La NASA celebra el 40 aniversario del lanzamiento del Apollo 11

16 07 2009

200px-Apollo_11_insigniaEl 16 de julio del 1969, la nave Apollo 11 fue lanzada en misión hacia la luna, para el 20 de julio descender sobre su superficie y Neil Armstrong marcar con su huella la llegada del primer hombre a la luna.  A esos fines, la NASA ha preparado una página web con detalles de la misión del Apollo 11, noticias de la celebración y videos.  Además, los videos originales del alunizaje han sido restaurados para ser vistos con más claridad por las nuevas generaciones que no vivieron ese histórico evento.  Imagino que también reaparecerán las teorías de que todo fue un montaje de los Estados Unidos, pero esa discusión se la dejo a los que gustan de  las “conspiracy theories“.

Nasa-Apollo 40th Anniversary

Información acerca de la misión Apolo 11





La Apple I, un hito en la historia de la informática

14 07 2009

504x_Apple_I_Core_Memory

La Apple I hizo su debut en 1976  (luego de ser rechazada por Hewlett-Packard) a un precio de $666, con una memoria de 4KB basada en semiconductores y un procesador MOS Technology 6502.    Más que una computadora, era un kit que serviría de base para construír una computadora personal, abriendo las puertas a uno de los productos más exitosos en el mercado y que al día de hoy es  indispensable en el hogar y oficina.  Se vendieron cerca de 200 unidades, por debajo de la Altair, pero estableció el concepto de Jobs y Wozniak para el desarrollo de la exitosa  Apple II y se convirtión en el ancestro de las populares Macintosh, el iPod y el iPhone.

Fuente:  Gizmodo





CompuServe cierra sus puertas

6 07 2009

Para los ciberrnautas de esta generación, el nombre CompuServe tal vez no le resulte familiar; para los que pertenecemos a la generación de lo ’80 y principio de de los ’90, recordamos a CompuServe como uno de los pioneros en servicios de ISP junto a America Online.  Recuerdo un procesador de palabras portátil que compré en Sears con capacidad de conectarse mediante dial-up al internet y el servicio que traía incluído era CompuServe, todo texto y para los estántadares modernos, a velocidad de tortuga; pero en aquel momento era una novedad y la ventana al cibermundo de los ’90.  En el 1997 AOL adquirió a CompuServe, prometiendo mantener sus operaciones como un ente aparte de AOL y le cambió el nombre a CompuServe Classic.  Con la llegada de las conexiones de banda ancha, CompuServe se convirtió en un viaje nostálgico en la historia del internet (su software más reciente era del 1999 para Windows NT 4.0.2) y finalmente AOL cerró sus puertas este mes.  A pesar de su irrelevancia para los estándares actuales, CompuServe sirvió como uno de los primeros accesos al web con una interface amigable y accesible al consumidor.

ch088d6-compuserve-screen

En el principio…

2791236204_e055a7d495

Un anuncio clásico

compuserve4

Tiempos recientes

Fuente:  Arstechnica





La evolución del iPod

4 07 2009

El reproductor de música digital más popular, el iPod, cambió para siempre la forma en que se diseñan y funcionan estos dispositivos.  Desde el click-wheel hasta la pantalla tactil, se ha convertido en modelo para un sinnúmero de imitadores en el mercado que se sientan a esperar qué nuevo trae Apple con cada generación del iPod para producir un clon.  En mi caso me estrené con un  iPod Nano 1Gen de 1GB blanco que aún poseo y atesoro por su tamaño compacto y versatilidad; luego tuve un iPod Video de 30GB que se convirtió en mi acompañante constante y finalmente me gradué al fabuloso iPod Touch 2Gen (con “jailbrake”, por supuesto), que es el sustituto bonafide de mi laptop para tareas básicas como navegar el web,revisar mi correo electrónico,  usar Twitter, Facebook y jugar.  No sé que tendrá Apple preparado para la próxima generación del iPod Touch, pero les aseguro que estaré muy pendiente.





