A swarm of buffer overflow and denial-of-service bugs makes versions 5.5, 5.6, and 5.7 of e-terrahabitat susceptible to tampering, the US Computer Emergency Readiness Team warns here. Customers using earlier versions need to upgrade as well.
“An unauthenticated attacker may be able to gain access with the
privileges of the e-terrahabitat account or an administrator account and execute arbitrary commands, or cause a vulnerable system to crash,” CERT’s advisory states. Users should apply the patch immediately, it adds.
Category Archives: Security
Non, je ne regrette rien
by Michel Vaucaire
Non, Rien De Rien, Non, Je Ne Regrette Rien
Ni Le Bien Qu’on M’a Fait, Ni Le Mal
Tout Ca M’est Bien Egal
Non, Rien De Rien, Non, Je Ne Regrette Rien
C’est Paye, Balaye, Oublie, Je Me Fous Du PasseAvec Mes Souvenirs J’ai Allume Le Feu
Mes Shagrins, Mes Plaisirs,
Je N’ai Plus Besoin D’eux
Balaye Les Amours Avec Leurs Tremolos
Balaye Pour Toujours
Je Reparas A ZeroNon, Rien De Rien, Non, Je Ne Regrette Rien
Ni Le Bien Qu’on M’a Fait, Ni Le Mal
Tout Ca M’est Bien Egal
Non, Rien De Rien, Non, Je Ne Regrette Rien
Car Ma Vie, Car Me Joies
Aujourd’hui Ca Commence Avec Toi
Piaf dedicated her recording of the song to the French Foreign Legion. At the time of the recording, France was engaged in a military conflict, the Algerian War (1956–1962), and the 1st R E P (Premier Regiment Etranger de Parachutistes, First Regiment Foreign Paratroopers) — which backed a temporary putsch by the French military against the civilian leadership of Algeria — adopted the song when their resistance was broken in April 1961. The leadership of the Regiment was arrested and tried but the non-commissioned officers, corporals and Legionnaires were assigned to other Foreign Legion formations. They left the barracks singing the song, which has now become part of the French Foreign Legion heritage and is sung when they are on parade.
Identities and Community of Practice
It looks like Adam over at Emergent Chaos has been reading sociology (ethnomethodology is a sociological approach to language use) and finding out about linguistic anthropology. Although it is nice to see these ideas spreading from anthropology to sociology and into information security, I hope some also will dig into it enough to find and cite originals or at least get back to where ideas are originating.
In “The Presentation of Self in Everyday Life,” the idea is that we create personas to control relationships. From lawyers to doctors to waitstaff or auto mechanics, people present a view into their identity that makes sense. I would question if I want to give business to an auto mechanic who was reading the Harvard Law Review when I came in, or a lawyer who was reading a Chilton’s repair manual. People present themselves in certain ways to control the perception of ‘who they are,’ and so a professional relationship develops in the right way.
Goffman’s foundational “presentation” book is widely cited but the more contemporary approach to language and identity is still in linguistic anthropology , where the role of language in identity-making has been a major focus at least since Dell Hymes developed the “ethnography of communication” along with concepts such as “linguistic community” and “community of practice.” Jane Hill’s recent work on Mock Spanish and on racism and identity in language is especially worth mention for this subject. Adam concludes:
So next time someone talks about identity or identity management, ask yourself, what are the assumptions about the relationship? And when you hear someone talking about ‘customer relationship management,’ as yourself what identity they seem to want to manage.
We have found important applications of these concepts in our study of identity-making in African (419) scam letters, where language is deliberately constructed in such a way as to authenticate false identities and to scam unwitting victims.