Thursday, September 11, 2008

sad, but true

Welcome to VMware-land!
"The most amazing achievement of the computer software industry is its continuing cancellation of the steady and staggering gains made by the computer hardware industry..." -- Henry Petroski

Wednesday, September 10, 2008

Why publish this software?

Threat to computers for industrial systems now serious | InfoWorld | News | 2008-09-10 | By Robert McMillan, IDG News Service

Finisterre released his attack code as a software module for Metasploit, a widely used hacking tool. By integrating it with Metasploit, Finisterre has made his code much easier to use, security experts said. "Integrating the exploit with Metasploit gives a broad spectrum of people access to the attack," said Seth Bromberger, manager of information security at PG&E. "Now all it takes is downloading Metasploit and you can launch the attack."

I have to admit, I will never understand the open source and hacker crowd. Particularly the hackers.

I can understand researching to identify risks.
I can understand developing exploits to further understand and define those risks.
I can even understand publishing an academic style paper on said risks and my research, which was very clever indeed.
I CANNOT understand giving away the frellin' crack for somthing like this. I mean, honestly, isn't this a bit like handing out lock-picking kits at a grade-school?

Creating Hash Values for Strings In MSSQL, DB2 UDB for LUW, and Oracle

It will often occur that we need to search a large character string in a relational database, something like an email address, postal addres...