Entrevista de CNET a Kevin Mitnick, de hacker a consultor de seguridad

22 06 2009

mitnickCNET News publicó una interesante entrevista con Kevin Mitnick, el “cóndor“, posiblemente el hacker más famoso y quien ostenta la “distinción”de haber sido el primer hacker en aparecer en un anuncio de “Se Busca” del gobierno federal.  Arrestado en 1995, se declaró culpable de fraude electrónico y fue liberado en el 2002; aprovechando su notoriedad, se dedica a dar conferencias y fundó una compañía de consultoría en seguridad.  A continución reproduzco la entrevista tal y como aparece en la página de CNET:

Q: When did you start hacking?
Mitnick: When I was 16 or 17 years old, when I was in high school–1979 time frame; before it was even illegal.

How did you get into it?
I became very interested in phones. I was a ham operator, an amateur radio operator, for about three years and in high school I met this other student whose dad was a ham radio operator and this other student had a hobby of phone freaking and he introduced me to this. He was able to do amazing things with the telephone system. He was able to get unlisted numbers. If he had my number he could get the name and address…He could do all these magic tricks with the phone system. I also had an interest in telephony over ham radio. He introduced me to phone phreaking and when the phone companies started converting over to electronic systems from electromechanical systems they used front-end computers to control it. So the phone company was in the process of automating their processes. To further my phone phreaking I needed to become familiar with the phone systems’ computers. So that was my foray into hacking.

So you went from phone phreaking into hacking?
Yes. The phone company had this computer system called COSMO, which stood for Computer System for Mainframe Operations. Well, my first hacking occurred as a student at Monroe High School in Sepulveda, Calif., in the San Fernando Valley. I met another student who was very heavy into computers and at this time it was the Commodore VIC-20. They offered a computer training course for seniors but I wasn’t a senior so he introduced me to the professor. He wasn’t going to let me into the class. So I did all these electronic tricks with the phone system and the teacher was amazed and he waived the prerequisites and let me in the class. I think he regrets that decision today.


What could you do with the phones then?
I think I demonstrated calling into comp systems. You could interact with them with your voice and control them by touch-tone. He gave me his name and the city he lived in and I was able to get his telephone number. I was able to interface my ham radio with the telephone system and dial into computers and access them through the touch-tone pad. At that time it was pretty advanced because you didn’t have voice response systems then like you do today.

What’s the hacking activity you are most proud of?
Ethical or unethical (laughing)? You probably want to hear about when I was a hacker. I guess my intrusion into Motorola. I was able to call an employee at Motorola and convince her to send me the code for the MicroTAC Ultra Lite cell phone…Motorola had their whole campus protected by SecurID and I was able to use an elaborate social-engineering scheme by also manipulating the telephone network and set up call-back numbers within Motorola’s campus. So I convinced a manager in operations to tell one of the employees to read off his RSA SecurID code any time I needed it so I could access the network remotely. That’s how I was able to access their internal network and then I was able to use technical means to hack into their development servers for cell phones…I was able to find the source code to all the different cell phones.

I was interested in the MicroTAC series because it looked like a Star Trek communicator. I wanted to understand how these phones worked, how the codes controlled the processor. I wasn’t interested in selling the source code or doing anything with it. It was more about the challenge of getting it. I had to breach like four layers of security to get in. I’m not really proud of it because it was obviously wrong…I made a stupid and regrettable decision and decided to go after the source code.

When you say it was about the challenge of getting it, can you elaborate?
At the time I was actually a fugitive in Denver, Colo., and one of my colleagues handed me a brochure of this phone and I thought it was ultra cool, like the iPhone of today. I really wanted to understand what are the protocols used, how does the phone talk to the communications network, how does the whole thing operate? And I thought maybe I could modify the firmware for the code in my phone and make it more difficult for the government to track me. For example, there are certain methodologies the government uses, like any time your phone is on, it is communicating with the mobile telephone company. I wanted to be able to toggle that off and on, so basically take my phone offline and do extra things to it. At the time I had that idea, but I never went through with it because I was so busy hacking…It was pretty much the trophy. Once I got the source code, that Motorola phone intrigued me. I looked at it, read through it, and tried to understand what I could understand.

After that I went after other different cell phone companies and it really was about the trophy. It was the challenge of getting in and getting the code, storing it at USC in Los Angeles, and moving onto the next one. That’s how I got caught. The USC administrators noticed that a lot of their disk space was being used and that their systems were breached and they called the FBI. The companies themselves didn’t realize they were hacked. It was USC that discovered it…I didn’t spend any time trying to hide it (source code). That was my downfall.

