Mark's Notebook

My sketchbook, code and other things I'm working on.

Sep 27, 2005 - 2 minute read - Comments - Public Interest

Serenity – Movie Review

Serenity

Four Stars ****

The Poster    I was invited to the Preview of Serenity on Tuesday September 27, 2005.

   Having not seen but two of the TV shows this movie is based on, and the two I saw, where not very satisfying, I was hoping the movie would stand on it’s own (because I don’t know  about the plot) and build the characters for me so when I return to the show, (Waiting for me on TiVo) I would have some ideas of what it is about.

   I WAS NOT DISAPPOINTED.

   This was a very good movie. I learned to love the characters in short order.  The plot is good. The actions are GREAT and the special effects are all there. 

   Serenity, is not a high drama like a StarWars.  It’s more of a made for TV movie like StarTrek Next Gen.  But it is FUN.  This is the kind of movie I’d love to return to every few months for the next installment. 
 

  

    I attended the Grand Opening of the new APPLE computer store in Oklahoma City on Saturday morning September 25. I got there at about 5:30 and there was already 50 people there. There are lots of stores in town that sell Apple computers. Some even sell apple exclusively. But a TRUE Apple store is a little different. Apple stores open with lots of FAN-fair. Literally.

Sep 10, 2005 - 6 minute read - Comments - Information Security

Zero Install War Driving

[]1

I have written about War Driving before so why do it again?

It has become so easy to setup a war driving

system now it worth another go. In this case you don’t have to install ANY software on your

system.  Zero.  You can to it all with a “Live CD”.

Here is what you need and I used.

(NOTE: Remote Exploit is working on a new version of Auditor called Back/Track. It is a fusion of the best two live security CDs, Auditor and WHAX.)

I have written about War Driving before so why do it again?

It has become so easy to setup a war driving

system now it worth another go. In this case you don’t have to install ANY software on your

system.  Zero.  You can to it all with a “Live CD”.

Here is what you need and I used.

(NOTE: Remote Exploit is working on a new version of Auditor called Back/Track. It is a fusion of the best two live security CDs, Auditor and WHAX.)

]5

  • WiFi adapter –

    [

    NETGEARwireless PC Care (MA401)]6

    I have also used a

    [

    Orinoco gold]7. This card is nice because it has a connection for an external antenna.

  • Thumb Drive –

    [[]1

I have written about War Driving before so why do it again?

It has become so easy to setup a war driving

system now it worth another go. In this case you don’t have to install ANY software on your

system.  Zero.  You can to it all with a “Live CD”.

Here is what you need and I used.

(NOTE: Remote Exploit is working on a new version of Auditor called Back/Track. It is a fusion of the best two live security CDs, Auditor and WHAX.)

I have written about War Driving before so why do it again?

It has become so easy to setup a war driving

system now it worth another go. In this case you don’t have to install ANY software on your

system.  Zero.  You can to it all with a “Live CD”.

Here is what you need and I used.

(NOTE: Remote Exploit is working on a new version of Auditor called Back/Track. It is a fusion of the best two live security CDs, Auditor and WHAX.)

]5

  • WiFi adapter –

    [

    NETGEARwireless PC Care (MA401)]6

    I have also used a

    [

    Orinoco gold]7. This card is nice because it has a connection for an external antenna.

  • Thumb Drive –

]8

Sep 10, 2005 - 1 minute read - Comments - Personal News

H Biddies

{enclose HiBiddies.mp3} This was my first attempt at a PodCast shout-out to the Biddies. �

Jan 22, 2005 - 2 minute read - Comments - Information Security

One Time Pad (OTP) login project

    I’m starting a software development project. I haven’t development any software for a long time. But this project is something I’ve wanted for a long time and It’s looking so simple I can taste it.

    Security based on obscurity is bad. Computer access based on simple passwords is an example. Anyone who knows the password can use it. Lots of computer equipment require their passwords to be sent across the network in the open using telnet.

    I want to protect the system I use with a one time pad (OTP). For each login there would only be one password of randomly selected characters.