Tuesday, March 28, 2006

New Server.

Originally uploaded by zeusfaber.
This is the new server that my brother and I bought. (more pics on Flickr) Dell PowerEdge 2550: 2GB of ECC RAM, 4 x 18GB SCSI drives and two Pentium 3 1GHz processors. Pretty sweet box.

Watch out Google, we are coming for ya!!

Sunday, March 26, 2006

Update to my Homeland Security Post

Here is a good example of what I was talking about: "Terrorist 007, Exposed". Here's an excerpt:

In one instance, Irhabi posted a 20-page message titled "Seminar on Hacking Websites," to the Ekhlas forum. It provided detailed information on the art of hacking, listing dozens of vulnerable Web sites to which one could upload shared media. Irhabi used this strategy himself, uploading data to a Web site run by the state of Arkansas, and then to another run by George Washington University. This stunt led many experts to believe -- erroneously -- that Irhabi was based in the United States.

Irhabi used countless other Web sites as free hosts for material that the jihadists needed to upload and share. In addition to these sites, Irhabi provided techniques for discovering server vulnerabilities, in the event that his suggested sites became secure. In this way, jihadists could use third-party hosts to disseminate propaganda so that they did not have to risk using their own web space and, more importantly, their own money.

Trust me, it's not going to get any better.

Thursday, March 16, 2006

Department of Homeland Security

My rant for the week:

If this doesn't cook your noodle I'm not sure what will. Read: DHS Gets Another F in Computer Security.

The Department of Homeland Security, which is charged with setting the government's cyber security agenda, earned a grade of F for the third straight year from the House Government Reform Committee.

This is not a good situation. I think about this...If you wanted to cause irreputable harm to the US without touching our soil or air space, how would you do it? Attack the government and corporate computer systems. Don't think for a second that terrorist groups and countries alike have not started preparing for just that. I don't want to sound fanatical but this could be the types of things we see in the next wave of terrorism and for that matter warfare in general. Luckily this will likely lead to no innocents dying, but may lead to the demise of corporate and government assets and privacy.

The worst part about this is that the people that run the government and the people who elect them are not aware of this notion of computer security. These are likely the same people that have a post-it note on their monitor with their password on it. Change of this type will have to come from the bottom, young people that are computer knowledgable eventually growing up and running this country and it's businesses. Sadly, I doubt that we have that much time before the cyber version of 9/11 happens.

Wednesday, March 08, 2006


For those of us whom have seen too much South Park and think Mung is some perverted word I give you the actual definition in this "Blogs" context.

Wikipedia Definition of Mung