You are viewing a read-only archive of the Blogs.Harvard network. Learn more.
Skip to content

Monthly Archives: January 2008

How to surf from hostile networks

NYT article claiming to help with the issue of kiosk network connections. They could have keyboard sniffers, network sniffers, or just good old spyware. Print edition

Circumventing censorship

The filtering takes place in at least three ways: de-listed domains: specific websites are removed entirely from search results; it is as if the website never existed. de-listed urls: specific urls are removed from search results if they contain a de-listed domain. restricted keywords: specific keywords are restricted to searches of web pages hosted in […]

Blocking VOIP

Derek Bambauer explains the legal ramifications of Service class blocking. http://blogs.law.harvard.edu/infolaw/2006/05/05/blocking-voip/

/whois Bruce_Schneier

Cryptography and Computer Security Resources Crypto-Gram Newsletter Algorithms Blowfish Twofish Solitaire Helix Phelix Free Software Password Safe S/MIME Cracking Screen Saver Essays and Columns on Cryptography and Computer Security Academic Papers by Bruce Schneier Bibliography of Papers by Other People Analyses Microsoft PPTP CMEA Digital Cellular

Wireless Security Review: Kismet++

Kismet is an 802.11 layer2 wireless network detector, sniffer, and intrusion detection system. wardriving.com Wardriving news portal – Ethereal/Tcpdump compatible data logging – Airsnort compatible weak-iv packet logging – Network IP range detection – Built-in channel hopping and multicard split channel hopping – Hidden network SSID decloaking – Graphical mapping of networks Q: What happens […]

Internet Filtering: Psiphon

Legal perspective on Internet Filtering from John Palfrey. More on Psiphon Psiphon is a censorship circumvention solution allowing users to access blocked sites in countries where the Internet is censored. Psiphon turns a regular home computer into a personal, encrypted server capable of retrieving and displaying web pages anywhere.

Internet Filtering: Chinese Filtering

Paper by Berkman’s J Zittrain on Chinese Filtering (warn: PDF)! /whois jzittrain Jonathan Zittrain – Berkman Center for Internet & Society Jonathan Zittrain is a co-founder of HLS’s Berkman Center for Internet & Society and served as its first executive director from 1997-2000. Control of digital property & content Cryptography Electronic privacy Internet governance Technology […]

Security Review: openVAS

For more information: from the bug logs: There seems to me a consistant misuse of autoconf “localstatedir” variable. It is traditionally seen that localstatedir be $prefix/var if not supplied. In the following example from nessus-adduser.in there are two issues. One being that if $localstate dir was $prefix/var then this would create $prefix/var/lib/nesuss. And the second […]

openVAS 2007

Date: Mon, 9 Apr 2007 09:50:04 -0400 From: “Jon D” Subject: Giving Nessus Reports to clients — Licensing, Legal, etc To: nessus@list.nessus.org Message-ID: Content-Type: text/plain; charset=”iso-8859-1″ I’ve heard of PenTesters giving a Nessus scan report to the client as part of their final report. I read through the nessus licensing agreement, and I didn’t say […]

Secrecy and Search and Seizures

Also called Sneak and Peeks the law enforcement community is sometimes permitted to search a persons place or things without telling them. In certain cases, such as library records or your off site data storage provider, the LE agent will issue a gag order so no one will know they were searched. One of these […]