I share. Some time after we went to bed last night, the ice storm arrived in DC and the snow began to fall.

    And fall.

    And fall.

    The local weather report says that we're looking and three to six inches …

    Read more...

  5. Java runtime environments sprout like mushrooms after a rainstorm.

    23 February 2007

    Very few software companies trust the JRE already installed on the target machine, so they bundle their own copy with their software and omit the option in the installer that lets the sysadmin opt out of installing that particular component.

    This results in a single server having up to a dozen independent copies of the JRE that are identical down to the binary level, save their locations in the disk array.

    Read more...

  6. China treating Internet addiction with ECT?

    23 February 2007

    China is notorious the Net over for its anti-Internet political stance. Bloggers have to register, talking about democracy is a dangerous thing to do at best, and the Great Firewall of China makes a valiant attempt to filter net.traffic to keep the masses uninformed and unable to speak out. They've even managed to have Internet addiction considered a real social problem treatable with hospitalisation and electroconvulsive therapy What gets me is this: The kids that are hospitalised for this 'treatment' (and I use the term in the loosest possible sense) aren't sleeping well, aren't motivated, don't like to listen …

    Read more...

  7. The RIAA is at it again - they want you responsible for your network link, regardless of who uses it.

    23 February 2007

    Not too long ago, a woman named Debbie Foster was sued by Capitol Records (RIAA) for copyright infringement because someone was using her network access account to exchange music on $peer_to_peer_network. As it turned out during the investigation phase, someone had cracked the passphrase on her account and was using it without her knowledge. Thus, the lawsuit had to be dropped because the RIAA was suing the wrong person (which has never stopped them in the past). The RIAA was commanded by the court to pay her legal fees, which topped $50kus in total. The RIAA in turn filed a …

    Read more...

  8. It still clicks...

    22 February 2007

    Remember those old IBM keyboards with the clicky keys that sounded like gunshots when you really got going on the console? It's a shame that they're so rare these days... what was done to this one is definitely not a shame, though: It's been turned into a steampunk typewriter keyboard, complete with working indicator lights and function keys numbered with roman numerals. All of the brass parts were hand fabricated, no less.. this is a true work of art.

    Please note that some of the images are broken - I suspect that's because this site is being slashdotted since it hit …

    Read more...

  9. Changing offices.

    22 February 2007

    It is the perogative of the system administrator to loot everything that could possibly be useful from his or her old office in the event of a forced move due to how easily important things get lost in the shuffle.

    Read more...

  10. More advances in quantum cryptographic keying methods.

    22 February 2007

    In slightly less technical terms, researchers at the Toshiba Research Europe facility in Cambridge, England have figured out how to make it harder for eavesdroppers to steal keying information from a quantum cryptosystem (registration required, Bugmenot has login credentials for this site). For an attacker to have a chance at breaking a quantum cryptosystem, he or she would have to splice a tap into the optical fibre which connects the two crypto units and record the pulses of light that encode the key used to encrypt the data. There are ways to use the principles of quantum mechanics to detect …

    Read more...

187 / 207