Wednesday, August 29, 2007

Point, Click ... Eavesdrop: How the FBI Wiretap Net Operates

This is sweet.. the FBI have been hackin the darn system for years !!

"the surveillance system, called DCSNet, for Digital Collection System Network, connects FBI wiretapping rooms to switches controlled by traditional land-line operator and internet-telephony providers and cellular companies. It is far more intricately woven into the nation's telecom infrastructure than observers suspected." - [ Source ]

Many of the details of the system and its full capabilities were redacted from these documents

Monday, August 20, 2007

Analyses of Cyber Jihadist Forums and Blogs

This post will provide links to cyber jihadist communities, with the idea to aggregate a decent sample of how cyber jihadists use, and abuse the Internet to achieve their objectives.

Tuesday, August 07, 2007

She's a chip freak !!

oh is a chip freak..she is pretty nosy when it comes to chips.. !!

300 interview questions

oh heres a nice list of questions that a PM will need to answer
My fav's so far..
There was a situation where more than one-way to accomplish the same task. Your onsite tech lead and offshore tech lead has different opinions about doing this and the feelings were very strong. Both are very important to you. How do you react to this ?

Saturday, August 04, 2007


OK after all that time .. its about Time I hung out a personal kudo. After all its historical correct ??

I'm on my way to Mars !!

This is too cool !!

"the spacecraft is now spinning up to 70 revolutions per minute... Third stage separated and ignited! Go go go...

Good quality data from Hawaii...  TECO! Third stage cutoff!

Everything nominal... With that final third-stage burn, Phoenix is now on its Mars-bound trajectory. "

..and on it goes a  silica glass mini-DVD with a quarter million names on it -- including mine !!

I wonder if some Martian can beam up all these names into some intraspace galaxy which is not our own !!

Hamster & Gmail

Gmail account 'hacked' over wi-fi hotpsot..

"Prior to the demonstration, which involved the live hijacking of a Google mail account (GMail), many sites were thought to be safe because they encrypted the data swapped back and forth when people login.

However, Mr Graham carried out his attack on the unencrypted cookies, tiny text files, many sites use to identify people that regularly return.

The tools created by Mr Graham, called "Hamster" and "Ferret", watch the traffic flowing in and out of public wi-fi hotspots and let attackers grab cookies as they are passed back to people logging in to their webmail or social network account."

What do I do with a Baby bird ?

for the last couple of days, I have been trying to nurse back a baby pigeon that fell on my balcony. Now it just crouches in a corner and hardly does anything. But, I do see a pair of older pigeon's always around, I am thinking its the parents of the poor bugger.

I am getting a little zissed off and want to throw this little bugger over the balcony (no not literally !) but, rather take him down and throw s/he into the bushes. As you can see, my cat seems to love to stalk it !!