ATI Screwing Linux Users

ATI has still failed to release drivers for its X1000 series of cards which have been out now for five months and the drivers it has released for previous cards tend to be quite inferior to their windows counterparts. Meanwhile, nVidia is grabbing the linux market share for one reason: because they have earned it by making linux driver development a priority.

read more | digg story

Advertisements
Posted in Uncategorized. Leave a Comment »

Everything You Need To Know About Netcat

Tech Blog has published a very cool guide to using netcat – the TCP/IP “swiss army knife.”

Technology Requires Stronger Laws to Protect Privacy

A new report by the Center for Democracy and Technology (CDT) details a widening gap between the technology that collects sensitive personal data and the laws designed to protect that data against government misuse. The National Security Agency’s domestic spying program, the Justice Department’s efforts to obtain millions of Internet search records, the government’s use of cell phones to track suspects, and other developments highlight the law’s failure to keep pace with technological advances, according to “Digital Search & Seizure: Updating Privacy Protections to Keep Pace with Technology.” Stronger laws are needed to ensure that Americans retain their constitutional privacy protections, the report finds.

Read more at the CDT website.

Posted in Uncategorized. Leave a Comment »

How To Perform a Bug Sweep

A brief guide to Technical Security Counter Measure (TSCM) operations for the professional information security specialist or the professional paranoid.

read more | digg story

Posted in Uncategorized. Leave a Comment »

Dust: A Ubiquitous Surveillance Technology?

Dust seemed a logical idea – a tiny device with wireless networking and the ability to link with neighbouring devices, and therefore to create a network of devices, all linked to their closest neighbours. As a surveillance technology, it’s perfect – tiny to the point of invisibilty, and ubiquitious.

read more | digg story

Posted in Uncategorized. Leave a Comment »

Encrypting Your Communication Means You Must Be a Criminal

Skype has come under scrutiny from the NSA and FBI since its PC-to-PC calls are encrypted using AES encryption. This is the same encryption used by the US Government for many things. So why is it ‘national security’ when the Government encrypts its communications yet it is assumed to be ‘criminal activity’ when private citizens do the same?

Just as a reminder, here is the Fourth Amendment to the United States Constitution:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

read more | digg story

Posted in Uncategorized. Leave a Comment »

Shady ‘Homeland Security Officers’ Harassing Citizens

It appears the ‘secret’ branches of Homeland Security are starting to crawl out from under their rocks. Here is the story of some goons trying to intimidate a citizen-veteran from exercising his right to dissent. Classic techniques are employed: cite some CFR code which isn’t appropriate, and browbeat.

read more | digg story