Tag Archives: security

Adding the Brain as Digital Attack Surface

This is approximately the worst idea ever. Yeah, yeah, everyone knew it was going to happen.  Everyone knows that someone, somewhere is going to push the cyborg thing, but you’ll find me forever au naturale.  I won’t even buy a … Continue reading

Posted in Governing the Body, Information Technology, Politics | Tagged | Leave a comment

Troubleshooting DLNA Discovery: Plex Media Server on a KVM/QEMU Emulated Fedora 22 Server

TL;DR:  If you’re running a Plex Media Server in a guest domain on a KVM/QEMU/libvirt-based hypervisor platform, make sure that the bridge you use to provide network access to the guest domain (such as macvtap) is configured in the host … Continue reading

Posted in Information Technology | Tagged , , , , , , , , , , | 2 Comments

Text-Only Web Browsing

In case anyone wanted a recommendation for a browser, mine is the classic GNU software: Lynx.  You can install it in Fedora 22 (or CentOS/RHEL) by merely commanding: dnf install lynx And you can access it straight from the command … Continue reading

Posted in Information Technology | Tagged , , | 2 Comments

John McAfee: Exemplar of the Stereotypical Angry IT Nerd

Man, McAfee sure comes across as a pompous ass in this article, no?  Maybe he wrote it when he was having a particularly bad day…or something, but clearly, the purpose of his article was to inform others of how awesome … Continue reading

Posted in Information Technology | Tagged | Leave a comment

Unreasonably Bad Design: Computerized Vehicles Edition

The Disaster I know I’m not the only systems engineer out there who has been disturbed by the obviously idiotic designs going into our planes, trains (probably), and automobiles (Update: Corvette, too is designing their vehicles with similar flaws). Here’s … Continue reading

Posted in Information Technology, Politics | Tagged | Leave a comment

The NSA is a Disaster

I don’t have too much to add to this subject, but I feel obligated to say something.  The story to which I will link is old news, but it’s just part of the constant flow of revelations about the extent … Continue reading

Posted in Information Technology, Politics | Tagged | Leave a comment

The System Defense Stack

Rationale I have scoured the Internet far and wide and found nothing similar to what is in my head regarding this topic, so I thought I’d provide the above as my conceptual map for system defense (not incident detection and … Continue reading

Posted in Information Technology | Tagged | Leave a comment

CVE-2015-0235: “GHOST” Vulnerability Analysis

Attack Vectors If I’m reading this report correctly, the only viable attack vector against an otherwise uncompromised system is through software which grants access to some means by which an attacker can supply a string and cause the software to … Continue reading

Posted in Information Technology | Tagged , | Leave a comment

Oh Yeah, It Might Not Have Been North Korea

See, I usually avoid discussing purely theoretical IT issues on this blog.  It’s more important to me that I stick to practical matters which actually help people out.  The Internet is full of theoretical discourse (to give it a very … Continue reading

Posted in Information Technology | Tagged | Leave a comment

The Proportionate Response to North Korea

You know, I thought about this for a while, and then the most obvious, most awesome answer hit me clearly.  I have a feeling our proportionate response should include a lot less data exfiltration and a lot more data infiltration. … Continue reading

Posted in Information Technology | Tagged | Leave a comment