* Posts by catphish

13 posts • joined 7 Aug 2011

When will Microsoft next run out of US IPv4 addresses for Azure?

catphish

Re: Confused about IPv6 vs. NAT.

With IPv6 all hosts have a public address, but networks should still have a firewall, offering the same protection as a NAT firewall by allowing outgoing connections but not incoming.

6
0

US Marshals seek buyer for Silk Road's Bitcoin

catphish

Perhaps I don't understand the process

Won't a large number of these never have been involved in criminal activity? Don't people deposit bitcoin into personal accounts, then use them (or not) to buy things which are probably (but may not be) illegal. Wouldn't they need to locate and prosecute each individual owner of these one before selling their assets? It's very easy for people to prove ownership in this case by providing their login credentials.

0
0

Google: 'EVERYTHING at Google runs in a container'

catphish

"paving the way for other companies to do the same."

Oh, I didn't realise we we lesser companies had to wait for Google to do things before we're allowed to try them.

7
14

Easy to use, virus free, secure: Aaah, how I miss my MAINFRAME

catphish
WTF?

The cloud

It's not a new invention? We ran out computing tasks remotely before? Well I'll be damned!

2
0

'Stop-gap' way to get Linux on Windows 8 machines to be issued

catphish
Linux

I'm too lazy to actually read the specification, but why is it such a problem for major Linux distributors (Ubuntu, Redhat) to build secure bootloaders and sign them properly in the same way that Microsoft do with Windows?

I realize yhey would then sign kernels accordingly, and of course end users would never be able to build their own kernels (else malware could do the same), but most don't need to.

Not necessarily an approach popular with hardcore free software types, but on most of my desktop systems where I don't build my own kernels, I'd happily see my system made more secure by an Ubuntu signed secure kernel.

Penguin, because.

0
2

Google to skew search results to punish PIRATES

catphish
Devil

Re: What is that legal term to preempt such things so business may go on?

Or maybe judges have important law things to spend their time dealing with :)

0
0

Brit telco flagship BT joins blockade of Pirate Bay

catphish

Just tested this...

and it seemed to work fine.

Further investigation reveals that they have been unable to block its IPv6 address because they don't offer IPv6 connectivity and so the connection was automagically tunnelled to another ISP...

Perhaps 2 wrongs do make a right?

0
0

LinkedIn dials 911 on password mega-leak hackers

catphish

Re: Call me confused

LinkedIn is important because it has a large number of technical users whose passwords have been leaked with weak hashes. Keep up.

0
0
catphish

Re: "until they get around to finally salting those hashes"

"Therefore if your passwords are hashed but not salted, a hash can only be added at the point the user changes their password."

Not totally true. You can rehash the password any time you have the plain text version which can be done the next time the user logs in. Of course, if the passwords have been leaked you should be asking them to change it when they log in anyway!

It's probably worth brute forcing those passwords themselves and invalidating the weak ones.

0
0

RIM execs chewed through restraints after in-flight fracas

catphish

A company not to consider working for

The post is required, and must contain letters.

2
32

AmEx 'debug mode left site wide open', says hacker

catphish
Facepalm

Re: PCI DSS anyone

If only PCI DSS covered points as sensible as this.

It doesn't.

0
0

ISPs get flimsy self-help leaflet on net speed ads

catphish
Unhappy

Unlimited

I'm totally confused as to why "up to" gets so much bad press, when it is both clear and true. Yet, at the same time 'unlimited' gets almost no coverage despite in many cases being a blatant lie.

3
0

Anonymous unsheathes new, potent attack weapon

catphish

Use the police

1) An application layer attack prevents the possibility of spoofing an IP address, so every source will be identifiable.

2) Ask the police to go and knock on the door of every location originating these attacks.

3) The police will meet one of 2 people: some kid's parents, or a Tor exit owner who might reconsider running their node if this is what it is being used for.

If the chance of the police showing up at your door were 50% instead of 0.001% then maybe they'd think twice. I'd never suggest that people be prosecuted because their network was being used illegally, but a visit from the police can be very persuasive.

0
0

Forums