Comment Vanilla kernel on EC2 (Score 1) 171
Finally I get to run a newer kernel on EC2! I have been looking forward to this for months.
Finally I get to run a newer kernel on EC2! I have been looking forward to this for months.
Yes but they can also just shut down the transactions. Why DoS something when you can just turn it off? That's what the paper advocates.
( ) You read the paper
(X) You did not read the paper
The paper specifically covers merchant relationships with acquiring banks and credit processing. Purchases were done to track the credit processing. It isn't possible to anonymously spoof that. Also, stopping the transactions is more legislative than market-based.
My fault. I searched the article for "phase" and decided it didn't have the information. Instead of phase, the article said:
...This, in effect, synchronizes power flows.
Sad that the media thinks the average American doesn't know what the term phase means. Even sadder is that they are probably right.
The three power grids are out of phase with each other. Are they doing a AC->DC->AC conversion? It was my understanding that the biggest technical hurdle to connecting the grids was the difficult problem of shifting the phase of one grid to another.
Yeah, even GNU NetCat isn't really a standard replacement. Ncat isn't likely to become one either. It's another tool, it has great features, if it's useful for you use it. I'd say Ncat's primary competitor is probably socat or cryptcat rather than vanilla nc.
Full Disclosure: I am a Nmap developer.
Despite your trollish tone, you're right that there isn't a ton of innovation coming out in just TCP port scanning. The 5.00 release has several scanning performance improvements but port scanning is still port scanning.
But as for innovation/enterprise features:
* OS Fingerprinting (second generation engine)
* Graphing (via the Zenmap front-end) of the network topology
* Service fingerprinting
* Script engine including
* Windows SMB/CIFS/RPC scripts
* Windows vulnerability detection scripts
* SQL Injection scanning script
* Telnet/HTTP/FTP/SMB brute force scripts
* Conficker detection script
* A lot more
* XML output for report generation and nice XLST file for conversion to HTML
If you want to see AI behind OS fingerprinting, then submit a patch. I'd recommend starting with a Support Vector Machine as that has shown the most promise in developer testing.
If you want to see a webapp front-end for scheduling of scans and report generation then start a project.
Nmap is an open source project and despite the release wording, does not believe in bloat. Nmap isn't Nessus and never will be. If you want a client/server architecture or webapp they will be separate tools.
I use Nmap in an enterprise environment to scan 3
"A car is just a big purse on wheels." -- Johanna Reynolds