Computer Wonder Woman Stand Strong

 

Computer Wonder Woman

Great ad on women vs. men in power positions.
70% of men think that women need to downplay their personality to be accepted. Double standards hold women back. Because when you stand strong, you shine.

About IEEE Computer Society

IEEE Computer Society is the source that computing professionals trust to provide high-quality, state-of-the-art information on an on-demand basis.

About IEEE Computer Society

IEEE Computer Society is the world’s leading computing membership organization and the trusted information and career-development source for a global workforce of technology leaders including: professors, researchers, software engineers, IT professionals, employers, and students. The unmatched source for technology information, inspiration, and collaboration, IEEE Computer Society is the source that computing professionals trust to provide high-quality, state-of-the-art information on an on-demand basis. The Computer Society provides a wide range of forums for top minds to come together, including technical conferences, publications, and a comprehensive digital library, unique training webinars,professional training, and a TechLeader Training Partner Program (T2P2) to help organizations increase their staff’s technical knowledge and expertise. To find out more about the community for technology leaders, visit http://www.computer.org.

Virtual machine used to steal crypto keys from other VM on same server

Virtual machine used to steal crypto keys from other VM on same server

By Dan Goodin Ars Technica Nov 6 2012
Piercing a key defense found in cloud environments such as Amazon’s EC2
service, scientists have devised a virtual machine that can extract
private cryptographic keys stored on a separate virtual machine when it
resides on the same piece of hardware.
The technique, unveiled in a research paper published by computer
scientists from the University of North Carolina, the University of
Wisconsin, and RSA Laboratories, took several hours to recover the
private key for a 4096-bit ElGamal-generated public key using the
libgcrypt v.1.5.0 cryptographic library. The attack relied on
“side-channel analysis,” in which attackers crack a private key by
studying the electromagnetic emanations, data caches, or other
manifestations of the targeted cryptographic system.
One of the chief selling points of virtual machines is their ability to
run a variety of tasks on a single computer rather than relying on a
separate machine to run each one. Adding to the allure, engineers have
long praised the ability of virtual machines to isolate separate tasks,
so one can’t eavesdrop or tamper with the other. Relying on fine-grained
access control mechanisms that allow each task to run in its own secure
environment, virtual machines have long been considered a safer
alternative for cloud services that cater to the rigorous security
requirements of multiple customers.
“In this paper, we present the development and application of a cross-VM
side-channel attack in exactly such an environment,” the scientists
wrote. “Like many attacks before, ours is an access-driven attack in
which the attacker VM alternates execution with the victim VM and
leverages processor caches to observe behavior of the victim.”
[…]
http://arstechnica.com/security/2012/11/crypto-keys-stolen-from-virtual-machine/

BITAG Announces Next Technical Topic on Port Blocking

BITAG Announces Next Technical Topic on Port Blocking

Denver, CO (November 7, 2012):  The Broadband Internet Technical Advisory Group (BITAG) is pleased to announce the launch of a new technical review on the topic of Port Blocking best practices. BITAG’s Technical Working Group elected to take up this topic through a self-initiated vote, as Port Blocking is of interest to many stakeholders in the Internet ecosystem.