Forgot your password?
typodupeerror

Comment: Re:13 to 15 deaths (Score 1) 518

by moj0e (#46630303) Attached to: Department of Transportation Makes Rear View Cameras Mandatory

What I was trying to communicate was let's not think of it in terms of "if it saves one life", but in terms
of "if it saves the life of someone I know" (which would have been our case).

I think the argument would have been much different
if we were trying to ban cars rather than changing something small to make it a little safer.

Comment: Re:13 to 15 deaths (Score 1) 518

by moj0e (#46629391) Attached to: Department of Transportation Makes Rear View Cameras Mandatory

Hopefully Intelligent Transportation Systems (https://en.wikipedia.org/wiki/Intelligent_transportation_system) will be mature enough to reduce those accidents/deaths as well. But for now, we will have to be content with 15 - 30 lives.

On a personal note, a close friend of ours lost their child to an accident that could have been avoided with a rear-view camera. Seeing all the pain that they went through, it makes me wish this existed back then.

User Journal

Journal: Running Oracle DB modules in Kali Linux

Journal by moj0e

Apparently, there is some manual work that needs to be done before one can run Oracle DB modules in Metasploit under Kali Linux. This is because of proprietary libraries from our dear Oracle.

Here are the instructions that worked for me:
http://blog.infosecsee.com/2013/08/how-to-get-oracle-support-in-metasploit.html

User Journal

Journal: TP-Link wr703n minipwner

Journal by moj0e

So I followed the instructions here:
http://www.minipwner.com/
to create a minipwner box using a TP-Link mini router.

However, using an older openwrt image would break the ones with the 1.7 firmware.
Here is the fix:

Unbrick wr703n wifi router
http://forums.openpilot.org/blog/52/entry-92-unbrick-wr703n-wifi-router/

Comment: Re:SGI was doing this a looong time ago... (Score 1) 230

by moj0e (#41230487) Attached to: Intel Embraces Oil Immersion Cooling For Servers

+1 to the parent. I used to work at SGI and, as you said, this is old news. One small note, unless rackspace is also doing something different, I believe you are talking about Rackable Systems intead of Rackspace.

This might be the first time Intel is doing it with their HW though. If I recall correctly, SGI did it with their MIPS systems.

Comment: Re:Attitude (Score 2, Insightful) 165

by moj0e (#40195161) Attached to: SSID As the New Community Bulletin Board and Yard Sign

One advantage of changing your default SSID a vanilla install is that it makes it harder to crack.
The SSID is used as salt in the encryption mechanism.

Here is an article that describes it in more detail:
http://netsecurity.about.com/od/secureyourwifinetwork/a/WPA2-Crack.htm

Plus... having a goofy SSID is fun :) Mine is "Dialup".

User Journal

Journal: Wrote my first snort rule!

Journal by moj0e

Wrote my first snort rule! It detects if someone is trying to capture credentials via the auxiliary/server/capture/smb module.
More information about this type of attack is here:
http://www.packetstan.com/2011/03/nbns-spoofing-on-your-way-to-world.html;

Wireless Networking

+ - Your Neighbor's WiFi Wants You to Vote for Romney

Submitted by
Hugh Pickens writes
Hugh Pickens writes writes "Megan Garber writes that wireless routers have become the lawn signs of the digital age particularly in large apartment buildings, where almost every unit has a unique wifi network that will be detected in turn by all the other unique wifi networks, SSIDs can be a cheeky, geeky way to broadcast messages to your immediate neighbors. Most of us keep it simple with "275_Elm_Street," "Apt23," or "my_network" but some get more creative with names like: "Apt112IHaveYourMail," "PrettyFlyForAWiFi," or "WeCanHearYouHavingSex" — a great way to freak out your annoying neighbors without hiding in their bushes or peeping in their windows late at night. Now the team at OpenSignalMaps, which maintains a database of geolocated wifi access points, analyzed the data they've collected about wireless routers to see whether wifi names are "being used to fly political colors" and have found, globally, 1,140 results for "Obama" and an additional six for "Romney" — an indication not necessarily of Romney's popularity relative to the president's, but of the attention that four years as president can confer. "There's something uniquely contemporary and incredibly old-school about that kind of broadcasting: It's messaging meant only for your immediate neighbors," writes Garber "It's both intimate and isolating, both invasive and impersonal, both omnipresent and invisible, both passive and aggressive." Which makes them a good metaphor for political discourse as it looks in the US today with its particular mix of intimacy and impersonality. "The politicized network names are like lawn signs for people who don't have lawns.""

