The company is hanging on to the mobile operating system, according to multiple sources, but will submit it to the open source community. HP plans to make the source code available to software developers under an open source arrangement, which will give other hardware manufacturers the ability to work with it.
PATRIOT Act and privacy laws take a bite out of US cloud business
Microsoft’s managing director in the UK, Gordon Frazer, made that admission in June at the Office 365 launch in London. After researching the PATRIOT act, Microsoft found that regardless of where data was stored, it could not ensure that data would not be turned over to the US government as the result of a National Security Letter or other government request, because the company is governed by US law.
via PATRIOT Act and privacy laws take a bite out of US cloud business.
4.3 Dealing with Static ARP Tables
If the LAN you are sniffing uses static ARP mapping, or retains ARP information for a very long time, normal ARP poisoning will not work because each host ignores any ARP Reply messages you send.
Arp Cache Poisoning and Packet Sniffing
Arp cache poisoning puts the attacker in position to intercept communications between the two computers. Computer A believes it is communicating with Computer B, but because of the poisoned arp table, the communication actually goes to the attacker’s computer. The attacker can then either respond to Computer A (pretending to be Computer B), or simply forward the packets to its intended destination, but only after the packet information is captured and logged for later use by the attacker. Likewise, the response from Computer B can be captured and logged by the attacker, who has also used Arp poisoning to make Computer B think the attacker’s computer is Computer A. This type of attack is known as Man in the Middle attack.
via Arp Cache Poisoning and Packet Sniffing – ADMIN | The resource for all system administrators.
Packet injection tool suite
Nemesis is a command-line network packet crafting and injection utility for UNIX-like and Windows systems. Nemesis, is well suited for testing Network Intrusion Detection Systems, firewalls, IP stacks and a variety of other tasks. As a command-line driven utility, Nemesis is perfect for automation and scripting.
Nemesis can natively craft and inject ARP, DNS, ETHERNET, ICMP, IGMP, IP, OSPF, RIP, TCP and UDP packets. Using the IP and the Ethernet injection modes, almost any custom packet can be crafted and injected.
TrueCrypt
Main Features:
- Creates a virtual encrypted disk within a file and mounts it as a real disk.
- Encrypts an entire partition or storage device such as USB flash drive or hard drive.
- Encrypts a partition or drive where Windows is installed (pre-boot authentication).
- Encryption is automatic, real-time (on-the-fly) and transparent.
- Parallelization and pipelining allow data to be read and written as fast as if the drive was not encrypted.
- Encryption can be hardware-accelerated on modern processors.
- Provides plausible deniability, in case an adversary forces you to reveal the password:Hidden volume (steganography) and hidden operating system.
More information about the features of TrueCrypt may be found in the documentation.
Port 4070/tcp tripe Protocol and Security Information | What is port 4070/tcp?
Port Number: 4070/tcp (Windows 7/Windows Vista/ Windows XP/Windows Server family)
Trivial IP Encryption (TrIPE)
Protocol Used : tripe
Service Type : tripe
Known Port 4070/tcp exploits: Yes
Known Port 4070/tcp Security Risks: Yes
via Port 4070/tcp tripe Protocol and Security Information | What is port 4070/tcp?.
Spotify uses this.
Tablet priced under $100 with Android 4.0 surfaces
Ainol’s Novo7 tablet has a 7-inch capacitive screen and runs on a 1GHz single-core MIPS processor, said MIPS Technologies and chip maker Ingenic in a joint press release. The tablet’s battery lasts eight hours on watching video, seven hours when browsing the Web and six hours when playing games.
The tablet runs on Google’s Android 4.0, code-named Ice Cream Sandwich, which is the successor to Android 3.0, code-named Honeycomb, which is found on the more advanced tablets today.
via Tablet priced under $100 with Android 4.0 surfaces | ITworld.
Biquad Antenna Construction
This page details the construction of a biquad antenna. The biquad antenna is easy to build, and provides a reliable 11dBi gain, with a fairly wide beamwidth.
Tomato Firmware: Increased Transmit Power Does More Harm Than Good?
I had turned the routers up to 80 mW and the problem was still occurring. Upon some research I found that as the Transmit power levels of the routers increased, so did the radio noise produced by the routers. I decided to turn the routers back down, to a level lower than when I first began to administer the network. After this change, users noticed an immediate improvement in the quality of their wireless connections. Everything was (and still is) running stable. The users are no longer losing Internet connection and are maintaining proper network speeds.
via Tomato Firmware: Increased Transmit Power Does More Harm Than Good? | Techerator.
I’m seeing the same thing with the Tomato firmware. The firmware is nicer than Linksys but I thought increasing the power of this router would increase the range but I suppose it’s more complicated than that.