Monthly Archives: February 2009
Illegal file transfer using BitTorrent protocol
BitTorrent has been popularly used for transferring files illegally because it reduces a vast amount of networking bandwidth that would have been required. The way it works is that users can connect to each other directly to send and receive … Continue reading
Current Event – FAA, Kaiser Permanente Security Breaches; Tens of Thousands of Names Compromised
In another of a long line of high-profile security breaches both in and out of the government recently, the Federal Aviation Administration has announced that in the course of a breach of their computer system, over 45,000 employee names – … Continue reading
Facebook Opens Status API
“Facebook is slowly tearing down the wall around its silo and is starting to expose more of its data to the outside” (From Facebook Opens Up: Lets Developers Access Status Updates, Notes, Links, and Videos). Now Facebook allows the third-party … Continue reading
USB power in airports
I noticed that the Denver airport has upgraded its power stands to include USB ports that presumably give power to recharge devices like cell phones, iPhones, and iPods. What I wonder is how I know that’s all that’s going on. … Continue reading
Current Event: Kaspersky Hacked
Kaspersky, an Antivirus vendor and Internet Security Lab, recently fell victim to an internet hacker using an SQL-injection attack. The attack compromised data in all databases accessible to the web server. According to the hacker, “Alter one of the parameters … Continue reading
Security Review: MMO Gaming
Most people in our society today are familiar with the concept of MMO gaming. World of Warcraft, for example, is something most everyone has heard of. Most MMO games operate under a fairly strict client/server paradigm. A company that … Continue reading
Security Review: The Bike and its Lock
EDIT: It appears that I goofed with the “more” tag when I first posted this, so I’ve included the rest of the article below. Since the days of waking up at 5am to watch the Tour de France live with … Continue reading
Security Review: Smashing abstract—more on Lab 2
While experimenting with Lab 2 I began discovering real vulnerabilities and decided to make a security review out of it. I spent a couple days experimenting and taking notes only to find that I’d been beaten to the punch yesterday. I nearly despaired at several days’ work gone for naught, but after carefully reading both of the posts I believe that I still have something to contribute. My discussion will focus a bit more on the security of abstract
and provide other additional details. Continue reading
Security review: Powered Exoskeletons
Exoskeletons look impressive in movies. They look impressive in real life also. Electronics reads brain signals sent to muscles and cause actuators to move, thus ‘amplifying’ human strength. Exoskeletons are close to get mass-produced and available to people around the … Continue reading
Security Review: New Technology Could Display Dreams on Screen
For years there have been research going on in neurobiological field with attempts to decode images from the brain activity. In 1999, University of California, Berkley, has been able to reconstruct the video images from cat’s observed brain activity. However, … Continue reading