Comment: The cost of DRM (Score 0) 5

by moj0e (#39109257) Attached to: Copy protection advice for ~$10k software

Why don't you release a 'not for commercial use' copy w/o the spying. That will prevent it from being distributed on P2P sites. The added benefit is that people would learn to use and love your software. Eventually, they can be your marketing arm and help convince management to purchase the software for business use.

Also, as you might be aware, developing DRM is very costly. The cost of DRM is expected to reach $9bln this year: http://drm.info/node/93

Linux

+ - Apple orphans Linux CUPS features- handicaps open source printing

Submitted by
donadony
donadony writes "CUPS, is the printing standard that open source projects have used successfully to convert desktops and computers to become printer servers, allowing plug-in, modular type of printing. However, now Apple after it acquired it from its developer Michael Sweet, at Easy Software Products, in 2007, has chosen to abandon certain Linux exclusive features, and continuing with popular Mac OS X features.The changeover is being attempted by Appleto set new printing standards that will not require ‘drivers’ in the future. However, the journey in between from the present ‘driver-only’ printers that communities across the world are engaged to Apple’s printer-utopia, just got tougher and essentially involves more work for Linux users."
Technology

+ - Rio Tinto bets on future of automated mining->

Submitted by Anonymous Coward
An anonymous reader writes "Global miner Rio Tinto has accelerated a move toward automation, unveiling a $518 million (AUD) plan to pioneer the use of driverless trains in Australia and increasing its bet on a future where machines rather than miners do most of the work.

The world's no.2 iron ore miner, which already has driverless trucks, plans to run fully automated trains across its 1,500 km (930 mile) iron-ore rail network in northwest Australia from 2014, to help boost output 60 percent by 2015."

Link to Original Source
DRM

+ - Copy protection advice for ~$10k software 5

Submitted by Anonymous Coward
An anonymous reader writes "Hi /., I'm a long time reader and would like some advice.

I'm part owner of a relatively small video editing software company. We're not yet profitable, and our stuff turned up on thePirateBay recently. Some of our potential paying customers are using it without paying, and some non-potential customers are using it without paying. Our copy protection isn't that tough to crack, and I'd rather see the developers working on the product than the DRM (I'm convinced any sufficiently desirable digital widget will get copied without authorization).

Would it be insane to release a 'not for commercial use' copy that does some spying and reporting on you, along with a spy-free version for ~$10,000? I feel like that would reduce the incentive to crack the paid version, and legit businesses (In the US anyway but we're trying to sell everywhere) would generally pay and maybe we could identify some of the people using it to make money without paying us (and then sue the one with the biggest pockets). What would you do? I respect the collective wisdom of ./; thanks for your time!"
Privacy

+ - Anonymous Cowards, Deanonymized-> 1

Submitted by mbstone
mbstone (457308) writes "Arvind Narayanan writes: What if authors can be identified based on nothing but a comparison of the content they publish to other web content they have previously authored? Naryanan has a new paper to be presented at the 33rd IEEE Symposium on Security & Privacy. Just as individual telegraphers could be identified by other telegraphers from their "fists," Naryanan posits that an author's habitual choices of words, such as, for example, the frequency with which the author uses "since" as opposed to "because," can be processed through an algorithm to identify the author's writing. Fortunately, and for now, manually altering one's writing style is effective as a countermeasure."
Link to Original Source
Facebook

+ - Facebook Also Bypasses Privacy Settings In IE

Submitted by Anonymous Coward
An anonymous reader writes "Following the news that Google is tricking Apple’s Safari browser by including privacy-circumventing code in its ads, Microsoft is now saying that Google bypassed privacy settings in Internet Explorer as well. The story goes deeper than that. Google isn’t the only one bypassing Microsoft Internet Explorer’s privacy settings: Facebook does it too, as do thousands of other companies."

Your computer account is overdrawn. Please see Big Brother.

Working...