Posts

A consistent maximum size for data compression

In February, I wrote about an experiment in data compression. The resulting algorithm is lossless and has an unanticipated virtue: it yields a compression that is consistent across all data types, as it indiscriminately reduces it to the type integer as a primary step. This results in a theoretical max value for storing bulk data. While some data types may respond better to specialized compression strategies, ALL data reduces by the SAME ratio when considered by [modified] "Golumb" compression.  This can apply to storage estimates.

Is Listing Axiomatic?

Choices in behavior are more pronounced when they result in pain from consequence (mental anguish) or corporal discipline (physical pain response.) I asserted that this results in a binary tree of possible characters in any individual. However, some choices are not strictly binary, resulting from a list instead.  Machiavelli's book, "The Prince," is authoritative for it's use of binary logic. However, the necessity of "Discourses On Livy," points out that The (unabridged) Prince is not exhaustive of all government.  I theorize the omissions are the result of dichotomies based on lists, which are divided into a single major choice contrasted against all others in the list. Information not in The Prince would be found in subsections treating on list headings abbreviated under an umbrella choice that is contrasted to a single opposing option. I hasten to admit that speaking authoritatively on these would be challenging, but also erudite and worthwhile. However,...

Control groups in Nature v Nurture studies need to include IDENTICAL ENVIRONMENTS.

In my book "Ethan And Emma Teach Dating," I asserted that choice has more influence in forming character than genetics (nature,) OR environment and stimuli (nurture.) Extant research on Nature v Nurture has focused on identical twins in disparate environments. (Identical nature in differing environments.)  To improve this, I suggest studying identical twins raised in IDENTICAL ENVIRONMENTS. We commonly observe is that, while (identical) twins exhibit an observable closeness that ordinary siblings do not, they are RARELY IDENTICAL in Character (behavior in response to identical stimuli.)  This should lead us to argue that neither Nature NOR Nurture is uniquely dominating in the formation of character - that force of mind that drives behavior.

White Hat Can Benefit From Archaic Network Commands

Investigating intrusions has challenges beyond normal Blue Team or even Red Team interests. However, an alert system administrator may become aware of an intrusion while it is STILL IN PROGRESS: At that time, the old DOS command "fflush," which instructs the D(omain) N(ame) S(erver) to REASSIGN ALL IP addresses, would be of assistance to him. After the server followed the instruction (which can take fifteen minutes or so,) the bad guys would be faced with searching many local IP addresses to identify the admin's address, before the bad guys could resume the assault. This is less useful to a webmaster since his IP address is available by presenting his site name to DNS outright, as soon as it is re-assigned. Likewise, many applications require a static IP address. To assist the situation, we can point out that "flush" (note: only one -1- "f") deletes all local DNS cache info. This can assist network requests in obtaining correct IP info to communicate o...

A "Secure" OS made PRACTICAL

I can remember suggesting a theoretical Operating System that requires object code to be compiled in such a way that a decryption key is required for a program object to execute. The program object itself would execute unencrypted in RAM.  I cannot find the entry at the moment, but I have also suggested an OS that uses an RSA key for program installation. Separately, I have contemplated a Linux user, organized such that the encrypted home folder appeared as an UNMOUNTED container over IP, while operating as a MOUNTED container locally, for the profile user. This would defeat some purposes of SSH, but would harden the installation against data theft over IP.  Now, with the development of an offline username/password for a program, I am asking myself if I cannot effectively suggest a practical (as opposed to theoretical) arrangement, whereby the program presents a credential (or two - username/password) to the OS, for permission to execute. Clearly, multiple program objects w...

DRM and Password Authorization

We log in online and are accustomed to being refused service if we supply an incorrect username/password combination.  We persecute "plain-text offenders" and rightly expect to benefit from comparing a hash fingerprint of the credential presented online to a list of hash fingerprints, each paired with a username. Even better if the username is hashed as well. The knowledge gained from online handshakes can benefit us in digital rights management.  It has long been the case that we could obfuscate a password literal in source code by compiling it into object code. However, decompilers provide assembler code that can reconstruct the source code without descriptive variable names and make string values stand out. Now, we can construct a creative solution. We can designate a username/password combination to COMPILE SOURCE UNIQUELY FOR EACH USER. To hide it in the object code, we hash the username and password with a published hash algorithm and use the hash-fingerprint literal in...

Secure Cloud Procedures

 The cloud is not secure for entry-level users.   My personal security has been pwnd, leaving open questions about my competency, by criminal hackers who employ their creativity to enable malice and occasionally spite, such as revenge porn.  This blog once reflected the language "with grim determination," alluding to my motives for implementing Erasthmus's sieve on an odd number line. Now it says "mad cap experiment," instead. I cannot even correct an error on blogger dot com once published. Caching takes over and the update never populates. But in a new development, my book "The Devil's Hangover," has been updated for me. When I first wrote it, I had the original bad guys named "Rurek" and "Harold York." However, this reflects offline preparatory drafts, and the only cloud interaction it might have seen was as a zip file to my Google Drive as a backup. At the time of publishing, I labored to correct every occurrence of Rurek th...