I used to run a crontabbed script that queried a cgi-bin giving back the
remote address
I use a very similar system (in PHP), activated by a wget request from
/etc/ppp/ip-up.local (Linux). Another tactics I use occassionally when
having to improvise is a remote syslog and a crontab entry that
Nice! Get them to cut _all_ your fingers off instead of just one.
Just say no to amputationware.
Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.
...of course,
WTF is the point of adding more biometric security to a device that
cannot and does not support data integrity? that flash memory held
within the thumbdrive keeps your data in clear text...unless of course
you store everything within some form of encrypted disk. even then,
the quick and
Nice! Get them to cut _all_ your fingers off instead of just one.
Just say no to amputationware.
Use the kind of fingerprint reader that can also sense the blood flow in
the finger, kinda like the heart rate sensors on some exercise machines.
Dead fingers then will be of no use.
...of course,
One of these days, I might build a little device that stores a private key
and does on-board encryption using a microcontroller. I would do it just for
fun, since it is pretty useless if the infrastructure to support it is not out
there.
Check http://developer.axis.com/products/mcm/ - this
WTF is the point of adding more biometric security to a device that
cannot and does not support data integrity? that flash memory held
within the thumbdrive keeps your data in clear text...unless of course
you store everything within some form of encrypted disk. even then,
the quick and
Gabe Neville, a spokesman for Rep. Joseph Pitts, (R-Penn.), co-chairman of
the House Electronic Warfare Working Group, said news of the Phrack story
about jamming indicates that GPS jamming technology is easily available
and that the Pentagon needs to beef up its electronic warfare research
Gabe Neville, a spokesman for Rep. Joseph Pitts, (R-Penn.), co-chairman of
the House Electronic Warfare Working Group, said news of the Phrack story
about jamming indicates that GPS jamming technology is easily available
and that the Pentagon needs to beef up its electronic warfare research
I just got this spam, and I was wondering if it was a honey-pot. Anyone? The
site exists, and advertises games and movies for download.
Classical porn and warez scam. The site itself is an attempt to extract
your email out of you for the purpose of spamming you. Offers you a set of
nicely
On Thu, 16 Jan 2003, Peter Fairbrother wrote:
Would the spam business _want_ email addresses from people who download
ripped games/ movies?
Or would eg RIAA be more motivated?
Good idea. However, RIAA would probably just collect IP addresses and then
go after ISPs for the users' identities.
I just got this spam, and I was wondering if it was a honey-pot. Anyone? The
site exists, and advertises games and movies for download.
Classical porn and warez scam. The site itself is an attempt to extract
your email out of you for the purpose of spamming you. Offers you a set of
nicely
May be the worlds air getting polluted isn't so
bad-atleast we could put anti-pollution masks and
protect our identity :)
In Japan, people are already wearing face masks frequently, ie. during the
flu season. If such cultural sh9ft happens here as well, we have partial
protection against the
It doesn't matter what you wear. Even if everybody would be wearing a
flowing robe and a face mask (fat chance; right now donning this would
invite for some deep anal probing),
Not over some critical mass. Also could pit the media against the police,
if the rate of such incidents against
Does anyone have a pointer to software that will create messages
like this? Could be a great opportunity for stego - just replace the
# characters with random ones. Then let there be an option to either
use a crypto RNG for the random char choice, or to load in a stealthed
version of a PGP
May be the worlds air getting polluted isn't so
bad-atleast we could put anti-pollution masks and
protect our identity :)
In Japan, people are already wearing face masks frequently, ie. during the
flu season. If such cultural sh9ft happens here as well, we have partial
protection against the
It doesn't matter what you wear. Even if everybody would be wearing a
flowing robe and a face mask (fat chance; right now donning this would
invite for some deep anal probing),
Not over some critical mass. Also could pit the media against the police,
if the rate of such incidents against
Isn't the obvious way to handle this to include an undeveloped
(latent image) photograph of some obscure object, person, or place on
the film rather than just a blank film ? ? You could then develop it
and check for light damage and evidence of lack of authenticity. I
suspect there
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out that the closet door has been opened?
A switch that shutdowns the server, and a passphrase on the startup.
Remote logging of the power-ups, using
I have a related question. I have a little server sitting in a wall
closet. Does anyone have an easy solution (preferably low tech) for
figuring out that the closet door has been opened?
A switch that shutdowns the server, and a passphrase on the startup.
Remote logging of the power-ups, using
Isn't the obvious way to handle this to include an undeveloped
(latent image) photograph of some obscure object, person, or place on
the film rather than just a blank film ? ? You could then develop it
and check for light damage and evidence of lack of authenticity. I
suspect there
Also, in the US, the police can request a mail cover
(which means recording who all your snail mail is from)
with much less legal formality than a search warrant,
and if they get a warrant to open all your incoming mail,
I don't think they're required to notify you.
Is there a way to
Also, in the US, the police can request a mail cover
(which means recording who all your snail mail is from)
with much less legal formality than a search warrant,
and if they get a warrant to open all your incoming mail,
I don't think they're required to notify you.
Is there a way to
http://www.speakfreely.org/ is a nice, open-source cross-platfor VoIP
software. Supports encryption by DES, Blowfish, and IDEA.
Had anyone knowledgeable ever looked at its code? How secure this
implementation is? Is better to use Blowfish or IDEA? Where are the
potential holes there?
I was curious what the status of the SMS encryption project quoted in the below post
is?
I did some googling and saw almost nothing on the subject.
Newer GSM phones have java engines, used for ie. downloadable games.
Shouldn't it be possible to write a SMS encryption/decryption software in
http://www.speakfreely.org/ is a nice, open-source cross-platfor VoIP
software. Supports encryption by DES, Blowfish, and IDEA.
Had anyone knowledgeable ever looked at its code? How secure this
implementation is? Is better to use Blowfish or IDEA? Where are the
potential holes there?
401 - 425 of 425 matches
Mail list logo