<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:georss="http://www.georss.org/georss" xmlns:geo="https://www.w3.org/2003/01/geo/wgs84_pos#" >

<channel>
	<title>inspired by grissom &#8211; brain::dump</title>
	<atom:link href="https://mla.apob.net/category/inspired-by-grissom/feed/" rel="self" type="application/rss+xml" />
	<link>https://mla.apob.net</link>
	<description></description>
	<lastBuildDate>Wed, 04 Jan 2006 09:23:21 +0000</lastBuildDate>
	<language>de</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.2</generator>
	<item>
		<title>How To Get Your Network Hacked in 10 Easy Steps</title>
		<link>https://mla.apob.net/2006/01/04/how-to-get-your-network-hacked-in-10-easy-steps/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Wed, 04 Jan 2006 09:23:21 +0000</pubDate>
				<category><![CDATA[english]]></category>
		<category><![CDATA[inspired by grissom]]></category>
		<category><![CDATA[it security]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2006/01/04/how-to-get-your-network-hacked-in-10-easy-steps/</guid>

					<description><![CDATA[While browsing through some website content I found a TechEd 2005 presentation which contained the following slide: How To Get Your Network Hacked in 10 Easy Steps 1. Donâ€™t patch anything 2. Run unhardened applications 3. Use one admin account, everywhere 4. Open lots of holes in the firewall 5. Allow unrestricted internal traffic 6. [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>While browsing through some website content I found a TechEd 2005 presentation which contained the following slide:</p>
<p><strong>How To Get Your Network Hacked in 10 Easy Steps</strong></p>
<p><em>1.</em> Donâ€<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t patch anything<br />
<em>2.</em> Run unhardened applications<br />
<em>3.</em> Use one admin account, everywhere<br />
<em>4.</em> Open lots of holes in the firewall<br />
<em>5.</em> Allow unrestricted internal traffic<br />
<em>6.</em> Allow all outbound traffic<br />
<em>7.</em> Donâ€<img src="https://s.w.org/images/core/emoji/15.0.3/72x72/2122.png" alt="™" class="wp-smiley" style="height: 1em; max-height: 1em;" />t harden servers<br />
<em>8.</em> Reuse your passwords<br />
<em>9.</em> Use high-level service accounts, in multiple places<br />
<em>10.</em> Assume everything is OK</p>
<p>Go ahead, make my day!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Attn: SPAMMERS</title>
		<link>https://mla.apob.net/2005/01/19/attn-spammers/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Wed, 19 Jan 2005 07:20:32 +0000</pubDate>
				<category><![CDATA[english]]></category>
		<category><![CDATA[inspired by grissom]]></category>
		<category><![CDATA[it security]]></category>
		<category><![CDATA[my world]]></category>
		<category><![CDATA[thoughts]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2005/01/19/attn-spammers/</guid>

					<description><![CDATA[Hello you naughty spammer, I&#8217;m very sorry but you won&#8217;t be able to spam me again. Never. I wonder what use this kind of spam has. What&#8217;s the use of spam anyway? Ahhh&#8230; I see, to generate nice stats graphs. 😉 Good Day Mr Spammer.]]></description>
										<content:encoded><![CDATA[<p>Hello you naughty spammer,</p>
<p>I&#8217;m very sorry but you won&#8217;t be able to spam me again. Never.</p>
<p>I wonder what use this kind of spam has.  What&#8217;s the use of spam anyway? Ahhh&#8230; I see, to generate nice stats graphs. <img src="https://s.w.org/images/core/emoji/15.0.3/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>Good Day Mr Spammer.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Knack den Code!</title>
		<link>https://mla.apob.net/2004/12/22/knack-den-code/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Wed, 22 Dec 2004 16:23:48 +0000</pubDate>
				<category><![CDATA[deutsch]]></category>
		<category><![CDATA[inspired by grissom]]></category>
		<category><![CDATA[it security]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/12/22/knack-den-code/</guid>

