Thursday, June 14, 2012

AS Peering

The guys over at Harvard Law put together an interesting diagram that maps out all the AS's, how they (mostly) peer together, and what countries they are based out of.  (Their take on this is what AS's are "controlled" by what countries, and who can filter what.)

GUI Solarsystem

The guys over at SunAeon, has a really nice flash map of the solar system that guides you through all the planets and their facts.  Nothing extra as far as info, but good eye candy.

Monday, June 4, 2012

Internet Defense League!



Check out the Internet Defense League's main page:
When the internet's in danger and we need millions of people to act, the League will ask its members to broadcast an action.  (Say, a prominent message asking everyone to call their elected leaders.)  With the combined reach of our websites and social networks, we can be massively more effective than any one organization. 
First, sign up. If you have a website, we'll send you sample alert code to get working in advance. The next time there's an emergency, we'll tell you and send new code. Then it's your decision to pull the trigger.

Credit Card Number Code

byJess.net has a nice diagram on the codes used to create a credit card:

RSA's big hole

RSA got hacked a while back (March, 2011).  Here's some notes on the incident:

And then slashdot points out
"A researcher has found and published a way to tune into an RSA SecurID Token. Once a few easy steps are followed, anyone can generate the exact numbers shown on the token. The method relies on finding the seed that is used to generate the numbers in a way that seems random. Once it is known, it can be used to generate the exact numbers displayed on the targeted Token. The technique, described on Thursday by a senior security analyst at a firm called SensePost, has important implications for the safekeeping of the tokens. An estimated 40 million people use these to access confidential data belonging to government agencies, military contractors, and corporations. Scrutiny of the widely used two-factor authentication system has grown since last year, when RSA revealed that intruders on its networks stole sensitive SecurID information that could be used to reduce its security. Defense contractor Lockheed Martin later confirmed that a separate attack on its systems was aided by the theft of the RSA data."