Forgot your password?
typodupeerror

Comment: Well known (Score 1) 77

by maotx (#38882143) Attached to: Ongoing Attacks Target Defense, Aerospace Industries
DSS are already our cyber detectives and can bring a great deal of wealth into what to expect with these types of attacks.

This is their report from last year on what kind of defense contractors are being targeted and why. (PDF Warning 2011-unclassified-trends.) Social engineering has generally always been the weakest link in a good secure system, but can still be deterred with strict security policies. It's not really a matter of if you'll get infected, but a matter of when. I've heard of incidents where companies have been infected for months without realization before the FBI stepped in to stop the further transmission of gigabytes of sensitive information.

If you think you or your company has been infected by foreign or domestic threats, go ahead and contact your local FBI office. They'll work with you in a cooperative investigation and guide you to prevent a similar incident from reoccurring. Despite what the movies show, the FBI does not come in and just take control of your network. You're still in charge and nothing happens without your consent.

Comment: Re:for those who wonder what the hell akamai might (Score 4, Informative) 171

by maotx (#33824326) Attached to: Would-Be Akamai Spy Busted By Feds
More specifically, Akamai is a content distribution company that serves as a local mirror for it's customers and their customer's clients. You'll see them everywhere from streaming video at Yahoo! to deploying Windows Updates with Microsoft. You would be surprised with how much content is delivered to your computer from their servers.

Comment: Exchange 2007 and Powershell (Score 3, Insightful) 617

by maotx (#33789666) Attached to: Take This GUI and Shove It
That's one thing Microsoft did right with Exchange 2007. They built it entirely around their new powershell CLI and then built a GUI for it. The GUI is limited in compared to what you can do with the CLI, but you can get most things done. The CLI becomes extremely handy for batch jobs and exporting statistics to csv files. I'd say it's really up there with BASH in terms of scripting, data manipulation, and integration (not just Exchange but WMI, SQL, etc.)

They tried to do similar with Windows 2008 and their Core feature, but they still have to load a GUI to present a prompt...

Comment: Re:Please reconsider (Score 4, Informative) 417

by maotx (#33471596) Attached to: Software (and Appropriate Input Device) For a Toddler?
As a father of five, I can testify that as long as you don't abuse it, computers are just as healthy and stimulating as a block of legos. My two year old spends most of his time with cars, blocks, and books; but he enjoys getting on the computer as well. We password protect it so he can only get on with our permission, but he has his own account configured with links to youtube videos of planes and bugs, toddler friendly websites, and games such as Minesweeper and Portal. We fully supervise when he is on the computer and limit how much time he can be on it, but overall it's quite beneficial. He no longer has a paranoia of bugs and he's improved quite a bit with identifying different types of colors and shapes. We credit his ability to recite his ABCs to his Vtech and the games we play with him, but the reinforcement from the computer certainly helps.

Regardless, no matter how a child is raised, it is mostly important to be involved with their day to day actions. Watching them soak up information and apply it is a huge testament to how incredible they are, which is also why it's important to remain involved and direct them.

Comment: Re:Trademark (Score 4, Informative) 357

by maotx (#33263474) Attached to: Geek Squad Sends Cease-and-Desist Letter To God Squad
Found out a little bit more. Unless you're going to confuse God Squad for Geek Squad, this doesn't appear to have a leg to stand on.
From 1114. Remedies; infringement; innocent infringement by printers and publishers emphasis mine
  • (1) Any person who shall, without the consent of the registrant—
    (a) use in commerce any reproduction, counterfeit, copy, or colorable imitation of a registered mark in connection with the sale, offering for sale, distribution, or advertising of any goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive; or
    (b) reproduce, counterfeit, copy, or colorably imitate a registered mark and apply such reproduction, counterfeit, copy, or colorable imitation to labels, signs, prints, packages, wrappers, receptacles or advertisements intended to be used in commerce upon or in connection with the sale, offering for sale, distribution, or advertising of goods or services on or in connection with which such use is likely to cause confusion, or to cause mistake, or to deceive,

Then again, IANAL

Privacy

+ - Beware: govts are tapping your 3G calls->

Submitted by joshgnosis
joshgnosis (1852688) writes "ZDNet Australia reports that an increasing number of governments around the world are using interceptors that can push 3G calls back down to the much less secure 2G in order to tap into the calls. "People have this misconception that if they're using a 3G phone their call cannot be intercepted because the 3G network provides them with a bit more security", says Les Goldsmith, CEO of call interceptor distributor ESD Group."
Link to Original Source

Comment: Re:Speaking of the BP gulf spill (Score 4, Interesting) 138

by maotx (#32539456) Attached to: DoE Posts Raw Data From Oil Spill, Coast Guard Asks For Tech Help
The problem with Florida isn't BP, but more likely ships illegally dumping.

"We've done a number of tarballs from Florida, Key West, Miami and so forth, none of which so far have matched the Deepwater Horizon," Gronlund said. "The tarballs that have been found on the beach in Florida are fuel oil."
Google

+ - Google TV Announced with Intel, Sony and Logitech->

Submitted by
MojoKid
MojoKid writes "Google's own I/O conference in California is wrapping up today, but not before the company goes out with a serious bang. Google just announced something that has been rumored for a while now: Google TV. Basically, Google is taking the Apple TV concept, but going way overboard by introducing apps, screen customization and channel searching. Following Google's own announcement, Intel stepped in to provide some backbone to the story. Google is obviously using the big players to move Google TV forward, with Intel, DISH Network, Best Buy and Adobe firmly on board. Google TV itself is based on Android, runs the Google Chrome browser, and will allow users to access all of their usual TV channels as well as a world of Internet and cloud-based information and applications, including Adobe Flash based content."
Link to Original Source

Comment: Re:Licensing? Severs? (Score 1) 190

by maotx (#31604332) Attached to: Open Source Alternative To Google Earth?

I'm trying to find out what exactly Google Earth is actually useful for???

I mean, Google Maps, sure I use that all the time to find where something is, directions how to get to it...on my iPhone, it even shows traffic loads.

I click Google Earth...it is neat how it zooms down to where I'm at from outer space..but after that...what?

As others have pointed out, it has a real value in the GIS community. Not so much for the actual work and planning, but for distributing our planned work in a format that's easily viewable.

Real life example, we're currently searching off of Brazil for Flight 447 and, while we use professional tools for the actual planning and searching, we also have our scan lines, the debris field, and the last known location all exported out into a set of layers that's easily opened in a KMZ file. For a quick look at what's going on, it's perfect.

If Machiavelli were a hacker, he'd have worked for the CSSG. -- Phil Lapsley

Working...