* Posts by mike acker

76 publicly visible posts • joined 1 Jul 2012

Page:

Browser makers rush to block fake Google.com security cert

mike acker

Glossing over a Critical Security Requirement

as I have noted in the past: the fundamental error here is that HTTPS bypasses the requirement for users to authenticate keys

this requirement is carefully detailed by Phil Zimmerman in his original PGP documentation in the section "Protecting keys from tampering"

HTTPS did not follow his requiremnts and got what they deserved

anyone using PGP ( or by extension x.509 certificates ) should generate their own keypair and sign any certificate that is used in a critical system. it should be noted that MSFT already does this for critical security bulletins .

the IT industry again is guilty of glossing over a critical requirement in favor of convenience

getting hacked ain't gonna be convenient

Three little words stall UN's 'bid for INTERNET DOMINATION'

mike acker

remember what Geo Orwell taught us:

"The Greate Enemy of Clear Language is INSINCERITY

EU joins Google, hippies, Uncle T Cobbleigh in fight against ITU

mike acker

lookup the International Covenant on Civil and Political Rights

Freedom of expression is subject to the following restrictions:

these shall only be such as are provided by law and are necessary:

1. For respect of the rights or reputations of others;

2. For the protection of national security or of public order (ordre public), or of public health or morals

it is obviously easy for a tyrant to bend the meaning of the above

The GPL self-destruct mechanism that is killing Linux

mike acker

as far as MSFT v Linus goes MSFT is its own enemy while Linus has an unlimited pool of allies generating Open Source Software.

The result: MSFT attempting to cram their style onto us (and make us pay for their stuff); Linus offering Freedom as the alternative at n/c

how will this play?

I think MSFT is retreating to the mobil and gaming area, leaving the desk workstations to Linus -- which various versions of Linux have already won the field for servers

as MSFT pushes into the mobil/gaming field they will face Google and Android on their other flank though...

"Half a league, Half a League, Half a League, onward ...

Android, heal thyself

mike acker

AppArmor

the thing Android needs is AppArmor for every App.

put an end to apps messing around where they should not be messing.

Mayer wants Yahoo! to be the world's mobile portal of habit

mike acker

she faces the Fundamental Internet Battle head on: Privacy v Advertising and Market Research

Google and Amazon have good models. social is a bad model and will soon be generally disdained

Salesforce CEO Benioff: Win 8 is 'the end of Windows'

mike acker

Fragments: Entertainment | Industry

IMHO ( which is free ) the industry is fragmenting,-- with the entertainment and business sectors going separate ways.

Win8 is going into the entertainment & Gaming business.

Canonical/Linux will pick up business computing.

why?

Windows is a hacker's paradise that is beyond repair.

Not so fast, T-Mobile: Sprint may bid for MetroPCS

mike acker

NEXTEL Refugee

as a NEXTEL refugee we looked at Sprint and then switched to T-Mobil. Sprint basically bought up NEXTEL -- and then wrecked it. The NEXTEL phones were better and so was the old iDEN net.

Firefox's birthday present to us: Teaching tech titans about DIY upstarts

mike acker

understanding the "cloud"

=" Music and other content are easier to move, but still painful."

ah, --understanding!! the "cloud" wants to own your entertainment properties and just lease the use of them to you

cloud must be resisted at every juncture.

cloud ain't "whats happening" it is a method of control that the industry is attempting to foist upon consumers

Windows 8: Never mind Office, it's for GAMING

mike acker
Linux

Bad decisions trace back to the 5150

MSFT has been built on decisions that can be traced back to the IBM 5150. The 5150 was intended to compete with Atari, PDP8s, 11s, Comedores, Vic 20s. A different line of development, these machines were intended to be easy to modify. and they succeeded in that and no one can deny that that has resulted in a lot of program development

but to use such machines for sensitive applications -- which deal with money or sensitive information -- you need a machine for which you can assert exclusive control. that was not a design objective with the early toy computers. the issue wasn't addressed at MSFT until 1-15/2002 when Gates wrote his now famous letter re. security to be Job 1.

the makers of android are facing this problem today having learned nothing from the debauch of windows...

we may well be poised upon a new doorway where we will recognize that it important to have 2 types of computers: one type for play -- another for use with commercial or sensitive information requirements. The later will not be a derivitive of the 5150/Windows line: it'sd too late to correct them.

The iPHONE 5 UNDERMINES western DEMOCRACY: 5 reasons why

mike acker
Pirate

iDIOT pHONE

iDIOT pHONE

who needs one?

