'Remote access tool', that is - a little beastie (usually considered malware, though there are legit incarnations of this sort of software) that hides itself inside a workstation and lets someone connect remotely at any time and go through the system and silently monitor what the user is doing. Crackers have been using them for years for recon before an infiltration attempt, but only recently are the white hats finding uses for them. Such as watching what your kids are up to. Presenting Snoopstick, an all in one package for infecting someone's box with a RAT that lets you keep an …
Lyssa and I are having new and exciting adventures in the world of health insurance this week. Lyssa needs to see a specialist for her eye, but unfortunately the nearest one to us doesn't work with her insurance company, and the out of pocket expense is more than either of us can front right now. Her appointment this morning wound up being a wash.. well, more like a spray of snow and slush on the roads because the state of Virginia, ever prepared for the snow, only cleared and salted the major roadways of the area, but no others.
Back in the late 90's, Dell offered computers for sale with Linux installed on them instead of Microsoft Windows, a move which got them sued and pressured to stop this practice. On 16 February 2007 they set up a website called Dell Ideastorm to gather suggestions from their users and customers so that they could better work within the marketplace.
I knew that something was going to happen when I spoke to my mom, and she mentioned getting ready for an ice storm in Pittsburgh on Saturday night.
That meant only one thing: It was headed toward DC.
Early this morning, I was awakened by the sound of snowflakes merrily ticking against the window above the bed that Lyssa and I share. Some time after we went to bed last night, the ice storm arrived in DC and the snow began to fall.
And fall.
And fall.
The local weather report says that we're looking and three to six inches …
Very few software companies trust the JRE already installed on the target machine, so they bundle their own copy with their software and omit the option in the installer that lets the sysadmin opt out of installing that particular component.
This results in a single server having up to a dozen independent copies of the JRE that are identical down to the binary level, save their locations in the disk array.
China is notorious the Net over for its anti-Internet political stance. Bloggers have to register, talking about democracy is a dangerous thing to do at best, and the Great Firewall of China makes a valiant attempt to filter net.traffic to keep the masses uninformed and unable to speak out. They've even managed to have Internet addiction considered a real social problem treatable with hospitalisation and electroconvulsive therapy What gets me is this: The kids that are hospitalised for this 'treatment' (and I use the term in the loosest possible sense) aren't sleeping well, aren't motivated, don't like to listen …
Not too long ago, a woman named Debbie Foster was sued by Capitol Records (RIAA) for copyright infringement because someone was using her network access account to exchange music on $peer_to_peer_network. As it turned out during the investigation phase, someone had cracked the passphrase on her account and was using it without her knowledge. Thus, the lawsuit had to be dropped because the RIAA was suing the wrong person (which has never stopped them in the past). The RIAA was commanded by the court to pay her legal fees, which topped $50kus in total. The RIAA in turn filed a …
Remember those old IBM keyboards with the clicky keys that sounded like gunshots when you really got going on the console? It's a shame that they're so rare these days... what was done to this one is definitely not a shame, though: It's been turned into a steampunk typewriter keyboard, complete with working indicator lights and function keys numbered with roman numerals. All of the brass parts were hand fabricated, no less.. this is a true work of art.
Please note that some of the images are broken - I suspect that's because this site is being slashdotted since it hit …
It is the perogative of the system administrator to loot everything that could possibly be useful from his or her old office in the event of a forced move due to how easily important things get lost in the shuffle.
In slightly less technical terms, researchers at the Toshiba Research Europe facility in Cambridge, England have figured out how to make it harder for eavesdroppers to steal keying information from a quantum cryptosystem (registration required, Bugmenot has login credentials for this site). For an attacker to have a chance at breaking a quantum cryptosystem, he or she would have to splice a tap into the optical fibre which connects the two crypto units and record the pulses of light that encode the key used to encrypt the data. There are ways to use the principles of quantum mechanics to detect …