New Mac malware opens secure reverse shell

Found on CNrét News on Tuesday, 19 February 2013
Browse Computer

A new backdoor Trojan for OS X is making the rounds, attempting to set up a secure connection for a remote hacker to connect through and grab private information.

The malware, dubbed "Pintsized" by Intego, is suspected of using a modified implementation of OpenSSH to set up a reverse shell that creates a secure connection to a remote server.

I remember it was one of the pro-Mac arguments that you will never get infected with a virus or trojan; how times have changed.

Canadian Business Groups Lobby For Right To Install Spyware on Your Computer

Found on Michael Geist on Wednesday, 06 February 2013
Browse Computer

During the anti-spam law debates in 2009, copyright lobby groups promoted amendments that would have allowed for expansive surveillance of user computers. Coming on the heels of the Sony rootkit scandal, the government ultimately rejected those proposals (the Liberals had plans to propose such amendments but backed down), leaving in place an important provision that requires express consent prior to the installation of computer software.

The Canadian Chamber of Commerce and other business groups want to ensure that the anti-spam law does not block their ability to secretly install spyware on personal computers for a wide range of purposes. In doing so, these groups are proposing to turn the law upside down by shifting from protecting consumers to protecting businesses.

Just don't do any business with them and consider using an operating system which does not make it easy to install spyware (which is usually designed for Windows).

Calculating the Cost of Full Disk Encryption

Found on Network Computing on Monday, 03 September 2012
Browse Computer

The study found that the most expensive element of FDE is not the hardware or software involved, but the value of user time it takes to start up, shut down and hibernate computing systems while using FDE. Also adding to the cost is the time it takes technicians to complete full disk encryption procedures.

After doing all of the math, Ponemon found that the cost of FDE on laptop and desktop computers in the U.S. per year was $235, while the cost savings from reduced data breach exposure was $4,650.

$235 to click on the checkbox which selects full disk encryption during the installation of a Linux desktop?

Ubisoft Games Won't Work Next Week

Found on ITProPortal on Friday, 03 February 2012
Browse Computer

Several of Ubisoft's biggest titles won't be playable as of next week thanks to a server move by the publisher and the restrictive DRM that was used in their development.

Because Ubisoft thought it would be a smart plan to use always on DRM for even the single player portion of games like Assassin's Creed, even the single player portion of that title won't be playable during the server move.

Those people paid money for your game and they won't be able to play it. If you didn't pay, downloaded illegally, pirated, you'll be able to play fine.

Once again, free wins against paid.

The Death of Booting Up

Found on Slate on Saturday, 13 August 2011
Browse Computer

Remember "booting up"? It was the first thing you did every morning-you waited two minutes, three minutes, sometimes even longer while your computer ran through a series of self-tests, loading screens, and an error prompt or two before settling into any kind of useful state.

Apple's MacBook Air loads up in 16 seconds, and machines based on Google's cloud-based Chrome OS boast boot times of under 10 seconds. Even Windows computers are fast-with the right set-up, your Windows 7 laptop can load just as quickly as a MacBook.

That's nice and spiff, but pretty useless. I wonder if people really sit down in front of their PC and switch it on, waiting for the desktop to come up while gnawing on the desk. In most cases, my system has booted before I return to it; there are always a few things one does between pressing the button and starting to work. Besides, I boot only once a day, so a minute more or less doesn't really shorten my life.

World's servers process 9.57ZB of data a year

Found on Computerworld on Sunday, 08 May 2011
Browse Computer

Three years ago, the world's 27 million business servers processed 9.57 zettabytes, or 9,570,000,000,000,000,000,000 bytes of information.

Researchers at the School of International Relations and Pacific Studies and the San Diego Supercomputer Center at the University of California, San Diego, estimate that the total is equivalent to a 5.6-billion-mile-high stack of books stretching from Earth to Neptune and back to Earth, repeated about 20 times.

Three years. That's pretty ancient data in the IT. Anyway, this amount of data is manageable: ZFS allows 256 zettabytes per zpool, so there would still be some space left. Even if the zpool gets filled, no problem: a ZFS system can have up to 2^64 zpools (that are 8,446,744,073,709,551,616 zpools, or 2,162,366,482,869,645,213,696 zettabytes).

Hadopi's secret 3-strikes security spec leaked

Found on Iptegrity on Tuesday, 03 August 2010
Browse Computer

Government certified security software: the French government's Hadopi wants to spy on everything on your computer, every time you log on, otherwise you cannot defend yourself against breach of copyright allegations.

The measures appear to be 'belt-and-braces' in that the software will be required to monitor all traffic through the Internet access as well as all files on the user's computer and the router configuration.

Most likely it will only run on Windows. So users of other operating systems will be guily by default or have to switch to Windows because everything else will be outlawed unless wiretapping, sniffing and censorship solutions are build in. Not much freedom and equality is left from the old "liberté, égalité, fraternité" slogan it seems.

ZFS gets inline dedupe

Found on The Register on Sunday, 01 November 2009
Browse Computer

Sun's Zettabyte File System (ZFS) now has built-in deduplication, making it probably the most space-efficient file system there is.

The deduplication is done inline, with ZFS assuming it's running with a multi-threaded operating system and on a server with lots of processing power. A multi-core server, in other words.

The beauty of ZFS dedupe is that you don't need special storage arrays to deduplicate data. Ordinary arrays are quite acceptable, and its applicability at a data-set level means that you need only to deduplicate the datasets with redundant data and not the others.

ZFS is probably the best filesystem out there currently; even though there are of course some feature differences with others. Putting that aside, thanks to incompatible licenses (CDDL vs GPL), there won't be a native support in Linux anytime soon. Sometimes Open Source just blocks itself.

Malware probes find a China angle

Found on CNet News on Sunday, 29 March 2009
Browse Computer

China is coming under scrutiny as the possible source of malicious software and Internet attacks directed at foreign governments and other institutions.

Completed separately, both reports--"Tracking GhostNet," from the Munk Centre for International Studies in Toronto, and "The snooping dragon," from the University of Cambridge Computer Laboratory--address the Chinese government's efforts to monitor the activities of the Dalai Lama and the governing of Tibet.

Now if the Great Firewall of China would work both ways. The chinese government does not really care much about outgoing, truly malicious traffic (not just malicious because it's free information).

Major cyber spy network uncovered

Found on BBC News on Saturday, 28 March 2009
Browse Computer

An electronic spy network, based mainly in China, has infiltrated computers from government offices around the world, Canadian researchers say.

They included computers belonging to foreign ministries and embassies and those linked with the Dalai Lama - Tibet's spiritual leader.

There is no conclusive evidence China's government was behind it, researchers say. Beijing also denied involvement.

Of course the chinese government denies being involved. Did anybody honestly think they would say "Oh, you caught us"?