So how hackable are the constellations?
Dr. Michael Thomas’ Post
More Relevant Posts
-
"If you do not take risks for your ideas you are nothing. Nothing." N.N.T. | #LibreQoS & #bufferbloat :-) PS: Bandwidth is a lie!
LibreQoS v1.4 Change Summary: Version 1.4 is a huge milestone. A whole new back-end, new GUI, 30%+ performance improvements, support for single-interface mode. #LibreQoS #bufferbloat #latency #jitter #ISP #WISP #InternetServiceProvider #FWA #FixedWirelessAccess #FixwdWireless #FiberInternet #QoE #QoS #QualityOfExperience #QualityOfService
This #technologist believes in #magic, of a peculiar kind. The #Bufferbloat Projects' and #SpaceX's have always had an odd tie between their successes and ours. Jim Gettys (the founder of the Bufferbloat Project) had originally studied to be an astronomer and me, I had wanted to be an "astro-miner". One of our great joys in working together for so many years was our endless discussions of all things space, while we dealt in more mundane problems. In talking with others about space stuff, we got to the point where we would finish each others sentences, like an old married couple! I have my personal story lying around somewhere about how, in 2004, as SpaceShipOne seemed to be spinning out of control at the top of its flight path, when the 5000 space enthusiasts at the site, suddenly stopped breathing as one, and believed also in the power of magic... *because we had to help will the thing to land*. It did (though it turned out Brian Binnie felt he was in total control). In the CeroWrt project's software release cycle, in particular, it seemed like there was a correlation... or causation... of success or failure between a SpaceX launch and one of ours. They blew something up, we blew something up. We didn't crash, neither did they. I think the kind of thought, craftsmanship and care we pour into our code, the hopes and dreams of all our things, that "manna", that "force", pervades everything we all do as humans, and powers the future of civilization. You could call it magic, I suppose. SpaceX @Starship's launch today was delayed until tomorrow. We launched LibreQoS v1.4 today, anyway. We are confident that after 9 months of development and deployment within our user base it is the greatest thing ever created for ISPs worldwide to better manage their latency, jitter and bandwidth on behalf of their subscribers, over nearly any network substrate, be it wireless, cable, or fiber... or one day, perhaps, Starlink. Get LibreQos here: https://lnkd.in/g8NutDe9 Tell your ISPs about it. There is no need for users to have bad #latency anymore. In the odd hope that how we passionately believe our successes rubs off (causation as opposed to correlation), we wish SpaceX the best of all possible days, tomorrow, also.
Bufferbloat
bufferbloat.net
To view or add a comment, sign in
-
Expert in I&C, Simulators, Control rooms and HFE with experience in 30 projects for 10 nuclear power plants
Contemporary #simulators and #instrumentationandcontrol systems are developed using #github and other open source repositories which helps to develop application software (process models) and system software (instructor station). Considering the demand on cloud-based automation and training solutions as well as full-scope simulator and plant computer remote updating the user shall be aware of the methods that hackers use to gain access. This example shows how effective internet reconnaissance is for gaining access to your network domains
He Hacked NASA in 60 seconds (Real World Tutorial)
https://www.youtube.com/
To view or add a comment, sign in
-
Advocate of the High Court of South Africa with Pupillage(Bar exams) #Rechtsanwalt #DataPrivacy #MaritimeLawyer #CommercialContracts #Compliance #Tenders #LegalAdvisor #Maritime #Shipping #LegalCounsel #Contracts
An interesting article:
Hafnia aims to connect its entire fleet to Starlink by the end of 2023
https://www.offshore-energy.biz
To view or add a comment, sign in
-
Security Analyst | Cybersecurity Expert | CISA | Security+ | GCSC | IIM Indore | Information Security | Operations Management | Govt of West Bengal | Penetration Testing
Jupiter Challenge Write-up Introduction: In this write-up, I will be discussing my experience solving the "Jupiter" challenge in the Hack The Box virtual environment. Please note that sensitive information such as links, user IDs, and flag usernames will be either hidden or replaced with asterisks (*) to maintain security. Challenge Overview: The Jupiter challenge presented a unique set of tasks that required a combination of technical skills and creative thinking. The objective was to navigate through various stages and overcome obstacles to ultimately achieve the desired outcome. Stage 1: Initial Reconnaissance The challenge began with an initial reconnaissance phase where I gathered information about the target system. Using a combination of scanning tools and manual inspection, I identified the potential vulnerabilities and entry points. Stage 2: Exploitation Once the vulnerabilities were identified, I proceeded to exploit them to gain access to the system. Through careful analysis and experimentation, I was able to leverage the weaknesses and successfully gain a foothold on the target machine. Stage 3: Privilege Escalation Having established a presence on the system, the next step was to elevate privileges and gain higher levels of access. This required thorough exploration of the target environment, searching for vulnerabilities and misconfigurations that could be leveraged to escalate privileges. Stage 4: Capture the Flag After gaining elevated privileges, I focused on finding the flag, which was the ultimate goal of the challenge. I meticulously searched the system, uncovering hidden directories, examining configuration files, and deciphering encrypted data. This process involved a combination of manual investigation and automated tools to aid in the discovery. Conclusion: The Jupiter challenge in the Hack The Box virtual environment provided an engaging and stimulating experience. It required a comprehensive understanding of various techniques, including reconnaissance, exploitation, privilege escalation, and flag capture. By following a systematic approach and leveraging my skills, I was able to successfully overcome the challenges and complete the task at hand. Hint: sql>reverse>(pspy helped a lot)>user1>flag>(chisel helped a lot)>login>logs>token>reverse>user2>s**o -l>flag
Owned Jupiter from Hack The Box!
