Berkeley CSUA MOTD:Entry 24222
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2018/10/16 [General] UID:1000 Activity:popular
10/16   

2002/3/25-26 [Computer/SW/Security] UID:24222 Activity:moderate
3/25    Has anyone heard about the CBDTPA?
        http://www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html
        It will be a disaster if this thing gets passed.
        \_ No one has ever heard of this or the SSSCA before.
           \_ dude! i just found the greatest web site! you should
              check it out: http://slashdot.org
              \_ cool thanks!  its looks really low end and new are they
                 working on improving it at all?  it might stand a chance!
                 "community" $ell$!!
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2018/10/16 [General] UID:1000 Activity:popular
10/16   

You may also be interested in these entries...
2013/10/24-11/21 [Computer/Companies/Apple] UID:54747 Activity:nil
9/19    "No, A Severed Finger Will Not Be Able to Access a Stolen iPhone 5S"
        http://mashable.com/2013/09/15/severed-finger-iphone-5s
        I'm sure the Apple QA department has tested extensively that a severed
        finger will not be able to access a stolen iPhone 5S.
        \_ It doesn't matter whether or not a severed finger can be used.  It
           matters whether or not a robber thinks that a severed finger can be
	...
2013/6/6-7/31 [Politics/Foreign/Asia/China, Computer/SW/Security] UID:54690 Activity:nil
6/6     Wow, NSA rocks. Who would have thought they had access to major
        data exchangers? I have much more respect for government workers,
        crypto experts, mathematicans now than ever.
        \_ flea to Hong Kong --> best dim-sum in the world
           \_ "flee"
        \_ The dumb ones work for DMV, the smart ones for the NSA. If you
	...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2012/8/7-10/17 [Computer/SW/Security] UID:54455 Activity:nil
8/6     Amazon and Apple have lame security policies:
        http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-hacking/all
        "First you call Amazon and tell them you are the account holder, and
         want to add a credit card number to the account. All you need is the
         name on the account, an associated e-mail address, and the billing
         address. "
	...
2012/7/18-8/19 [Health/Men, Computer/SW/Security] UID:54438 Activity:nil
7/18    "Largest penis record holder arouses security suspicions at airport"
        http://www.csua.org/u/x2f (in.news.yahoo.com)
        \_ I often have that same problem.
        \_ I think the headline writer had some fun with that one.
           \_ One time when I glanced over a Yahoo News headline "U.S. busts
              largest-ever identity theft ring" all I saw was "U.S. busts
	...
Cache (3902 bytes)
www.politechbot.com/docs/cbdtpa/hollings.s2048.032102.html
To regulate interstate commerce in certain devices by providing for private sector development of technological protection measures to be implemented and enforced by Federal regulations to protect digital content and promote broadband as well as the transition to digital television, and for other purposes. FEINSTEIN) introduced the following bill, which was read twice and referred to the Committee on A BILL To regulate interstate commerce in certain devices by providing for private sector development of technological protection measures to be implemented and enforced by Federal regulations to protect digital content and promote broadband as well as the transition to digital television, and for other purposes. Be it enacted by the Senate and House of Representatives of the United States of America assembled, 2 SECTION 1. Adoption of security system standards and encoding rules. Prohibition on shipment in interstate commerce of nonconforming digital media devices. Prohibition on removal or alteration of security technology: violation of encoding rules. The Congress finds: The lack of high quality digital content continues to hinder consumer adoption of broadband Internet service and digital television products. Owners of digital programming and content are increasingly reluctant to transmit their products unless digital media devices incorporate technologies that recognize and respond to content security measures designed to prevent theft. Because digital content can be copied quickly, easily, and without degradation, digital programming and content owners face an exponentially increasing piracy threat in a digital age. Current agreements reached in the marketplace to include security technologies in certain dig- 3 ital media devices fail to provide a secure digital environment because those agreements do not prevent the continued use and manufacture of digital media devices that fail to incorporate such security technologies. Other existing digital rights management schemes represent proprietary, partial solutions that limit, rather than promote, consumers' access to the greatest variety of digital content possible. Technological solutions can be developed to protect digital content on digital broadcast television and over the Internet. Competing business interests have frustrated agreement on the deployment of existing technology in digital media devices to protect digital content on the Internet or on digital broadcast television. The secure protection of digital content is a necessary precondition to the dissemination, and on-line availability, of high quality digital content, which will benefit consumers and lead to the rapid growth of broadband networks. The secure protection of digital content is a necessary precondition to facilitating and has- 4 tening the transition to high-definition television, which will benefit consumers. Much of this activity is illegal, but demonstrates consumers's desire to access digital content. ADOPTION OF SECURITY SYSTEM STANDARDS AND ENCODING RULES. COMMISSION MAY REVISE STANDARDS AND RULES THROUGH RULEMAKING. An interactive computer service shall store and transmit with integrity any security measure associated with standard security technologies that is used in connection with copyrighted material such service transmits or stores. PROHIBITION ON SHIPMENT IN INTERSTATE COMMERCE OF NONCONFORMING DIGITAL MEDIA DEVICES. PROHIBITION ON REMOVAL OR ALTERATION OF SECURITY TECHNOLOGY; The provisions of section 1203 and 1204 of title 17, United States Code, shall apply to any violation of this Act as if -- a violation of section 5 or 6 of this Act were a violation of section 1201 of title 17, United States Code; This Act shall take effect on the date of enactment of this Act, except that sections 4, 5, and 6 shall take effect on the day on which the final rule published under section 3 or takes effect.
