Archive for the ‘Music’ Category

Morning random notes: September 4, 2012.

Tuesday, September 4th, 2012

Would you pay $18 for a 40-minute vinyl record of previously unreleased Charles Manson songs?

Yeah, I wouldn’t, either.

The album’s title, a vulgarity that means wasting time…

I want to come back to this later and elaborate on the idea some, but I’m getting more than a little tired of the mass media being coy in their reporting. (See also: Russian punk bands.)

Vasquez turned to the funding website Kickstarter to raise several thousand dollars to pay to have the album cover printed and 500 copies of the record pressed.

This kind of bothers me, too, but I’m not sure I can articulate why.

Headline in the NYT:

Gotham: A Summer of Easy Guns and Dead Children

First paragraph:

In Harlem, Paula Shaw-Leary talks of her youngest, Matt, who got his college degree in May and was accepted to graduate school…

Matt’s death is tragic, but a 21-year-old man who has been accepted to grad school is not a child.

(Gee, doesn’t NYC have strict gun control laws?)

I don’t think I ever saw anything Michael Clarke Duncan was in, and I wouldn’t say I was a big fan of his work. But 54 is just too young. (NYT. LAT. A/V Club.)

The Frank Lloyd Wright archive is moving to New York City. This sounds like a very good thing:

The models will live at MoMA, which has extensive conservation and exhibition experience. The museum will display them in periodic presentations and special exhibitions. The papers will be housed at Avery, whose librarians will make them available to researchers and educators starting at the end of next year.

(Well, a very good thing for everyone except Mike the Musicologist, who hates NYC.)

Headline from something called “The Root”, linked from the WP site:

Few African Americans at Burning Man

“Word Ends: Women, Minorities Hardest Hit”.

Musical note.

Friday, August 31st, 2012

At the moment, I have some of the worst crap in the world stuck in my head.

And I can’t get it unstuck.

(Hotel. Motel. Holiday Inn.)

TMQ Watch: August 28, 2012.

Tuesday, August 28th, 2012

We are having trouble coming up with a clever introduction for this week’s TMQ, so let’s just jump right into the NFC preview, shall we?

(more…)

A bunch of random links.

Sunday, August 19th, 2012

Here are a bunch of random links that I promised various people, collected in one place, so I can email one link rather than half-a-dozen.

“Stupid Idea Of The Day: Let’s Nationalize Facebook!”. This was also in TMQ Watch, but buried, so I’m breaking it out here. Note that this goes to Forbes and not Slate, because I refuse to give Idiot Boy any linkage.

Obit from EE Times for Hans Camenzind, inventor of the 555 timer IC.

Rap music is becoming less homophobic.

“Many hip-hop artists, too, noticed when Jamaican dance hall artists such as Buju Banton, whose lyrics are violently anti-gay, saw lucrative tour dates canceled as a result.”

The latest in Buju Banton’s legal case, or “You got 10 years. Would you like to go for 15?”

“What will 2011 (the Year of the Rabbit) hold for Buju Banton?” Somehow, I don’t think the answer was “Federal prison”.

“I ride a Flying Pigeon. It’s an obscure bicycle, imported from China. You’ve probably never heard of it.”

Cheesecake.

Sunday, August 19th, 2012

I have mentioned in the past that I don’t like linking to stories already on FARK, unless it is something that just demands coverage and comment.

I’m not sure this qualifies as an example of that, but I feel compelled to link anyway.

The Seattle Times has a profile of Dolores Erickson, who is 76 years old and doesn’t look that bad for 76. We’d happily take her out for a chaste dinner and movie.

Most of you probably see this coming, especially if you’re music buffs (Weer’d Beard, I’m looking at you). For the rest of you: who is Dolores Erickson?

After the jump (picture may be mildly NSFW. depending on where you work)…

(more…)

And the bait is taken.

Thursday, August 16th, 2012

Today is the 35th anniversary of Elvis Presley’s death.

Say what you will about the man and his music, but he had good taste in guns. I think that Savage 99A is pretty nice, though I’d have to start reloading .250-3000.

I want to say that Storied Firearms has a Field King for $650 (not listed on their website). That one has a Volksquarten trigger and barrel, if I’m remembering correctly.

And it looks like the going rate for a nice Python is around $2,000.

Obit watch: August 7, 2012.

