The guys over at Harvard Law put together an interesting diagram that maps out all the AS's, how they (mostly) peer together, and what countries they are based out of. (Their take on this is what AS's are "controlled" by what countries, and who can filter what.)
Thursday, June 14, 2012
GUI Solarsystem
The guys over at SunAeon, has a really nice flash map of the solar system that guides you through all the planets and their facts. Nothing extra as far as info, but good eye candy.
Monday, June 4, 2012
Internet Defense League!
PC Mag notes that lots of folks are "gearing up to battle SOPA-like legislation via the Internet Defense League, a new organization intended to protect the open Web." All Things D points out that the "League" has done a good job already gathering supporters.
Check out the Internet Defense League's main page:
When the internet's in danger and we need millions of people to act, the League will ask its members to broadcast an action. (Say, a prominent message asking everyone to call their elected leaders.) With the combined reach of our websites and social networks, we can be massively more effective than any one organization.
First, sign up. If you have a website, we'll send you sample alert code to get working in advance. The next time there's an emergency, we'll tell you and send new code. Then it's your decision to pull the trigger.
RSA's big hole
RSA got hacked a while back (March, 2011). Here's some notes on the incident:
- NYTimes on What Happened.
- Znet on what happened.
- Overview of the tools, techniques and procedures used in the attack from Command5. (pdf)
- RSA tells everyone to replace SecurID tokens (RSA, Mar/2011)
- Wired discusses how F-Secure figured out what the Worm was that got into RSA.
And then slashdot points out:
"A researcher has found and published a way to tune into an RSA SecurID Token. Once a few easy steps are followed,
anyone can generate the exact numbers shown on the token. The method
relies on finding the seed that is used to generate the numbers in a way
that seems random. Once it is known, it can be used to generate the
exact numbers displayed on the targeted Token. The technique, described
on Thursday by a senior security analyst at a firm called SensePost, has
important implications for the safekeeping of the tokens. An estimated
40 million people use these to access confidential data belonging to
government agencies, military contractors, and corporations. Scrutiny of
the widely used two-factor authentication system has grown since last
year, when RSA revealed
that intruders on its networks stole sensitive SecurID information that
could be used to reduce its security. Defense contractor Lockheed
Martin later confirmed that a separate attack on its systems was aided by the theft of the RSA data."
Subscribe to:
Posts (Atom)
-
Every year, there is a competition at the Stanford Mall showing off some cool playhouses. SFGate has a couple of picts of them . Also on ...
-
Newsweek reporter Ravi Somaiya has an article on " Why rebels and insurgent groups the world over love the Toyota Hilux pickup as much ...
-
I've always been keen on the open-office layout, new study's are showing that privacy is best for creativity (with quick access to g...