November 1, 2014

  • Be a Cynic

    I typically try to be open minded, and give people the benefit of the doubt. Seriously, I could be wrong, right?  I get that.  But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic.  I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact…

  • New Methods of Attack?

    Back in the late 90′s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…

  • Bridging the Digital Divide

    Turns out “the cloud” is not just a place to keep your iTunes collection. Okay, to be fair, if you’re reading this you already know that. But are you aware of how cloud computing is helping to bridge the digital divide between developed nations and the developing world? The New York Times reports in its Bits section that the swiftest and most monumental benefits from cloud computing may be seen in developing nations like Nigeria and India. In such places, where web server costs can be financially out of reach even by developed-nation standards, small companies are finding that Amazon Web…

  • mini-ninjas-still2

    Square Enix launches free HD gaming site CoreOnline

    Video game developer Square Enix has launched CoreOnline, a website that lets users play high-definition games for free in web browsers. They’ve launched with two games: Hitman: Blood Money and Mini Ninjas; and promise Tomb Raider: Underworld is coming soon. The games are free to play up until a certain point, but game players are asked to view advertising to get more playing time. Gamers can also pay a fee to unlock specific parts of the games. The titles CoreOnline is offering are older titles from Square Enix’s catalog.

  • Phoenix Comicon

    Don’t miss this year’s Comicon in Phoenix, Arizona from May 24-27. Guests include William Shatner, Ed Asner, George Pérez, Greg Horn, Yvonne Navarro, Jeff Mariotte, Jeremy Bulloch, Vic Mignogna, Arthur Suydam, Gil Gerard, Erin Gray, James A. Owen, Gini Koch, Billy Tucci, Weston Ochse, Tony Amendola, Stuart Immonen, Kathryn Immonen, Brent Spiner, Levar Burton, Patrick Stewart, Michael Dorn, Marina Sirtis, Colin Ferguson, David Finch, Garth Ennis. (Subject to change.) The Zombie Walk takes place Friday, from 7:30 – 8:30pm. Here are ticket prices: $35 until December 31 $40 until May 25th $45 weekend $30 Fri $35 Sat $20 Sun Take…

Official Selections for 2014 UAT Digital Video Festival

Oct 18, 2014

This year’s Official Selections: (Out of Competition) The Adventures of Barty and the Pirate – Mark Chavez Modieval – Bryan Ribeiro Snake Eater – Andreas Olenberg I Need My Monster – Howard Cook Focus – Matt Chesin Ocean – Stephanie Maxwell (In Competition) To Judge a Thief – Luke Lowder Into Nether – Paul Lopez Films designated as “In Competition” are competing for the Grand Prize, a full-tuition scholarship to University of Advancing Technology’s award-winning Digital Video Program. Films that are “Out of Competition” aren’t eligible for the Grand Prize but are still eligible for our Audience Award. Our 3rd…

Be a Cynic

Oct 8, 2014

I typically try to be open minded, and give people the benefit of the doubt. Seriously, I could be wrong, right?  I get that.  But when it comes to companies that have been hacked, and I’m listening to the story I’m being spoon-fed by their PR department; I’m a cynic.  I imagine I always will be, actually. This comes up because of the recent JP Morgan Chase hack, where a purported 76 million households have had their information compromised. The story starts to fall apart each time the company says anything else about the incident, and how widespread the impact…

New Methods of Attack?

Oct 2, 2014

Back in the late 90′s, we saw methodologies of exploitation that relied heavily upon poor programming practices within core services on computers. One example of that is the FTP PASV vulnerability, which allowed a hacker to dump the password hashes for all users contained in the /etc/shadow file, simply by following a series of steps, and causing a segmentation fault. The resulting “core” file would contain a full memory dump of the system, including the shadow file, if it had recently been pulled into memory. As time progressed, hackers became obsessed with other methods of attack, such as buffer and heap…