Tuesday, August 7th, 2012

Noted art critic Robert Hughes.

A/V Club obit for Marvin Hamlisch. I expect fuller obits in the daily papers tomorrow. (I did not know, until I read it in one of the current obits, that Hamlisch was an EGOT recipient, and one of only two people to receive a Pulitzer Prize in addition to the Emmy, Grammy, Oscar, and Tony awards. Richard Rodgers was the other one.)

The NYT is also reporting the passing of noted film critic Judith Crist.

DEFCON 20 notes: day 3, part 2.

Monday, July 30th, 2012

Where were we? Oh, yes: The Day of the Router.

(That’d be a good title for a movie. Maybe one about penetration testers. Hmmmm…a pen tester accidentally finds a vulnerability in the wrong system, and the bad guys want to shut him up?)

But I digress.

First in our router trilogy is Michael Coppola‘s “Owning the Network: Adventures in Router Rootkits“. (First link goes to his blog, second link goes to the presentation.)

Coppola has been working on altered versions of firmware for popular routers: “altered” in the sense that the firmware contains useful exploits. (‘But how do you get the firmware on the router?” Well, there are well known cross-site scripting attacks on router configuration pages: as I recall, that was the subject of a DEFCON presentation, but I don’t have time to dig out which one right now. When I get back, I’ll add a link. In addition, how many people leave their router login/password set to defaults? Too many.)

Coppola specifically attacked these routers:

  • Netgear WNR1000v3.
  • Netgear WGR614v9.
  • Belkin FD57230
  • Trendnet TEW652BRP 3.2r

And there’s a simple five-step process:

How much would you pay for all this? But wait, there’s more! The end result of Coppola’s work is rpef, a framework that automates much of this process. You point it at a firmware image, tell it what exploit you want to use and where to save the modified image…and it generates a new firmware binary for you, ready to upload to your favorite router. Isn’t that a clever cleaver?

(At the moment, rpef only supports a limited number of routers. I suspect if this takes off, the number of supported routers in rpef will expand dramatically.)

Second up on the router hit parade was FX with “Hacking [redacted] Routers“. The [redacted] in this case is Huawei, a large Chinese manufacturer of routers, and the short version of this talk is that their routers are crap. They have no known product security group, they do not issue security advisories, the quality of their code is poor, important ports (SSH, FTP, HTTP) are open by default (and you can access the flash file system by FTP), their OpenSSH implementation is a rewrite from scratch and is broken…

…and it is possible with a simple script to hijack a remote session to the router, there are built-in functions that allow execution of commands from the command line interface with no privilege checks…

….and there’s a heap overflow bug (which the presenters spent a great deal of time explaining) that allows you root on the router. Whew. I think that just about covers it. Luckily, in my opinion, Huawei routers are mostly used in other countries, and I can’t get very upset about those countries having their routers hacked. (What’s the worst case scenario? Less Chinese spam?)

(I can’t find FX’s presentation, and it isn’t on the DEFCON DVD. I’ll link to it when I can find it. Link added 8/1/2012.)

(Interestingly, these first two router panels were so popular, they had to move FX’s panel to a larger room to accommodate the people who wanted to see it. And I think there were still people who didn’t get in.)

Finally, we have “SQL Injection to MIPS Overflows: Rooting SOHO Routers” by Zachary Cutlip. (Link goes to a version of this talk he gave at Black Hat.)

The short summary here is that Cutlip attacked a specific router, the Netgear WNDR3700 v3. This is a highly popular router: as a matter of fact, WCD uses the v2 version of this router (reflashed with DD-WRT firmware) in our home office. One of the interesting aspects of this router is that it has DLNA support, so you can use it to serve things like music and movies. (It has an external USB port for connecting drives.)

As it turns out:

  1. As part of the DLNA setup, the router runs SQLite. (Apparently, it keeps a database of album art for DLNA device display purposes.)
  2. You probably already guessed this, but the implementation on the router is vulnerable to SQL injection attacks.
  3. You can leverage SQL injection and grab the router’s password file, or other arbitrary files from the running router.
  4. You can also leverage this to force a buffer overflow and run arbitrary code on the device.

Cutlip’s paper contains example Python code for implementing these attacks.

I totally spaced on the “Hacking the GoogleTV” panel and spent the last few hours trolling the dealer’s room for bargains. I did pick up a few things which I may discuss in more detail later. Or maybe not. It depends.

