Just a basic blog—snagging random stuff that catches our eye—nothing else, really...
Friday, December 30, 2011
Featured Articles: The Rustock takedown
"The Rustock takedown was the second major botnet takedown Microsoft has spearheaded within the last two years. In 2010, Microsoft asked for and received a court order that shut down a number of malicious domains used by the Waledac botnet. (See the Security Intelligence Report website for more information.) As part of that effort, Microsoft filed a John Doe lawsuit against the anonymous operators of the Rustock botnet, based in part on the abuse of Microsoft trademarks in the bot’s spam."
UNODC crime and criminal justice statistics
Cross-national UNODC crime statistics for over 120 countries are available on this page covering the period 2003 to 2008. Statistics on police-recorded offences and identified victims are available by crime type. Statistics on the response of the criminal justice system are divided according to police, prosecution, court and prison statistics.
Thursday, December 29, 2011
UNODC Resources: data and analysis
One of the key tasks of UNODC is to produce and disseminate accurate drugs and crime statistics at the international level.
E-ZPass New York - Close Account Form
In order to process your request to close your account, please complete, sign and return this form along with the tag(s) to the address below or at one of our Walk-In Customer Service Centers:
Verizon to Charge Customers $2 Fee When Paying Bills Online
Time to set up “auto pay” through your Verizon Wireless account. According to our sources, Big Red will start charging you a $2 fee both over the phone and online for your monthly bill transaction unless you have your account set up to pay automatically.
Information Warfare, 1995
The National Computer Security Association sponsors an annual International Conference on Information Warfare.
Wednesday, December 28, 2011
Recent Links on Varied Topics
It's small and portable and it fits easily in a purse, pocket, or briefcase. No more lugging a brick-sized gizmo around to stay connected. Because of how little it weighs, convenience and portability are greatly enhanced.
Macrium Reflect FREE Edition - Information and download
One to try?
iTunes - Podcasts - DEFCON 3 [Audio] Speeches from the Hacker Convention. by The Dark Tangent
DEFCON 3 was held August 4-6th 1995 at the Tropicana in Las Vegas. Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4b format.
How do I transfer Palm contacts to Address Book?
First off, launch your Palm desktop application, then from the File menu choose Export. You'll get a window that looks like this:
About Us | Steven K Carpentry
Carpentry & Handyman Services to businesses and residences in San Diego county. If you’re looking for an experienced carpenter then look no further.
Saturday, December 24, 2011
ECOR® | Innovative Nature-Engineered™ Products
Ecor® is an innovative environmental core technology offering an extensive new generation of highly versatile, strong, lightweight, three-dimensional engineered molded fiber (3dEMF) panel products manufactured from an almost unlimited variety of readily-available, low-cost and underutilized raw material sources."
'via Blog this'
Corrugated Packing Material | honeycomb board | corrugated sheet | coroplast
'via Blog this'
What is BlogThis! ? - Blogger Help
'via Blog this'
Save On Discount Utrecht Honeycomb Board 42x30x1/2 - 10pk & More Corrugated Cardboard at Utrecht
Honeycomb board is a sheet material in which the medium is made from a paperboard honeycomb. The medium is sandwiched between paperboard liners. Compared to both cardboard and foam core, it has good structural characteristics.
asada's memorandum (The Day I Saw Van Gogh's Genius in a New Light)
The event’s main objective was to educate the public about the diversity of color vision which exists in our society.
Thursday, December 22, 2011
Wednesday, December 21, 2011
Researchers demo cloud security issue with Amazon AWS hijacking attack
Researchers from the Horst Goertz Institute (HGI) of the Ruhr-University Bochum (RUB) in Germany have demonstrated an account hijacking attack against Amazon Web Services (AWS) that they believe affects other cloud computing products as well.
The attack uses a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.
The 6 Stages of Exposing Yourself with Content Marketing | Content Marketing
To study the relative merits of content creation and dissemination, we declared there to be 6 stages on the content marketing continuum (6 stages of opening the kimono in the parlance of the presentation).
Taking Down the Giant: Be the Thought Leader Your Customers Are Looking For
Write about the ecosystem that your solution resides in. Offer help to the person that’s buying your solution with tips, tricks, and how-to articles. Identify, contact, and build relationships with the influencers (authors, bloggers, analysts, etc.) in your industry.
How do you define good content? | OpenView Blog
1. Substance – First and foremost, the content items you post need to be substantive enough to make it worth the reader’s time. Keep in mind that “substantive” doesn’t necessarily mean “long”; in fact some articles might even be too long for online publication. It means that the content you’re creating adds standalone value to the page. In other words, people can read this one page and get something out of it.
Content Marketing Tips and Resources
Have a minute? Check out this series of short video primers with content marketing expert Joe Pulizzi.
What Does Your Content Marketing Strategy Say About YOU? | OpenView Labs
Baer shares his six stages of the content marketing continuum, offering real world examples of these content marketing strategies in action.
7 Basic Content Marketing Principles for the Corporate Marketer | Content Marketing Institute
Yes, every business wants to boost sales and build brand awareness; but the truth of the matter is that to reach those goals you must first succeed in building an online conversation around the content objects you produce.
Monday, December 19, 2011
Malware developer AMA : IAmA
I develop malware for profit, ask me anything. I'm not giving any background, I'll let the answers do the talking.
Sunday, December 18, 2011
Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually
Sept. 7, 2011 – Symantec Corp. (Nasdaq: SYMC) For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually1. Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost2. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion).
Cybercrime: A Shocking Picture of the Problem - Norton Community
"Cybercrime costs $388 billion dollars in annual losses globally and it affected almost 7 in 10 adults last year.