Did know what you were doing was illegal?
I started hacking back in the ’70s and there were basically no laws against it, against phreaking or hacking. In school, my parents and other people actually encouraged it. There were no ethics taught. If you could hack into the school’s computer you were considered a whiz kid. Today if you do it you get expelled or they call the cops. It was like a reward of intellect back when I got started. Then they criminalized it later. I was so hooked into the adventure of the hacking game, doing it for a number of years even though it became illegal. It was thrilling, adventurous. It was all about solving the puzzle, using intellect to get around obstacles. It was like a huge game.

What would you do differently if you could go back in time?
In hindsight, I wouldn’t do what I did because now I’m much smarter and wiser, and I caused a lot of network and systems administrators a lot of headaches undeservedly. It was the wrong thing to do. But at the time there was no such thing as penetration testing and no school curriculum on security. You had to be self-taught. That’s how I learned about security and systems–through hacking. I took the wrong road in doing it. I wouldn’t repeat it. Today there are degrees, pen testing, books on the subject. At the time, a lot of companies and universities didn’t give much thought to security.

When I was 17 years old, the phone company was so livid with me for hacking their systems–and not hacking through a computer but through social engineering and calling and controlling touch phones or calling employees. There were no laws against it. They actually yanked out the phones in our house, and I was living with my mom at the time. I was in high school. They wouldn’t let us have a phone and cited California Public Utilities Commission rules that if there’s fraud or abuse the phone company can yank the phone.

Rather than stop my activities I figured I would one-up them. We were living in a condo. The condo had unit numbers and we were unit 13. I went to the hardware store and got the numbers 1, 2, and a B for unit 12B. I called the phone company and told them the builder had built another unit in the condo complex. Then the phone company came out and installed a phone for a new subscriber in 12B under my name or my mother’s. Then we had a phone for two weeks and one day it just went dead. The phone company was livid because I had done this elaborate thing to trick them. After about six months we got the phone service back but we could only make outgoing calls.

Let me ask about your time in jail. How much time did you serve and what was that like?
I served five years, and I ended up in solitary confinement for a year because a federal prosecutor told the judge that if I got to a phone I could connect to NORAD (North American Aerospace Command) and somehow launch an ICBM (Intercontinental Ballistic Missile). So the judge, reflecting on the movie War Games, put me in solitary confinement. I think it was a strategy they used to get me to plead out or cooperate. I was held for four and a half years without a trial. I spent a lot of time focused on the defense and reading cases and serving as assistant to my attorney. At the end of the day I realized justice is economic; unless you have enough money to properly mount an effective defense you always lose.

I wanted to admit that I was hacking, but the intention and the purpose of it wasn’t fraud because to commit a fraud you have to convert property to your own use and benefit, to profit. In my case that was lacking. I was doing it for the trophy. I was cloning my cell phone to random subscribers and dialing into computers from the cell phone. The purpose wasn’t to make free calls; it was to make it more difficult for the government to track me. They claimed all my hacking into those companies was a huge elaborate fraud and that I caused $300 million of damage. They said the value of property I copied, the R&D development cost, was $300 million. The government tried to use the old (definition of) loss for tangible property. If I copied that code and they no longer had use of it, it would be a $300 million loss or whatever.

They told my attorney that if I didn’t cooperate and plead out, not only would they take me to trial in Los Angeles, but they would put me in a revolving door of trials and put me on a bus and take me from federal jurisdiction to federal jurisdiction. So I signed the deal and admitted causing between a $5 million and $10 million loss. I signed it not believing it. I signed it to get out. I really don’t believe to this day that my actions caused that amount of loss, because none of the victim companies lost use of their code, they never claimed any losses due to my activities. Sure there were losses, maybe in the thousands of dollars, for their time to investigate who hacked into their systems and to secure them. Those are the real losses. But I was the example for the federal government, so they needed to put me away for a long time. That’s why I was very angry and bitter against the government at the time, because I wasn’t being punished for what I did. I was being punished for what I represented at the time. I have no qualms about being punished for what I did. The punishment should fit the crime.

So, if someone were to ask you what lessons you’ve learned, what would you say?
Don’t break the law. Don’t intrude on other peoples’ property. It’s just the wrong thing to do. It’s unethical and immoral. And now of course it’s illegal. It’s trespassing. You’re violating somebody’s property rights. And they have the right to control and keep their property confidential. What I attribute my change of heart to is growing up. Back then I was young and immature, and never damaged anything intentionally.

