Archive

Category Archives for "Networking"

Admin of anonymous, Tor-friendly email service has electronics seized at US border

If you don’t live in the US and run an anonymous, Tor-friendly email service – such as one used by 4chan and 8chan – sadly, it’s a pretty decent bet that you would experience some drama when entering the US. At least that was the case for Vincent Canfield as he was detained by US Customs and Border Protection and had all of his electronics seized by the agency. He is originally from the US, but currently resides in Romania.Canfield, the admin of the cock.li e-mail hosting service, came to vacation in the US after attending the 33rd Chaos Communication Congress held in Germany during December. He claims CBP detained him for over three hours, asking “lots of strange” and “some offensive questions” about his personal life. He refused to comply and instead gave them his attorney’s contact information. Agents allegedly demanded that he decrypt his phone so they could “make sure there isn't any bad stuff on there.” Again he refused, so CPB seized the 14 electronic devices that Canfield had with him.To read this article in full or to leave a comment, please click here

Admin of anonymous, Tor-friendly email service has electronics seized at U.S. border

If you live outside the U.S. and run an anonymous, Tor-friendly email service—such as one used by 4chan and 8chan—sadly, it’s a pretty decent bet you will experience some drama when entering the U.S. At least that was the case for Vincent Canfield as he was detained by U.S. Customs and Border Protection and had all of his electronics seized by the agency. He is originally from the U.S., but he currently resides in Romania.Canfield, the admin of the cock.li e-mail hosting service, came to vacation in the U.S. after attending the 33rd Chaos Communication Congress held in Germany in December. He claims CBP detained him for over three hours, asking “lots of strange” and “some offensive questions” about his personal life. He refused to comply and instead gave them his attorney’s contact information. Agents allegedly demanded he decrypt his phone so they could “make sure there isn't any bad stuff on there.” Again, he refused, so CPB seized the 14 electronic devices Canfield had with him.To read this article in full or to leave a comment, please click here

Reading Tech Books Via The All-At-Once Method

I was recently asked by a friend to read and review a book his publisher had just released. This was a technical book on a topic I was keenly interested in, so I was happy to oblige.

I tackled the book in the way that I normally tackle technical books — a chapter a day, or maybe two chapters in a day. Technical books aren’t recreational fiction for me. I want to grasp the contents of technical books to best make use of the information. This often leads to slow reading. I mull over paragraphs and digest.

This time, I broke that habit. I wanted to get this book done quickly. I wanted the information immediately. I didn’t want to take a few weeks to get through it. Thus, I tried reading the book all at once.

Surprisingly, this worked out well. I ended up getting through the book in four sittings, which perhaps doesn’t sound like “all at once.” Bear with me. The first sitting was a single chapter. The second sitting was a single chapter. Then came the holidays and a complete disruption to my workflow. And then came the epiphany as I stared at the book post-holidays. Continue reading

25% off YETI Hopper 20 Portable Cooler – Deal Alert

The YETI Hopper 20 ice-for-days portable cooler and is tough as nails so it can be hauled anywhere you want to take it.  It features a DryHide Shell and nearly indestructible straps will stand up to an abundance of abuse in the field.  It's HydroLok Zipper is completely leakproof, eliminating spills and locking in cold.  It can hold 18 cans, a limit of rainbow trout, or 20 pounds of ice.  The YETI Hopper 20 is currently selling at the discounted price of $225, a good deal considering its $299.95 list price. See this high-end portable cooler now on Amazon. To read this article in full or to leave a comment, please click here

34% off SanDisk Connect Wireless Stick 200GB – Deal Alert

The SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 34%, from $119.99 down to $78.95. See it now on Amazon.To read this article in full or to leave a comment, please click here

34% off SanDisk Connect Wireless Stick 200GB – Deal Alert

The SanDisk Connect wireless stick is a flash drive with a unique twist -- you can access it wirelessly. Whether it's in your pants pocket, in your bag, or on the picnic table at your campsite, the Connect wireless stick lets you stream media or move files wirelessly with up to three computers, phones or tablets simultaneously. Connections are made via built-in wifi (think "hotspot"), so no external wireless or internet services are needed. A USB connection is also available, if desired. Storage on this model is a generous 200GB. Reviewers on Amazon report at least 8-10 hours of battery life on one charge. This model is currently discounted 34%, from $119.99 down to $78.95. See it now on Amazon.To read this article in full or to leave a comment, please click here

