Learning AutoCAD
Okay, so now I own AutoCAD, now what? I got an e-book from the iBook store to get me stated and I asked the guy who did our floor plans […]
Just another news site
Okay, so now I own AutoCAD, now what? I got an e-book from the iBook store to get me stated and I asked the guy who did our floor plans […]
I have been fascinated with AutoCAD since a friend of mine showed me a drawing of the space shuttle and zoomed from showing the whole thing, through the windshield to the […]
I have a Hilti laser range finder, its their model PD 40. I don’t use it often but it’s great to have around when measuring rooms and such. I was […]
Have you evern experienced the madness of not getting your luggages when you are transiting to your destination and can’t find them when you’ve arrived? You know, experienced travelers often will face this kind of condition where their luggage in going to the opposite direction of their owner location because of some technical error in […]
For those who are buying with their business, it’s a rare sight for them the cook their meal 2/3 times a day. Usually, busy people will cook once in the morning and never cook ago. Medically speaking, it’s not healthy at all to eat cold meal, especially a supper. However, thanks to the advancement in […]
Tests at OHM2013 confirm SIM vulnerabilities
Recently discussed vulnerabilities enable remote SIM malware deployment and in some cases even remote SIM cloning. At this year’s hacker camp OHM 2013, the SRLabs team offered four SIM card security workshops.
The measurements taken at the OHM workshops confirmed that more than a quarter of European SIM cards still disclose signed error messages, of which about half can be cracked due to their use of DES. Each crack takes about two minutes with a complete set of rainbow tables on a standard computer. (At OHM, cards were tested with an incomplete set resulting in a discount in the number of actually cracked cards.)
Network operators are encouraged to upgrade their cards to AES (or 3DES) or disable the OTA functionality of vulnerable cards before criminals are able to infect SIM cards with viruses.
The OHM2013 presentation on Exploiting SIM Cards provides details on the method, test results, and mitigation options.
With all the uses for equipment that comes with a Wall Wart, plug in power supply, many companies have tried to come up with ways to make it easier to […]
I have talked about this before, a long network run with network switches at a mid point,that point is in a concrete room that gets wet sometimes. To help keep […]
Producing The OnLine Engineer requires a lot of data and that requires hard disks and that mandates backups. So I have a lot of drives, what I would really like […]
Our local cable company recently asked for an ASI feed from us to replace the analog feed we have been sending the for all the years I have been here. […]