WATCHA CLAN “GOUMARI” part 2 LIVE @ la Maroquinerie Paris

Ξ March 30th, 2010 | → 0 Comments | ∇ Uncategorized |


YouTube Preview Image
...

 

CERIAS : Cowed Through DNS

Ξ March 29th, 2010 | → 0 Comments | ∇ Uncategorized |



    May 2010 will mark the 4th anniversary of our collective cowing by spammers, malware authors and botnet operators. In 2006, spammers squashed Blue Frog. They made the vendor of this service, Blue Security, into lepers, as everyone became afraid of being contaminated by association and becoming a casualty of the spamming war. Blue Frog hit spammers were it counted -- in the revenue stream, simply by posting complaints to spamvertized web sites. It was effective enough to warrant retaliation. DNS was battered into making Blue Security unreachable. The then paying commercial clients of Blue Security were targeted, destroying the business model; so Blue Security folded. I was stunned that the "bad guys" won by brute force and terror, and the security community either was powerless or let it go. Blue Security was even blamed for some of their actions and their approach. Blaming the victims for daring to organize and attempt to defend people, err, I mean for provoking the aggressor further, isn't new. An open-source project attempting to revive the Blue Frog technology evaporated within the year. The absence of interest and progress has since been scary (or scared) silence.

    According to most sources, 90-95% of our email traffic has been spam for years now. Not content with this, they subject us to blog spam, friendme spam, IM spam, and XSS (cross-site scripting) spam. That spam or browser abuse through XSS convinces more people to visit links and install malware, thus enrolling computers into botnets. Botnets then enforce our submission by defeating Blue Security type efforts, and extort money from web-based businesses. We can then smugly blame "those idiots" who unknowingly handed over the control over their computers, with a slight air of exasperation. It may also be argued that there's more money to be made selling somewhat effective spam-fighting solutions than by emulating a doomed business model. But in reality, we've been cowed.

 

http://cs-www.cs.yale.edu/homes/dna/abadirdf.pdf

Ξ March 25th, 2010 | → 0 Comments | ∇ Uncategorized |


"Scalable Semantic Web Data Management Using Vertical Partitioning"

Interesting, and very applicable to data storage for flexible multi-variate retrieval and analysis problems other than just dealing with semantic web RDF.

 

The Original &True Ver (The Good Ship Venus)

Ξ March 23rd, 2010 | → 0 Comments | ∇ Uncategorized |


YouTube Preview Image
,,,

 

Live Backups of MySQL Using Replication – OReilly Media

Ξ March 23rd, 2010 | → 0 Comments | ∇ Uncategorized |


BSDM for replicant sys-admins.

 

Weapons Of Sound “Tommy” The original Junk Percussion Band

Ξ March 21st, 2010 | → 0 Comments | ∇ Music |


YouTube Preview Image
...

 

Red Hot Chilli Pipers Smoke On The Water and Thunderstruck

Ξ March 21st, 2010 | → 0 Comments | ∇ Uncategorized |


YouTube Preview Image
...

 

The Imagined Village Come On Feel The Noize Liverpool 2010

Ξ March 20th, 2010 | → 0 Comments | ∇ Uncategorized |


YouTube Preview Image
...

 

Winnie Pooh, p.1 (rus.+eng. subs)

Ξ March 20th, 2010 | → 0 Comments | ∇ Uncategorized |


YouTube Preview Image
This buzz is not without a reason

 

Hard Times of Old England Retold by The Imagined Village

Ξ March 18th, 2010 | → 0 Comments | ∇ Music |


YouTube Preview Image
...