Syslog-ng Configuration For Newbies

Some time ago I was asked by my friend to recommend a cost-free solution that he could use for storing logs of his security device over network. The Linux OS with installed syslog-ng is perfectly suitable for this job because it can collect logs from any source, process them in near real-time and deliver them to a wide variety of destinations. However it was challenge to explain all the steps in an easy manner as he was a total newbie in a Linux world. For this reason I wrote a basic installation and configuration manual for him which I share with you. The manual helps you to setup syslog-ng on Ubuntu server and troubleshoot the possible issues.

1. Install Ubuntu 16.04 Server Edition

During Ubuntu installation you are asked to provide the username/password and IP settings. Once an installation process finishes, the system is rebooted. when you get your console again, login and install updates with the command:

$ sudo su
# apt-get update
# apt-get upgrade

2. Install and Configure Syslog-ng

# apt-get install syslog-ng

First, you need to download a simple configuration file that I created for you.

# cd /etc/syslog-ng/conf.d
# wget http://brezular.com/wp-content/uploads/2016/12/firewals.conf_.txt -O firewals.conf
# Continue reading

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging. The code for the Dark Internet Mail Environment (DIME) standard will become available on Github, along with an associated mail server program, said its developer Ladar Levison on Friday. DIME will work across different service providers and perhaps crucially will be "flexible enough to allow users to continue using their email without a Ph.D. in cryptology," said Levison. To coincide with its launch, Levison is also reviving Lavabit. The encrypted email service shut down in 2013 when federal agents investigating Snowden demanded access to email messages of his 410,000 customers, including their private encryption keys.To read this article in full or to leave a comment, please click here

Lavabit developer has a new encrypted, end-to-end email protocol

The developer behind Lavabit, an email service that noted leaker Edward Snowden used, is releasing source code for an open-source end-to-end encrypted email standard that promises surveillance-proof messaging. The code for the Dark Internet Mail Environment (DIME) standard will become available on Github, along with an associated mail server program, said its developer Ladar Levison on Friday. DIME will work across different service providers and perhaps crucially will be "flexible enough to allow users to continue using their email without a Ph.D. in cryptology," said Levison. To coincide with its launch, Levison is also reviving Lavabit. The encrypted email service shut down in 2013 when federal agents investigating Snowden demanded access to email messages of his 410,000 customers, including their private encryption keys.To read this article in full or to leave a comment, please click here

Apple sues Qualcomm over patent licensing and $1B in payments

A nasty spat between Apple and Qualcomm broke into public view on Friday when the smartphone maker accused the chip supplier of charging "exorbitant" licensing fees for its cellular technology.Apple is asking a Southern California court to order Qualcomm to pay it nearly $1 billion that it says Qualcomm is holding back. Apple says it is owed the money but Qualcomm is holding it back because Apple cooperated with a South Korean government investigation into Qualcomm's licensing practices.The lawsuit alleges that Qualcomm charges high licensing fees to the companies that make iPhones for Apple. Those companies pass the fees on to Apple but aren't allowed to show Apple the specifics of the licensing deals, leaving Apple unsure what it is paying for.To read this article in full or to leave a comment, please click here

New details emerge about Intel’s super-small Euclid computer for robots

Intel is getting proficient at developing small computers. First, came its Compute Sticks and then its credit-card-shaped Compute Cards.But nothing's quite like the mysterious Euclid, which is a self-contained computer the size of a thumb designed to be the brains and eyes of a robot.More details have emerged about the computer, which was announced in August and has yet to be released.The Euclid is so small and light that's possible to hold like a pen. It has a built-in 3D RealSense camera, making it like a PC fused into a Microsoft Kinect.The design makes it possible to install the Euclid where the eyes of a human-like robot would be typically placed. The 3D RealSense camera will act as the eyes of a robot, capturing images in real-time and helping with movement.To read this article in full or to leave a comment, please click here

