Other Posts

How to Stop Distant Attacks on RFID Chips

The limited power and processing ability of RFID chips makes them vulnerable to attackers operating at a distance. A new protocol could tackle this problem. One drawback with RFID chips is their inability to know the distance of any device that is interrogating them. That allows a malicious user to attack from a distance, more or less at leisure and […]

April 17, 2010 · 0 comments · security
Is Android Evil?

Is Android Evil?

You thought Android was open? The Android governance model consists of an elaborate set of control points that allows Google to bundle its own services and control the exact software and hardware make-up on every handset. All this while touting the openness rhetoric that is founded on the Apache permissive license used in the Android SDK. Indeed, Google’s mobile platform […]

April 16, 2010 · 0 comments · android

Traffic Mining Firewall Logs Could Improve Network Security

A firewall is the safety barrier between a computer network and the outside world. Individuals, companies and large organizations alike rely on a firewall being robust enough to fend off hackers attempting to break into a computer system. However, managing the firewall rules that decide between online friend and foe has proved to be complex, error-prone, expensive, and inefficient for […]

April 16, 2010 · 1 comment · security
ClearOS

ClearOS

ClearOS is a Linux distribution derived from RedHat and CentOS. Formerly known as Clark Connect, it is developed and maintained by the Clear Foundation, an IT solutions provider based in Wellington, New Zealand. It is modular in design, with the base OS and all modules free to download and use. However, updates to the most mission-critical modules are fee based. […]

April 16, 2010 · 0 comments · Firewall and Router

How essential is anonymity to peer to peer relationality?

How essential is anonymity to peer to peer relationality? I believe answering that question becomes easier if we look at the historical development of relationality and that such a review may lead us to challenge any simplistic identification of peer to peer relationality with anonymity. For starters, let us broadly define peer to peer relationality, as that type of relationality […]

April 15, 2010 · 0 comments · privacy and licensing

Open Source Education

Open source or software freedom isn’t simply another way of procuring software, it’s more a state of mind, a particular attitude to technology. Of course, you can just treat it as a cheap way of getting high quality, robust code, and there’s certainly no requirement to grow a beard, wear sandals or drink real ale in order to install open […]

April 15, 2010 · 0 comments · miscellaneous