Category Archives: Security

ATM + Pipe Organ = Art?

A Diebold Opteva 562 cash dispenser has been set into the centre of a pipe organ for an art exhibit titled “Algorithm” at the U.S. Pavilion for the 54th International Art Exhibition.

Each financial transaction that visitors conduct generates a unique musical score that produces randomized notes and chords at varying degrees of volume by driving pressurized air through pipes selected via the ATM keyboard.

I bet the notes are not truly random.

And the second thing that comes to mind are the televangelist priests begging for money and keeping two sets of accounting books. Not sure if that was the idea.

ATMorgan

EC2 Security Group Support

EC2 application instances can now restrict traffic that they will accept to a specific load balancer by specifying a Security Group:

To do this, you call the DescribeLoadBalancers API to get the name of the Security Group, and then include that group in the group list when you subsequently launch some EC2 instances. The name of the Security Group can also be obtained from the load balancer details pane in the AWS Management Console.

Happy IPv6 Day!

Today is World IPv6 Day, a 24-hour test of IPv6.

The goal of the Test Flight Day is to motivate organizations across the industry – Internet service providers, hardware makers, operating system vendors and web companies – to prepare their services for IPv6 to ensure a successful transition as IPv4 addresses run out.

The BBC (www.bbc.co.uk), for example, is now running on the IPv6 address 2001:4b10:bbc::1

Even if you don’t join the fun, you can test your connection for readiness.

RIPE NCC is providing a running measurement of status.

Static Checks for Dynamic Security Policies

Paper presented by Adam Chlipala at the USENIX Symposium on Operating Systems Design and Implementation 2010.

We present a system for sound static checking of security policies for database-backed Web applications. Our tool checks a combination of access control and information flow policies, where the policies vary based on database contents. For instance, one or more database tables may represent an access control matrix, controlling who may read or write which cells of these and other tables.