Skip to main content

Posts

The Mythical STEM Shortage

Long ago, there were Personnel Managers.  Nowadays, there are Human Resource Managers.  As an engineer or scientist, you are a consumable resource, just like oil and electricity.  You are used to make a project work and once the project is done, you are not needed anymore and you will be laid off.   In my experience, there is a perpetual over supply of engineers and scientists and roughly 10% to 15% of engineers are always unemployed or underemployed.  However, there is a huge shortage of Entrepreneurs. Jobs are created by small businesses - large businesses destroy jobs. Large businesses buy small businesses, absorb them, take the good products, discard the bad ones, fire half the people in the first round, and the rest in the second round.  This is known as increasing productivity. For example Intel, Microsoft, Cobham, IBM, Yahoo, Boeing, Lockheed-Martin, United Technologies - they buy companies and then frack them and shake the employees o...

Juniper, Citrix and Fortinet

No, this is not about the famous Donovan song. Most of this list was compiled by M. Jennings: NSA Helped British Spies Find Security Holes In Juniper Firewalls [theintercept.com] Quote: "... British spy agency GCHQ, with the knowledge and apparent cooperation of the NSA, acquired the capability to covertly exploit security vulnerabilities in 13 different models of firewalls made by Juniper Networks..." Secret Code Found in Juniper's Firewalls Shows Risk of Government Backdoors [wired.com] Quote: "This is a very good showcase for why backdoors are really something governments should not have in these types of devices because at some point it will backfire." New Discovery Around Juniper Backdoor Raises More Questions About the Company [wired.com] Quote: "Juniper added the insecure algorithm to its software long after the more secure one was already in it, raising questions about why the company would have knowingly undermined an al...

Ethernet Funnies

Sometimes it is very hard to connect to an embedded system, because the designers cut some corners to simplify the system and keep memory use down, or simply because the system is prehistoric and full of bugs. One such device worked fine provided that there was a little ethernet switch between the laptop machine and the target, but a direct connection between the laptop machine and target device only worked about half the time.  Even the little switch sometimes could not connect. MAC, PHY, MAG An ethernet interface device consists of three main parts: The Media Access Controller (MAC), the Physical Interface (PHY) and a set of transformers - the Magnetics.  When you plug a cable in, the PHY sends out little pulses to figure out what is going on and then swaps the wires around internally and changes the speed and duplex settings to make the interface work. The trouble was that the target only supports 100 Mbps, while the laptop machine wanted to run at 1 Gbps and the t...

Compile The Latest ffplay From Source

Compile latest version of ffplay from source Note that this script doesn't overwrite the existing ffmpeg installation: https://trac.ffmpeg.org/wiki/CompilationGuide/Centos The gotcha in the above guide is the SDL-devel package without which ffplay will not build. #! /bin/bash yum install autoconf automake cmake freetype-devel gcc gcc-c++ git libtool make mercurial nasm pkgconfig zlib-devel SDL-devel mkdir ~/ffmpeg_sources cd ~/ffmpeg_sources git clone --depth 1 git://github.com/yasm/yasm.git cd yasm autoreconf -fiv ./configure --prefix="$HOME/ffmpeg_build" --bindir="$HOME/bin" make make install make distclean cd ~/ffmpeg_sources git clone --depth 1 git://git.videolan.org/x264 cd x264 PKG_CONFIG_PATH="$HOME/ffmpeg_build/lib/pkgconfig" ./configure --prefix="$HOME/ffmpeg_build" --bindir="$HOME/bin" --enable-static make make install make distclean cd ~/ffmpeg_sources hg clone https://bitbucket.org/multicoreware/x265 cd ~/ff...

Windows Insanity

Unsolicited Advertisements To add insult to injury, Microsoft Windows 10 now displays advertisements right in the File Explorer.  I'll leave it to you to figure out why that is a very bad security problem.   Rusted Sieve Windows 10 is about as secure as a rusted sieve, with a few deliberate holes poked in it for good measure.  Microsoft essentially tries to convert your Personal Computer into a cell phone, which is a purpose built blabbing and tracking device.  They don't seem to understand the word 'personal' in 'PC' though. https://answers.microsoft.com/en-us/windows/forum/windows8_1-update/what-is-diagnostics-tracking-service-which-was/253fe2ec-fba6-4240-bfb8-2a3bdc801ed1?auth=1 Examples of data we collect include your name, email address, preferences and interests; browsing, search and file history; phone call and SMS data ; device configuration and sensor data; and application usage. Recently, the Diagnostics Tracking Service (DiagTrac...

Dropbear - Embedded SSH Daemonology

A Bear of Very Little Brain The name Dropbear is intriguing since it makes me think of grizzlies and gummy bears. Real Aussies know that a Drop Bear is a carnivorous marsupial with a particular taste for foreign hikers .  I love sugar - who doesn't - but I should not eat it anymore.  I found that cinnamon makes a good substitute in most things, but I digress, this is not supposed to be a treatise on sugary treats or scary marsupials. The Dropbear SSH daemon can be compiled with various options, but when one is faced with an existing system that cannot easily be changed, then one has to make do with what one got. I was trying to download log files and video off an ARM based system and it took forever.  So I experimented with the SSH encryption and compression options to speed it up.  Since a typical embedded system has a dinky little processor, selecting a simpler encryption algorithm can make a huge difference. AES vs Blowfish The standard copy command "s...

Nothing to Fear

Armand Jean du Plessis, Cardinal-Duke of Richelieu and Fronsac, 17th century Prime Minister of France, reputedly said something to the effect of: "Give me six lines written by an honest man and I will find something in it to hang him with". There are probably many things he said, that he didn't say, but it is a nice quote. Beware of a Man in a Dress The French encrypted communications up to the early 19th century, using simple ciphers known as petits chiffres . These were short notes, based on 50 numbers. Later, they began to write letters using a combination of 150 numbers, known as the Army of Portugal Code.  By 1812, new cipher tables were sent from Paris based on 1400 numbers and derived from a mid-18th century diplomatic code.  18th Century Paris Cipher Many people think that 'If you have nothing to hide, then you have nothing to fear' , or simply state 'I have nothing ...