"This short paper will examine several discovered statistical irregularities
in functions used within the SecurID algorithm: the time
computation and final conversion routines. Where and how these irregularities
can be mitigated by usage and policy are explored."
My point is just because it is encased in plastic does not mean that the number can not be determined.
"At a contest held in London, Victorinox was offering a £100,000 cash prize ($149,000) to a team of professional hackers if they could break into the USB drive within two hours. They failed."
Umm, they weren't Pros. The contest was open to anyone who preregistered and you got to keep the knife after the contest. Not only that there were several restrictions on the contest. First you have to live in the UK, preregister and you only get two hours. Because ya know the bad guys always tell you who they are and always give up after two hours. Oh, and you have to be present to win, no Internet based attacks, you can only use Windows 64bit or whatever Linux flavor they are providing and of course you have to give up your exploit if you win. All that and more for a measly hundred thousand pounds? Yeah, no thanks, but hey it makes for great publicity and it is a cool knife.
So called "Hacker Challenges" are not a valid security assessment.
- Space Rogue
Basically a free book with ads online, a printable PDF version for a small fee ($9.95), a slightly larger fee ($14.95) without the ads and a modest printing cost for the full book ($24.95).
I got the printed book version. Pretty nice book to. It has no bar code but it does have an ISBN and it is marked "Not for Resale" But at under $30 including shipping I don't really care if I can resell it or not.
This business model seems to be new in the area of text books but I like it and hope it takes off. - SR
The really funny thing about all this is that after Senator Thompson and the Government Affairs committee was finished pimpimg us out as media whores several unrelated people approached us and said "Hey, where you thinking of taking the net down this way..." And we would say "No, that's not what we thought of but your idea would probably work just as well."
The thing is many of those ideas are still valid. The global Internet network is a rickety piece of technology held together with bubble gum and bailing wire. If it wasn't for the fact that people are actively trying to keep it operational I fear it would fall apart under its own weight in a very short amount of time not to mention if someone actually wanted to take it down.
State hits crime lab on DNA cache, Some files improperly kept, IG says
The State Police crime laboratory is storing the DNA profiles of hundreds of people whose crimes do not warrant it, according to an investigation of the historically troubled lab, raising the specter of what one civil libertarian called a "shadow DNA database."
I get notification from my HR department about new employees at least two weeks prior to their start date. In that time I and my staff create email accounts, domain accounts, set network permissions etc... Then on their first day everything is set and ready to go. Occasionally employees are actually given web access to email before they officially start work (but not before paperwork is signed). Our employee manual specifically forbids using outside email services such as Google, Yahoo, etc... for corporate email. Not so much for security but for auditing and accountability reasons.
There is no reason why the outgoing IT staff at the White House could not, at the very least, create email accounts for the incoming administration prior to their arrival. I sincerely hope that when the time comes for the O-Man and his cohorts to leave office that they don't go through this same mess. Inexcusable.
Twitter is already down and it is not even 11AM EST yet.
Granted twitter goes down ALL the time so that is not saying much.
After the last of 16 mounting screws has been removed from an access cover, it will be discovered that the wrong access cover has been removed.