"Norton Cybercrime Report 2011, a study on the impact of cybercrime that included a survey of over 12,000 adults in 24 countries. This provides an important and accurate picture of the scope of cybercrime globally and the results are shocking! Every day of the past year, over 1 million online adults in 24 countries experienced cybercrime. This can also be broken down to 50,000 victims per hour, 820 victims per minute, or 14 victims every second. In just the last 12 months 44% of people have been a victim of cybercrime while only 15% have been a victim of physical crime in the same period. "
Credit Card Fraud: How Big Is The Problem? | Practical eCommerce
Across the board, the cost of managing fraud exceeds the cost of fraud itself by as much as 300 percent, according to preCharge's report.
Public records shed light on American Express plans
In the year since American Express decided to build a massive data center in eastern Guilford County, much has happened, but most of it didn't make headlines.
Saturday, December 17, 2011
Tweaks & keyboard shortcuts for Stacks in 10.6 Snow Leopard | MacYourself
Have you ever agonized over the choice between List and Grid views because you liked certain things from both?
Thursday, December 15, 2011
Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chronicle of Higher Education
One of the characters in Henry James's 1888 novel, The Reverberator, muses: "If these people had done bad things they ought to be ashamed of themselves and he couldn't pity them, and if they hadn't done them there was no need of making such a rumpus about other people knowing."
Wednesday, December 14, 2011
Report on UK cybercrime statistics reveals culprits and responders
While most agreed that cybercrime awareness was important in beating cybercrime, 45% of respondents said they had no cybersecurity-related training in the last year. Only 24% of UK respondents received face-to-face training, which most people agreed was the most effective.
London Conference on Cyberspace - The Nation
The London Conference on Cyberspace (1-2 November 2011) We are writing to inform you that the Foreign Secretary will be chairing the London Conference on Cyberspace from 1 - 2 November this year.
London Conference on Cyberspace: Chair's statement
Quoting the UK Foreign Secretary William Hague: "Earlier this year I proposed the following principles for governing behaviour in cyberspace, and called for a more focussed and inclusive dialogue between all those with a stake in the Internet – civil society and industry as well as governments - on how we might implement them..."
- The need for governments to act proportionately in cyberspace and in accordance with national and international law;
- The need for everyone to have the ability – in terms of skills, technology, confidence and opportunity – to access cyberspace;
- The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas;
- Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression;
- The need to respect individual rights of privacy and to provide proper protection to intellectual property;
- The need for us all to work collectively to tackle the threat from criminals acting online; and
- The promotion of a competitive environment which ensures a fair return on investment in network, services and content.
Erase All Data Before Selling Your iPhone
With the arrival of iPhone 4, you may consider selling your existing iPhone and upgrade to the new one. Whether you plan to sell your old iPhone on eBay or through a store, make sure you completely erase all data on your device.
Tuesday, December 13, 2011
Russia: Election Day DDoS-alypse
Global Voices is an international community of bloggers who report on blogs and citizen media from around the world.
Friday, December 9, 2011
Noise Abatement | Neighborhood Code Compliance Department
Thursday, December 8, 2011
History of Ultimate bet - How Ultimatebet.com Started - UB History |
The Once and Future War | World Policy Institute
Cybercriminals offer complex infection services
However, recent research has indicated changes in service scope and price due to service convergence and demanding buyers.
Report Details China's Electronic Espionage Apparatus
The report, titled "The Chinese People's Liberation Army Signal Intelligence and Cyber Reconnaissance Infrastructure",
Brazilian Banking Trojan Poses as Microsoft Anti-Malware Tool | Malware & Computer Viruses | Anti-Virus Software & Web Browser Security | SecurityNewsDaily
The Trojan affects "ntldr," the default boot loader on Windows machines, explained Kaspersky Lab expert Fabio Assolini. Identified as Trojan-Downloader.Win32.VB.aoff, the Trojan originated in Brazil, and spreads as a link attached to emails.
Wednesday, December 7, 2011
InterfaceLIFT: Icons sorted by Date
There are 1080 desktop icon sets listed below, sorted by the date they were posted to the site, beginning with the most recent content. You are on page 4 of 108.
SuperDuper!
SuperDuper is the wildly acclaimed program that makes recovery painless, because it makes creating a fully bootable backup painless. Its incredibly clear, friendly interface is understandable, easy to use...
True!
How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011" 13-Inch, 15-Inch, and 17-Inch MacBook Pro models? What type of hard drive do these models support? Can one replace the hard drive with an SSD? @ EveryMac.com
How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011"Pro models?
...the basic procedure is to turn off the notebook, disconnect cables, and let it cool; flip it over and unscrew the bottom plate, discharge static electricity, unscrew the retaining bar, disconnect the SATA connector, remove the mounting screws, install the new drive, and reassemble the computer.
Saturday, December 3, 2011
Hotel Esprit Bratislava : Welcome
This ancient city with over two millennia of history is one of the youngest capitals in Europe. Since 1919 Bratislava has been the capital of the Slovak Republic and it is currently regarded as one of the fastest developing cities in Europe. Bratislava represents an important centre of trade, culture and art and its huge potential is chiefly in its excellent transport connections with Vienna, Prague and Budapest.
View Larger Map
Hotel Esprit Bratislava : Welcome
Welcome to the new design hotel, Hotel Esprit, which creates a unique atmosphere for you thanks to its stylish interior and carefully selected decor. The hotel is situated in the immediate vicinity of Incheba exhibition centre, the historic city centre and Bratislava Castle.
Budget Light-weight Pulpboard Coasters
Promote your message while your guests enjoy their beverage with Customized Pulpboard Coasters. Promotional Round Coasters keep your brand or message in plain sight in bars, restaurants, nightclubs, and at private or corporate events.
Friday, December 2, 2011
Lawmaker calls for FTC probe into Carrier IQ | Reuters
Thursday, December 1, 2011
Auto Glass Replacement & Repair - Get An Instant Free Quote Online!
