-
Are you in Law Enforcement? Do you have problems correcting erroneous CCTV timestamps? There’s an App for that!
My friend Dario has written one: https://itunes.apple.com/gb/app/clock-check/id586663057 Clock Check — By Dario Persechino Description Clock Check is an application designed to aid CCTV engineers and Law Enforcement personnel when calculating the time discrepancies on CCTV systems. The app calculates the difference between a ‘real time’ and a CCTV ‘system time’. This difference can then be
-
1995, USENIX Security: Marcus Ranum pulls out a Hasselblad, a ringflash and asks me to sit for a portrait
Pose is as the photographer wanted. Do what the man wants, he has the camera. My print arrived in the post a few weeks later. Subsequently he did a whole pile of other security geek portraits; where they are I don’t know, but the one of Bob Morris Sr is epic, and spattered around the
-
Doris Lessing on Beauty, Entitlement …
…and, perhaps, Hedonism. From the essay A Beauty, by Robert Boyers: Useful, perhaps, to recall something from Doris Lessing which may have some bearing on the question of beauty. Lessing noted what she called “a basic female ruthlessness” in herself, and went on to disdain the notion that gender is, in its essence, “socially constructed.”
-
Burp Suite Professional now supports interception and analysis of #Tor websites & hidden services via SOCKS /ht @runasand @torproject @portswigger
I predict a rapid and significant uptick in Government purchases of Burp Suite licenses: http://releases.portswigger.net/2013/02/v1505.html Burp Suite Professional – Release Notes Friday, February 15, 2013 v1.5.05 This release contains a number of feature enhancements and bugfixes, including: * The SOCKS proxy support now has an option to perform DNS lookups remotely via the proxy. This
-
1) MakerGeek 2) Pretty LEDs 3) Arduino 4) Multiuser Sex Toy 5) Intellectual Property & Patent Argument
All wrapped up in one colourful package: http://www.toymakerproject.com/hammer/ I’d mark the page NSFW except that I don’t see an obvious reason for it to be designated that way. Don’t forget to click through to the YouTube demo.
-
FLASH: Hansard: Minister admits: “There is no offence of cybercrime in law” /ht @gwire #cybersecurity
Cybercrime: 13 Feb 2013: Hansard Written Answers and Statements – TheyWorkForYou. Parliamentary Under-Secretary of State for Crime and Security: Quote: The Government’s Cyber Security Strategy made it clear that there are crimes which only exist in the digital world, in particular those that target the integrity of computer networks and online systems. However, the internet
-
If you want to try tracking the Asteroid 2012 DA14 fly-by tonight, use HeavensAbove # shortcuts
Method: Visit Heavens Above Location Database and search for your location Pick your Location from the responses for the search When redirected to the homepage, click the Click here for a sky chart and table of positions for your location at the top Shortcuts: London Birmingham Manchester Edinburgh London illustrated below, but using the website
-
Next time you need examples of Cyberattacks, these are three of them… apparently… /ht @jeffreycarr
Cited by Jeffrey Carr because they are both “Cyber” according to him, and might be “Attacks” according to Thomas Rid and Carl von Clausewitz. It dates from 2011, but still, quoth Mr Carr: Personally, I’m not a fan of the term “cyberwar” as evidenced by a recent article that I wrote for Slate, however it is
-
A Chinese Hacker’s Identity Unmasked – Businessweek # surprising #mustread
A bit light towards the end, but good. Some of the addresses had also figured in Chinese espionage campaigns documented by other researchers. They were part of a block of about 2,000 addresses belonging to China Unicom (CHU), one of the country’s largest Internet service providers. Trails of hacks had led Stewart to this cluster
-
VAX Cluster running on VAX Emulator running on Raspberry Pi # too cool for words, today is over
Hat tip to Gilberto Persico for this: http://www.designspark.com/blog/a-raspberry-pi-vax-cluster In a blog post last month I looked at how a Raspberry Pi can be used to emulate a formidable IBM mainframe, and in this post I describe how a pair can be used to emulate VAX computers which can then be configured to form a VMScluster.
-
WANTED: *Uncorrupted* Energetic #Security Geek, ideally: mixed Web/OpenSource/Developer/Linux/SysAdmin Background, UK
UPDATE: see updated title, see comment below. If you roughly fit this bill and are looking for flexible working in a lovely, boutique company of similar folk – and if you have the native sense of curiosity that is essential to a role like this – then drop me a line: alec.muffett@gmail.com
-
Stop pretending cyberspace exists – Salon.com # Traction, at bloody last
Some ideas make you dumber the moment you learn of them. One of those ideas is the concept of “cyberspace.” The term was coined by William Gibson in his novel “Neuromancer” and defined as “a graphic representation of data abstracted from the banks of every computer in the human system …” As a metaphor that