Do you feel that your hacking has led to positive change in some way?
Yes. It led to my career. Today I speak around world, I do pen testing all the time–and deep penetration testing, where I go after the most sensitive credentials at a company to see if I can get to the crown jewels. I see what I can do as an ethical hacker. I really enjoy this work because when is it that you can take a criminal activity, legitimize it, and get paid for it? Ethical hacking. It’s not like you can be a drug dealer and go work for Walgreens…A lot of pen testers today have done unethical things in their past during their learning process, especially the older ones because there was no opportunity to learn about security. Back in the ’70s and ’80s, it was all self-taught. So a lot of the old-school hackers really learned on other people’s systems. And at the time, I couldn’t even afford my own computer. A dumb terminal was like $2,000. A 1,200-baud modem was like $1,200. The cost of this technology was out of my range as a high school student so I used to go to local universities and use their system, albeit without their knowledge, to learn.

Any advice for young hackers?
Yeah, don’t follow in my footsteps. There are definitely other roads or other opportunities and ways that people can learn and educate themselves about hacking, security, and pen testing. Today it’s a huge market. It’s become a huge issue within the federal government with critical infrastructure.

Some people say companies shouldn’t hire former black hat hackers. What are your thoughts on that?
I’m hired all the time. So far it has not really been an impediment. You have to evaluate the person’s skill set, their maturity, and what they did before as a hacker. Were they getting credit card numbers and buying merchandise on the Internet? Or were they hacking systems for their own intellectual curiosity? You can’t just lump black hat hackers into one category. You have to look at what they did in the past, what they’ve done since then, and what credentials they have to get the job done. People who have operated on the other side of the law, like Frank Abagnale, he is a prime example. He reformed himself and now is the leading authority on counterfeit money and checks. Look at Steve Wozniak. He even started out as a phone phreak (and sold blue boxes on UC Berkeley campus). But he took a whole different direction. He’s done a lot of good for the community. That’s another factor–what good has that person done for the community and industry since the transgression?

What are you doing now?
Consulting, author, public speaker. I go around the world speaking. That’s my primary activity–ethical hacking, pen testing, system hardening, training, education. And I’m working on my autobiography. It’s due out in spring 2010.

Fuente:  CNET, por Elinor Mills, junio 22, 2009





Cuando el Internet falla

19 06 2009

internet11Desde ayer al mediodía tengo problemas con mi conexión al Internet.  Soy suscriptor de Choice Cable TV desde hace varios años y reconozco que es la primera vez que tengo problemas serios de interrupciones en mi acceso al internet.  Ha sido frustrante la experiencia de las múltiples llamadas a servicio al cliente sin obtener una razón concreta del por qué del problema ni mucho menos una solución.  Las personas que me han atendido han sido muy amables y sé que han realizado un esfuerzo genuino por ayudar, pero la realidad es que a veces me cuestiono hasta qué punto llega el conocimiento técnico de algunas de esta personas.  Como profesional y educador en el área de computación, se me hace relativamente fácil saber cuando alguien sabe o no de lo que está hablando o si no nos estamos comunicando en el mismo idioma.  Pero aparte de esto, hay un detalle que no se puede pasar por alto:  La dependencia que creamos del internet.  Nuestras comunicaciones, nuestro trabajo y hasta nuestros entretenimientos se han ligado al web de tal forma que cuando no lo tenemos, nos sentimos desorientados.  Esto puede ser normal de acuerdo a cómo nuestras actividades se han tornado con mayor frecuencia dependientes de la red, sin embargo, también nos crea un problema al momento en que no estamos conectados.  Incluso,a  algunas personas les puede producir ansiedad y tensión, como si se tratara de alguna adicción y esa es la parte que debemos vigilar.  El internet es bueno, nos resuelve mucho en nuestro diario vivir, pero no debemos crear una dependencia del  mismo, como si nuestra vida dependiera del web.  Mi experiencia me ha servido para evaluar hasta qué punto mis actividades dependen de estar conectado y hacer los ajustes de contingencia pertinentes.





Primer video del iPhone 3GS

16 06 2009

Aquí  un video tomado en Brasil que muestra las nuevas caraterísticas del iPhone3GS.  Aunque está en portugués, no será difícil apreciar lo nuevo de 3GS.

