Researchers at University of California San Diego, Princeton University and University of Michigan have demonstrated a method to compromise and alter the tallies of Sequoia AVC Advantage voting machines. They presented their results at the Usenix 2009 Electronic Voting Workshop, held in Montreal this week. They used a method called return-oriented programming to modify voting [...]
One of the core components of interactive web services was found to have serious programming flaws. An exploit of these flaws has the potential for anything from denial of service to sending of malicious documents to seize control of users computers. XML is used in all types of web services, including banking, desktop [...]
The recent announcements by Adobe and Microsoft of source code releases under FOSS licenses are attempts to co-opt free software.
Microsoft announced this week that they are releasing source code for Linux drivers that allow it to interact better with Windows, where Windows is the host OS and Linux is running as a guest OS. This [...]
Here’s an excellent article on automating backups on Linux systems. I use many of these same scripts to archive data to my backup server, nightly. If you haven’t already started using automated backups, I strongly urge you to do so. Remember if it’s not backed up, it must not be important. — Neil
I’ll not rewrite what Gary Barnett has to say, except to reprint his abstract. I think it’s a thoughtful criticism of what’s been written about the Twitter fiasco, as well as cloud computing and security.
If you’re busy, here’s the abstract:
It wasn’t twitter that was hacked – it was Google Apps
Please don’t confuse “network” with [...]
On Tuesday a Vietnamese security company Bach Khoa Internetwork Security reportedly identified the IP address of the master server that directed the attacks from North Korea against targets in the U.S. and South Korea.
The IP (Internet Protocol) address is alleged to belong to Global Digital Broadcast, an IP TV technology company based in Brighton, [...]
Summary: Learn these 10 tricks and you’ll be the most powerful Linux® systems administrator in the universe…well, maybe not the universe, but you will need these tips to play in the big leagues. Learn about SSH tunnels, VNC, password recovery, console spying, and more. Examples accompany each trick, so you can duplicate them on your [...]
Summary: With Web 2.0, Cloud, and SOA, it’s more important than ever to have a clear understanding of who owns information and what you are permitted to do with it. The Creative Commons License contains a mechanism for providing more open usage rights without giving up ownership. The Creative Commons (CC) Rights Expression Language [...]