Auto Glass Replacement & Repair
Call Center Open 24/7 ~ Free Mobile Service
Over 30 Years Experience with 36 California Locations
Wednesday, November 30, 2011
BUSTED! Secret app on millions of phones logs key taps • The Register
An Android app developer has published what he says is conclusive proof that millions of smartphones are secretly monitoring the key presses, geographic locations, and received messages of its users.
Tuesday, November 29, 2011
Feds Seize 150 Websites In Counterfeit Crackdown : NPR
Monday, November 28, 2011
HP EliteBook 8760w Mobile Workstation Configure your model - HP Small & Medium Business products
MRP40 Morse Decoder by dxzone.com
MRP40 Morse Decoder by dxzone.com
Amazon.com: Solid Thermal Insulated Blackout Curtain 84"L- 1 Set-BLACK: Home & Garden
Best Home Fashion introduces the new Blackout Curtain. It features innovative fabric construction. Compare to the other curtains, our product is extremely SOFT and DRAPERY. The sophisticated designs allow you to decorate your windows with great styles. NEVER compare our Blackout Curtains with those cheap ones that are stiff and looks like a shower curtain.
Sunday, November 27, 2011
Customize 13.3" Laptop | VAIO S Series Configure-to-Order | VPCSA390X CTO | Sony USA
Intel Core™ i7-2640M processor (2.80GHz / 3.50GHz with Turbo Boost)
The Regex Coach - interactive regular expressions
The Regex Coach is a graphical application for Windows which can be used to experiment with (Perl-compatible) regular expressions interactively. It has the following features:
How to use Migration Assistant to transfer files from another Mac
You can use Migration Assistant to transfer important information, such as user accounts, applications, network and computer settings, and files, from one Mac computer to another via a FireWire cable or over a wired or wireless network.
How to Transfer Mac OS X Application Data between Computers - Professional PHP
You can open the Keychain Access application to view and manage your passwords. Each User’s keychain is stored in their ~/Library/Keychains directory. (The ~ means this directory is a subdirectory of your user home directory.)
Fix Fan Noise & Overheating After Upgrading to Mac OS X 10.7 Lion with SMC Reset
To give further backing to the solution, Apple’s support doc lists the following as the first reason to reset the SMC: “The computer’s fans run at high speed although the computer is not experiencing heavy usage and is properly ventilated.
Friday, November 25, 2011
HP Z600 Workstation for $5,099
The HP Z600 is engineered to optimize the way processor, memory, graphics, OS, and software technology work together to deliver massive, whole-system computational power.
Tuesday, November 22, 2011
Paper Bin & Parts Boxes
Length is the widest dimension of the opening into the box. Width is the smallest dimension of the opening into the box. Depth is the distance into the box from the opening to the bottom of the box.
Moving Services from ABF U-Pack Moving
U-Pack ReloCubes are ground-level and big enough for a room's worth of furnishings. The ideal moving option for apartment and college moves.
Monday, November 21, 2011
SOPA goes for House debate Dec. 15 - Post Tech - The Washington Post
Rep. Lamar Smith’s (R-Tex.) Stop Online Piracy Act, a legislation that has pitted media companies against high-tech firms such as Google and Facebook:
"Legitimate websites have nothing to worry about under this bill.”
Except maybe blogs and search sites that innocently link to sites that are not innocent.
Saturday, November 19, 2011
2011/Support/en - Wikimedia Foundation
2011/Support/en - Wikimedia Foundation
(And make that chap's face go away.)
SOPA: 9 Tech Companies That Support The 'Stop Online Piracy Act'
In a speech to the Hollywood Chamber of Commerce, former Senator and MPAA President Chris Dodd chastised tech companies who oppose SOPA saying, "There are those in the tech industry who hold the mistaken belief that there is nothing wrong with providing links to stolen content[...] I wonder if they would feel the same if their patents were stolen and used by others for profit?"
Come on Mr. Dodd, this does not even make sense. Name someone who thinks it is okay to provide links to stolen content. And tech companies take legal action against infringers all the time, using the legal system, not by nuking the national and global infrastructure.
Friday, November 18, 2011
EU Adopts Resolution Against US Domain Seizures
The European Parliament has adopted a resolution which criticizes domain name seizures of “infringing” websites by US authorities. According to the resolution these measures need to be countered as they endanger “the integrity of the global internet and freedom of communication.” With this stance the European Parliament joins an ever-growing list of opposition to the Stop Online Piracy Act .
Wednesday, November 16, 2011
Sharp Rees-Stealy Medical Group - Home
Sharp Rees Stealy! We are pleased to welcome you to our office. If you're looking for quality care with a personal touch, we hope you'll give us a call. We look forward to the opportunity of serving your family's optometric needs.We are conveniently located nearby and would be delighted to have you as a patient.
Hillcrest Optical
Saturday, November 12, 2011
In which I fall truly, madly, dIkea’s Dignitet curtain hanging system
The thing is, all the Ikea rods except one kind of ugly one stop at 79 inches, and the bedroom windows in the Schoolhouse are 101 inches wide. I bought the Dignitet system as a default solution – but I have ended up thinking it is the best thing since sliced bread.
Friday, November 11, 2011
Gary Fisher Simple City 3 - Trek Bicycle Superstore
Fisher's Simple City 3 is the perfect answer to high gas prices and headache-inducing traffic. It sports a sweet-riding butted-aluminum frame with a quick-shifting 3-speed drivetrain that's great for commuting, city biking and bike paths
Cybercrime Corner - SC Magazine US
Stephen Cobb has been a CISSP since 1996 and has helped companies large and small to manage their information security, with a focus on emerging threats and data privacy issues.
Have You Checked Your DNS Settings? - ReadWriteCloud
Now might be time to use a DNS provider such as OpenDNS.org, that can provide more security and higher performance of this critical function
Tuesday, November 8, 2011
Wachovia employee busted for attempted half million dollar embezzlement - Media Town Talk - Delco News Network
Delaware County Criminal Investigation Detectives arrested Librado S. Wright for attempting to embezzle over half a million dollars from Wachovia Bank, now owned and operated by Wells Fargo.
BBC News - Smartphone scams: Owners warned over malware apps
Get Safe Online, a joint initiative between the government, police and industry, said it was concerned that users of smartphones, such as Android devices, were not taking steps to protect their devices
Monday, November 7, 2011
Friday, November 4, 2011
FBI — Cyber Crimes
Bobnev was indicted for his alleged participation in a money laundering scheme involving unauthorized access to the accounts of a major provider of investment services. Bobnev allegedly accessed compromised accounts and wire transferred funds out of these accounts to money mules in the United States.
cybercrime.gov
Former Citadel Employee Arrested for Theft of Financial Firm's Trade Secrets: Hard drives recovered from canal allegedly contained effort to construct currency futures trading platform based on Citadel's proprietary model (October 13, 2011)
Thursday, November 3, 2011
The Socialbot Network: When Bots Socialize for Fame and Money
We adopt a traditional web-based botnet design and built a Socialbot Network (SbN): a group of adaptive socialbots that are orchestrated in a command-and-control fashion.
Kelihos, Waledac and Storm malware believed to have same author
Pierre-Marc Bureau, senior malware researcher at antivirus company ESET, posits that its author is the same person (or group of people) who has developed the Storm worm and the Waledac malware.
How Not to Get Hooked by a ‘Phishing’ Scam
If you get an email or pop-up message that asks for personal or financial information, do not reply. And don’t click on the link in the message, either. Legitimate companies don’t ask for this information via email
APWG Consumer Advice
as a general rule you should be careful about giving out your personal financial information over the Internet. The Anti-Phishing Working Group has compiled a list of recommendations below that you can use to avoid becoming a victim of these scams.
National Retail Federation - Holiday Shopping Tips
Fail to prepare = prepare to fail! Make your Black Friday shopping trip as successful (and enjoyable!) as possible by following these tips from the National Retail Federation
Idiot's Guide to Bitcoin [WIP]
"I wrote this after trying to explain Bitcoin to my mom. Brackets indicate a link to be added later. Suggestions welcome."
Hmmm, don't think my Mum would get that. I don't get it. I have yet to read a clear statement of what bitcoin is.
Wednesday, November 2, 2011
Researchers Flood Facebook With Bots, Collect 250GB Of User Data | TechCrunch
In an experiment that reveals as much about the people on Facebook as it does about Facebook itself, researchers from the University of British Columbia Vancouver infiltrated the social network with bots and made off with information from thousands of users.
TechCrunch: Agari Email Security
America's Cup | America’s Cup World Series shifts focus to San Diego
With the second stop for the America’s Cup World Series in Plymouth reaching a thrilling conclusion on Sunday, with ORACLE Racing Spithill’s Fleet Racing Championship win punctuated by capsizes and collisions, attention now shifts to the next event in San Diego, November 12-20.
Pack-up started in the Race Village on Sunday night and continues throughout the week, with the cargo ship HR Constitution being loaded with the lifeblood of the America’s Cup World Series, including the AC45 race boats, 102 shipping containers, 20 support boats, and one of the cranes used to hoist the AC45s into the water. The ship is scheduled to depart Plymouth Sound on Sunday and to arrive in San Diego by October 24, approximately three weeks ahead of the first race day.
HR CONSTITUTION - Vessel's Details and Current Position - 9273791 - 305429000
HR CONSTITUTION
Contribute to this page
Vessel's Details
Ship Type: Cargo
Year Built: 2006
Global Security Survey: Security Budgets Increasing, But Strategy Lacking | SecurityWeek.Com
Sail-World.com : America's Cup: Oracle Racing News - Edition 32
Construction on village for next leg of America’s Cup World Series begins in San Diego: Sailing News | bettor.com
Foreign Secretary opens the London Conference on Cyberspace
The 7 principles proposed are:
The need for governments to act proportionately in cyberspace and in accordance with international law;
The need for everyone to have the ability to access cyberspace, including the skills, technology, confidence and opportunity to do so;
The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas;
Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression;
The need to respect individual rights of privacy and to provide proper protection to intellectual property;
The need for us all to work together collectively to tackle the threat from criminals acting online;
And the promotion of a competitive environment which ensures a fair return on investment in networks, services and content.
Hague suggested these principles as a starting point in efforts to reach a broad agreement about behaviour in cyberspace.
Chemicals and defence firms targeted by hacking attack
"This is unfortunately becoming a new normal behaviour," Symantec's chief technology officer, Greg Day, told the BBC.
"We had at least a decade of cybercrime which generally targeted anybody. Then we had the emergence of very skilled techniques involving a lot of time and effort to target global organisations."
London hosts cyberspace security conference
"If you want to defend against this kind of threat it's not enough to just shoot a few crocodiles, you have to drain the swamp," Prof Anderson told BBC Radio 4's Today programme.
BBC News - London hosts cyberspace security conference
Tuesday, November 1, 2011
Study Reveals 75 Percent of Individuals Use Same Password for Social Networking and Email
Study Reveals 75 Percent of Individuals Use Same Password for Social Networking and Email | SecurityWeek.Com:
The study also revealed that 75 percent of social networking username and password samples collected online were identical to those used for email accounts.
Poor Password Security Poses Big IT Problem
A fundamental lack of IT security awareness – particularly in the area of password control and privileged logins – is potentially paving the way for more waves of data breaches, new research reveals.
from | IT Password Management | Password Management Tools | Business News Daily
Site Identity Button | How to | Firefox Help
The Site Identity Button is a Firefox security feature that gives you more information about the sites you visit.
Firefox & You: Security
Luckily, Firefox knows what's hiding under the bed, so it has plenty of built-in features to put online monsters in their place. That's a big reason for our accelerated release process, too.
