Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
Sorting the Mail: Agile Databases, Vulnerable Appl...
 
SSH and Known_Hosts Vulnerabilities Threaten Grid
 
Service Research: Focusing on Requirements for Tec...
 
TiddlyWiki: Ohmygosh, I'm in Love.
 
3I: Individualized Interactive Instruction
 
Three Defects We Can Do Without: Memory Leaks, Buf...
 
Windows Genuine Advantage: So, did I fail the test...
 
Hark, Is That a Pattern I See Before Me?
 
NSS2: All Things to All People through Perfect Sof...
 
Are You A Problem Witch or a Solution Witch?

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-05-29

 

The Same Old Mistakes, Over and Over Again

ACM News Service: Scientist Blames Web Security Issues on Repeated Mistakes.  It is suggested in this blurb that the Internet’s vulnerability stems from repeatedly commiting the same mistakes and overworking the critical infrastructure’s intended use.  There are two observations that stand out for me:

  • The simplification of using dedicated services instead of multipurpose devices
  • The ultimate reliability collapse, following continued abuse, will lead to government regulation.

Jack M. Germain’s 2005-05-24 E-Commerce Times article features Peiter Zatko’s observation that the Internet is heading for a catostrophic failure, and that it is in no one’s interest for that to happen.

From Zatko's perspective, Internet security issues won't go away until programmers stop tainting code. Program coding is based on trust, but that trust is misplaced when programmers create access holes.

Tainted coding occurs through calls within a program for certain convenience actions. For example, a program will contain code calling for access to certain files or links to other computers.

Hackers put these coding vulnerabilities to good use. They easily tap into binary executables, Zatko said.

 There seem to be two key ideas: First, that the practice of putting modifications on top of modifications — whether protocols or programs — has to stop and, secondly, the fundamental flaws can and must be repaired.  Zatko also predicts that this will only happen when it finally becomes too expensive not to.

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $