knocking on port knocking

Port knocking has the potential to be an additional layer of protection available to highly security conscience network administrators.  However, just like any innovation, it is not without its weaknesses.  The author of the following article discusses some of the problems that can occur with port knocking.  The primary issue the author identifies is the use of new definitions for existing security concepts that are already well researched.  This has caused some administrators to fail to identify  the natural security limitations of port knocking.

Iraq and Bin Laden

Two articles that I ran into today, the first is a campaign piece from myway news.  In it Democratic Presidential candidate John Kerry admits that he would have voted for the war regardless of WMD.  The statement actually improves my opinion of Senator Kerry because it was obvious to anyone who read his Iraq opinions prior to the election campaign that he was a big supporter of the war.  By making this statement he shows some honesty on this topic (something I have long sense given up finding in a Democratic President.)

The second article was sent to me by Jason Mical. Its a report by Alan Cullison on his discovery of an Al-Qaeda computer hard drive (actually two of them) in late 2001.  After reading some of the letters written by Abu Abdullah and Osama Bin Laden it is amazing these people were able to organize a trip to the telephone booth let alone the largest terrorist attack in American history.

and what did he ever do for us?

“Propose to an Englishman any principle, or any instrument, however admirable, and you will observe that the whole effort of the English mind is directed to find a difficulty, a defect, or an impossiblity in it. If you speak to him of a machine for peeling a potato, he will pronounce it impossible: if you peel a potato with it before his eyes, he will declare it useless, because it will not slice a pineapple.”
–Babbage

As said with regard to his Analytical Engine, thus becoming the world’s first programmer.

AES Cipher System

The successor to DES encryption approved by the US National Institute of Standards and Technology is called AES.  The basis for AES is a wonderfully interesting block cypher called the Rijndael algorithm.  If you are interested in Rijndael or  block cypher encryption you can find out more about it here.   A great place to find brief outlines of several of the more common types of cryptography can be found here.  If you want to understand the basic structure of public key cryptography, this is a good place.

While I am on the subject of cryptography, let me post my public key information.  Anyone interested in secure contact with my can use my publicly listed 1024 bit DSA key (ID: DC430CA6).

Usage Stats

On a regular basis I am asked market share questions.  This is mostly in relation to software usage and is used to make application development decisions.  Two of the best (or most commonly quoted) usage statistics sites are w3schools and Google’s zeitgeist.  Either source has their strengths and weaknesses; but combined they make for a very useful informational tool. 

While I am on the topic of market share IDC has predicted that Linux has moved into the number 2 slot on the desktop OS market.  Today the Mac, tomorrow the world…

Yahoo the Vote

Yahoo has a great election information page that I have found useful for looking up candidates, their voting records, and local issues.  It even have functionality to send the legislator messages on issues that are important to you, the voter.

Free iPod

I hate marketing gimmick referer sites because they (almost?!) never work. I am kicking myself now because I could have registered a month ago and a friend of my actually got his iPod in the mail today. So here is my freeipod referer link. Please sign up, get an iPod, and get me MY iPod.