					<description><![CDATA[Der Ingenieur Rolf Jentzsch glaubt ein unknackbares Chiffrierverfahren entwickelt zu haben. Im Rahmen eines Wettbewerbes hat er einen Preis von 10.000 Euro für denjenigen ausgelobt, dem es als ersten gelingt, eine damit verschlüsselte Datei zu entschlüsseln. Der Wettbewerb läuft noch bis zum 31.12.2005, bietet also noch ausreichend Zeit, die Datei einer Analyse zu unterziehen. Allerdings [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Der Ingenieur Rolf Jentzsch glaubt ein unknackbares Chiffrierverfahren entwickelt zu haben. Im Rahmen eines Wettbewerbes hat er einen Preis von 10.000 Euro für denjenigen ausgelobt, dem es als ersten gelingt, eine damit verschlüsselte Datei zu entschlüsseln. Der Wettbewerb läuft noch bis zum 31.12.2005, bietet also noch ausreichend Zeit, die Datei einer Analyse zu unterziehen. Allerdings gibt es keine näheren Angaben zu dem Verfahren &#8212; es wird auch nicht offengelegt. Die Teilnehmer müssen sich darauf verlassen, dass alles mit rechten Dingen zugeht und nicht etwa ein One-Time-Pad-Verfahren dahinter steckt.</p>
<p>Jentzsch hat sein Verfahren nach eigenen Angaben während des Kalten Krieges in der ehemaligen DDR erfunden, um mit Freunden und Bekannten zu kommunizieren und ihre Privatsphäre zu schützen. Der Autor ist zwar Ingenieur, in Bezug auf Kryptologie aber ein Autodidakt. In der Vergangenheit waren derartige Entwicklungen im Selbststudium selten von Erfolg gekrönt. Weitere Einzelheiten und Teilnahmebedingungen des Wettbewerbs hält die Technische Universität Darmstadt auf ihren CrypTool-Seiten bereit: <a href='http://www.cryptool.de/jentzsch.de.html'>Krypto-Wettbewerb &#8212; Jentzsch&#8217;s Verschlüsselungsaufgabe</a>.</p>
<blockquote><p>zZqSfyrX84hZ?9Njtueu2s4DuyLGuEOwFGjbvzfbWyPLHPkfabqrgUeQfnqbjsja<br />
cljSyIuAlz8LhHjyAI6vKvwcjfOcJT3vwouLwgvrwgssJOemwDhMWH4DBDhsfw1P<br />
WaLKYIjDjMbn6yjI6aeQcMhbw98PeQJH3T3DhwgEhzAmeraswrbrxlisaQiE0qfL<br />
wfwD31tk6auLmEAmqU0yPXdeqoKvwUNA6v5GLH4D0aqifshv5LP8yPK0LLaz8mdz<br />
Pvs2PPKu0qhvZcKT1yyD0rqvbrnwGT3I1vdbyL0r10jHhD3HxnHKunJKdKbqeUMg<br />
rEuDhrGugU0ilmZCkawE1v3vKKWHfLPG0CTLwnZDywgE5m4rZLKvjm0yPvgEhM3D<br />
tDZQajYWatnNSfX8KXvb0KtyizvjPLwrhU0KashE1myEjr1yvBvyiE0LtefjpcvD<br />
3LfQwILc3r1miI5syLqa0y7X0aWTJPLK7HmzzbgsyILvjbjGhLaCiv0qPLgswEuj<br />
vIvaykOswEeD3H01faMIKHxlU43Dxbb8yKsA8CkzyjiEhrHHeCPuvEhFvraC1r3r<br />
fK3Lqj1oqy1H4PHT3THJKIjMfu0GKA4rfCfz5DmCOE3LwvdaXalzvK1LyAmqwQXL<br />
JvXGvGxsaLK1YcwnWD3D1yyfJuhfisJu7CLvXEhzLLZHejjE5mg2lrxjvGuy5a1o<br />
qruq0LuucIey4H5HuV3rqC3vgQgEunvTzbwxaIfs3Ls./<br />
bH!34iqWIIwHZPVL0ynEhLayPvhZrbXKHvWqteisxb8ifs5y5czoqayQGKPTqs0G<br />
LK0DeyLuJH3D1mhnzkfvGvxf3D5T3LsAPXaq1DPWZmgpGv1qwMQ9yahw4vzeBoae<br />
3rPvty4I6CjChvcI0HP2fD4vhb1CeGhs2gdLhbkHxl1iLLGunwZmcsKHkuasMdaD<br />
0vdzQv1svyiv3HjM?Ztivu9eeb5HBaGvyUGHjC3cumdvwwtgayLLzEhMitwIhn3H<br />
PGhzvHyLgwGv1mWaWHmmjqqDiMJ05C4QMExbkiPLBPMcfvZTYsuzPGizQFvahR3D<br />
jyPLdazzCmwr6qKHSKhE3D3DewJE4DhLG/&#8230;/</p></blockquote>
<p>Quelle: <a href='http://www.heise.de'>Heise Online</a> vom 22.12.2004 (<a href='http://www.heise.de/newsticker/meldung/54563'>direkt zum Artikel</a>)</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>what Freud said about sex</title>
		<link>https://mla.apob.net/2004/10/07/what-freud-said-about-sex/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Thu, 07 Oct 2004 18:15:53 +0000</pubDate>
				<category><![CDATA[inspired by grissom]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/10/07/what-freud-said-about-sex/</guid>

					<description><![CDATA[Freud said that the only unusual sexual behavior was not to have any at all. After that, it was only a matter of opportunity and preference. I&#8217;m just wondering why so little people know about this as everybody seems to like citing Freud. For myself I would like an opportunity satisfying my preference, just once [&#8230;]]]></description>
										<content:encoded><![CDATA[<blockquote><p><strong>Freud said that the only unusual sexual behavior was not to have any at all. After that, it was only a matter of opportunity and preference.</strong></p></blockquote>
<p>I&#8217;m just wondering why so little people know about this as everybody seems to like citing Freud.<br />
For myself I would like an opportunity satisfying my preference, just once in a while. Or an opportunity. No preference.</p>
<p>Okay, that&#8217;s not true. I DO have a preference. <em><strong>See:</strong> crush.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>SHA-1 Break Rumored</title>
		<link>https://mla.apob.net/2004/08/18/sha-1-break-rumored/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Wed, 18 Aug 2004 11:32:36 +0000</pubDate>
				<category><![CDATA[inspired by grissom]]></category>
		<category><![CDATA[it security]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/08/18/sha-1-break-rumored/</guid>

