Star Wars, Noobs, and Hackaz
LOL! Enjoy. :) Star Wars, Noobs, and Hackaz
LOL! Enjoy. :) Star Wars, Noobs, and Hackaz
Posted by digitalcartel at 5:03 PM 0 comments
I was trying to do some work when I stumbled upon this link. Needless to say, my work got put off until the video was over. This is a really kickass presentation on Human Computation. The presentation is by Luis von Ahn who is an assistant Professor at Carnegie Mellon University. Pre-interview he looks nervous and bit squirrely. Needless to say, he did an awesome job. He starts off discussing the pros and cons of captchas. He moves on to cover human computation and how he has applied it to his ESP game.
Posted by digitalcartel at 4:46 PM 0 comments
Labels: Captchas, ESP game, Human Computation, Luis von Ahn
Long story short: If you downloaded WordPress 2.1.1 within the past 3-4 days, your files may include a security exploit that was added by a cracker, and you should upgrade all of your files to 2.1.2 immediately.
Long explanation...
No Good. Circle with da slash. I have a few wordpress installs. Even though they are not a few days old... I upgraded anyway. I suggest everyone running wordpress to do the same. I'm just wondering if MU was affected. I guess we will find out soon enough.
Back in February, there was a rather large DDoS attack on the Internet's root DNS servers (TLD). There really wasn't many details on the attack, except for rumors that it originated somewhere in the Asia-Pacific region. Well now we have something to sink our teeth into. ICANN has released an official fact sheet with more information on the attack. There are still some unanswered questions, but this fact sheet is very concise and well put together. It covers details on the root server infrastructure including Anycast, DDoS, Zombies, and other aspects relevant to the attack.
ICANN TLD DNS DDoS attack fact sheet
Posted by digitalcartel at 1:34 PM 0 comments
Labels: Anycast, DDoS Attack, DNS DDoS, ICANN, TLD
Posted by digitalcartel at 7:48 PM 0 comments
Labels: CVE, Data Injection, False sense of security, OpenPGP Bug
Check Point's Secureplatform(SPLAT) and hardware do not always play nicely together. In the past, I have experienced many issues with SPLAT not supporting newer system hardware. I have bumped my head on the unsupported network interface card many times. The following link is their official hardware compatibility page. However, I just recently discovered they have released a Secureplatform hardware compatibility testing tool. It's somewhat useful if you have the hardware available, but then again if you got the hardware...why not just try a SPLAT install. It could be handy if you don't want to blow away the current system. *Shrug* I guess its a step in the right direction.
Posted by digitalcartel at 12:55 PM 0 comments
Labels: Check Point, Firewall, Hardware Compatibility, Network Security, R55, R60, R62, SecurePlatform, SPLAT