By Topic

Distributed Systems Online, IEEE

Issue 10 • Date Oct. 2007

Filter Results

Displaying Results 1 - 4 of 4
  • Games and Simulation: DS Online's Newest Topic Area

    Page(s): 1
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (182 KB)  

    Over the past few years, we've all witnessed the hacker community's growing impact on both the IT industry and academia. Host and network exploitation techniques that used to be discussed in "underground" forums are now featured in book series from No Starch Press, Syngress, and other publishers. Furthermore, they've become standard training for security practitioners - see, for example, the SANS Institute's Security 504: Hacker Techniques, Exploits, and Incident Handling course (http://www.sans.org/training/courses.php). It is now beyond doubt that the hacker community has developed efficient techniques for analyzing, reverse engineering, testing, and modifying software and hardware that challenge their college and graduate-school-educated peers. These techniques have let the community substantially contribute to the state of the art of practical computer security. Many academic researchers recognize that marginalizing the hacker community would be a mistake, and increasing numbers of industry and government security practitioners attend hacker conferences such as DefCon (http://www.defcon.org) and Black Hat (http://www.blackhat.com). In fact, the US Military Academy and the US Naval Academy supported their students' participation in computer-security-related competitions at ShmooCon (http://www.shmoocon.org) and DefCon, respectively. View full abstract»

    Open Access
  • Hacker Curriculum : How Hackers Learn Networking

    Page(s): 2
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (174 KB)  

    This two-part article discusses the factors distinguishing the hacker culture from the IT industry and traditional academia, using networking examples. This first part describes the starting points of the hackers' approach to layered computer systems. View full abstract»

    Open Access
  • Stepping Up to Long-Term Research

    Page(s): 3
    Save to Project icon | Click to expandQuick Abstract | PDF file iconPDF (139 KB)  

    After many years of budget cuts and limelight lost to other disciplines, long-term computer science research is receiving a new, if tentative, boost. Recent government-sponsored reports have emphasized basic CS research needs and, perhaps more important, a general direction the overall effort might take. Concurrently, the US Congress has begun to demonstrate a willingness to fund some of these projects to an extent sorely lacking for several years. View full abstract»

    Open Access
  • Hardening Network Infrastructure: Not Suitable for Everyone

    Page(s): 4
    Save to Project icon | Request Permissions | PDF file iconPDF (121 KB)  
    Freely Available from IEEE

Aims & Scope

IEEE DS Online provides constantly updated, expert-moderated material in such areas as cluster computing, grid computing, security, and middleware.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Jean Bacon
Univ. of Cambridge
Computer Laboratory