Numeracy teaching with a healthy eating message.
Archive for the ‘Forensic’ Category
Maths tables produced using MS Excel
Some notes from a new blog
Print from PowerPoint and blue-tak to a timeline for planning purposes
Chi-squared test viewed another way…
Blood stain measurement as a motivation for maths and error analysis.
The photo above shows one of today’s whiteboards as imaged using my Olympus Camedia point and shoot – the images are 1600 by 1200 pixels. I resized the image above using Photoshop Elements with bi-cubic resampling. No other adjustments have been made, the flat image is typical of this camera. A quick e-mail to ScanR.com [...]
Just storing a draft in a convenient location
Latest results on new experiments…
PhotoShop or similar image editor provides a way of measuring a scanned image accurately, but you need Pythagoras…
Lawyer in Huddesfield uses Blogger to record case law
Small and medium businesses don’t have clear licence proof for software
How the mighty are fallen – Cliff Stanford founder of Demon Internet – receives suspended sentence for e-mail interception during argument with board members of Redbus
Just deleting files or even formatting a hard drive does not completely remove the data…. so who has your old hard drive or computer?
New virus exploiting a vulnerability in Windows was commissioned for cash – dial M for Murder arrives in cyberspace
Broadband connectivity is shared amongst users – Fair Use policies need to cap bandwidth hogs
Jason Smathers who stole 90 million AoL e-mail addresses and sold them in alphabetical blocks to spammers is sent to prison for a year and a bit. He also has to pay restitution to AoL at the usual inflated level that US courts seem to impose.
e-mails sent by naive people can be tracked to the server using information in the header, and laptops used on insecure WiFi access points can still be traced using the MAC address of the network card or wireless card.
419 scams amazingly attract 20,000 people to part with real money.
Sasser worm author gets suspended sentence from German court.
The European Copyright Directive makes it an offence to alter games consoles so as to circumvent games copying controls. ELSPA has successfully prosecuted a case recently in the UK, and this raises issues about ‘change of use’ modification of platforms such as the xbox.
It all started in May of 2001. I began getting calls from companies I had tried selling security services to in the past but were never interested. Now they needed my help because something happened. It seemed like dozens of people had their websites defaced with the words: “fu*k USA Government, fu*k PoizonBOx.” It was [...]
“I dont really get all this open source malarkey. Do you know some where that spells it out S L O W L Y for us clueless folk!”
The homework was set by a student (who is not clueless at all by any means). Its my own fault for trying to interest people in using [...]
The OPTE project provides views of the distribution of Internet connections and routes
Download a handout for students on organising folders in My Computer. Saves all that stress with failing floppies.
Survey! Question! Read! Recite! Review! is a reading framework that is suggested for University students.
As I find myself teaching a reading / writing based subject (Forensic ICT) to a group of sixth formers and some adults in the evening, I come up against problems with reading, summarising and writing. I have been ‘scaffolding’ complex readings [...]
Forensic ICT lesson
Students searched for information about Adrian Lamo, the ‘homeless hacker’
Then we read page 3 and 4 of Marc Roger’s essay A New Hacker Taxonomy
Students were invited to analyse aspects of Lamo’s ‘career’ using Rogers’ roles
Disagreements! Arguments focussing on what the roles meant! Useful!
Lamo’s minimalist home page provides an example of embedded hypertext – [...]
The Business School hack has highlighted issues of definition around access to information. The (US based) article in The Register by Mark Rasch reports the facts as follows…
Some US business schools farm out processing of Web based applications to a third party Web company
Someone identified a security hole in the system used to process the [...]
“Teddys would be with their user for their entire lives. They would change in shape and form to match the growing sophistication and interests of the person, but each time someone got a new model Teddy, the information from the earlier version would be transferred to the new. As a result, Teddy would always retain [...]
Don Norman is the other half of Nielsen and Norman the usability consultants. He has provided Chapter 7 of his book The Invisible Computer as a Web reading. The title of the chapter is Being Analog – which we as humans are… You can also read other chapters on the MIT Press site and [...]
Last few Drink or Die members are going through the courts – a non-profit cracking and warez ring
The BBC report on the UK conviction of Alex Bell and Steven Dowd now in 2005 after raids in 2001 relating to activity in the mid 90s has me thinking about the difference in timescales in IT and [...]
Is the Lycos Fightback a distributed denial of service attack or not?
Either way, it looks like Lycos have suspended their attempt to hassle the spammers for now, perhaps for fear of retaliation against users.
The idea went as follows
Spammers send these daft e-mails to encourage you to visit their idiotic Web sites selling enhancement products you [...]
SpamAssassin is labelling some of my e-mail as spam. Often it gets it right, but sometimes it gets it wrong (e-mail from my own Web server forms is voted spam).
A rather old but useful article on how SpamAssassin does the sums gives basic information on the multiple rule scoring approach. The gory details are on [...]
A useful article from The Register explaines what to do if your Windows PC gets infected by a virus. The article also mentions a number of free virus checkers and firewalls. I currently use AVG on the reconditioned Windows laptop – looks like time for Avast and Zone Alarm.
The BBC news story on the recent problems with the Cahoot online banking service also mentions an HCFB error where an e-mail was sent to 2,500 people in such a way that they could all see the addresses of the other recipients (CC rather than BCC).
What I find interesting was that this latter e-mail hiccup [...]
The SANS Institute has a good Web site where you can download articles about a wide range of topics – look for the Reading Room link from the front page. There is even a 13 page tutorial on using an Apple Mac laptop running Mac OS X as a forensic analysis station – the Mac [...]
guvf zrffntr unf orra rapbqrq hfvat gur fvzcyr vqrn bs cynpvat gur yrggref bs gur nycunorg ebhaq n qehz naq ebgngvat rnpu yrggre 13 cynprf, fb n orpbzrf z. v’yy or hfvat vg gbzbeebj jvgu fghqragf nf n fvzcyr rkrepvfr. gur fghqragf jvyy unir gb
jbex va cnvef
hfr n gnoyr bs crepragntr serdhrapvrf bs gur yrggref [...]
Bruce Sterling’s 1992 book The Hacker Crackdown is still available free on the Web. Sterling had the uncommonly neat idea of reserving the digital rights to his book and putting out a free copy. As Bruce says…
“The critics were very kind to The Hacker Crackdown, and commercially the book has done well. On the other [...]