An aggregation of our Blog Roll, made up of acmqueue authors.   more

Postings for December 2016:  (9 posts)
Sat, 03 Dec 2016 03:03:53 UTC

Identity theft: the proof

Posted By Greg Lehey

Found in my spam folder today: From: Card SafeGuard RFID Bloc. Re: Your identity can be hacked - Your identity can be hacked Your identity could be stolen To stop all Ads follow Un_sub_scribe extended/ TD /may /mercer /090 /sizes /Lemon /russia /accepts' Barclays /plastic /s /Ha /dogg's / From: Re:Viagra,Cialis,Levitra - ACM only downloads articles once.

Sat, 03 Dec 2016 02:41:57 UTC

Second guessing Ethernet relay board

Posted By Greg Lehey

Finally got round to connecting up my Ethernet relay board to the network. It was wise to wait until I had some time. How would a generic board with no instructions connect to an unknown network? That's what DHCP is for. Of course, there's the question how normal users can then know the IP address of the device, but I wasn't too worried about that at the moment. I just connected it up and checked with arp: === grog@eureka (/dev/pts/41) ~ 1 -> arp -a ( at 10:f3:11:e9:9f:01 on xl0 expires in 884 seconds [ethernet] ( at 00:50:da:cf:07:35 on xl0 permanent [ethernet] ( at 8c:89:a5:7a:a7:bf on em0 expires in 1183 seconds [ethernet] ( at bc:5f:f4:c9:9b:bf on em0 permanent [ethernet] ( at 00:25:9b:6e:34:36 on em0 expires in 869 seconds [ethernet] ( at 00:1f:d0:20:4e:7f on em0 expires ...

Fri, 02 Dec 2016 22:26:38 UTC

Computer vs Human 0-1

Posted By Diomidis D. Spinellis

Earlier today the Athens State Orchestra played the Symphony No. 3 in C minor, Op. 78 by Camille Saint-Saens, which is also known as the Organ Symphony . The French organist and composer Thierry Escaich was supposed to play the organ. There was a slight delay at the beginning: a lady appeared on stage and explained that there were technical problems with the organ's "brain".

Thu, 01 Dec 2016 23:51:39 UTC

My keynote from the OReilly Security Conference: Security and feudalism: Own or be pwned

Posted By Cory Doctorow

Here’s the 32 minute video of my presentation at last month’s O’Reilly Security Conference in New York, “Security and feudalism: Own or be pwned.” Cory Doctorow explains how EFF is battling the perfect storm of bad security, abusive business practices, and threats to the very nature of property itself, fighting for a future where our... more

Thu, 01 Dec 2016 22:18:05 UTC

Ethernet relay card

Posted By Greg Lehey

My complaint to the eBay seller of the Ethernet relay card, asking for documentation, didn't bring much in the way of a result: Please don't worry,I have submit your question to the product department,they will reply us in 1-2 working days. Could you kindly contact us after 2 working day?We will try our best to solve the problem. I can see that's going to be a dead end.

Thu, 01 Dec 2016 21:54:19 UTC

Recovering dumb phone videos

Posted By Greg Lehey

So yesterday I managed to sideload Yvonne's video from her dumb phone to my new Android tablet. Uploading it to a real computer was no more pain than usual, though the image quality is appalling: There are a couple of reasons there. First, it wasn't taken well, but the rolling shutter effect is amazing. But then we never bought the phones for such purposes. If Yvonne had had her camera with her, she could have got reasonable quality images. But what about the USB interface on the phone?

Thu, 01 Dec 2016 21:45:50 UTC

Posted By Greg Lehey

After my scammer experience on Tuesday, I noted a button to report abuse to, so reported that, along with the code, which might help. And I got a reply: Thank you for contacting LogMeIn Customer Care, and for sharing the recent experience you had with a third party using our LogMeIn Rescue product. We encourage anyone who believes that someone is using LogMeIn software maliciously to report it, as we investigate each claim filed. We take abuse of our software very seriously and would appreciate collecting more information from you in efforts to identify who was attempting to initiate that Rescue session.

Thu, 01 Dec 2016 20:00:00 UTC

Transforming Development with AWS

Posted By Werner Vogels

In my keynote at AWS re:Invent today, I announced 13 new features and services (in addition to the 15 we announced yesterday). My favorite parts of James Bond movies is are where 007 gets to visit Q to pick up and learn about new tools of the trade: super-powered tools with special features which that he can use to complete his missions, and, in some cases, get out of some nasty scrapes. Bond always seems to have the perfect tool for every situation that he finds himself in. * At AWS, we want to be the Q for developers, giving them the super-powered tools and services with deep features in the Cloud.

Thu, 01 Dec 2016 20:00:00 UTC

Validating State Machines

Posted By Tim Bray

This morning we released AWS Step Functions, a Serverless Distributed Cloud Microservices Polyglot Workflow Orchestration Coordinator thingie. Its cool; you want to read about it, visit Jeff Barrs joint. Step Functions uses state machines specified in a JSON DSL called the States language. This piece is about the two validators I wrote for States documents, one of which is interesting. Not that many people care about validators and parsers; so if you think you probably wont be interested in the rest of this piece, youre probably right. The validator in the service Like most AWS Services, Step Functions has a front-end that handles the API calls and dispatches the work.