Researchers at the University of Twente in the Netherlands report that the LOIC (Low Orbit Ion Cannon) software used in pro-Wikileaks Anonymous attacks discloses the identity of the user.
If hacktivists use this tool directly from their own machines, instead of via anonymization networks such as Tor, the Internet address of the attacker is included in every Internet message being transmitted. In the tools no sophisticated techniques are used, such as IP-spoofing, in which the source address of others is used, or reflected attacks, in which attacks go via third party systems. The current attack technique can therefore be compared to overwhelming someone with letters, but putting your address at the back of the envelop. In addition, hacktivists may not be aware that international data retention laws require that commercial Internet providers store data regarding Internet usage for at least 6 months. This means that hacktivists can still be traced easily after the attacks are over.
If the last 50 years of education have taught us nothing else, it’s that it often requires different tactics to best reach different learners. To pick up a foreign language, some students take best to the old-school high school language lab method, using heavy repetition, verb conjugation and grammar emphasis to embed a new language. […]
For those who want a career in video games, there’s no reason to sit around and wait. EA and Rockstar Games probably aren’t going to seek you out and knock on your door with a job opportunity. But if you’re an indie developer with a good idea and some passion, you can create a really […]
Nobody is happy about the current state of our COVID-ravaged education system. With a new school year fast approaching, plans for teaching students still in flux, and political in-fighting driving more fear and confusion about whether or not to re-open campuses, teachers and parents are concerned. Meanwhile, most kids are just fine with spending less […]