Walking the Security Tightrope

Some 38 years ago, I started working for the systems group at CUCCA (Columbia Center for Computing Activities).  I was fresh out of engineering school (Columbia, by coincidence) and a brand new junior systems programmer. In those days, we actually wrote modifications to the operating system in assembly language – it was a lot of…

Details

Deja Vu All Over Again – DDoS Amplification Attacks

Yep, it’s time to use this title again. This time we’re talking about Distributed Denial of Service (DDoS) amplification attacks. One of the lists I monitor posted the following: Christian Rossow has done some great work on DDoS.  The two interesting papers are: “Exit from Hell? Reducing the Impact of Amplification DDoS Attacks,” read here. The…

Details

Anti-Viral

Aggregating is the inverse of broadcasting.   What complicates this is that many technologies are now used for both.  Cell phones are the best example.  They are a device originally designed for communication. Their original purpose was  for transmitting information between individuals and they have evolved into one that can broadcast that information via social media. …

Details