Wednesday, January 2, 2008
NYT article claiming to help with the issue of kiosk network connections. They could have keyboard sniffers, network sniffers, or just good old spyware. Print edition
Wednesday, January 2, 2008
The filtering takes place in at least three ways: de-listed domains: specific websites are removed entirely from search results; it is as if the website never existed. de-listed urls: specific urls are removed from search results if they contain a de-listed domain. restricted keywords: specific keywords are restricted to searches of web pages hosted in […]
Wednesday, January 2, 2008
Derek Bambauer explains the legal ramifications of Service class blocking. http://blogs.law.harvard.edu/infolaw/2006/05/05/blocking-voip/
Wednesday, January 2, 2008
Cryptography and Computer Security Resources Crypto-Gram Newsletter Algorithms Blowfish Twofish Solitaire Helix Phelix Free Software Password Safe S/MIME Cracking Screen Saver Essays and Columns on Cryptography and Computer Security Academic Papers by Bruce Schneier Bibliography of Papers by Other People Analyses Microsoft PPTP CMEA Digital Cellular
Wednesday, January 2, 2008
Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. wardriving.com Wardriving news portal – Ethereal/Tcpdump compatible data logging – Airsnort compatible weak-iv packet logging – Network IP range detection – Built-in channel hopping and multicard split channel hopping – Hidden network SSID decloaking – Graphical mapping of networks Q: What happens […]
Wednesday, January 2, 2008
Legal perspective on Internet Filtering from John Palfrey. More on Psiphon Psiphon is a censorship circumvention solution allowing users to access blocked sites in countries where the Internet is censored. Psiphon turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere.
Wednesday, January 2, 2008
Paper by Berkman’s J Zittrain on Chinese Filtering (warn: PDF)! /whois jzittrain Jonathan Zittrain – Berkman Center for Internet & Society Jonathan Zittrain is a co-founder of HLS’s Berkman Center for Internet & Society and served as its first executive director from 1997-2000. Control of digital property & content Cryptography Electronic privacy Internet governance Technology […]
Wednesday, January 2, 2008
For more information: from the bug logs: There seems to me a consistant misuse of autoconf “localstatedir” variable. It is traditionally seen that localstatedir be $prefix/var if not supplied. In the following example from nessus-adduser.in there are two issues. One being that if $localstate dir was $prefix/var then this would create $prefix/var/lib/nesuss. And the second […]
Wednesday, January 2, 2008
Date: Mon, 9 Apr 2007 09:50:04 -0400 From: “Jon D” Subject: Giving Nessus Reports to clients — Licensing, Legal, etc To: nessus@list.nessus.org Message-ID: Content-Type: text/plain; charset=”iso-8859-1″ I’ve heard of PenTesters giving a Nessus scan report to the client as part of their final report. I read through the nessus licensing agreement, and I didn’t say […]
Wednesday, January 2, 2008
Also called Sneak and Peeks the law enforcement community is sometimes permitted to search a persons place or things without telling them. In certain cases, such as library records or your off site data storage provider, the LE agent will issue a gag order so no one will know they were searched. One of these […]