Tuesday, April 9, 2013

Moving to Wordpress.com, for indexing services

Blogger blogs are not indexed by search engines, to protect the privacy of the amateur suburban blogger.

Despite apprehensions, 65535sec is moving to www.65535sec,wordpress.com, so that the content will be indexed by the various search engines.

Usage based billing increases lock-in.

In Cloud-type data assurance, it can be vital it can be to maintain an offline processing capabilitiy, for general purpose computing. To facilitate this, Operating System providers make redistributable updates available. We can still get service pack redistributables for Win 7, and offline Java etc. But with the advent of Windows 8, Microsoft can saddle you with a computer that won't boot, if you do not have online access. 

I fact, with updatable EULA's, the Windows 8 OS could be changed to require payment of a (nominal) monthly subscription fee.

Meanwhile, the mad rush to the Cloud is leading laymen to forget that they can also be charged by the bit for internet access. As an end user, one might neither be able to access his work product data, nor back it up, without fee based bandwidth services. 

Linux makes package managers, but offline installers would be a significant addition, so "maverick installs" are not the only choice, for offline applications.

Would a virtual router have advantages over a hardware router?

In 2010, I used a Cisco EA2700 router behind an AT&T gateway, with the remote update turned off, and MAC address filtering for only three devices, two general purpose computing "towers," and an iPod.

While using this implementation, I began to theorize a Virtual environment, where a virtual router controls access to other (possibly even "virtual") machines. I speculated that this would make penetration harder, by specifying the (updatable) MAC address of the virtual router as the only device authorized to pass traffic to the WAN, at the hardware router. Admins could still telnet in, to manage the virtual router, using the IP address and password, (such as managing whitelists and blacklists.) One could also specify MAC address filtering within the virtual environment.  It's obligatory to suggest that the virtual router is a different firmware model than the physical router. 

This might compare or contrast to a Bluetooth type pairing and bonding protocol. 

I think it actually improves things.

RSA certificates need not auto-authorize

We are all familiar with the message-box "Always trust s/w from NVIDIA/Microsoft/Big Name."  We click on these with confidence, because DNSsec (officially required since June 2010,) is remarkably secure in employing RSA certificates in ways that are difficult to counterfeit.

However, large corporations are not the only entities empowered to install "trusted" code. In fact browsers, such as Firefox, Chrome, and Internet Explorer, maintain a list of trusted certificates, any one of which will suffice to install certified code on any windows PC, unattended. The pop-up box is obligatory, not intrinsically required. 

Conscientious programmers have noted that whenever a browser is updated, manually entered exclusions, (such as "No Malaysian RSA authorized software at all,") are clobbered, or over-written.

One solution to this, for security obligated employers, is to employ Open Source's freedom to modify, to insert a pop-up alert, or "nag," EVERY time any RSA cert is invoked. 

The purpose of such an alert, would be to denote that ANY software was installing unattended. Every virus writer drools over the idea, and nation-states that promote A.P.T.'s or turn a blind eye to abuse, are very capable of compromising their own RSA certificate(s,) for nefarious purposes. As with Hitchcock's classic "Strangers on a Train," the bad actors need not incriminate themselves, if they are appropriately sophisticated. 

Despite the allure of this solution, it requires some understanding of Certificates, on the part of the end user. It used to be commonplace, for a legitimate Certificate to be flagged for error, due to date/time stamp inaccuracies in the BIOS of the end user's machine. 

How many decimal digits are there in 2^(d)?

log x = y, such that 10^(y) = x.

By algebra, 2^d = 10 ^ (d * log(2)) or (d * log(2)) digits.

By experimentation, 2^d = (d * log(2)) + 1 digits.