Experimental Flash Sites

These sites have news, information and techniques for doing weird stuff in Flash. Some very cool stuff in there.

http://www.levitated.net/
http://www.chewinggumfortheeyes.com/
http://www.nanolabs.net/
http://www.ultrashock.com/
http://www.gotoandlearn.com/

Bubbles around your hull save 20% fuel

The Tokyo National Maritime Research Institute’s Advanced Maritime Transport Technology Department has thought up a system that allows ships hulls to be surrounded by a blanket of bubbles, which keeps away the water from the hull, reducing friction and drag and accounting for the efficiency increase of moving through water. In 2003 > 90% of all goods were transported by ship – which means that this could be a massive environment and fuel saver.

Pre murder suspects

A group of psychologists have created a list of the 100 most dangerous murderers in London – before they’ve committed the murders. This minority report type study is being hailed as being ‘obscene’, even though apparently spying on your citizens day and night isn’t. There are plans to arrest the would be murderers allthoug no one knows under what laws this could be done. Why don’t they watch them or put them into some kind of therapy?

Smog eating coating

Apparently materials containing titanium dioxide break down smog. Structures and roads have been coated with this stuff, which has lead to a reduction up to 60% (depending on light and temperature) of smog in that area. The material itself stays clean as well, reducing cleanup costs. There have been no long term studies, and considering reagents usually break down after a while, the coatings may have to be reapplied, but with an increase in price of EUR. 100,- for the facade of a 5 storey building over traditional paint or plaster, this sounds do-able to me.

Tomb Raiding

Tomb Raiders exist and treasure hunters are still being prosecuted for beating archaeologists to the find. Why? Because buried treasure is a non-renewable resource which tells us about our history, especially when the finds are taken in context, and thus a crime to humanity.

In Italy a huge trial was held over 10 years, where Marion True and Robert E. Hecht were exposed at the top of a huge network of dealers, middlemen and art curators. Over 200 people were called in testimony and Italy wants their riches back. This was called the Medici conspiracy

Peruvian history is being dug up and sold to museums and private collectors at a huge rate. The writer of Stealing History thinks the problem is more due to curators than the raiders themselves.

In Egypt archaeologists were pointed to a particularly rich burial site of three dentists by captured tombraiders.

In China four people were severly punished for looting tombs in the Shaanxi province.

Cambodians are selling antiquities to any tourist on the street – 20% of which admit to buying them there.

In Iraq the looting continues in museums and palaces.

This article has quite a bit of history based on a Cyprus case and states that the pieces are placed on e-bay as well as valuing the trade at $5 – $6 billion per year.

There are three basic levels of operatives in the black market trade in art and antiquities: tombaroli, middle men and customers. Tomb robbers and customers are many but the middle men – wholesalers and primary dealers – are few and form closely connected mafias with regional specialities. Key figures at each level are known to the authorities as well as to scholars. Istanbul, Munich, Zurich, London and New York are hubs of the trade. Artefacts flow along routes used by drug dealers and arms merchants.

Since penalties for possession of loot are light, they buy art to launder profits from their other enterprises.

Dutch Elections

Well, lets face it – our choices all suck. There are several websites in the Netherlands that allow you to match your choices with a political party, of which none of the matches are larger than 50% and the questions are framed in such a way that you end up answering in a manner diametrically opposed to your wishes unless you read the question very carefully.
An advantage of the Dutch political system is that the government rules by coalition, so that means there are quite a few viable political parties. The downside to this is that if you want to research all of them, you have to spend quite some time looking through poorly designed websites for the party programmes which are often hidden away somewhere in a PDF download.
Now there are a few things freaking me out in the West at the moment, so I’ve chosen two main points to look at in the party I’m going to be voting for:
1) “Security”
2) Defence.

1) “Security”
Now this one winds me up no end – you peel away the veneer of the word “security” and you find a cesspit of privacy invasion and personal control. ID Cards, camera’s, unwarranted phone and internet tapping, incarceration without due process, legal systems that ignore the “innocent untill proven guilty” idea, centralised databases, etc etc etc. This reminds me of Nazi Germany and what really gets me is that almost every political party is for more “security”. As a matter of fact, the reason that the Netherlands was the greatest exporter of Jews during WWII was because it had the best personal registration system in the world at the time. People say it won’t happen again – but no one can give me that garauntee. The world changes, and we’re picking on all sorts of people here – Moroccans, Antilleans and with that kind of data at a politicians disposal, who says he won’t use it to blackmail any people opposing him / her?

The argument is trotted out that people can use these tools to catch paedofiles – after all, who wouldn’t be against harming our little children?! But all criminals are only caught after due and diligent investigation – which means that getting permission from a judge after considering the merits of the case should be a part of the investigation. Randomly spying on people without their consent doesn’t solve paedofelia – investigation through competent and thourogh policing does.

Then we get the “if you’re not doing anything wrong, what have you go to fear?” argument. Well, it’s my life, and I want it private. If I didn’t do anything wrong, why do you have to spy on me? And would you have a government camera put up in your bedroom over your bed if you accept that argument?

