Re: I can't believe...
I assume they tested the envelope of bank notes they were handed.
2513 publicly visible posts • joined 29 Jun 2009
I was wondering how he could even connect to the FMS and the other flight computers in the first place. These systems are fully air-gapped and there are no wireless links and no way to access these things without being in the cockpit or other engineering compartments which will be noticed immediately if any one accesses these.
As for the Nav systems with the wireless links to the ground and satellites, it would be impossible for a phone to even rival the power output of these, and that's even if the Cabin wasn't shielded against EM and RF in the first place.
Yes, temperatures in factories and kitchens do regularly exceed 38c/100f but the law states that any time a worker feels their health is in danger (such as feeling dehydrated in this case) their supervisor must allow them to recover before putting them back to work. Something the supervisors involved in the warehouse incident denied the workers.
You just need to set up a BGP router to advertise KP's AS number and you will receive all traffic destined for their network (Including replies for sessions they created). You could then just drop all those packets and it will effectively drop KP off the internet (unless your local router is closer to KP's router than the dummy is).
China performed a similar attack a few years back against AS number associated with US companies.
Most of the engines out there will render things differently depending on the underlying OS. Even Firefox on Windows 7 will render a slight bit differently than the same build of Firefox on Windows 8. The engine and the OS are not entirely separated, specifically in the image and video rendering and in the appearance of certain controls. While something like SuperPreview or the like will give you a good idea, it doesn't give you a completely accurate one.
I went to plain text just to ward of the gigantic signatures that are nothing but a single image (To make sure the formatting stays and to prevent people from stealing their contact info [I know, but they won't listen]).
My email client is does allow clicking and following links in plain-text emails, but it can't be obfuscated.
I was thinking that the filing was pointless anyway. It'd be as useless as making a filing for every variation they make such as having a different patent for "iPad 3, 32 GB, WiFi" and another for "iPad 3, 32 GB, 3G AT&T edition"
I suspect that this is more marketing than 'brand protection'
I would have assumed someone would have already pointed this out since this is wasting money and companies hate spending money, hell most companies are so serious about that that if they could, they'd go to strip clubs and throw naked women at money.
because we all know that viruses only come as compiled binaries and never anything like a java package, a PDF, or really any other file format (None are safe). Most e-mail / internet borne viruses are just using scripting in PDFs or Java applets to infect the machines.
Hell, there are text editors that can be exploited by putting the EOF character in the middle of a TXT file with the malicious code following that character; the text editor only counts the file size until it hits the EOF character but the OS might load the whole thing in memory, stomping over the rest of the editor's code.
Lately I've been getting:
The servers don't need patching, they are running Linux!
They continue to say that even after I report that postfix on the DB servers is spewing spam all over the place (we are a sendmail shop, so there is no reason for postfix to even be installed, let alone sending out mail to world+dog)
I had the same question. I can see 'Blood play' being banned, but where do you stop? Someone could argue that a knife showing up would be considered violence, another even just holding someone down, and yet another would call it violent if someone said 'Bitch'.
Internet censorship is a gigantic cluster-fuck, especially with things like this where it is all subjective and there is no clean lines. It should be the parents' responsibility to monitor their kids' actions, not Big Brother's.
Except that Microsoft has mandated that the switch to turn off SafeBoot is a required to pass the 'Designed for Windows 8' certification. The worry is Mother Board manufacturers that don't give two shits about MS's certifications and push out boards as soon as they can (looking at you Asus).
I've had a lot of problems with Cisco switches dying from bogons in the networks such as:
*MAC addresses appearing on more than one interface (once on the local interface and again on the trunk port)
*Malformed packets (bad header, same dest/source, etc)
*MAC Address/port limits on trunk ports (had this issue when we started getting more than 4000 servers per VLAN set, it would kill the core routers)
These are all issues that I've had with Cisco kit (6509's and 3750g's) and would like to see how the others handle these kinds of thing.
From what I see, this attack requires perfect conditions:
1 client accessing a single server, no other clients connecting to said server
*If the server is busy with another client, then the packet will be delayed and change the timing.
An unencumbered router, or at least one that is perfectly consistent in moving packets
*Any slight delay could change this packet timing, even a simple CRC check would take a different length of time on different packets.
*Special features on the router may also delay the packet randomly
No specialized network equipment
*Load Balancers, firewalls or NAT/PAT device would add random delays due to processing, of course a pair of load-balanced servers would have different timing even they used machine with only one-off serial numbers.
All links are the same exact length
*If the packet is going over a set of bonded links (Like nearly all ISPs have and most companies), a difference in cable length would delay the packet enough to defeat this attack
Using a non time-division style network
*crossing ISPs wouldn't work or even within the same ISP. Cellular and 3/4G networks wouldn't work either.
While this is good work and patches should be made for the affected products, an attack isn't practical outside of a lab.
Texas Instruments makes an ARM-based with 2x GigE ports and a crypto-accelerator for $199. It also has a touch-screen and some other goodies (no video-out though).
http://www.ti.com/tool/tmdssk3358
I've been using a couple of these for firewalls and VPN gateways for remote sites and built a very simple GTK-based UI for the office staff that just kicks off a couple of simple scripts.
Seriously people, are you not getting the fact that people check that over and it would be near impossible for something like that to happen?
Plus $185,000 is a little more than anyone would want to throw away on the off change it gets past the people doing the screening, when current methods of phishing are oh so much easier and profitable.
You do realized that these are looked over by human beings who would never let something like that happen? You're probably one of those idiots who thought they would do the same thing when IDNs were introduced, which is why you are hiding behind anonymity. Plus the 20+ year old meme gives away the idiocy as well.
There isn't which is why Windows Phone does support 'free protocols'. You can use IMAP, POP3, whatever you want on a Win Phone, it just won't sync Calendars or contacts, but that is the same on every IMAP or POP client.
In reality there is no reason that Google couldn't reverse-engineer the ActiveSync protocol and name it Google-sync or something like that. Performing black-box reverse engineering is perfectly legal and how Samba got along before Microsoft released the specs to it.
Actually they do, just not much. They have a couple gig connection and 4x /24 IPv4 allocations coming out of China.
http://bgp.he.net/AS131279
They also have a very large 'Cyber warrior' division (Something like 1500-200 members last I heard) and the motivation to steal rocket data mostly since their current rockets are made out of old ICBMs from the Former Soviet Union and they aren't really bursting at the seams with rocket scientists.
Why not just put relays on lampposts? It would be much easier than convincing companies to start putting antennas and equipment on their roofs just to benefit others. And I would trust the road crews a little more than some random 18-wheeler to keep the relays working properly.
Lampposts are the highest objects on the road, and thus a very large area of reception; they already have electricity going to them; and you could still reap the benefits of having such a network when only one car is on the road.
If these companies didn't charge an arm and a leg for this crap, there would be no motivation behind making counterfeits. I am guilty of buying counterfeit shows, the girlfriend wanted some fancy shoes for a party we were going to; buying legit would have cost me $1000 where going two streets down to the street merchants cost me $25. I would have been willing to pay $200 for them if they were as high-quality as the manufacturer says they are, although the counterfeits fell apart after 3 uses but that's all they were needed for.
Same goes for the Symantec and McAfee products, they may be a slight bit better than the free stuff, but certainly not $75/year better.