Archive for 2011/01/24
Charles Aznavour outraged by WikiLeaks revelations that President Sarkozy, having promised to support the law penalizing denial of Armenian Genocide, retracted on May 27, 2007, after his election as PresidentPosted: 2011/01/24 in Education / Awareness, Public Policy
Wikileaks: The Inside Story – That is the title of a discussion on wikileaks next Thursday evening, February 3, at the Columbia School of Journalism, led by two of the central playersPosted: 2011/01/24 in Education / Awareness
Duane R. Clarridge, who parted with the Central Intelligence Agency over twenty years ago, has been running a private network of spies from his poolside at his home near San DiegoPosted: 2011/01/24 in Education / Awareness, New Business Models, Public Policy
Wikileaks, the notorious on-line whistle blower, publishes the corruption survey made in mid-2007 by the US Embassy in MoscowPosted: 2011/01/24 in Education / Awareness, Privacy / Data Protection, Public Policy, Stats / reports
Blast From The Past. Strobe is fast (its author claims that an entire small country can be scanned within a reasonable period of time)Posted: 2011/01/24 in Education / Awareness
Strobe (The Super Optimized TCP Port Surveyor) is a TCP port scanner that logs all open ports on a given machine. Strobe is fast (its author claims that an entire small country can be scanned within a reasonable period of time).
The key feature of Strobe is that it can quickly identify what services are being run on a given target (so quickly, in fact, that it takes less than 30 seconds to pin down a server, even with a 28.8 modem connection to the Internet). The key drawback of Strobe is that such information is limited. At best, a Strobe attack provides the cracker with a rough guideline, a map of what services can be attacked.
Typical output from a Strobe scan looks like this:
localhost echo 7/tcp Echo [95,JBP]
localhost discard 9/tcp Discard [94,JBP]
localhost systat 11/tcp Active Users [89,JBP]
localhost daytime 13/tcp Daytime [93,JBP]
localhost netstat 15/tcp Netstat
localhost chargen 19/tcp Character Generator [92,JBP]
localhost ftp 21/tcp File Transfer [Control] [96,JBP]
localhost telnet 23/tcp Telnet [112,JBP]
localhost smtp 25/tcp Simple Mail Transfer [102,JBP]
localhost time 37/tcp Time [108,JBP]
localhost finger 79/tcp Finger [52,KLH]
localhost pop3 0/tcp Post Office Protocol-Version 3 122
localhost sunrpc 111/tcp SUN Remote Procedure Call [DXG]
localhost auth 113/tcp Authentication Service [130,MCSJ]
localhost nntp 119/tcp Network News Transfer Protocol 65,PL4
As you can see, the information is purely diagnostic in character (for example, there are no probes for particular holes). However, Strobe makes up for this with extensive command-line options. For example, in scanning hosts with large numbers of assigned ports, you can disable all duplicate port descriptions. (Only the first definition is printed.) Other amenities include
Command-line option to specify starting and ending ports
Command-line option to specify time after which a scan will terminate
if it receives no response from a port or host
Command-line option to specify the number of sockets to use
Command-line option to specify a file from which Strobe will take its target hosts
Combining all these options produces a very controllable and configurable scan. Strobe generally comes as a tarred and g’zipped file. Contained within that distribution is a full man page and the binary.
Cross Reference: You can find a copy of Strobe, authored by Julian
Assange (released 1995), at
Dutch media experts Piet Bakker, professor of cross media studies at the Hogeschool Utrecht and Jacob Groshek, media and communications lecturer at Erasmus University in Rotterdam, think that the Dutch market as yet is too small for successful digital newspapers that focus specifically on The NetherlandsPosted: 2011/01/24 in Education / Awareness, New Business Models
economies of scale are needed
Something unprecedented is unfolding — and it’s unfolding with frightening speed. Put simply, these I&O execs all echoed one thing: they’re ill equipped to support empowered employeesPosted: 2011/01/24 in Education / Awareness, Future Developments?, New Business Models, Tech Evolution
Today’s employees have access to a wealth of hardware and software, and they’re procuring it on their own. They need to solve customer challenges quickly and efficiently — and they’re willing to bypass I&O altogether. Forrester refers to these employees as empowered, as written about in the book by Josh Bernoff and Ted Schadler. We’ve also spent quite a bit of energy discussing how empowered employees will impact I&O and I encourage you to read our reports on mobility, UC, and automation. Even my colleague, Richard Fichera, has discussed his own personal empowered journey.
But the empowered movement is far more challenging than outlined above. Your business executives are going down this path with or without you. They need to address employee satisfaction, talent retention, and customer service challenges. If you’re not scared, then you should be. And here’s why: Supporting empowered employees is expensive.
The UK Advertising Standards Authority (ASA) has confirmed that the conclusion to its review into how internet services are marketed, specifically those offered by broadband ISPs and mobile operators, will be published this weekPosted: 2011/01/24 in Bandwidth Management, Education / Awareness, Online advertising, Stats / reports
An IPv4 address is assigned to your computer each time you go online (e.g. 184.108.40.206). These are a bit like the online equivalent of your home phone number, except now only a few million out of roughly 4.5 Billion addresses remain.
