Archive for April, 2006

Sunday, April 23rd, 2006

This is a test

http://www.riversideactiongroup.org/article.php?story=2006042107310695

Sunday, April 23rd, 2006

This blows my mind

This was from a link on Cnet

http://news.com.com/2061-11200_3-6063987.html?part=rss&tag=6063987&subj=news

Note: if you did not see the blinking text above, it means that your browser is not compliant with the Web 2.1 standards. An easy way of checking whether your browser is standards compliant is to check whether the installation files for your browser were smaller than 50MB, or the run-time memory usage is less than 300MB. If this is the case, you should download a more recent browser to get the full Web 2.1 experience. http://cheese.blartwendo.com/web21-demo.html

Why the fuck would I want a browser that takes up more then 300 MB in run time thats just crazy talk.
Firefox Mem Usage 60 Meg, Virtual Mem size (50 Meg)

Then again these guys are recreating the bink tag.

Sunday, April 23rd, 2006

I don’t know if you guys have seen the ATT ad that feature KITT ( http://youtube.com/watch?v=bRxGu7Yy5rA ) . The one thing that got me curious was the VA state inspection and Decal in the window. I did a little googling and came up with this

http://www.knightrideronline.com/phpbb/viewtopic.php?t=8628&postdays=0&postorder=asc&start=0&sid=44c687a692b2ef7c5c47be15976aade3

It turns out the car is a replica someone built

There seems to be a whole load of people building replicas
http://youtube.com/watch?v=6p01ahzrVNg
http://youtube.com/watch?v=5oVxdcUXzoI
http://youtube.com/watch?v=KOZTk7MmRK8

Friday, April 21st, 2006

This is s a good link for setting up SPF and Grey listing on postfix

Famous sort of

Wednesday, April 19th, 2006

I was interviewed for a security magazine a little while back and one of my co workers read it. I also hear my photo is in there as well 🙂 I am not subscribed to the magazine so my co worker has promised me his copy.

Monday, April 17th, 2006


First boat into to the inner harbor from the volvo ocean race

Monday, April 17th, 2006

I am thinking about get this 1 Gig usb drive then it occurred to me. The first every hard drive I owned was a 540 Meg unit.

Friday, April 14th, 2006


And another one of the squirrel

Friday, April 14th, 2006

squirrel large squirrel large
Squirrel on the national mall in washington DC

Wednesday, April 12th, 2006

US-Visit computers failed due to a virus.

To me this is crazy that computers could be affected so badly by a virus. Lets assume that you haven’t installed the patch because you are testing it. That is a reasonable enough situation, but in security you don’t just rely on just one layer of protection instead you use multiple layers. For a moment lets assume that these machines are not used for reading email, surfing the web and only have the software needed to perform the US-visit program.

1) Virus software.
Any reasonable virus software will protect computers from known viruses. Some vendors will also give you the ability to block buffer over attacks and perform some behavioral blocking. All the machines should be managed from a central location that allows the machines to all be updated to the latest virus definition files.

2) physical or logical separation.
In this example they are running machines that have a single purpose, to collect and valid passports. This allows you to put the computers on a firewalled segment that only allow the specific traffic needed to run the us-visit machines. If they they are connected to an untrusted network then tie them back to a central secured network using a vpn connection.

3) Hostbased Firewall
Windows XP includes a very simple firewall that allows you to block traffic going to the machine. When dealing with a machine that is there to serve a single purpose it should be a fairly simple to create a set of firewall rules that blocks most traffic to the machines.

3) Hostbased application control
Again since these are single purpose machines you can install a security application that controls which applications are allowed to run and what types of network connections those applications are allowed to make.

What is even more amazing is that wired has published a copy of there Network Architecture