hackthebox.com
To view or add a comment, sign in
-
Interesting application of the system.
Military May Get Its Own SpaceX Starship Rockets For Dangerous Missions
twz.com
To view or add a comment, sign in
-
Are software flaws inevitable? I thrive on the challenge of resolving them swiftly. Every software has its imperfections, and when issues arise, swift and easy access to support is essential ⛑. To facilitate this, we implement error boundaries within our application and provide customers with the appropriate links to submit support requests. A clear and detailed problem description is crucial. As a support engineer, understanding the issue and attempting to reproduce it before escalating it to the development team is imperative. Within the development team, the goal is to identify the root cause and provide a solution 🚀 . These tasks require as much information as possible to expedite the process. To gather comprehensive information 🔎 , we have created a concise guide: https://lnkd.in/ehSZCZbw. This resource enables customers to either resolve their issues independently or provide the necessary details, such as reproduction steps, screenshots, etc., and of course a link to our JSM portal to assist us in addressing their concerns effectively. How do you facilitate customer communication during challenging times?
Spacecraft
awesomecustomfields.wikipage.io
To view or add a comment, sign in
-
Healthy and well-informed skepticism is the right sensibility to bring to this challenge of achieving a "fully realized" hybrid MILSATCOM/COMSATCOM architecture for the DoD. Just the same, between "fully realized" and a sort of tacitly accepted "escalating chaos of verticals," there is an aspirational and potentially achievable sweet spot to be found. It'll take serious DoD buying power, and, as is postulated in this article, at least one, probably a handful, of "anchor customers" across the DoD. As I've said in other threads on this DoD SATCOM EM&C topic, we're going to have to want this pretty badly, and put our money where our vision is, if we expect a consortium of leading commercial space and network management industry partners to band together to get started on this, and to converge upon and define the data and API standards that would be essential to sustaining such an ecosystem. Steve Nixon, quoted at the back end of the article, has it largely right: Industry (broadly defined here) has the chops to get something of this complexity and scope moving forward, with the potential that you'd grow it and improve it through time. The question is whether DoD has the chops, the strategic intent, the governance will and the staying power to fully incentivize industry to do it. Somewhat shooting for effect, I'd suggest time is of the essence here (chaos stops and waits for no one), and leaders need to get about leading on this front, and PDQ. OSD should be triangulating the critical requirement for this, at at least a broad level of approximation, with CJCS, MILDEP/Component 4-stars and Combatant Commands, resulting in resolute JROC-vetted/sponsored investment. From there, accept the reality that v1.0, even designed and fielded at a relatively small and achievable scale, will likely suck. From there, we can self-assess our sincere fealty to DevSecOps/AGILE -- and commit the funding and governance rigor to continuous and sustained improvement. A "fully realized" hybrid space architecture, or even something pretty darned good that falls a bit short of that, won't be built in a day.
Space Force goal of a multi-vendor space network called impractical
https://spacenews.com
To view or add a comment, sign in
-
Have you watched “How to Get Data From Your Website / App That You'll Actually Use” on The Civic Hacker Network YouTube channel? This video invites technologists to take a more strategic approach to their product data and analytics. You can watch it there, along with the playlist of NASA Space Apps Bootcamp sessions from our very own Lori McNeill. Check it out here: https://lnkd.in/gXPXi58i #data #website #productdata
Civic Hacker Network
youtube.com
To view or add a comment, sign in
-
Pivoting, Tunneling, and Port Forwarding Once a foothold is gained during an assessment, it may be in scope to move laterally and vertically within a target network. Using one compromised machine to access another is called pivoting and allows us to access networks and resources that are not directly accessible to us through the compromised host. Port forwarding accepts the traffic on a given IP address and port and redirects it to a different IP address and port combination. Tunneling is a technique that allows us to encapsulate traffic within another protocol so that it looks like a benign traffic stream.
Awarded the badge Explore deep space
academy.hackthebox.com
To view or add a comment, sign in
-
No one is safe
Hackers shut down 2 of the world's most advanced telescopes
space.com
To view or add a comment, sign in