Here are some fun clips from Stewie Griffin: The Untold Story which comes out today!
A preoccupation with firewalls is diverting attention and resources away
from the more important issue of locking systems down, according to an
Computer security researcher at the San Diego Supercomputing Center
(SDSC), Abe Singer said companies can spend 90 percent of their security
efforts on firewalls and not much of anything else. "I'm not saying
firewalls are completely irrelevant, but how much effort do you spend on
security?" Singer asked. "Do security at the host, not just the
perimeter. You should be worried about what users are doing, because if
an attacker is going through the perimeter [without secure hosts] then
it's game over."
Date: Mon, 2 Feb 2004 09:50:52 -0500
From: Monty Solomon
Subject: Security Holes at DMVs Nationwide Lead to ID Theft and Safety
CDT (http://www.cdt.org/) has issued a report entitled "Unlicensed
(http://www.cdt.org/privacy/20040200dmv.pdf) documenting rampant
internal fraud and lax security at state motor vehicle administration
offices across the country placing the reliability of all driver's
license at risk. While heavy public attention has been placed on new
national standards and new technologies for driver's licenses, studying
local news reports from throughout 2003 CDT finds that basic management
processes to stop bribery and theft are lacking. In the report, CDT
offers policy recommendations to address this dire issue. February 2,
20Q.net is an experiment in artificial intelligence. The program is very simple but its behavior is complex. Everything that it knows and all questions that it asks were entered by people playing this game. 20Q.net is a learning system; the more it is played, the smarter it gets.
Idaho weatherman quits, says he wants to pursue hurricane theory
THE ASSOCIATED PRESS
IDAHO FALLS, Idaho -- A Pocatello weatherman who gained attention for an unusual theory that Hurricane Katrina was caused by the Japanese mafia using a Russian electromagnetic generator has quit the television station.
Folks might want to look at
the slides from a talk Christian Huitema gave at the Applications Area
at IETF63 this past week. Of particular interest is just how cheap it
is to brute-force a passphrase these days, especially if it's just used
as a cryptographic key with known plaintext (i.e., in challenge/
--Steven M. Bellovin, http://www.cs.columbia.edu/~smb
The footer on my main index seems to be incorrectly displayed:
%%time"> | | (0)
1- %% shouldn't be displaying
2- It should say Posted by xyz on August 19, 2005 02:00 PM | Permalink | (0)
3- '>' shouldn't be displaying
4- the permalink should be displaying
the DMCA must be read in the context of the Copyright Act, which balances the rights of the copyright owner against the public’s interest in having appropriate access to the work.
"It is relying on the goodwill and best efforts of many people, and that doesn't have the same commercial imperative," he said. "I'm sure that is part of what is causing the blow-out in the patch window."
He also argued that, according to security company Secunia's statistics, the Microsoft vulnerabilities were more critical, and had been so over a longer timescale. In the period 2003 to 2005 Secunia have issued 22 security advisories regarding Firefox 1.x, and rate it as "less critical". In the same period Microsoft Internet Explorer 6.x had 85 Secunia advisories, and is rated as "highly critical".
"Basically their vulnerabilities are more critical. With Firefox — yeah, you have holes, but they're much less serious." Nitot likened the differences between Firefox and IE vulnerabilities as being like injuries: "Which would you prefer, to have a broken finger, or your head ripped off?"
A large majority of voters express confidence that Bush will protect the country from a terrorist attack if he is re-elected in November
the public now shows diminished confidence in his abilities to handle a crisis or provide leadership, as well as in the government's ability to protect the country.