Disruptive Innovation – Clayton Christensen (Parts 1-4)

Disruptive Innovation – Clayton Christensen (Part 1)

 

Statistics on 4/19/15

Views: 62,356
I like this: 120
I dislike this: 2
Comments: 15

Disruptive Innovation – Clayton Christensen (Part 2)

 

Statistics on 4/19/15

Views: 24,941
I like this: 39
I dislike this: 1
Comments: 3

Disruptive Innovation – Clayton Christensen (Part 3)

 

Statistics on 4/19/15

Views: 13,791
I like this: 41
I dislike this: 1
Comments: 7

Disruptive Innovation – Clayton Christensen (Part 4)

 

Statistics on 4/19/15

Views: 10,135
I like this: 32
I dislike this: 1
Comments: 6

concrete data from the applied predictive modeling library

Variable names in concrete data:

Cement

BlastFurnaceSlag

FlyAsh

Water

Superplasticizer

CoarseAggregate

FineAggregate

Age

CompressiveStrength

 

Concrete data Summary

summary(concrete)

20150419-data(concrete)_summary(concrete)

 

Mixtures data Summary

summary(mixtures)

20150419-data(concrete)-mixtures_summary(mixtures)

Mixtures data Feature Plot

requires library(caret)

We could list out all the variable names as shown below:

featurePlot(x=mixtures[,c(“Cement”, “BlastFurnaceSlag”, “FlyAsh”, “Water”, “Superplasticizer”, “CoarseAggregate”, “FineAggregate”, “Age”)],y=mixtures$CompressiveStrength, plot=”pairs”)

or simplify a bit:

names <- colnames(mixtures)

names <- names[-length(names)]

then plot:

featurePlot(x = mixtures[, names], y = mixtures$CompressiveStrength, plot=“pairs”)

 

20150419-data(concrete)-mixtures_featurePlot

R: Get AppliedPredictiveModeling Library

install.packages(“AppliedPredictiveModeling”)

Verify it installed correctly; try loading the library:

library(AppliedPredictiveModeling)

 

If you also see “also installing the dependency ‘CORElearn’” in the console is because Applied Predictive Modeling requires CORElearn which should install automatically.  If it already is installed you won’t see that message.

2015 Updated analysis of Troy Hunt’s password reset examples

An updated 2015 analysis of password reset examples from Troy Hunt: Everything you ever wanted to know about building a secure password reset feature (May 22, 2012) performed April 16 & 17, 2015

I was reading through the post and wondered in nearly three years what, if anything, has changed with the examples provided?

Short answer: largely nothing security-wise

US Outdoor changes:

  • Slight theme update
  • Extended Validation SSL certificate
  • Uses HTTPS for logon page (issues there also)

2012

2012-US_Outdoor_Logon
by Troy Hunt is licensed under CC BY 3.0

Clearly the first problem is that the logon page hasn’t been loaded over HTTPS, but then they’ve also gone and offered to “Send Password”. Now maybe that’s an example of the earlier mentioned colloquial use of the term, let’s dig a big further and see what happens:

201520150417_US_Outdoor_Logon

  • You will notice the logon page now loads over HTTPS, but there is a mixed content warning  (see below).
  • The text “Enter your email address and we’ll send your password” clarifies that yes, they will be sending your password and not a reset link.
20150417-US_Outdoor_Mixed_Content_warning
Logon page mixed content warning

Looks like it is the search form in the header:

20150417-US_Outdoor_insecure_endpoint
1920×1040 image click to expand

They incurred the extra expense of a extended validation SSL certificate, you’d think they’d want it to display correctly on all pages.

Extended validation info before loading mixed content
Extended validation info before loading mixed content

 

Back to the original analysis…

2012

2012-US_Outdoor_Your_password_has_been_sent
by Troy Hunt is licensed under CC BY 3.0

Not looking much better, unfortunately and the email confirms the problem:

201520150417-US_Outdoor_Your_password_has_been_sent

Exactly the same.

Wait, there are 2 errors and 1 warning (the same mixed content warning as before) in the console…

20150417-US_Outdoor_errors_warning
Password has been sent page errors and warning

 

and the email…

2012

2012-US_Outdoor_Your_password_is
by Troy Hunt is licensed under CC BY 3.0

So this tells us a couple of important things about usoutdoor.com:

  1. They’re not hashing the password. At best they’re encrypting it but they’re quite possibly just storing it in the clear; we have no evidence to the contrary.
  2. They’re sending a persistent password – one we can go back and keep using over and over – via an insecure channel.

201520150416_US_Outdoor_Store_Password_Offender

Clearly you can.  Again, exactly the same.

Still no evidence whether the password is encrypted or stored in the clear, but it obviously isn’t being hashed.

Don’t worry, I changed the password after this analysis, which brought up a completely different set of usability issues I plan to detail later.  Basically it boils down to disallowing characters and truncating passwords without warning.  It was easy to discover the latter however, because they just email my password back upon request.


 

Original analysis and images courtesy of Troy Hunt licensed under a Creative Commons Attribution 3.0 Unported License.

Work on this page is also licensed under a Creative Commons Attribution 3.0 Unported License.

Daily Links Thursday 4/16/15

News:
https://lists.debian.org/debian-devel-announce/2015/04/msg00005.html

http://www.catonmat.net/blog/fogcreek-interview/

http://arstechnica.com/security/2015/04/it-wasnt-easy-but-netflix-will-soon-use-https-to-secure-video-streams/

http://phys.org/news/2015-04-world-record-electric-motor-aircraft.html

Everything else:

http://www.troyhunt.com/2012/05/everything-you-ever-wanted-to-know.html

http://www.troyhunt.com/2014/02/your-api-versioning-is-wrong-which-is.html

http://www.paulirish.com/2010/the-protocol-relative-url/

http://tools.ietf.org/html/rfc3986#section-4.2

https://url.spec.whatwg.org/#concept-scheme-relative-url

https://istlsfastyet.com/

https://www.eff.org/encrypt-the-web-report

https://support.google.com/a/answer/2520500?hl=en