					<description><![CDATA[There&#8217;s a rumor circulating at the Crypto conference, which is being held this week in Santa Barbara, that somebody is about to announce a partial break of the SHA-1 cryptographic hashfunction. If true, this will have a big impact, as I&#8217;ll describe below. And if it&#8217;s not true, it will have helped me trick you [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>There&#8217;s a rumor circulating at the Crypto conference, which is being held this week in Santa Barbara, that somebody is about to announce a partial break of the SHA-1 cryptographic hashfunction. If true, this will have a big impact, as I&#8217;ll describe below. And if it&#8217;s not true, it will have helped me trick you into learning a little bit about cryptography. So read on&#8230;.</p>
<p>SHA-1 is the most popular cryptographic hashfunction (CHF). A CHF is a mathematical operation which, roughly speaking, takes a pile of data and computes a fixed size &#8222;digest&#8220; of that data. To be cryptographically sound, a CHF should have two main properties. (1) Given a digest, it must be essentially impossible to figure out what data generated that digest. (2) It must be essentially impossible to find find a &#8222;collision&#8220;, that is, to find two different data values that have the same digest.</p>
<p>CHFs are used all over the place. They&#8217;re used in most popular cryptographic protocols, including the ones used to secure email and secure web connections. They appear in digital signature protocols that are used in e-commerce applications. Since SHA-1 is the most popular CHF, and the other popular ones are weaker cousins of SHA-1, a break of SHA-1 would be pretty troublesome. For example, it would cast doubt on digital signatures, since it might allow an adversary to cut somebody&#8217;s signature off one document and paste it (undetectably) onto another document.</p>
<p>At the Crypto conference, Biham and Chen have a paper showing how to find near-collisions in SHA-0, a slightly less secure variant of SHA-1. On Thursday, Antoine Joux announced an actual <a href="http://www.mail-archive.com/cryptography@metzdowd.com/msg02554.html">collision</a> for SHA-0. And now the rumor is that somebody has extended Joux&#8217;s method to find a collision in SHA-1. If true, this would mean that the SHA-1 function, which is widely used, does not have the cryptographic properties that it is supposed to have.</p>
<p>The finding of a single collision in SHA-1 would not, by itself, cause much trouble, since one arbitrary collision won&#8217;t do an attacker much good in practice. But history tells us that such discoveries are usually followed by a series of bigger discoveries that widen the breach, to the point that the broken primitive becomes unusable. A collision in SHA-1 would cast doubt over the future viability of any system that relies on SHA-1; and as I&#8217;ve explained, that&#8217;s a lot of systems. If SHA-1 is completely broken, the result would be significant confusion, reengineering of many systems, and incompatibility between new (patched) systems and old.</p>
<p>We&#8217;ll probably know within a few days whether the rumor of the finding a collision in SHA-1 is correct.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>while thinking about the world i live in&#8230;</title>
		<link>https://mla.apob.net/2004/08/17/while-thinking-about-the-world-i-live-in/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Tue, 17 Aug 2004 20:28:37 +0000</pubDate>
				<category><![CDATA[inspired by grissom]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/08/17/while-thinking-about-the-world-i-live-in/</guid>

					<description><![CDATA[&#8230; &#8222;There is no spoon!&#8220;]]></description>
										<content:encoded><![CDATA[<p>&#8230;<br />
&#8222;There is no spoon!&#8220;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>This could be a real Grissom!</title>
		<link>https://mla.apob.net/2004/07/27/this-could-be-a-real-grissom/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Tue, 27 Jul 2004 19:23:27 +0000</pubDate>
				<category><![CDATA[all irish]]></category>
		<category><![CDATA[inspired by grissom]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/07/27/this-could-be-a-real-grissom/</guid>

					<description><![CDATA[An nì a thig leis a’ghaoith, falbhaidh e leis an uisge. What comes with the wind will go with the water.]]></description>
										<content:encoded><![CDATA[<p><strong>An nì a thig leis a’ghaoith, falbhaidh e leis an uisge.</strong><br />
<em>What comes with the wind will go with the water.</em></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title></title>
		<link>https://mla.apob.net/2004/07/19/4743/</link>
		
		<dc:creator><![CDATA[Matthias Läßig]]></dc:creator>
		<pubDate>Mon, 19 Jul 2004 19:14:45 +0000</pubDate>
				<category><![CDATA[inspired by grissom]]></category>
		<guid isPermaLink="false">http://mla.apob.net/blog/archives/2004/07/19//</guid>

					<description><![CDATA[&#8222;If you chase two rabbits, you lose them both.&#8220; Gil Grissom]]></description>
										<content:encoded><![CDATA[<blockquote><p>&#8222;If you chase two rabbits, you lose them both.&#8220;</p></blockquote>
<p><em>Gil Grissom</em></p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