Survey Reveals How Stupid People are With Their Passwords | SecurityWeek.Com
Don't think this is a helpful attitude in cybersecurity awareness:
"It never fails to amaze me when I read studies about how careless and stupid people are with regards to their online security"
Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology | guardian.co.uk
'Exponential rise' in attacks on departments, industry and public reveal global cybercrime marketplace, says intelligence director
International Conference on Cyber Security
ICCS 2012 is an event consisting of four days, over 50 unique lectures from keynote, distinguished, plenary and parallel speakers in the disciplines of Emerging Technologies, Operations and Enforcement, and Real Life Experiences.
Facebook passwords are not case sensitive
Facebook actually accepts three forms of your password:
- Your original password.
- Your original password with the first letter capitalized. This is only for mobile devices, which sometimes capitalize the first character of a word.
- Your original password with the case reversed, for those with a caps lock key on.
Conference on Cyberspace
The London Conference will launch a focused and inclusive dialogue to help guide the behaviour of all in cyberspa
Cyber-attacks on UK at disturbing levels, warns GCHQ chief | Technology | guardian.co.uk
'Exponential rise' in attacks on departments, industry and public reveal global cybercrime marketplace, says intelligence director
Monday, October 31, 2011
Internet Access - Households and Individuals, 2011
21 per cent of Internet users did not believe their skills were sufficient to protect their personal data
77 per cent of households had Internet access
Sony’s Weakest Link Hijack | OpenID
Sony announced today that a large number of accounts were hijacked using an attack based on the fact that people reuse passwords across websites. These “weakest link hijackings” are an evolution of the phishing attacks that have become so well known over the last few years.
Cyber Experts Point to Computer Passwords as Weakest Link in Cyber Defences by Contingency Today
Interesting stuff. From straight password guessing to password reset hacks.
Sunday, October 30, 2011
FTC Gives Final Approval to Settlement with Google over Buzz Rollout
The settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years.
FTC Gives Final Approval to Settlement with Google over Buzz Rollout
The settlement bars the company from future privacy misrepresentations, requires it to implement a comprehensive privacy program, and calls for regular, independent privacy audits for the next 20 years.
Official Google Blog: A fall sweep
In a few weeks we’ll shut down Google Buzz and the Buzz API, and focus instead on Google . While people obviously won't be able to create new posts after that, they will be able to view their existing content on their Google Profile, and download it using Google Takeout.
Google ends buzz privacy row with ftc- The Inquirer
Unlike its Google social network, Google's Buzz had a rather blighted entrance to the market, thanks to the fact that it put users in the unfortunate position of having their contact lists exposed.
Google Must Submit to Privacy Audits for 20 Years Under FTC Settlement | Reuters
Google's settlement with the Federal Trade Commission over what the feds called deceptive tactics became official Monday.
Google agrees to FTC settlement (corrected) - MarketWatch
The FTC said the agreement represents the first settlement order that mandates a comprehensive Internet privacy program and the first time the agency alleged a violation of the U.S.-EU safe harbor framework, which covers personal data exchanged between the U.S. and European Union.
Saturday, October 29, 2011
BlueSniff: Eve meets Alice and Bluetooth
First, we show that the Bluetooth packets have no confidentiality properties. Specifically we demonstrate how data can be unwhitened and the hopping sequence calculated. Prior work has shown how the data can be decrypted if necessary [14]. Second, we show that the undiscoverable mode does not provide access control to master devices, nor protects the secrecy of their MAC address. We are able to determine the complete MAC address of these devices. Finally, all our work was done using GNU Radio and we therefore provide the first open-source Bluetooth sniffer, free from any licensing restrictions.
Bluetooth Security Review, Part 2 | Symantec Connect Community
... we look at Bluetooth viruses, several unpublished vulnerabilities in Symbian based phones, and then moves on to discuss "Blue tag" tracking, positioning, and privacy issues.
Configure the Diamante for Bluetooth wireless realtime
The configuration process identifies the computer’s address and generates a Passkey. The Passkey is a security code that allows your writing machine and the computer to communicate securely. You must use this code to establish an active wireless connection between the writing machine and your computer.
Schneier on Security: Bluetooth Sniper Rifle
We've all known that you can intercept Bluetooth communications from up to a mile away. What's new is the step-by-step instructions necessary to build an interceptor for yourself for less than $400. Be the first on your block to build one.
Friday, October 28, 2011
7 SEO Friendly Site Features that Developers Often Miss - Search Engine Watch (#SEW)
But unfortunately, a lot of developers can have a bit of a blind-spot when it comes to SEO.
FTC Finalizes Settlement of Google Buzz Privacy Issues - Search Engine Watch (#SEW)
The FTC has approved its settlement with Google that addresses improper privacy disclosure during the release of Buzz. The settlement mandates additional privacy procedures, including third-party privacy audits every other year for the next two decades
'Smishing' scammers may hit cellphones – USATODAY.com
People who dialed the number were asked for account information, Social Security numbers and personal identification numbers, officials said.
'Smishing' scammers may hit cellphones – USATODAY.com
Monday, October 24, 2011
401k Rollover Annuity
Wednesday, October 19, 2011
"Security Breach" Class Action Dismissed for No Actual Damages - Privacy In Focus - Wiley Rein LLP
October 2003 | Privacy In Focus
On October 20, a federal judge in Arizona dismissed a class action lawsuit that had been filed against TriWest Healthcare Alliance stemming from a security breach at the TriWest facilities.
Monday, October 17, 2011
Cloud Security - Metaflows Product
The MetaFlows Security System (MSS) is software that you can install on your cloud server that will monitor traffic flowing in and out of your cloud instances to detect and prevent cloud security incidents. Metaflows customers can manage both on-site and cloud-based assets through a single, unified and secure web browser dashboard.
Austin software developer's future unclear after employees walk out, offices locked by landlord
The future of local software developer Appiction LLC was unclear Wednesday after most of its employees resigned and the company was locked out of its North Austin offices.
