company:novell

  • L0pht in Transition

    Most of the ’90s hacking group the L0pht - Mudge, Space Rogue, Weld Pond and others - have emerged in legitimate roles. Was their work ultimately boon or bane for security?

    http://www.csoonline.com/article/2121870/network-security/lopht-in-transition.html

    Brian Oblivion. Kingpin [Joe Grand]. Mudge [Peiter Zatko]. Space Rogue . Stefan von Neumann. Tan. Weld Pond [Chris Wysopal]. That’s how the hacker group called the L0pht appeared before the Senate Subcommittee on Government Cybersecurity on May 19, 1998. They said, among other things [before the Congress of the United States] that they could take down the Internet in 30 minutes.

    [...]

    “Back then, the companies would pretend [vulnerabilities] weren’t real,” says Bruce Schneier, the noted cryptographer and CTO of BT Counterpane. Schneier says the L0pht’s ability to build tools like L0phtCrack forced vendors to address security problems. “That’s the reason we have more secure software today. If it wasn’t for that, Microsoft would still be belittling, insulting and suing researchers,” he says.

    [...]

    that merger [with security consulting firm “@Stake”] announced Jan. 10, 2000, marked the symbolic end of the L0pht. Over the next few years, its members were fired or drifted away, and @Stake itself was gobbled up by Symantec in 2004. The only member of the L0pht still there is Nash. The transition was particularly difficult for Zatko, who spent six months on disability and left @Stake after just two years.

    The 1998 L0pth testimony before the US Senate:

    https://www.youtube.com/watch?v=VVJldn_MmMY


    Transcript of that testimony:

    http://www.spacerogue.net/wordpress/?p=602

    In reality, all we really are, is just Curious. For, well over the past decade, the seven of us have independently learned and worked in the fields of satellites communication, cryptography, operating systems’ design and implementation, computer network security, electronics and telecommunications.

    To other learning process, we’ve made few waves with some large companies such as Microsoft, IBM, Novell, and Sun Microsystems. At the same time, the top hackers, and the top legitimate cryptographers, and computer security professionals pay us visits when they are in town, just to see what we’re currently working on.. so we kind of figured we must be doing something right.

    [...]

    Senator Thomson: (15’30")
    I am informed that, you think that within 30 minutes the seven of you could make the internet unusable for the entire nation, is that correct?

    Mudge: That’s correct. Actually one of us with just a few packets. We’ve told a few agencies about this, it’s kinda funny because we think that this is something that the various government agency should be actively going after, we know that the Department of Defense at very large, investigation into what’s known as denial of service attacks against the infrastructure

    [...]

    Kingpin: (22’36") I just want to add one thing to that, in the point of liability, the car manufactures will be and are held liable if something goes wrong in a product. If something goes wrong in one of the ten thousand cars, and it explodes they will be held liable. If something breaks in the software the companies aren’t held liable and they feel, why?

    More about @Stake
    This is a cached version of the original March 2000 article in BusinessWeek.
    A Short, Strange Trip from Hackers to Entrepreneurs

    https://hackerfall.com/story/a-short-strange-trip-from-hackers-to-entrepreneurs
    https://web.archive.org/web/20160325230929/http://www.businessweek.com/smallbiz/0003/ep000302.htm

    #L0pht
    #DoS
    #Hacker

  • Microsoft et SUSE sont plus copains que jamais
    http://www.comptoir-hardware.com/actus/business/31965-microsoft-et-suse-sont-plus-copains-que-jamais.html

    Comme vous le savez peut-être, Microsoft ne se cache plus et a fait son coming out l’année dernière en annonçant aimer Linux (parce qu’ils ne disent pas GNU/Linux). Mais en réalité, cela fait des années que le géant s’acoquine avec les manchots, puisque leur premier contrat avec SUSE date de 2006, époque où la firme était aux USA sous le nom de Novell (qui l’avait racheté en 2003)... [Tout lire]

    #Business_&_internet

  • Official #Google Blog : When patents attack Android
    http://googleblog.blogspot.com/2011/08/when-patents-attack-android.html

    la guerre des #brevets dans la téléphonie mobile

    Android’s success has yielded something else: a hostile, organized campaign against #Android by #Microsoft, #Oracle, #Apple and other companies, waged through bogus #patents.

