topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Saturday December 20, 2025, 8:37 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 96 97 98 99 100 [101] 102 103 104 105 106 ... 470next
2501
Living Room / Re: Knight to queen's bishop 3 - Snowden charged with espionage.
« Last post by 40hz on December 09, 2013, 12:38 PM »

I don't even know how to describe them all working together!

I do! It's called: spin management & damage control.

Also known as "The Fog Machine."  8)
2502
I came into this thread to ask who in the world still uses CDs and then discovered the original post was from 2006.



FYI: musicians. Y'know...these guys:

mus.png

(Mag tape and vinyl too sometimes - if they're lucky!)

Just thought you'd like to know since yer askin'... :P ;)
2503
Sounds good. And better than nothing.

But unfortunately, even though it's (supposedly) not subject to US law, there's still no real expectation it will be not subject to "special accommodations" or "diplomatic favors" from the Swiss government. Even the countries most vocal about the US spy programs (i.e. France, China, Russia) have their own robust and abusive network espionage systems and laws in place.

And don't forget the IT provisions in all those secret trade agreements and treaties many governments seem so intent on getting signed. Preferably with as little public disclosure as possible.

That's why a technological "solution" is a pipe dream at best. The most it can provide is a temporary sanctuary. And the same goes for oversight committees or changes to the law. Our intelligence communities seem quite comfortable and willing to work outside the rule of law, to say nothing of their being utterly contemptuous of legality in general.

As long as The One Ring exists, it will never be over. Sauron knew what he was doing when he 'gave' his ring technology "as a gift" to the elves, dwarves, and men. Apparently, so too did the US government when it gifted The Internet to planet earth..

 8)
2504
Living Room / Re: Does anyone here use Bitcoins?
« Last post by 40hz on December 09, 2013, 07:06 AM »
If you saw my finances, you'd know that I'm already thinking that.

Glad to see somebody I know is coming out ahead. Luck! :Thmbsup:
2505
Living Room / Re: DOTCOM saga - updates
« Last post by 40hz on December 07, 2013, 11:09 PM »
confronting a bully who is about to punch your lights out and do you some serious injury.

A polite exaggeration?

What exactly is the US threatening? To send in the drones? Order a cruise missile strike? Put "boots on the ground" and demonstrate some "shock and awe" to the Kiwis? Stand by idly and allow China to invade the The South Island and cart its population off for forced labor?

I hardly think so.

The US is not omnipotent. Not by a long shot.

So, imagine having this friend in the shape of the US, who is a bit like Allah in that you had better do as he wants, or else.

If that's a euphemism for "being bought" or saying the powers that be in NZ have "sold out" however, isn't that an entirely different story?

Because I can agree NZ's current government sold itself and it's people out on this one. Possibly with the best of intentions. But certainly for all the wrong reasons. And definitely with the lamest excuse if "arm twisting" on the part of the Obama administration is the best it could come up with.

I guess I'm a bit old-school when it comes to something like this. To wit: there are always reasons why somebody may - or may not - do something. And of those reasons, some may very well be "very good reasons."

But at the end of the day, all that really matters is what was - or wasn't - done. That's the diamond in the equation. The reasons given are merely its price tag.
 :)

End-of-World-cartoon.gif


2506
Living Room / Re: DOTCOM saga - updates
« Last post by 40hz on December 07, 2013, 11:39 AM »
I happen to really like NZ and hope, at the very least, to visit it someday. I pray it doesn't get completely mucked up before I do.[/i]
In order that you....  ;)
-cranioscopical (December 07, 2013, 11:10 AM)

...have a place with an interesting climate and geography, an English-speaking populace (and decent ale!) where one can apply for political asylum. :P
2507
Living Room / Re: network engineering (cisco, etc)
« Last post by 40hz on December 07, 2013, 11:19 AM »
^Can't speak for the UK, never having worked there. But I'd suggest talking to an IT headhunter based in the UK to find out what the expectations and norms are for that employment market.

I say this because obtaining certification is both time consuming and costly. If it's an entry requirement for decent employment in your job market, you don't really have a choice. But if that's the case, it's also important to decide which certifications you pursue carefully since you likely won't have the time, energy, or money to get all of them. And it's become somewhat questionable just how important certifications still are for the IT workforce.

Not all certifications automatically translate out to better offers or higher salaries. In fact, none really do any more. At best, they may get you in the door for an interview. Especially if you don't have much documented work experience. Note too that certain certifications will be more in vogue than others at any given time. So to get on top of that, you'll need some inside advice. Either get in touch with an IT recruiter to discuss it - or get yourself set up on LinkedIn and (politely!) work your connections for insights and advice.

Training for network engineering isn't particularly difficult AFAIC. There's no esoteric mathematics background you'll need. But you will need a good memory for detail plus an organized problem-solving mindset. After that, it's largely a matter of putting in the time learning the hundreds of details that make up a network person's body of knowledge.