The 1974 Privacy Act
THE PRIVACY ACT OF 1974, 5 U.S.C. 552a -- As Amended
10 Massive Security Breaches -- InformationWeek
10 Massive Security Breaches -- InformationWeek
Legal Resources | BCP Business Center
Legal Resources | BCP Business Center:
Friday, October 14, 2011
Firesheep addon updated to exploit Google info leak • The Register
“We extended Firesheep to implement our information leakage attack,” researchers Vincent Toubiana and Vincent Verdot of the Alcatel-Lucent Bell Labs wrote in a recently released paper (PDF). “As a result, when a Google SID cookie is captured, the account name appears in the Firesheep sidebar. Double clicking on it starts the attack; double clicking again displays the retrieved list of visited links.”
Facebook accused of violating US wiretap law • The Register
“Plaintiff did not give consent or otherwise authorize Facebook to intercept, track, collect, and store her wire or electronic communications, including but not limited to her internet browsing history when not logged-in to Facebook.”
Cyber Threats to Expect in Coming Year
The year ahead will feature new and sophisticated means to capture and exploit user data, as well as escalating battles over the control of online information that threaten to compromise content and erode public trust and privacy.
New Survey Data From Experian Reveals People Are Making It Easy For Cybercriminals To Steal Their Identity - Dark Reading
nearly 54 percent of respondents do not use a password to lock their phone and/or tablet.
FTC and Disney Breach
Disney’s Playdom, Inc. subsidiary and its Senior Vice-President Howard Marks have agreed to pay $3 million to settle charges by the FTC that they collected and disclosed personal information of more than 1.2 million children in violation of the Children’s Online Privacy Protection Act (“COPPA”). Between 2006 and 2010,
Thursday, October 13, 2011
Netflix Facebook
http://blog.netflix.com/2011/09/help-us-bring-facebook-sharing-to.html
Herman Cain's '999 plan': long overdue tax reform or job killer? - CSMonitor.com
One of the major implications would be moving the nation away from consumption. That may not be so bad, says Mark Zandi, chief economist at Moody’s Analytics in West Chester, Pa. “The more we save and invest, the stronger our economy would be.” But, he quickly adds, “It’s not exactly what I would do, but I sympathize with the spirit.”
Cybercriminals Use Facebook, Bitcoin to Steal Digital Currency - ABC News
To steal loot this way no credit card is necessary. Cyber thieves attempt to get users to provide a phone number that will allow them to apply a minimal fee to each cell phone bill, perhaps $1 or $10. It’s those little fees connected to sending text messages that can go unnoticed.
Koch Brothers Flout Law Getting Richer With Secret Iran Sales - Bloomberg
Internal company records show that Koch Industries used its foreign subsidiary to sidestep a U.S. trade ban barring American companies from selling materials to Iran. Koch-Glitsch offices in Germany and Italy continued selling to Iran until as recently as 2007, the records show.
Win32/Cycbot: Ready to Ride | ESET ThreatBlog
Win32/Cycbot is a multithreaded application and just a single instance of the bot can handle dozens of tasks, clicking advertisements or poisoning web searches. Here is an example of the bot’s network activity, captured over several minutes.
Wednesday, October 12, 2011
Enterprise Applications in the Cloud: A SaaS Security Perspective -- Enterprise Systems
Proven backup and recovery services at the SaaS application, infrastructure and the cloud level are necessary to facilitate disaster recovery and mitigate risks against the loss of sensitive data due to failures.
The backup data should be protected, similar to operational data, using strong encryption mechanisms. These checks are essential to reduce the risk of unauthorized access and leakage of sensitive data.
Tuesday, October 11, 2011
Plantronics P251N-U10P Supra Plus Polaris Noise-Canceling (NOW HW251N A10)
Plantronics Supra Plus Polaris HW251N plus A10 connector cable. By clicking "Add to Cart" on this page you will be getting both the headset and the bottom cable to connect to your phone. Nothing additional is needed! Plantronics Supra Plus features a noise canceling microphone and is ideal for use in noisy offices and call centers.
Virus phone scam being run from call centres in India | Technology | The Guardian
The scam always starts the same way: the phone rings at someone's home, and the caller – usually with an Indian accent – asks for the householder, quoting their name and address before saying "I'm calling for Microsoft. We've had a report from your internet service provider of serious virus problems from your computer."
I received a Phone Call From Someone claiming I have a Virus - Microsoft Answers
I have just recieved a phone call form someone claiming to be from Microsoft, who says that I have a virus which is sending information from my computer.
Monday, October 10, 2011
Thousands of Hacked Sites Seriously Poison Google Image Search Results | Unmask Parasites. Blog.
The attack uses cloaking to feed keyword-rich pages with hot-linked images to search engine bots and return a malicious JavaScript that redirects to fake AV sites to visitors that come from search engines.
10 FTP Clients Malware Steals Credentials From | Unmask Parasites. Blog.
I always suggest that you don’t store passwords in your FTP programs where they are easily accessible by any program running on your computer (including malware).
Trojan Abuses FTP Access and Infects PHP
This trojan sents all your FTP data and passwords to someone who than uses it to change all index.html and index.php files on your server and adds to the end a string like
Microsoft knocks out another botnet as Kelihos is taken offline | Security | silicon.com
Microsoft has put a halt to the Kelihos botnet and is accusing a Czech resident of hosting the botnet and using it to deliver spam and steal data, the company said today.
Online fraud declines as tighter web security sees crooks resort to retro methods | Security | silicon.com
Initiatives such as chip and PIN are forcing fraudsters to give up on high-tech scams and resort to more traditional methods of committing financial crimes, according to a report by fraud prevention group Financial Fraud Action UK (FFA UK).
Hackers Scam Friends of Victim | NBC Philadelphia
Henson wasn’t in England but instead at her home in Pine Hill, NJ. It was true however, that she was the victim of a crime, though it took place in cyberspace rather than the streets of London.
Hackers Scam Friends of Victim | NBC Philadelphia
Ubee Interactive | Product Detail | DOCSIS 2.0 Modem
The Ubee U10C018 Data Cable Modem is the most compact design available in the market today measuring at under 5 inches long.
Sunday, October 9, 2011
Slovakian Intrigues: Michael Genelin’s Jana Matinova Novels � Scene of the Crime
Slovakian Intrigues: Michael Genelin’s Jana Matinova Novels
Genelin is the author of three novels in the crime series featuring police commander Jana Matinova: Siren of the Waters, Dark Dreams, and coming this summer, The Magician’s Accomplice.
Genelin takes the reader into a part of Europe that most are unfamiliar with: Slovakia—yes the Slovakia that was once part of Czechoslovakia.
NYC ID Theft Ring Bust Leads to 111 Arrests - TIME
NYC ID Theft Ring Bust Leads to 111 Arrests - TIME
Bank tellers, restaurant workers and other service employees in New York lifted credit card data from residents and foreign tourists as part of an identity theft ring that stretched to China, Europe and the Middle East and victimized thousands, authorities said Friday.
TriWest pay $10M to settle false claims
"TriWest Healthcare Alliance Corp. agreed to pay $10 million to resolve allegations that the Arizona-based contractor filed false inflated claims to the U.S. military's Tricare medical benefit plan between 2004 and 2010, the Justice Department said.
TriWest was accused of failing to pass on negotiated discounts with service providers to the program, which covers millions of military members, retirees and their families.
The settlement resolves a lawsuit filed by four former TriWest employees, Judi Jerdee, Deborah Thornton, Linda Glassgow and Paige Fiorillo, under the qui tam, or whistleblower provisions, of the False Claims Act. Together, the qui tam relators will receive $1.7 million as their share of the government's recovery.
"Ensuring that the programs receive the contractual savings and deductions to which they are entitled is essential to our commitment," Melinda Haag, U.S. attorney for the northern district of California, said."
TriWest pay $10M to settle false claimsFORMULA ONE - F1 News, Formula One Racing, and Pictures of F1
The Motor Sports Authority, SPEED and associated logos are registered trademarks of Speed Channel Inc
The CURTA Calculator Page
CURTA Literature Listing is a list of all know CURTA literature compiled by Rick Furr and Skip Godfrey. Please send us copies of your literature if it is different so we can include it.
Saturday, October 8, 2011
American Express Extended Warranty - Important Information!
If the covered item has an extended warranty of 5 years or less, AmEx will double the duration coverage, up to a maximum of one additional year
Friday, October 7, 2011
Inside Social Games - Tracking Innovation at the Convergence of Games and Social Platforms
"Depending on how the game performs in the next few weeks, The Sims Social could go into a period of decline or finally unseat Zynga’s CityVille as the largest application on Facebook."
Researcher: Malware, Increasingly Interdependent, Stifles Security Wares | threatpost
"Rather than operating independently, the BlackHole BEP relied heavily on the Zeus malware family to spread - and vice-versa, Sood found. The Zeus malware relies on BlackHole's anti-malware tracking features, whereas Sood observed BlackHole uses the Zeus database of infected hosts to spread, harvesting specific details about the Zeus-infected target and then launching attacks that would trigger infections on that host, Sood said."
Thursday, October 6, 2011
Information Security Policies Made Easy | Information Security Policy
Information Security Policies Made Easy is the "gold standard" information security policy resource based on the 25 year consulting experience of Charles Cresson Wood, CISSP, CISA. The most complete security policy library available, ISPME contains over 1400 pre-written information security policies covering over 200 security topics and organized in ISO 27002 format. Take the work out of creating, writing, and implementing security policies.
Former Countrywide analyst sentenced to prison for selling data of 2.5 million customers - The Washington Post
A former senior analyst for Countrywide Home Loans was sentenced Wednesday to eight months behind bars for downloading and selling the personal information of some 2.5 million customers in a scam that cost the mortgage lender some $30 million.
Check Point software takes aim at botnets
The heart of the new software is ThreatSpect, the anti-bot engine that identifies bots and focuses in three areas - detecting command and control computers via IP address, DNS and URL, detecting communications patterns and detecting and blocking what data it is trying to send,
Dandy Livingstone - Wikipedia, the free encyclopedia
Dandy Livingstone (born Robert Livingstone Thompson, 14 December 1943,[1] Kingston, Jamaica) is a Jamaican reggae musician and producer, best known for his 1972 hit, "Suzanne Beware of the Devil", and for his song, "Rudy, A Message to You", which was later a hit for The Specials. "Suzanne Beware of the Devil", reached number 14 on the UK Singles Chart.[2]
'Tricked' RSA Employee Opened Door that Led to APT Attack
A well-crafted e-mail with the subject line "2011 Recruitment Plan" tricked an RSA employee to retrieve from a junk-mail folder and open a message containing a virus that led to a sophisticated attack on the company's information systems, a top technologist at the security vendor says in a blog.
Too Much Cybersecurity Awareness
"There's too much awareness without anything being done. The problem is that when consumers see time and time again, nothing happens to correct it. They throw up their hands. There's no amount of consumer education to make them smart enough to resist attacks."
Wednesday, October 5, 2011
CSIS: This is how Windows get infected with malware
CSIS: This is how Windows get infected with malware
Tuesday, October 4, 2011
RealLegal, LLC - Improving the Business of Law
Each RealLegal E-Transcript has guaranteed page and line integrity and comes as a read-only, accurate, encrypted, virus and password-protected transcript. For maximum security and authentication, court reporters can include their official electronic signature with each RealLegal E-Transcript. Law firms also have the ability to create their own E-Transcript from an ASCII using RealLegal E-Transcript Internet™ on a pay-per-use basis.
