Archive for the “General” Category

Well with the claim of Anonymous‘ attempt to take down the internet a couple days ago(which they denied), one of the words that keep popping up is

“…the use of computers and computer networks as a means of protest to promote political end”hacktivist. According to wikipedia defines hacktivism as

This is not to be confused with hacktavision, which is hacking your old activision game console to play mame games.

I am curious as to what these people are protesting as all I ever seem to hear is that they are attacking someone to protest something. I personally don’t feel that a protest has as much weight as individuals publicly voicing there opinions. Anonymity seems to fall into obscurity in my opinion. Now if you tell everyone who you are and still hacktivate an attack, always remember, it’s the martyr that gets all the credit.

Further Reading:

 

Comments No Comments »

Post Office Protocol (POP) is one of the protocols used to retrieve mail from an email server. The term is generally used that email is ‘popped’ of the server and stored on the client. The most commonly used version is POP3.

Further Reading:

Comments No Comments »

Contrary to popular media, the CSI has been around for nearly forty years. Their focus is computer and network security, not creating hokey computer references to catch criminals.

Further reading:

Comments No Comments »

Google has announced the end of their on-line collaboration tool, Google Wave. Having obtained a beta invitation, I tested out the tool and found that, while the concept was promising, the usefulness was lacking. The fact they tried to market it as an e-mail replacement was a bit annoying. While email does have its problem, the basic protocol for mail will be hard to replace.  This announcement comes on the heels of Google announce they would also stop production on Google Buzz. Personally, it seems Google was trying to be first in creating the next big thing. And while they tried to generate a lot of Buzz, I think it is time to Wave goodbye to these apps.

Comments No Comments »

According to Apache’s web site for FAQ:

Why the name “Apache”?
The name ‘Apache’ was chosen from respect for the Native American Indian tribe of Apache (Indé), well-known for their superior skills in warfare strategy and their inexhaustible endurance. For more information on the Apache Nation, we suggest searching Google, or AllTheWeb.

Secondarily, and more popularly (though incorrectly) accepted, it’s a considered cute name which stuck. Apache is “A PAtCHy server”. It was based on some existing code and a series of “patch files

I find the use of ‘it’s a patchy server’ to be a misnomer as it could apply to any type of server, whether running apache or not. Check your sources people.

Comments No Comments »

Many say that this isn’t a legitimate way of securing your data, but my personal opinion is ‘If no-one gets your data… it’s legitimate!” Sometimes its easier to guess a persons actions than their skillz, as a results, I present the following:

Hackersafe

http://xkcd.com/916/

Comments No Comments »

DEF CON 19 will be at the Rio Hotel and Casino August 4-7, 2011! Price of admission is $150 cash at the door for the entire con.

http://www.defcon.org/

Comments No Comments »

FrOSCon, the conference for Free and Open Source Software, has announced a ‘Call for Papers’. This request is for submissions on Lectures and workshops for the 6th annual convention. FrOSCon will be held on August 20th – 21st in Sankt Augustin, Germany.

Comments No Comments »

Having started multiple blogs and not really having time for any. I found a, thus far, nice utility  for blogging. The utility is a chrome extension called ScribeFire, and it lets you post an article on multiple blogs. I fine this desirable as I have not crossed posted because of the hassle of logging into another interface, cut-n-paste, check the format, and what ever else violates my head in the process. This extension allows me to write an article, select a blog sight and add the article to the site.

This will be the first post using the extension across multiple sites. Please feel free to ask any questions.

Comments No Comments »

In information technology, a wrapper is data that precedes or frames the main data or a program that sets up another program so that it can run successfully.

  1. On the Internet, “http://” and “ftp://” are sometimes described as wrappers for the Internet addresses or Uniform Resource Locator URL that follow. A set of bracketing symbols (such as < and >, used here to wrap the word “and”) are also sometimes referred to as wrappers .
  2. In programming, a wrapper is a program or script that sets the stage and makes possible the running of another, more important program.
  3. In data transmission, a wrapper is the data that is put in front of or around a transmission that provides information about it and may also encapsulate it from view to anyone other than the intended recipient. A wrapper often consists of a header that precedes the encapsulated data and the trailer that follows it.
  4. In database technology, a wrapper can be used to determine who has access to look at or change the data that is wrapped.

Comments No Comments »