Having a "can do" attitude is also essential once you start working in the field. Because you will be judged heavily on the results you produce. So "getting in there" and doing it correctly and quickly is what it's all about. My company has an unofficial mantra: Up and running correctly in the shortest time possible. I suggest you take that to heart. Because your future employers (or clients) will expect and accept nothing less from you.

Work hours in this field are generally the hours needed to accomplish the assignment. Putting in late nights, and coming in on weekends, is not unusual. But that's only to be expected since much of what you'll be implementing or provisioning needs to be done outside of normal business hours.

Work days vary. Most of us have routine tasks we're responsible for plus a few longer range projects (with deadlines) we're working on. But there's also those random network issues or outages we'll be called on to fix. Those can mess up even the best planned day. If that doesn't work for you, you'll need to seriously reconsider this field. Because (for most of us) our primary function is troubleshooter and fixer first, and wise old engineer second. If something breaks, we're expected to fix it. Fast. (Remember my company's mantra? Believe it!)

It's risky to try to predict where the market is headed - or what specific skill sets will be most valuable to have. However, most in the industry seem to feel that Linux certifications may become increasingly important over time. My own experience seems to confirm that since I'm seeing more and more mention of Linux certifications in IT job listings. I don't know if it's considered a real "plus" for these potential employers. Or if it's just something the HR department thinks is "nice to have." Either way, I'm seeing it - which makes it something worth my paying attention to.

Don't know if any of this was helpful. But there you have it. Good luck with your career goals.

------------
Addendum:

If you have about an hour to spare, give this video a watch. This pretty much will sum up virtually everything you need to know about getting into and ahead in the IT profession. Some of it might be a little dated. But it's solid real-world info worth knowing:




 :)
2508
Living Room / Re: DOTCOM saga - updates
« Last post by 40hz on December 07, 2013, 07:33 AM »
Call me old-fashioned if you want, but I really have had a gutsfull of the American so-called "ethics" and "law" over this case, and of the arm-twisting it has subjected the NZ government, police and judiciary to. The country doesn't seem to deserve its Constitution.

Poor NZ. It's merely a fully independent sovereign nation - as it's politicians and government keep reminding us. Besides...it didn't want to do it. The Big Bad Sam made them do it! (The US must have threatened drone strikes, right? Otherwise NZ never ever ever ever ever would have gone along with any of this...)

Call me old fashioned if you like. But it's hard for anybody in that equation to even broach the topic of  'ethics' let alone justice.

Not to apologize for the Obama administration (which is not the same thing as the people of the United States of America) but the sooner NZ's current government (which is not the same thing as the people of New Zealand/Aotearoa) accepts full responsibility for going along (with some apparent enthusiasm), the better off the people of NZ and their country as a whole will be.

With luck, the people of NZ won't allow their government to play the same game the US government has. The US used "The Communists," "The Russians," "The Chinese," - and now "The Terrorists" as a handy excuse to justify its lawless excesses, abuses of power, and hypocrisies.

Hopefully the people of New Zealand will be smart enough not to allow their government to employ the US as a justification for its own breaches of public faith and constitutional law.

Just my :two: anyway.

Note: I happen to really like NZ and hope, at the very least, to visit it someday. I pray it doesn't get completely mucked up before I do.
 :)
2509
Living Room / Re: Elitists of the World - UNITE!
« Last post by 40hz on December 06, 2013, 06:08 PM »
^Now that guy has a real "three pipe problem."
2510
Living Room / Re: When you make your 100'th Post
« Last post by 40hz on December 06, 2013, 04:11 PM »
Congrats to Tuxman! :Thmbsup:
2511
Living Room / Re: Elitists of the World - UNITE!
« Last post by 40hz on December 06, 2013, 04:10 PM »
@Miles - and we just know that particular poseur in the photo adopted one purely for effect. ;D :Thmbsup:

(Lord - are we getting that old? :tellme:)
2512
Living Room / Re: badBIOS revisited - it is possible to bridge the airgap after all
« Last post by 40hz on December 06, 2013, 04:01 PM »
What interests me is how it is able to infect other machines on the other side of the airgap. Somehow I don't think most computers routinely check their microphones for incoming data, let alone execute data recorded from the air.

Correct. The problem is primarily on machines that do have (and leave) the microphone enabled. The paper mentioned Skype and related users. But any infection that availed itself of this concept would not need to be limited to acoustic communications. It merely adds yet another vector for infection (as you noted) to the palette of methods we're already familiar with.

For example, suppose you could infect a machine in the usual way (i.e. wire, wireless, media, download), and covertly enable the sound system to transmit keystroke data. And also have the microphone listening for an "I'm listening" signal from a zombie routing machine to start playing it. Then that same zombie device could start recording and transmitting your keystrokes elsewhere via whatever network it's connected to for analysis and possible later use.

It's not so much what this can do now. But give it some time. Just sitting with some of my "in the biz" cronies, we came up with a few dozen viable ideas. That was without even trying. And none of us are real hacker types. Just imagine what the real professional 'naughty folks' will come up with.
 8)
2513
I found CD & DVD Box Labeler Pro to be pretty good if you're still living on the Windows side of things. Not much to say about it other than it works for me.

For address labels I'll just use whatever templates are available in my installed wordprocessor app, and do a data merge into that.
 :Thmbsup:
2514
General Software Discussion / Re: Spammer Question with Webmail server
« Last post by 40hz on December 06, 2013, 11:09 AM »
^ i don't like sleeping on the couch  :tellme: :'(

LOL! :Thmbsup:

Or worse...

in-the-doghouse.jpg

 ;)
2515
General Software Discussion / Re: Spammer Question with Webmail server
« Last post by 40hz on December 06, 2013, 09:30 AM »
^Yup. I deal with that too. I still have two clients that insist on using their AOL accounts for their main business email address.   :-\
2516
General Software Discussion / Re: Spammer Question with Webmail server
« Last post by 40hz on December 06, 2013, 08:00 AM »
Best advice at the moment is find an alternative email provider and make sure you backup you address book from Yahoo and then delete your entire content list from their servers otherwise it will continue to happen.

Good advice. Especially since it's so inexpensive to register a domain name these days. Most registrars throw in one free POP email account as part of the deal. GoDaddy wants something like $3/mo for single and $5/mo for 5-address e-mail hosting. I'm sure there are better and cheaper providers out there too.
2517
So... Did you really just Cut-N-Paste ^that out of the 'So you want to join the dark side' training manual? :D

Nope. It's page 127 from The Necronomicon of 40hz - A Complete Rainy-Day Guide to Imanentizing the Eschaton in Your Spare Time Using Other People's Money. ;)

 ;D
2518
Non-Windows Software / Re: Question for coders: What do you think of this idea?
« Last post by 40hz on December 06, 2013, 06:03 AM »
^Yeah...that forum thread brought me to a screeching halt and set off my nagi-buzzer too. And I'm not PC by any stretch. I'm hoping it's just somebody pranking them.

But if so, they really need to be monitoring their site better.

2519
General Software Discussion / Re: Spammer Question with Webmail server
« Last post by 40hz on December 05, 2013, 07:16 PM »
The only time I ran into that was when a client had her personal Yahoo account hijacked and was spamming everybody in her (very large) contact list. But whoever did it also changed her password thereby locking her out. And the spam was so ridiculous that it was obviously from somebody else. So it was pretty obvious somebody was playing games with her account. Unfortunately, working with Yahoo to get her access back was a study in patience and aggravation.

Email headers can be spoofed however, so it doesn't automatically follow that the header info reflects the actual origin of the email in question. Email addresses can be harvested as well so that's not anything unusual. But having her header on spam to one of her contacts is somewhat bothersome.

She should definitely change her passwords - and enable two factor authentication if she's in the habit of getting her email in public places - or going through coffee shop and other insecure public routers. She should also do the usual checks for resident malware on all the devices she uses for email.

If it's only occasional, and the frequency of occurrence isn't increasing, I wouldn't be too concerned.

In my client's case, her problems started shortly after she used a machine at one of her own client's offices to access her email via the web. There was something on that machine that likely scooped her credentials, and it was downhill from there for her.

That's about all I can suggest. Luck!
2520
Welcome and well met Suraj! :Thmbsup:
2521
Now how do I get somebody to send me a million dollars for the idea?

Easy.

  • First, stop referring to your idea as an 'idea.' (You can't patent 'ideas.')
  • Next, write your idea down on a sheet of paper.
  • Next, prefix the words "A method to (or for)..." and write that phrase in front of the idea you just wrote down.
  • Then take the completed sheet of paper to an IP attorney. (Bring a blank check along. You'll need one.)


Your IP attorney will then file for one of those bullshit vaguely (but broadly) worded "business method" patents the USPTO sooooo loves to grant

  • Once you receive confirmation (and a patent number) from Uncle Sam, assign your nice shiny new patent to a troll - the bigger the better
  • Let troll threaten to sue the living tar out of anybody who does anything remotely resembling online advertising
  • Sit back and wait for checks from troll to arrive in mailbox

Troll-face-problem.gif   ;) ;) :Thmbsup:
2522
Living Room / Re: Elitists of the World - UNITE!
« Last post by 40hz on December 05, 2013, 10:35 AM »
All this Cthulhu talk.  You're making me want to read some lovecraft.

You don't want to go there. I've been binging on all things Mythos for the last 5 days. Lost a LOT of productivity. :tellme:
2523
Living Room / Elitists of the World - UNITE!
« Last post by 40hz on December 05, 2013, 09:05 AM »
Now you can save the universe, cure all human woe, design the ultimate future, have fun - AND look absolutely fabulous while doing so!

Is it me, or does something like this just make you want to scream FUBAR at the top of your lungs?

All Aboard for a Sun-Filled, Intellectually Stimulating Week at Sea!
You Won’t Want to Miss Fixing the World: Reason Seminar Cruise 2014!


Dec. 5, 2013 9:10 am

Register today at xxxx

Spend a week with author, columnist and speaker Virginia Postrel, whose fascinating work runs the gamut from science to fashion. Virginia is the former Editor in Chief of Reason magazine, and is the author of the soon-to-be-released Power of Glamour.

Other speakers on this year’s cruise include “skeptical environmentalist” Bjorn Lomborg, author and historian Johan Norberg, Reason Editor in Chief Matt Welch, Reason TV Editor in Chief Nick Gillespie, Reason Science Correspondent Ron Bailey, and Reason Senior Editor Jacob Sullum.

We’ll be traveling in style on the Celebrity Silhouette, and all-inclusive accommodations start at just $1,650 per person (and range up to deluxe cabins with incredible ocean views and private verandas)...


Her "fascinating work runs the gamut from science to fashion"?????

All that? Great Cthulhu protect us! Let's get her in here...I'd like to take a group photo - of her.

 :-\

looks.png
2524
...adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range.

Ah, so may be dogs can hear what's going on...yet another way they can help us!

Funny you should say that. It's already been proposed that "covert acoustic network sniffing dogs" be added to the cadre of pooches that sniff for drugs, explosives, electronics, and trapped human bodies.

Figure if the DHS (along with that dolorous brotherhood of other tri-letter US security agencies) think they can use this as an excuse to pry yet another half-billion out of Congress for a "pilot program," it's a done deal already.

The dogs will (of course) be told to ignore any data originating form American citizens unless specifically directed to do so. Failure to comply will result in a very stern look and no cookie...IF they're caught.

dog2.jpg
    I found it Boss! Here's their main torrent feeder!!!
 ;D
2525
No longer any need to speculate or wonder!  ;D Here's the paper by researchers Michael Hanspach and Michael Goetz on engineering a transmission vector that can bridge the air gap. It's been published by The Journal of Communications:

On Covert Acoustical Mesh Networks in Air

Michael Hanspach and Michael Goetz
Fraunhofer FKIE, Wachtberg, Germany


Abstract—Covert channels can be used to circumvent system and network policies by establishing communications that have not been considered in the design of the computing system. We construct a covert channel between different computing systems that utilizes audio modulation/demodulation to exchange data between the computing systems over the air medium. The underlying network stack is based on a communication system that was originally designed for robust underwater communication. We adapt the communication system to implement covert and stealthy communications by utilizing the near ultrasonic frequency range. We further demonstrate how the scenario of covert acoustical communication over the air medium can be extended to multi-hop communications and even to wireless mesh networks. A covert acoustical mesh network can be conceived as a botnet or malnet that is accessible via nearfield audio communications. Different applications of covert acoustical mesh networks are presented, including the use for remote keylogging over multiple hops. It is shown that the concept of a covert acoustical mesh network renders many conventional security concepts useless, as acoustical communications are usually not considered. Finally, countermeasures against covert acoustical mesh networks are discussed, including the use of lowpass filtering in computing systems and a host-based intrusion detection system for analyzing audio input and output in order to detect any irregularities.

Index Terms—malware, network covert channels, wireless mesh networks, ultrasonic communication

Cite: Michael Hanspach and Michael Goetz, "On Covert Acoustical Mesh Networks in Air," Journal of Communications, vol. 8, no. 11, pp. 758-767, 2013. doi: 10.12720/jcm.8.11.758-767

Links:

Journal of Communications abstract page here.

Article (PDF) direct link here.

Interestingly (but not surprisingly) Linux already has some very powerful resources to deal with this new type of threat. From the paper:

If audio input and output devices cannot be switched off, implementation of audio filtering options may be an alternative approach to counter maliciously triggered participation in covert networks. In Linux-based operating systems, a software-defined audio filter can be implemented with ALSA (Advanced Linux Sound Architecture) in conjunction with the LADSPA (Linux Audio Developer’s Simple Plugin API) ...

Add in the relative ease of developing solutions, plus the large community of contributors, and it looks like Linux may be in better shape than most to resist this cyber-siren's call. Especially since so many in the Linux community see things like this not only as an affront, but also as a challenge.

Tux and his team sez: Bring it on!

tux.jpg

 8)
Pages: prev1 ... 96 97 98 99 100 [101] 102 103 104 105 106 ... 470next