There is no excuse for random invasions of privacy.

2) Defense
We’re living in a much more unstable world than during the Cold War and we need to adapt to it. Now the Netherlands is doing a very good job in this respect – a professional, competent armed forces, restructured around mobility and operations other than war (OOTW), well versed in jointness (working with armed forces from other countries) and technologically advanced. We are doing a good job of protecting our foreign and local interests and it’s sheer naivite to expect that because it’s going well now we can stop investing in our armed forces. We need to keep changing to adapt to different global threats, as we do face them in the whole scale, from all out war, to undefined threats such as “terrorism” as well as disaster relief. For that we need new and diverse equipment, as well as manpower and training. We also need logistical support, transportation, and big guns to keep us safe. If we want to have a say in international politics, we need a big stick to help apply our say – even if it is by not using the stick (allthough we are using it now and heavily). We can’t expect the international community to do our dirty work for us and expect to feed our consumptive economy (which is one of the largest in the world) of the backs of our allies.
The Netherlands is a partner in an ill conceived second rate fighter programme called JSF. We should be investing in serious military hardware – F-22, Eurofighter, Gripen, Rafale, whatever gives us our best protection. Not another F-16 which won’t be wanted in coalitions untill it has had a mid life update!

So where does this leave me? Currently the only party that acknowledges my right to personal freedom and privacy is D66. The rest (traditionally I vote VVD) are all too intent in setting up a police state. Unfortunately D66 thinks we can have this liberty without protection, which I consider a bit stupid. Still, considering that D66 will never garner enough votes to actually become a dominant party in the coalition government, I’ll vote for them in the hope that the big parties (CDA, VVD, PvdA) will get the right message – Leave me to live my life the way I want to!

Debian Security Tools

Debian comes installed standard without much in the way of active security (such as a firewall, a file state checker, disk encryption, etc) but has got the packages to implement an actively secure environment. Given a little work you can securify Debian with existing packages quite nicely. This article has a nice list of the packages Debian has on offer and what they’re for:

Table 1. Some Security-Enhancing Packages in Debian 3.1

Package Name Description
aide, fam, tripwire, osiris File/system integrity checkers.
bastille Excellent, comprehensive and interactive (yet scriptable) hardening utility.
bochs Bochs virtual x86 PC.
bozohttpd, dhttpd, thttpd Minimally featured, secure Web server daemons.
chrootuid, jailer, jailtool, makejail Utilities for using and creating chroot jails.
clamav General-purpose virus scanner.
cracklib2, cracklib-runtime Library and utilities to prevent users from choosing easily guessed passwords.
filtergen, fireflier, firestarter, ferm, fwbuilder, guarddog, mason, shorewall Tools for generating and managing local firewall policies.
flawfinder, pscan, rats Scripts that parse source code for security vulnerabilities.
freeradius, freeradius-ldap, etc. Free radius server, useful for WLANs running WPA.
frox, ftp-proxy FTP proxies.
gnupg, gnupg2, gpa, gnupg-agent GNU Privacy Guard (gpg), a versatile and ubiquitous e-mail- and file-encryption utility.
harden, harden-clients, harden-servers, etc. Actually an empty package containing only scripts that install and un-install other packages so as to improve system security.
ipsec-tools, pipsecd, openswan, openswan-modules-source Tools for building IPSec-based virtual private networks.
libapache-mod-chroot, libapache2-mod-chroot Apache module to run httpd chrooted without requiring a populated chroot jail.
libapache-mod-security, libapache2-mod-security Proxies user input and server output for Apache.
oftpd, twoftpd, vsftpd Minimally featured, secure FTP server daemons.
privoxy Privacy-enhancing Web proxy.
psad Port-scan attack detector.
pyca, tinyca Certificate authority managers.
selinux-utils, libselinux1 Utilities and shared libraries for SELinux.
slat Analyzes information flow in SELinux policies.
slapd OpenLDAP server daemon.
squidguard Adds access controls and other security functions to the popular Squid Web proxy.
squidview, srg Log analyzers for Squid.
syslog-ng Next-generation syslog daemon with many more features than standard syslogd.
trustees Extends file/directory permissions to allow different permissions for different (multiple) groups on asingle object.
uml-utilities User-mode Linux virtual machine engine for Linux guests.

In addition to the local security-enhancing packages in Table 1, Debian includes many tools for analyzingthe security of other systems and networks. Table 2 lists some notable ones.

Table 2. Security Audit Tools in Debian 3.1

Package Name Description
dsniff, ettercap Packet sniffers for switched environments.
ethereal, tcpdump Excellent packet sniffers.
fping Flood ping (multiple-target ping).
idswakeup Attack simulator for testing intrusion detection systems (IDSes).
john John the Ripper, a password-cracking tool (legitimately used for identifying weak passwords).
kismet Wireless LAN sniffer that supports many wireless cards.
nessus, nessusd, nessus-plugins Nessus general-purpose security scanner.
nmap Undisputed king of port scanners.
snort Outstanding packet sniffer, packet logger and intrusion detection system.