Cache (4017 bytes)
slashdot.org -> slashdot.org/
Will this signal new life for the console, or is it too little, too late? We linked to leaked pictures of the N-Gage follow-up late last week on Slashdot Games , and theres further information at GameSpot , which mentions: When bundled with a service contract, the QD is expected to sell for $99. Without subsidy from a service provider, the phone will go for $199 with the platforms Tony Hawk title bundled in at that price. Posted by timothy on Wednesday April 14, 12:21AM from the it-would-have-been-someone dept. Shippy writes Ten years ago today, a pair of Arizona attorneys launched a homemade marketing software program that forever changed the Internet. They did this by whipping up a Perl script that flooded message boards advertising their legal services. Update: 04/14 05:26 GMT by S : Thatd be ten years ago, not twenty. JigSaw writes Well known Lycoris person Jason Spisak left the company to join Element Computer , a new hardware company which now strives to offer the Apple experience on PCs: they sell Linux-certified modern hardware with their own flavor of Debian, ION Linux. ION is a desktop distro and it is developed specifically to work perfectly with the accompanied hardware. Other highlights include usage support as opposed to installation-only support other distros provide and system upgrades specific to the exact hardware the user runs. The KDE-based distro will only sell with their hardware as Mike Hjorleifsson says in his interview . Free Software Foundation writes Stanford Professor Lawrence Lessig was elected to the Free Software Foundations Board of Directors on March 28, 2004. With Eben Moglen, the two most prominent academic legal minds on the subject of copyleft licensing now both serve as Directors of the Foundation. Professor Lessigs involvement will undoubtedly give a major boost to the FSFs ongoing efforts to neutralize legal threats to software freedom. The flaws could allow attackers to break into PCs running Windows in several ways and then use the system to run malicious programs and steal or delete key data. These latest security flaws affect the latest versions of Windows, including Windows NT 40, Windows 98, Windows 2000 , Windows XP, as well as software for networked computers such as Windows NT Server and Windows Server 2003. Despite the growing success of the Open Source movement, most of the general public continues to feel that Open Source software is inaccessible to them. This paper discusses five fundamental problems with the current Open Source software development trend, explores why these issues are holding the movement back, and offers solutions that might help overcome these problems. What do you think of the issues given in this paper, and how do you think the Open Source community should address these issues? Analog, wind-up Analog, battery-powered Analog, solar-powered Digital Digital w/calculator Digital w/mp3 player Digital w/cell phone Implant Results Polls Comments: 953 Votes: 23320 Book Reviews Need something to read? Slashdots book review section is full of reader-submitted reviews of books you should know about. Preston Tollingers review of Bruce Schneiers security overview Beyond Fear : should be required reading for members of Congress. Honestpucks review of Managing Linux Systems With Webmin : a good guide to using Webmin, flawed by lack of structure. Fancellus review of Extreme Programming Refactored : a critical look at the popular XP development method. Alex Moskalyuks review of the Secure Programming Cookbook for C and C : a security cookbook that teaches you how to make a basic ham-and-cheese sandwich as well as fine cuisine. Neads review of Automating Unix and Linux Administration : How to leverage the power of a few common tools to significantly reduce the time and effort system administrators spend doing their jobs. Just read Slashdots book review guidelines , and then use the web submission form . Updated: 20031013 17:00 by timothy Quick Links Cool Sites: AnimeFu Addicted to Anime?