I don’t have a lot to say about the closing ceremonies, with one exception. DEFCON admission this year was $200: during the ceremonies, Dark Tangent stated that they had intended to raise the cost for this year only, to cover all the awesome stuff they wanted to do for DEFCON 20. Their plan was to roll the price back next year, but Dark Tangent found people were asking them how they were going to top this year…

…and he polled the audience to find out if they thought the $200 was a good value for the money. Overwhelming audience sentiment seemed to be that the $200 price tag was not too high, considering what folks got out of DEFCON. And Dark Tangent seems to be serious about getting Kraftwerk to do a concert next year.

I’m going to wrap things here. In the next day or two, I will probably be doing an after-action report, covering Vegas in general and some additional DEFCON odds and ends. I also will be posting updates as I find people’s presentations online, and as folks put them up.

As always, I welcome comments from presenters. I want to say that this year, I did not see a single panel that disappointed me; I liked every single panel I was able to get into.

Also, I want to make note of a thought from dinner tonight with some friends of mine. This may very well be a research idea for next year’s DEFCON.

So we all know how flash memory works, and that if you do repeated write/erase cycles, you’ll wear out your flash. We also know that manufacturers have implemented wear leveling to get around this.

Questions.

  1. Is it possible to bypass wear leveling on flash devices? Can you write software that does write/erase operations to specific flash memory locations?
  2. Can you write software that will do repeated write/erase cycles on flash memory devices and make those devices forensically useless? Similar to the old “three pass overwrite” for hard drives?

I don’t know the answers (as I said, this came up at dinner literally two hours after my plane got in) but it seems like a possible area for exploration. I need to go back through my DEFCON archives, as I have a vague memory of someone doing a presentation on flash memory forensics.

(Also, I’m sorry it took so long to get this post up. I finished about 2/3rds of it in the Las Vegas airport, had a very tight connection in Phoenix (literally running to the plane and arriving just seconds before boarding started), got in, wrote most of the last third, and am now going to have a cold beverage and (I hope) about eight hours of sleep.)

Obit watch: July 17, 2012.

Tuesday, July 17th, 2012

Some of these have been noted on FARK or elsewhere, but I want to round them up here for completeness:

Stephen R. Covey.

Kitty Wells, noted country singer. (“It Wasn’t God Who Made Honky Tonk Angels”) (A/V Club.)

John Lord, keyboard player for Deep Purple.

I also wanted to say a few words about Donald J. Sobol. (NYT. WP. A/V Club. Patrick @ Balko.) I got a great deal of enjoyment out of Mr. Sobol’s work when I was young, and I am saddened by his death (though 87 is a good run).

As regular readers know, I generally do not solicit donations here. But I would like to note that in lieu of flowers, the family has asked for donations to the New York Public Library to support services for kids. You can donate here, if you’d like.

Things you may have wondered about. (#4 in a series)

Thursday, July 12th, 2012

We haven’t had one of these in a while, and this is a pretty good one.

What ever happened to Bob Dylan’s guitar?

Specifically, what ever happened to the 1964 Fender Stratocaster that Dylan played at the Newport Folk Festival in 1965? You know, the one that prompted noted “folk icon” Pete Seegar to try to unplug Dylan?

The PBS “History Detectives” say they’ve found the guitar, which has been stored in some woman’s attic for 50 years.

Dylan’s attorney says he still has the guitar.

Quote of the day.

Monday, June 18th, 2012

“…these apps are nothing but digitally-enabled takeout menus for that ‘It puts the lotion on its skin’ guy from Silence of the Lambs.”

—Tam

(Also, it gives me an excuse to link to this, which I don’t think I’ve linked to before. Kind of a catchy tune, if you ask me.)

A little night music.

Thursday, May 10th, 2012

Continuing with our theme of musical interludes, how about a little sherbet as a palate cleanser?

This is another song that I was listening to a lot in 2006 (along with “The Walls Came Down”: “It’s a song of assassins ringing in your ears/We got terrorist thinking playing on fears”). It still has a lot of resonance with me as a song about hope and faith and belief. Not necessarily in a religious sense; there’s not a whole lot of religion in this song, but the message is still clear.

“For people like us, in places like this, need all the hope that we can get…”