Is Logical Data Modeling Dead?

The key to getting people to at least appreciate logical data models is to just do them as part of whatever modeling effort you are working on. Don’t say “stop”. Just model on. Demonstrate, don’t tell your teams where the business requirements are written down, where they live. Then demonstrate how that leads to beautiful physical models as well.

Source: Is Logical Data Modeling Dead? | InfoAdvisors Blog

Yes, we can validate the Wikileaks emails

DKIM is a system designed to stop spam. It works by verifying the sender of the email. Moreover, as a side effect, it verifies that the email has not been altered.

Hillary’s team uses “hillaryclinton.com”, which as DKIM enabled. Thus, we can verify whether some of these emails are true.

Source: Errata Security: Yes, we can validate the Wikileaks emails

I was just listening to ABC News about this story. It repeated Democrat talking points that the WikiLeaks emails weren’t validated. That’s a lie. This email in particular has been validated. I just did it, and shown you how you can validate it, too.

“Most serious” Linux privilege-escalation bug ever is under active exploit

The vulnerability, a variety known as a race condition, was found in the way Linux memory handles a duplication technique called copy on write. Untrusted users can exploit it to gain highly privileged write-access rights to memory mappings that would normally be read-only. More technical details about the vulnerability and exploit are available here, here, and here. Using the acronym derived from copy on write, some researchers have dubbed the vulnerability Dirty COW.

Source: “Most serious” Linux privilege-escalation bug ever is under active exploit (updated)

Schiaparelli Mars probe’s parachute ‘jettisoned too early’

For the moment, all Esa has to work with is the relatively large volume of engineering data Schiaparelli managed to transmit back to the “mothership” that dropped it off at Mars – the Trace Gas Orbiter.

Source: Schiaparelli Mars probe’s parachute ‘jettisoned too early’ – BBC News

But officials here have tried to emphasise Schiaparelli’s role as a technology demonstrator – a project to give Europe the learning experience and the confidence to go ahead with the landing on Mars in 2021 of an ambitious six-wheeled rover.

Say hello to .google and other branded internet addresses

Google’s website is at the fore of an expected boom in websites taking advantage of a 2-year-old change in internet rules that lifted the limits for these suffixes, called top-level domains. That’s brought .paris, .movie and .xyz to websites and email addresses.

Source: Say hello to .google and other branded internet addresses – CNET

Stop Trying to Fix the User

We must stop trying to fix the user to achieve security. We’ll never get there, and research toward those goals just obscures the real problems. Usable security does not mean “getting people to do what we want.” It means creating security that works, given (or despite) what people do. It means security solutions that deliver on users’ security goals without­ — as the 19th-century Dutch cryptographer Auguste Kerckhoffs aptly put it­ — “stress of mind, or knowledge of a long series of rules.”

Source: Security Design: Stop Trying to Fix the User – Schneier on Security

FTC Report Sheds New Light on How Patent Assertion Entities Operate; Recommends Patent Litigation Reforms

“The FTC recognizes that infringement litigation plays an important role in protecting patent rights, and that a robust judicial system promotes respect for the patent laws. Nuisance infringement litigation, however, can tax judicial resources and divert attention away from productive business behavior,” the report states. With this balance in mind, the FTC proposes reforms to:

  • Address the imbalances between the cost of litigation discovery for PAE plaintiffs and defendants;
  • provide the courts and defendants with more information about the plaintiffs that have filed infringement lawsuits;
  • streamline multiple cases brought against defendants on the same theories of infringement; and
  • provide sufficient notice of these infringement theories as courts continue to develop heightened pleading requirements for patent cases.

Source: FTC Report Sheds New Light on How Patent Assertion Entities Operate; Recommends Patent Litigation Reforms | Federal Trade Commission

How does iptables hashlimit module work?

Hashlimit is an iptables module that allows one to define rules that in effect will limit traffic speed (bytes / time unit) or frequency (connections / time unit) per target or origin ports / IPs. The inner workings of this module and / or how to make it work correctly remains a mystery for many.

Hashlimit is also close friends with the limit module, only much more powerful, capable of expressing rate limiting per source IP (for example) in a single rule.

Source: Stuff I do: How does iptables hashlimit module work?

IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes

“Going beyond 1 Gb/s with existing Cat5e and Cat6 cables was little more than a talking point two years ago. But now with NBASE-T, we have the ability to extend the life of an enormous asset —your wired network. The Cat5e and Cat6 installed in just the last 15 years now exceeds an estimated 70 billion meters of cabling, which is more than 10 trips to Pluto,”

Source: IEEE sets new Ethernet standard that brings 5X the speed without disruptive cable changes

How to permanently stop Windows 10 reboots after installing updates

If you do not want to wait for Anniversary Update (which will be released in July 2016) or if Active Hours is not a solution for you, you can permanently stop Windows 10 reboots after updates are installed if you follow the steps below.

via How to permanently stop Windows 10 reboots after installing updates

Just bought a refurbished I7 machine with Windows 10 Home edition to use for gaming  and run VMs via Virtual Box.  The VMs need to be up 24/7 if they are an active unit.   This box has a lot of RAM so it can run many VMs.  Microsoft brought them all down last night with an update then reboot.  This is totally unacceptable.  Most of the solutions on the web using gpedit.msc or regedit do not work on Windows Home since we are the lowest OS on the MS totem pole.

The procedure in the above website worked for Windows 10 Home.   Now I just have to wait a week or so to see if it really stops the auto reboot.  I don’t mind having to queue up updates that require reboot.  VMs  need to be shutdown gracefully.  Many people use their computers for doing things other than consuming mass media.