Greetings, I'm Javantea author and founder of AltSci Concepts. I've written 25 essays for 4.5 issues of AltSci Concepts Computer Journal. I will continue to do so at my leisure. I added a comment system to provide a public method of feedback. Now that I'm more confident, I'd like to add a third method of feedback. Readers can now buy public hacks from AltSci Concepts. Click the button at the top or bottom of this page to buy a hack for US$5.
First off, let me discuss the terms of the purchase. The cost of the "public hack" is $5. You are purchasing a guaranteed article with code and data on the topic of your choice. In fact, I will not taboo any topic. I guarantee delivery via e-mail or web in less than 30 days (much less if a reasonably easy topic). At my discretion I will publish the results on AltSci Concepts. If you wish the results to be private, my fee is $20 per hour, my normal developer rate. The product is subsidized by the fact that it will be published on AltSci Concepts as public knowledge.
Now I will give examples of projects that could be bought for the low low price of $5.
- The Nature of Reverse Engineering
- Cryptanalysis of a common or new cipher
- USB Device Driver for Linux
- Vulnerability Analysis on Win32
- Vulnerability Analysis on Linux
- Code Analysis
- Exploit development
- Virus development
- Fuzzing a specific program/OS
- AI Development
- Blender3D Scripting
- OpenGL coding issue
- Reverse Engineering video game data
- Reverse Engineering a program feature
- Programming in C
- Programming in Python
- Subverting Digg
- Tracking images on Myspace
- Phishing for passwords on Myspace
- Specific Website Security
by Javantea aka. Joel R. Voss
Analysis: Jan 9-Aug 26, 2006
Write-up: Sept 8, 2006
Botnets
Spam Server Analysis 0.6
[sig]
Spam Server Analysis 0.4
[sig]
Spam Server Analysis 0.1
[sig]
50 MB of Test Spam
[sig]
Spam servers are generally accepted to be among the worst netizens currently residing on the net. Most are zombie botnets, some are open relays or proxies, but some are legitimate businesses in foreign countries. Since spam is illegal in the US, any server sending spam (with quite a few exceptions) is committing a crime. Of course, legislators have no concept of legitimate enforcement, so the fact that spam is a crime does not affect the level of spam that users receive.
Detection, analysis, and blacklisting of spam servers is the proper method to eradicate spam servers. While certain methods of unblacklisting will be required, blacklisting has no downsides. Occasional spammers will not be blocked until they make themself a nuisance.
Read more »
by Javantea aka. Joel R. Voss
Nov 9-10, 2006
AI Coder 1 version 0.1 Source
[sig]
Scripting languages have become an important part of programming functionality. Often, scripting languages are run in a sandbox with a specific piece of memory available and all code interpreted by a program written to execute only a subset of the computer's functionality. This has allowed a system on the web where client-based code can be run on the clients for quick reaction time and specific features. Most of the actual code (data retrieval, calculation, and storage) needs to be run on the server, so it leaves the client code to be nearly all real-time display. In fact, most webpages need no actual client-side code to be perfectly functional. However, more and more sites are relying on increasingly complex scripting libraries including AJAX, math, and data handling. Running a SHA1 hash on a client-side may be useful for many purposes, but many problems arise with these systems.
Browsers must handle a large amount of useful script as well as a large amount of invalid script without detracting from user experience. Compliance with standards is also an important factor in writing a browser. With these factors in mind, obvious security questions arise. Many of these have been addressed by browser developers, yet many have not. Javascript is obviously headed to be the leading cause of DoS if it is not already. It has also become a major threat to user privacy due to Cross-site scripting (XSS) attacks as well as malicious phishing attacks.
Read more »BitTorrent Protocol Attack
jvoss@altsci.com
jvoss@myuw.net
Feb 23-26, 2005
BitTorrent Attack 0.3 Source
[sig]
BitTorrent Attack 0.2 Source
[sig]
Official BitTorrent Protocol
Official BitTorrent Client
Netmap2 Page
The BitTorrent Attack is a small project to see what we can do with the BitTorrent protocol without sending or receiving legitimate data. It is part of Netmap2 (aka. Protocols and Services Project).
Read more »