Fuente:  Gizmodo





Los 8 productos de código abierto más exitosos

10 06 2009

El concepto de código abierto ha revolucionado la forma en que se distribuye el software y ha provocado que las grandes empresas tengan que repensar sus estrategias de mercadeo, ventas y distribución.  A continuación los 8 productos de código abierto más populares y exitosos según publicado por Royal Pingdom:

  1. Linux:  El sistema operativo de código abierto que nos permite tener un sistema operativo completamente funcional y seguro sin costo alguno.  Estos días Linux se encuentra instalado en la mayoría de los servidores, Ubuntu ha logrado penetrar el mercado de las computadoras personales y Android, cuyo kernel es el  de Linux, ha sido un éxito en el mercado de los móviles.
  2. Ubuntu:  Aunque es una distribución de Linux, su enorme éxtio en el mercado de las computadoras personales lo hace merecedor de una mención en esta lista.  Ha logrado llevar Linux más allá de los confines de los geeks.
  3. BSD:  Derivado del Berkeley Unix, sistema operativo alternativo que ha evolucionado en varias versiones, como FreeBSD, OpenBSD y NetBSD.  Como dato curioso, el núcleo de Mac OS X está derivado de FreeBSD.
  4. MySQL:  El servidor de bases de datos más usado en el mundo, utilizado por páginas web y servicios como Wikipedia y Facebook.
  5. Apache:  El Apache HTTP Server es el servidor web más popular desde 1996, llevándole la delantera a IIS en términos de sitios webs que lo usan, de acuerdo a Netcratf (46% de todas las páginas web usan Apache versus un 29% que usan IIS).  En el 2009 se convirtió en el primer servidor usado en más de 100 millones de páginas web.
  6. Firefox:  Desde que se lanzó Firefox 1.0 en el 2004, se ha convertido en el navegador de mayor crecimiento, logrando quitarle a IE una porción considerable del mercado, antes totalmente dominado por el navegador de Microsoft.
  7. WordPress:  Desde su aparición en el 2004, se ha convertido en una popular y dominante plataforma  de blogs.  Un 32% de los blogs en existencia utilizan como base WordPress.org o WordPress.com, pero se estima que ese número puede llegar al 41% por el cambio de los 9 Wired Blogs en el top 100 de Typepad a WordPress.
  8. BIND: ( The Berkeley Internet Name Domain Server)  Es el software de servidores DNS más usado en Internet.  Ha sido el principal software de DNS en los sistemas UNIX y se pudiera considerar el de facto estándar para servidores DNS.

opensource

Fuente:  Royal Pingdom





Video del Keynote del Apple WWDC 2009

9 06 2009

Si quieres ver lo nuevo que Apple presentó para el 2009, accede al video oficial de Apple del WWDC 2009.  Para acceder, da click sobre la imagen.

wwdc

Apple WWDC 2009





Twitter, Flickr y otros servicios bloqueados en China

2 06 2009

En el aniversario de la Masacre de la Plaza de Tiananmen, China ha bloqueado Twitter, Flickr, Hotmail, y Live.com/Bing a raíz de las expresiones surgidas en estos medios acerca de ese lamentable suceso, donde manifestantes se reunieron para protestar contra el gobierno autoritario de China.  El grupo comenzó con unos cuantos estudiantes hasta alcanzar un estimado de millones de personas en unos cuantos días.  El gobierno trató de convencer a los manifestantes de que abandonaran el área, pero al éstos negarse, enviaron tanques que dispararon contra el grupo allí reunido.  China nunca ha revelado el total de víctimas, pero se estima que pudo haber alcanzado los 7,000.  El tema es uno de los muchos que utiliza el gobierno chino para censurar el internet y con el aumento de redes socales donde los usuarios pueden coversar y expresarse acerca de temas prohibidos, China ha añadido los servicios mencionados a la lista de la Gran Muralla (una lista de sitios en internet censurados por el gobierno chino).  Los bloqueos cambian con frecuencia, así que un sitio inaccesible hoy, puede estar accesible mañana, o solamente estar bloqueadas secciones de una página.  Un ejemplo es Wikipedia, que ha estado bloqueada en varias ocasiones; se espera que una vez pase el aniversario de la masacre, se restaure el acceso s Twitter, Flickr y los demás sitios censurados.

Fuente:  ArsTechnica