Netfilter: Making large iptables rulesets scale
The Real Life Social Network v2
July 16th, 2010
A great presentation [from google] about how people interact socially in the real life and how current social networks represent them. (Needs about 30 min to read)
Comptel
July 12th, 2010
website of the association of communication service providers and their vendors ( virizon, L3, cisco and the likes ]
PGCon2010: Perspectives on NoSQL [Gavin M. Roy, CTO of MyYearBook.com]
July 12th, 2010
http://www.pgcon.org/2010/schedule/attachments/141_PostgreSQL-and-NoSQL.pdf
"Reinventing the Dialplan" slides from Twilio’s Astricon 2009 talk [asterisk in the cloud]
July 8th, 2010
Company provides Virtual PBX - asterisk "in the cloud", with HTTP/XML/REST API (business-level google voice)
[RUS ]nuclight: Torrent: альтернативный способ детектирования [how to detect torrent protocol by looking at tracker requests]
July 7th, 2010
A way to detect BT protocol traffic -- instead of looking at every packet, traffic to torrent tracker websites is redirected (via divert(4) ) and then analyzed. Analyzer script (PERL) produces the src_ip, dst_ip, dst_port triplet, this info can be used to produce firewall rules
NeuroLogica Blog » Barriers to the Acceptance of Science
July 2nd, 2010
Excellent article, shows some aspects why ppl do not accept silence -- main cause: due to human nature emotions win over reason
Recursion Ventures – Dan Kamisky on SQL Injections and XSS
June 17th, 2010
in 3 lines Dan's method is:
Errata Security: Cyberwar is fiction
June 7th, 2010
"The conflicts between nation states in cyberspace are nothing like warfare, and the tools hackers use are nothing like weapons. However, this fiction is what is driving national policy, and that worries me a lot. I feel this cluelessness is a bigger danger to cyberspace than foreign hackers." , by Robert Graham