Copyright law was designed for a different world, and these days, most of what it seems to do is hold back what the technology enablesPosted: 2011/01/24 in Copyright, Education / Awareness, Jurisprudence
Japanese Court Says That Place Shifting TV Overseas Is Infringing
The Facebook account of Nicolas Sarkozy was hacked over the weekend to post the false rumour that the French president would not seek re-election next yearPosted: 2011/01/24 in Cybercrime, Education / Awareness, Privacy / Data Protection
Google backslaps Schmidt with $100m award – will be hanging out with some members of UK.gov later todayPosted: 2011/01/24 in Education / Awareness, Google, Public Policy
O2 customers in Germany will soon be able to have Bada applications added to their phone bill, with another platform set to follow later in the yearPosted: 2011/01/24 in Education / Awareness, New Business Models, Tech Evolution
Near-field communications (NFC) will take off very quickly – once it’s clear who can make money from itPosted: 2011/01/24 in Education / Awareness, Future Developments?, Tech Evolution
Huawei is suing Motorola in order to stop it from transferring Huawei’s IP to the Nokia Siemens NetworksPosted: 2011/01/24 in Education / Awareness, Litigation
Blast From The Past. I’m sure many people that were watching events back then have this same feeling of deja-vue I’m havingPosted: 2011/01/24 in Education / Awareness
To: declan () well com
Subject: UK terrorism bill is a true terror itself
Date: Wed, 12 Jan 2000 03:38:35 -0800
From: John Gilmore <gnu () toad com>
From: “Rop Gonggrijp” <rop () xs4all nl>
Subject: FW: STATE OF TERROR
Date: Wed, 12 Jan 2000 11:26:36 +0100
Executive summary: Personal note, followed by interesting and maybe slightly alarming update on new anti-terrorism legislation in the UK. (I guess it’s only alarming if you weren’t previously aware of the level of erosion of basic human rights over there).
The weird thing is that I’m discovering that I am no longer angry at any of these developments. I mostly find them hilarious, even though that disturbs me a bit…
Slashdot today reports that Janet Reno wants to institute a ‘global network’ to fight computer crime. It’ll probably cost a few billion dollars, but then ‘problems of different jurisdictions’ (such as the horrible fact that many countries are still effectively outside US jurisdiction) will finally be solved. Damn… At this speed, they’ll be busting Napster users (“copyright terrorists”?) and script kiddies (“corporate website terrorists”?) within a few years. The people that reverse engineered the DVD copy protection will get life sentences. Invest in the prison industry today, it’s a major growth market…
In the days of Hack-Tic we’ve had many fun but practical discussions extrapolating the political developments of that time. I’m sure many people that were watching events back then have this same feeling of deja-vue I’m having. Except this time it’s an IRL remake of our crazy paranoid fantasies.
A new system that can capture visual information using off-the-shelf electronics, send it over the Internet to a holographic display, and update the image at rates approaching those of feature filmsPosted: 2011/01/24 in Education / Awareness, Future Developments?, Tech Evolution
On a Smarter Planet, organizations with limited IT staff reduce the cost, complexity and security risk of managing their employee’s desktops with IBM Virtual DesktopPosted: 2011/01/24 in Education / Awareness, New Business Models, Tech Evolution
It allows access to a personal PC desktop from anywhere, using any device
China Unicom may be about to get a bigger bite of the Apple, after a key government certification body for gadgets approved what appears to be a 3G-enabled version of the iPadPosted: 2011/01/24 in Education / Awareness
A 3G connection would mean the PSP could download data (and movies, and music) over a phone network, greatly increasing the connectivity of the unit (the current PSP can only download via wi-fi, limiting its online use to wi-fi hotspots).
Online retail sales in Europe are set to rise 18 percent to more than 200 billion euros ($271 billion) this year, outpacing growth at traditional shops as well as internet sales in the United StatesPosted: 2011/01/24 in Education / Awareness, Stats / reports
Germany and Facebook Form Privacy Agreement – Facebook would now offer members more control over their e-mail address books that are displayedPosted: 2011/01/24 in Education / Awareness, New Business Models, Privacy / Data Protection, Public Policy
Facebook stated in an e-mailed message to the Associated Press, “We are pleased that we have come to a solution with the Hamburg Data Protection Authority regarding concerns about Friend-Finder and look forward to continue our constructive discussions and dialogue in the future.”
German language press release of Der Hamburgische Beauftragte für Datenschutz und Informationsfreiheit:
Music Unlimited powered by Qriocity™, which debuted in the U.K. and Ireland in December 2010, is a new, cloud-based, digital music service which gives music lovers access at any time to a constantly growing catalogue of millions of songs from major labels including Universal Music Group, Sony Music Entertainment, Warner Music Group and EMI Music as well as leading independent labels and major publishers worldwide.
The hacker is also selling info personally identifiable information (PII) from hacked sites, for $20 per 1K records
Iran’s Cyber Police started its work today to prevent espionage and sabotage activities through the internetPosted: 2011/01/24 in Education / Awareness, Enforcement, New Business Models, Public Policy
IT tools play an undeniable role in political, security, economic, trade, ethical and religious rivalries at the national and international levels