    They’re doing this by banding together to acquire Novell’s old patents (the “CPTN” group including Microsoft and Apple) and Nortel’s old patents (the “Rockstar” group including Microsoft and Apple), to make sure Google didn’t get them; seeking $15 licensing fees for every Android device; attempting to make it more expensive for phone manufacturers to license Android (which we provide free of charge) than Windows Phone 7; and even suing Barnes & Noble, HTC, Motorola, and Samsung. Patents were meant to encourage innovation, but lately they are being used as a weapon to stop it.

    A smartphone might involve as many as 250,000 (largely questionable) patent claims, and our competitors want to impose a “tax” for these dubious patents (...)

    This anti-competitive strategy is also escalating the cost of patents way beyond what they’re really worth. The winning $4.5 billion for Nortel’s patent portfolio was nearly five times larger than the pre-auction estimate of $1 billion. (...)

    (...) We’re encouraged that the Department of Justice forced the group I mentioned earlier to license the former Novell patents on fair terms, and that it’s looking into whether Microsoft and Apple acquired the Nortel patents for anti-competitive means. We’re also looking at other ways to reduce the anti-competitive threats against Android by strengthening our own patent portfolio.

  • Syncany – Le Dropbox open source
    http://www.korben.info/syncany-le-dropbox-open-source.html

    #Syncany fonctionne de manière similaire à #Dropbox, possède une couche de chiffrement et permet la sauvegarde sur (au choix) un espace local (un disque partagé par exemple), un serveur FTP, un serveur accessible en SSH (#SFTP pour être exact), un serveur IMAP, un partage #webdav ou si vraiment vous le désirez, sur des services de stockage en ligne comme #Box.net, Amazon #S3, #Picasa ou encore #Google_Storage.

    (ne vous emballez pas, c’est de l’alpha)

    • Oui, j’ai vu ça, je me suis dit « Parfait ! Je vais l’installer sur mon serveur, je garderai la main sur mes données, je n’aurai plus de limitation… » Bon mais en fait pas tout de suite :(

    • @davduf un de mes collègues à participé au développement de iFolder, et fait le constat suivant :

      « Novell a eu une attitude absolument grotesque avec ce projet, l’entrainant dans sa tombe par l’abandon de tous les contributeurs principaux.

      C’est maintenant à des années lumières des solutions basées sur du cloud, des apis correctes etc.

      Pas une solution viable quoi. »

    • ...Beta maintenant, et passé sur github :-)
      http://www.syncany.org

      While the basic idea is similar to Dropbox and JungleDisk, Syncany is open-source and additionally provides data encryption and more flexibility in terms of storage type and provider:
      - Data encryption: Syncany encrypts the files locally, so that any online storage can be used even for sensitive data.
      - Arbitrary storage: Syncany uses a plug-in based storage system. It can be used with any type of remote storage.

      Even though Syncany is still under heavy development, it already supports a wide variety of different storage types:
      - Local Folder: uses any local folder as storage. This could be any mounted device, network file systems (NFS), or any virtual file system based on FUSE.
      - FTP: uses an FTP folder as remote repository.
      - IMAP: uses an IMAP folder as remote storage. Stores file chunks as e-mail attachments.
      - Google Storage: uses a bucket in the Google Storage service as repository.
      - Amazon S3: uses a bucket in the Amazon Simple Storage Service as remote storage.
      - Rackspace Cloud Files: uses a Cloud Files container as remote storage.
      - WebDAV: uses one folder in a WebDAV as remote storage.
      - Picasa Web Albums: encodes the file chunks in images, and uses a Picasa album as repository.
      - Windows Share (NetBIOS/CIFS): uses a Windows share as data repository.
      - Box.net: uses a Box.net folder as data storage.
      - SFTP/SSH: uses an SFTP folder as data storage.

      #synchronisation #opensource #dropox-alternative #cloud #encryption #ssh #do-it-yourself