Bank Hacking

This is a great story of social engineering, wherein USB drives are “dropped” around a bank and employees pick them up and plug them into bank computers [via Slashdot]. This was done as part of a security audit, and what is particuarly interesting is that the employees knew a security audit was being done and knew that social engineering attacks were going to be attempted. The results: Of the 20 USB drives we planted, 15 were found by employees, and all had been plugged into company computers. The data we obtained helped us to compromise additional systems, and the best … Continue reading Bank Hacking

Big Brother 2.0?

This is a well-written discussion of the privacy concerns with Web 2.0, including a nice dissection of how the most reasonable business model for the growing number of social networking style sites is their use as data mining sources for a company’s other operations [via Clicked]. For example, Flickr is perhaps one of the most interesting ones. Search for ‘cat’, and Flickr will record the most popular photo clicked. By associating the colour and picture data within photos with keywords used to search, Yahoo is slowly building a database of human identification. It has often said that the differentiator between … Continue reading Big Brother 2.0?

Victim of Flash

Animator vs. Animation is a very good flash animation reminiscent of the Bugs Bunny vs. Animator cartoons, but in a digital world [via Clicked]. I’m most impressed by how much is going on in the video – I watched it a couple of times to try to get everything that is going on, and even then by the end it gets pretty chaotic.

Photo Retouching

There are a number of websites that do interesting “before and after” demonstrations of photo retouching, but this one from a professional photographer is particularly interesting because it doesn’t just cover fashion photos and comes from the perspective of somebody who actually does this for a living.

Hardware Keylogger

A number of people pointed out the Key Katcher at ThinkGeek to me yesterday. I”d love to get my hands on one of these to try it out, but it seems very simple. I wondered how long it would take the average user to generate 130,000 keystrokes – how easy or frequent does rerieval need to be if you’re hoping to catch a password? Of course, the product description doesn’t mention that as a use, focusing on putting it on your own machine to identify if an unauthorized user accessed it, or for sys admins to use to see what … Continue reading Hardware Keylogger

Exterrestrial Bed Coverings

I’ve been meaning to look into how the image search engine Pixsy actually works, as it’s been getting a lot of attention. I poked around on their site and couldn’t find any explanation of their methods, but from trying out some searches, it doesn’t appear that they are doing any actual image processing, just doing text processing for text and tags in proiximity to images they are indexing. This theory is supported by my discovery that the top 5 out of 12 image results on the query term “ufo” are pictures of quilts. Which absolutely cracks me up in how … Continue reading Exterrestrial Bed Coverings

Two Faces of Design

I originally intended just to point out this interesting post about the success of “ugly” design, arguing that unattractive sites such as del.icio.us are successful because the lack of design communicates to the user a lack of marketing or corporate influence. But then I found a response to the conversation that I liked even more: disambiguity’s separating of information/interaction design from visual design. And, having just talked to one of my classes about the distinction between logical versus physical tags and why one might use one over the other, I liked seeing the point made that a site with good … Continue reading Two Faces of Design

Data Security Legislation

The ACM technology policy weblog has a nice summary of and response to H.R. 4127 regarding stronger data security requirements for businesses. The highlights include requiring data security plans and notification if security is breached. But be sure to scan down for their discussion of the exemption from notification if the compromised data is encrypted, and why this is a dangerous loophole. It reminds me of a recent experience talking about security principles to a general audience – one of the hardest concepts to get them to accept was the idea that redundant or layered security is necessary, and single … Continue reading Data Security Legislation

But what kind of tea…..

A recent article discusses the goal of building AI that anticipates user desires, opening with the following teaser: MANY viewers were probably impressed when a character on Star Trek asked a computer for a cup of tea and it was produced immediately. Not Kristian Hammond. “I wondered why he had to ask,” says Hammond, co-director of America’s Northwestern University intelligent information computer lab. “A truly intelligent machine would anticipate that its operator wanted tea.” If you read the rest of the article, you see that their actual project is a bit more sensible in scope, looking at how AI can … Continue reading But what kind of tea…..

Google spreads further afield

Like Google Earth, but with fewer roads so far (though, you can check up on the locations of Spirit and Opportunity): Google Mars! Check out both an elevation-shaded and an actual image at an impressive range of zooms. At this point only covers a limited chunk of the western hemisphere. They hope to tie it into the Google Earth client in the future to allow fly-throughs and such.