Microsoft will soon end Office 2013 distribution through Office 365

Get ready, Office 365 administrators: Microsoft is ending support for the Office 2013 client apps that it previously distributed through its cloud-based productivity service. Instead, administrators and users will be pushed to use Office 2016, the latest version of the productivity suite that includes Word, Excel, and PowerPoint.Starting on Feb. 28, users won’t be able to download the Office 2013 apps from the Office 365 self-service portal, and they won’t be downloadable through the Office 365 Admin Center. Microsoft also won’t release feature updates for those products, and won’t provide support through Customer Service Support or Premier Support.To read this article in full or to leave a comment, please click here

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients' health records.  The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously collect physiological data and transmit it to the patients' doctors. Because electrocardiogram (ECG) signals are already collected for clinical diagnosis, the system would simply reuse the data during transmission, thus reducing the cost and computational power needed to create an encryption key from scratch.To read this article in full or to leave a comment, please click here

Researchers propose a way to use your heartbeat as a password

Researchers at Binghamton State University in New York think your heart could be the key to your personal data. By measuring the electrical activity of the heart, researchers say they can encrypt patients' health records.  The fundamental idea is this: In the future, all patients will be outfitted with a wearable device, which will continuously collect physiological data and transmit it to the patients' doctors. Because electrocardiogram (ECG) signals are already collected for clinical diagnosis, the system would simply reuse the data during transmission, thus reducing the cost and computational power needed to create an encryption key from scratch.To read this article in full or to leave a comment, please click here

Augmented reality is more than just holograms

Holographic headsets are a central theme to augmented reality (AR) today, but the recent AR in Action Conference demonstrated the diversity of the field and the potential to include many more technologies to augment humans. The AR in Action Conference, held at the MIT Media Lab, expanded the definition of AR through a TED conference-like lens, delivering 70 diverse curated talks and 32 panels over two days to over 1,000 experts and practitioners in the field. As Chris Croteau, general manager of Intel’s Wearable Device Group, said: “A liberal definition of AR focuses on the way data is presented to users and how they interact with it. The popular definition of the AR platform as a holographic projection system like the Hololens, Meta and ODG headsets limits what AR can be.”To read this article in full or to leave a comment, please click here

Cluster HAT, the easiest way to build a Raspberry Pi Zero cluster

I recently compiled a list of Raspberry Pi clusters and reader Alex Hortin wrote in to suggest I looked at a cluster framework for up to four Raspberry Pi Zeros called the Cluster HAT produced by 8086 Consultancy. In case you haven’t come across the term, the “HAT” part of Cluster HAT, means that the device implements the Raspberry Pi Foundation’s Hardware Attached on Top system for add-on hardware. The Foundation’s 2014 blog post announcing the standard explains:To read this article in full or to leave a comment, please click here

If your data lake turned into a data swamp, it might be time to take the next step

As the the leader of Deloitte’s analytics practice, Paul Roma directs the company's analytics offerings across all businesses, so he sees companies struggling with a range of issues.  Network World Editor in Chief John Dix recently talked to Roma about everything from what analytics problems companies are facing (Hint: the swamp reference above), to tools that help extract more value (cognitive analytics and machine learning), and even the executive management roles that are evolving (the title doesn’t matter much, but ownership of the problem does).  Deloitte Paul Roma, Chief Analytics Officer, DeloitteTo read this article in full or to leave a comment, please click here

The CSO guide to top security conferences

There is nothing like attending a face-to-face event for career networking and knowledge gathering, and we don’t have to tell you how helpful it can be to get a hands-on demo of a new tool or to have your questions answered by experts.Fortunately, there are plenty of great conferences coming up in the months ahead.If keeping abreast of security trends and evolving threats is critical to your job — and we know it is — then attending some top-notch security conferences is on your must-do list for 2017.From major events to those that are more narrowly focused, this list from the editors of CSO, will help you find the security conferences that matter the most to you.To read this article in full or to leave a comment, please click here(Insider Story)