Why is the iPhone so successful? 'Cause people love 'em

mike acker
Flame

anti aapl

theres gonna be more of us as a result of aapl having become a patent troll

You'll be on a list 3 hrs after you start downloading from pirates - study

mike acker

new music and video model

notes

it seems there are elements of the 'net that would love to inventory every computer attached to the 'net

particularly MUSIC and VIDEO libraries

it appears this business is in a state of flux,... it appears the New Model is: you don't own any copies. Copies are to be kept in Cloud Libraries operated by licensed vendors. when you establish an account your will be placed on the Access List and given access to those assets you have paid the access fee for...

in this model if you have any titles on YOUR computer you are ipso facto a pirate

think about it

i only noticed this recently when Amazon changed their download procedures...

Why Java would still stink even if it weren't security swiss cheese

mike acker

Computers: a market research tool

unfortunately there are a lot of folks working with computers today that see computers as the ultimate market research and advertising tool. for this they assert their ability to run their programs on your computer.

preventing this means controlling what their programs are allowed to do -- on your computer. My suggestion is: switch to Linux. I have a Ubuntu box working now.

the interesting thing about Linux is: Security. You can create a user account just for e/mail and browsing. By default -- working from that logon -- you -- or any program you are running -- hence an intruder -- can only modify files in the home directory associated with that user.

you still need to take care however: If you share a directory out from your browser user account and then extract an html document from that shared directory -- you are pulling a copy of the intruders java with that document . You could of course open the document with LibreOffice and then save it as text -- before you remove it from the shared directory.

just depends on whether tin foil is enough or if you need a helmet

1 MILLION accounts leaked in megahack on banks, websites

mike acker

SQL Injection

SQL Injection is an old, known attack. the defense is (1) use only stored procedures and (2) sanitize input data.

getting hacked via SQL Injection is simple negligence on the part of the system operations staff. they should incur the $$$ liability for this.

Phone-flingers flock to Finland for World Championships

mike acker

hopefully they also have a contract burning bonfire

IEEE admits its MS-DOS history revisionist is in Microsoft's pay

mike acker

Re: QDOS vs CP/M

="The limit came from the address pins because there were only 20 of them."

the decision to use 20 rather than 24 address lines was taken during the design phase of the chip.

mike acker

Re: QDOS vs CP/M

it is important to remember that at the time of the 5150 IBM did not want the 5150 to have enough guts to threaten its regular business products. that is why CP/M was NOT authorized for the 5150. Rather the junk O/S was scrounged up from experimenters. too you'll remember the segment offset was carefully limited to 4 bits -- limiting the 5150 and derivitives to 1MB memory

Gabe Newell: Windows 8 is a 'catastrophe' for PC biz

mike acker

Re: thank you and goodbye

Wir sehen den Beginn des Untergangs von microsoft

mike acker

Re: I see what you did there!

yep, i have no interest in games

but i do have a great interest in security and Linux makes windows look like a festival of fools

Anonymous vows to wipe web clean of child abuse scum

mike acker

Anon Computer Group

this morning I'm playing some Joan Baez music and have renamed my file for the Anon Computer Group

Shuttleworth: Why Windows 8 made us ditch GPL Linux loader

mike acker

UEFI

this is a critical move and a very good one. if we can design a mechanism that can verify the initial load of the o/s then the o/s should be able to check itself as it finishes loading.

the danger remains in the attacker possibly being able to flash the bios or somehow modify the firmware used in the initial process. attackers have always preferred to inject their un-authorized programming into the system at the lowest level

of course if the O/S is secure -- and it receives a BIOS update signed by the OEM -- then it would be expected that it would be safe to accept the update. but if the O/S were compromised, uuuugh

all of which goes back to the note that security is like a balloon: 1 pin-prick and POP! it's gone.

Facebook: Our phone app DID seize your email

mike acker

bug?

yeah, whatever

ITC denies Apple an emergency ban on ALL HTC PHONES

mike acker

my i 305 did that

a patent that allows folks to isolate data such as phone numbers in emails and then call the number.

??

my i 305 does that and i've had it for 5 years

mike acker

a patent that allows folks to isolate data such as phone numbers in emails and then call the number.

??

my i305 does that and I've had it for 5 years

Second win for Apple as Galaxy Nexus sales banned in US

mike acker

marketing muscle

marketing in the courts

apple is a RICO and that should come up in court

Page: