Guest Article By: Ryan Pfleghaar (post_break) of iamthekiller.net DEFENDING AGAINST JASAGER Jasager has been making people question wireless security since episode one of season four on Hak5. The number one question besides “How do I get this to work” is ”How do I protect myself?”. This exploit in wireless security has been somewhat of a challenge to protect against and with this article I am going to detail how Mubix and I came up with a quick and easy fix.
I have had this rant on Twitter (if they had threading I would link to it). I have also had it in person a half dozen times at CSI Annual. And a piece of it was touched on a piece of the puzzle by Jack Daniel on his blog posting “The Fallacy of Penetration Testing”. We as “Security Professionals” have a big problem. We usually don’t have the power to make change.
This is just a quick blurb because Tom from the Security Justice Podcast already has a great post about all the changes: Check out his post here: http://spylogic.net/item/382 New link: http://www.spylogic.net/2008/12/maltego-201-released/
Gary Vaynerchuk of Wine Library TV made a post about Ego Searching. He describes in this short video that ego searching when you are trying to make a brand is simply caring about your audience: Now even Leo Laporte, while being interviewed on the Geek Cred podcast said that as a broadcaster (which can be translated into “Content Producer”), your audience is the most important thing and your responsibility is to them.
Unless you have been hiding under a rock, or just started reading this blog today. You have heard about GoPC. I featured it in my USB Goodies 2008 and I love their product. Now that they have entered into a “Strategic Alliance” with a company called ThinLinX. Now, the details of this alliance and the future it holds aren’t clear at the moment. And of course I have my own speculations.
I use gmail. Not really a big admission nor, very hard to find out. But the reason I use it is becasuse of it’s theading and archiving. For me those two abilities are unmatched anywhere else, both Outlook and Thunderbird fail horribly at this. More to the point, I have reached a certain level of ‘zen’ with my GTD methods on gmail. I am in a constant battle for “Inbox Zero” and have “Starring” extremely useless for me.
Alan posted this about the SBN: Well there is not much sense keeping it a secret any longer, as others have already blogged on it. The Security Bloggers Network is going Lijit. Working with the folks who bring you Lijit search widgets, the Security Bloggers Network has a new home. You can find site at http://www.securitybloggers.net (thanks to Tyler Reguly of http://www.computerdefense.org) and at http://www.securitybloggersnetwork.com (this may still be resolving).
I thought today’s dilbert fit me to a ‘T’: Originally Posted: http://dilbert.com/strips/comic/2008-11-21/
Update - Shmoocon already had a list: http://lists.shmoo.com/mailman/listinfo/shmoocon-roommates Go with what your readers want right? Well I have recently been getting a lot of hits on finding room sharing at ShmooCon. I have done this before at cons and I have met some very interesting people. So I created the google group ShmooCon RoomShare. Post that you are looking, post that you have space. It’s all voluntary and you can sign up for email alerts so that you don’t have to check it all the time.
Even if you have been to ShmooCon, something that alludes most con-goers is the Hack or Halo contest. Most of the time you will see it’s organizers at table near the registration desk getting people signed up. What you may not know is how the whole thing goes down. It’s after hours so, you aren’t missing the great content during the day, and it might save you a few dollars of money spending bar time.