Search n00bz.net
Friday
Jul092010

Facebook's most popular

I don't know about you but I am impressed that General Larry (Pants on the Ground) beat out LeBron and Jigga.

http://www.huffingtonpost.com/2010/07/09/facebook-most-popular-the_n_640965.html

Thursday
Jul082010

Flash on the iPad

I have an iPad and don't see the need of Flash on it.  However, I have also hacked/moded so many things just because I could so having a need isn't really a requirement.

http://www.engadget.com/2010/07/07/how-to-install-flash-on-your-jailbroken-ipad-for-real/

Thursday
Jul082010

FaceTime (part 2: SIP and Data Streams) 

Packetstan post the second installmemt of the series looking at the last two components of FaceTime: SIP and the UDP stream information.

http://www.packetstan.com/2010/07/special-look-face-time-part-2-sip-and.html

Thursday
Jul082010

The Code in the US Cyber Command’s Logo

Answer below:

 

The U.S. military’s new Cyber Command is headquartered at Ft. Meade, Maryland, one of the military’s most secretive and secure facilities. Its mission is largely opaque, even inside the armed forces. But the there’s another mystery surrounding the emerging unit. It’s embedded in the Cyber Command logo.

On the logo’s inner gold ring is a code: 9ec4c12949a4f31474f299058ce2b22a

“It is not just random numbers and does ‘decode’ to something specific,” a Cyber Command source tells Danger Room. “I believe it is specifically detailed in the official heraldry for the unit symbol.”

“While there a few different proposals during the design phase, in the end the choice was obvious and something necessary for every military unit,” the source adds. “The mission.”



Read More http://www.wired.com/dangerroom/2010/07/solve-the-mystery-code-in-cyber-commands-logo#ixzz0t6V8xpZy


The mission statement of the USCYBERCOM is "USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries."

Heading over to http://www.miraclesalad.com/webtools/md5.php and entering the text results in the hash: 9ec4c12949a4f31474f299058ce2b22a

 

 

Wednesday
Jul072010

iPhone FaceTime and Firewalls

As some may have discovered, showing off FaceTime on your new iPhone while on your corporate network resulted in the demo fail! 

Apple has posted on their support site that to use FaceTime on a restricted Wi-Fi network, port forwarding must be enabled for ports 53, 80, 443, 4080, 5223, and 16393-16472 (UDP).

http://support.apple.com/kb/HT4245

Packetstan has done some analysis of the FaceTime protocol using WireShark.

http://www.packetstan.com/2010/07/special-look-face-time-part-1.html