How to protect yourself in an “external” network world …
Recently there has been a lot of talk about the failure of WEP encryption in 802.11b to protect wireless users. This link is to a simple application which can quickly break the WEP keys. These types of tools have been around for years, and can be used on ANY network which is not physically secured!

The key to solving these issues is to look at the medium – wireless – as an “external” network. It is one which exists “outside” of your firewall! If you view it this way, you then can begin to solve the “problem” of security using standard off the shelf solutions.

The entire Virtual Private Network (VPN) market was created to solve this exact issue, and is the solution being used by networking companies such as Novell. Communications over wireless is no different than communications over any network that is outside of your control … and it requires a full end-to-end security solution. That is what a VPN is. Even if you were in a hotel, communicating over a wired network, your traffic could be intercepted and captured. Again, most companies would use a VPN for their employees in these scenarios …and so wireless is no different.

If you are considering deploying wireless for your employees … even for use at your company offices … install the wireless access points OUTSIDE your firewall, and use a VPN solution for them to communicate into the network. The benefit is that it will secure your corporate communications ANYWHERE!

This program breaks the WEP encryption and delivers the key: I have mixed feelings about posting a link to this software, but it’s necessary because it’s widely available. Running this software against anyone’s network except your own (or one that you have authorized, written permission to crack) could constitute illegal cracking in many jurisdictions worldwide. Simple ownership of this program might also be illegal in some countries. Note that cracking WEP encryption is not covered by the DCMA, which has resulted in charges against people cracking Adobe eBook and Hollywood DVD encryption. Those schemes are copyright-protection methodologies that include encryption; WEP is a general-purpose encryption system which is not design specifically to protect copyrighted materials.

[80211b News]

Distributed, replicated file and data storage …
This is a project that resembles the work of the Freenet organization … only this has the backing of Microsoft! They are creating a distributed set of shared storage as a solution for fault tolerant data protection. A group of people form a “replica ring” of sorts … and begin to store files on each others file systems. There is encryption and meta-directory capabilities which make this a very likely future.

MIT Technology Review: Fault-Tolerant File Storage. That earth-shaking experience got Theimer, then an operating systems researcher at Xerox PARC, thinking about how to make computer file storage systems radically more fault tolerant. His work has helped to lead to Farsite, a fail-safe storage technology being created at Microsoft. [Tomalak’s Realm]

Very cool “sniffer” application …
I couldn’t help but read through this application description. Very innovative … I really like it. This application not only “sniffs” IP traffic off any Internet connection, it looks for images being transferred over HTTP connections, and grabs the images … displaying them for your viewing pleasure! (Or displeasure!)

What I really like is that this demonstrates how insecure your connections can be … it looks for specific data types and snatches them … and could be a very usefull tool for administrators. This again shows how VPNs and SOCKS proxies can really provide you more security … if implemented correctly.

Driftnet 0.1.1 (Default). Picks out and displays images from network traffic. [freshmeat.net]

Impressive Internet statistics … evidence of much …
I came across this web site on another stock discussion thread. I really liked the statistics and information that is provided here for a few reasons.

The original post was made about measuring the impacts of the terrorist attacks at the World Trade Center on the Internet and Internet connectivity. The writer commented on the hundreds of networks which were effected during that fateful Tuesday event. The measurements of the BGP routing tables were used to see what occurred.

Obviously this relates directly to ways that we can monitor, manage, and maintain the human organism that we are creating. The mass connectivity that is forming at a global level, can now be looked at in many new ways, and I can envision when we have new tools which will relate the various networks to the services that are provided by them. This will then provide information on where redundancy makes sense, and where we are going to want to build in extra security services.

The last area that I can see here is the relation to the Singularity. If you are following the writing on the Singularity then you might have seen the work of Ray Kurzweil and his propositions on the measuring of accelerating change. He has presented a series of graphs which measure various attributes of human evolution and technological evolution. If you look a these graphs of BGP route increases, you’ll recognize the predictable pattern …

Two XDrive articles in one week …

Windows XP is going to use XDrive …
It appears from this ZDNet article that Windows XP is going to be offering XDrive on the desktop … or advertising a partnership on the desktop. I’m wondering if this is being done with closed, proprietary protocols, or with any WebDAV (or other?) standard protocol and solution.

Another failure being designed before our eyes?
I am always amazed when these types of adventures begin. IMHO, I believe that they are doomed to fail.

First, their storage costs are *so* expensive … why would I pay ~$70/GB/Month for storage, when I can buy a 30GB harddrive at Costco for ~$140?

Second, their main costs are not involved in the storage … it’s the backbone network costs. They are having to pay for the bandwidth for user to send and retrieve data across the backbone of the Internet … to their centralized location.

The way that I believe that this is going to be solved is when every ISP get’s into the storage and caching market … they’ll realize that they can offer their users storage and backup services for very agressive prices … and they already own the bandwidth of the last mile to their users.

Xdrive Sees Outage, Shelves Free Storage for Fee System. The Santa Monica, Calif. provider of storage for end users experiences a brief outage and gives up on giving out free storage for a subscription-driven model geared toward businesses. [internetnews.com: Product News]

Who is going to pay these centralized guys these rates? If people do, I don’t think it will last … I think they are dead already. I’m looking at how this will relate to, and effect, our Novell iFolder solution? We are putting any corproation or ISP into this business. So if an ISP installs iFolder for their customers, they could be getting a chunk of this revenue …

Cool little administration and management tool …
This is a very cool architecture for a management and administration tool. It is a script based agent that can be easily configured to monitor a variety of sources, generate ‘alarms’, which can trigger a variety of scripted actions. Simple, yet elegant …

PIKT 1.13.0pre8 (Default). An innovative new systems administration paradigm. [freshmeat.net]