Stenograph: industry leader in court reporting technology, supplies, and education.
Case CATalyst is the industry-leading software for computerized-assisted transcription (CAT) with special editions configured for judicial reporters, captioners, editors, and students.
Monday, October 3, 2011
OnStar reverses course on controversial GPS tracking plans - Computerworld
GM subsidiary OnStar has reversed course on a planned change to its privacy policies that would have let it collect and share GPS tracking and other data from vehicles -- even after their users stopped subscribing to OnStar service.
Sunday, October 2, 2011
Facebook changes touch privacy nerve – USATODAY.com
Facebook changes touch privacy nerve – USATODAY.com
Saturday, October 1, 2011
Poisoned Google image searches becoming a problem
Poisoned Google image searches becoming a problem
Friday, September 30, 2011
ISC Diary | More on Google image poisoning
ISC Diary | More on Google image poisoning
Thursday, September 29, 2011
Code Signing Certificate for Microsoft Authenticode - Code Signing Certificates from Thawte
Code Signing Certificate for Microsoft Authenticode - Code Signing Certificates from Thawte
Code Signing for Developers
Code Signing for Developers
Tuesday, September 27, 2011
Feds seize $15m from scareware monger's Swiss account • The Register
Last year, the US Attorney's office in Chicago accused Jain of selling more than $100m worth of rogue antivirus software.
The programs carried titles such as WinFixer, WinAntivirus, DriveCleaner, and ErrorSafe and sold for $30 to $70 for each copy. The US citizen and former resident of Mountain View, California, was believed to have fled to Ukraine, authorities said at the time.
Feds seize $15m from scareware monger's Swiss account • The Register
Jain had originally surrendered to ICE agents, but was declared a fugitive in January 2009 when he failed to appear for a scheduled appearance in federal court in San Jose, California.
Hackers breach Sony's password reset system | Security | News | PC Pro
“A new hack is currently doing the rounds in dark corners of the internet that allows the attacker the ability to change your password using only your account’s email and date of birth,” the website reported. “Without any shadow of a doubt this is real.”
Monday, September 26, 2011
Modern Warfare, Too - by Michael Tanji - Tablet Magazine - A New Read on Jewish Life
"If you’re not actually going to bomb your adversaries back into the Stone Age, you don’t want to destroy the power plant, you just want to turn it off, because eventually you want the lights to come back."
Sunday, September 25, 2011
Masterminds of far-reaching scareware scam charged - SC Magazine US
CyberCrime & Doing Time
We've already seen nearly 500 copies of the new Government-related Zeus spam campaign so far this morning in the UAB Spam Data Mine. As has been typical in this campaign that we first started tracking on July 13th, the detection has been fairly horrible each morning for the new malware version.
(ISC)2 Security Transcends Technology
There is an immediate need from the public to better understand information security safety issues
Security sector on the attack - The Irish Times - Fri, Sep 23, 2011
At the opposite end of the spectrum, attacks are now being created specifically to exploit flaws in just one organisation’s systems, or to target particular individuals.
Wednesday, September 21, 2011
Cyber-Security Can't Ignore Human Behavior - James Fallows - Technology - The Atlantic
Here's a quote we can't agree with:
"On the positive side, the cyber-universe can be thought of as reduced to the 0s and 1s of binary data. Actions in this universe consist of sequences of changes to binary data, interleaved in time, and having some sort of locations in space. One can speculate as to why mathematics is so effective in explaining physics, but the cyber-world is inherently mathematical."
Noooo, cyber-world is inherently human, humans doing things with binary data.
Tuesday, September 20, 2011
Health Data Management: Security
Craigslist Apartment Scams Target Renters Seeking Deals | Internet Scams & Phishing | Identity Theft & Online Fraud | SecurityNewsDaily
It's the job Cobb was moving to take, as a researcher for the cybersecurity firm ESET, that helped him recognize and avoid falling victim to the alluring apartment scam.
Craigslist Apartment Scams Target Renters Seeking Deals | Internet Scams & Phishing | Identity Theft & Online Fraud | SecurityNewsDaily
Sunday, September 18, 2011
Forget 2012 end of the world, the PC apocalypse comes in 2015
"Forget what we have taken for granted on how consumers use the Internet", Karsten Weide, IDC research vice president, says in a statement. "Soon, more users will access the Web using mobile devices than using PCs, and it's going to make the Internet a very different place".
Windows XP PCs breed rootkit infections - Computerworld
Machines running the decade-old Windows XP make up a huge reservoir of infected PCs that can spread malware to other systems, a Czech antivirus company said today.
Windows XP computers are infected with rootkits out of proportion to the operating system's market share, according to data released Thursday by Avast Software, which surveyed more than 600,000 Windows PCs.
While XP now accounts for about 58% of all Windows systems in use, 74% of the rootkit infections found by Avast were on XP machines.
XP's share of the infection pie was much larger than Windows 7's, which accounted for only 12% of the malware-plagued machines -- even though the 2009 OS now powers 31% of all Windows PCs.
UBS Says Trading Losses Were Closer to $2.3 Billion - NYTimes.com
UBS Says Trading Losses Were Closer to $2.3 Billion - NYTimes.com:
“The true magnitude of the risk exposure was distorted because the positions had been offset in our systems with fictitious, forward-settling, cash ETF positions, allegedly executed by the trader,” the UBS statement said. “These fictitious trades concealed the fact that the index futures trades violated UBS’s risk limits.”
Saturday, August 27, 2011
Wednesday, August 24, 2011
Latest Earthquakes M5.0 in the World - Past 7 days
Magnitude 5 and greater earthquakes located by the USGS and contributing networks in the last week (168 hours). Magnitudes 6 and above are in red. (Some early events may be obscured by later ones on the maps.)
MLK memorial ‘holy ground’ for many - The Washington Post
The Martin Luther King, Jr. Memorial official unveiling on the National Mall is scheduled for Sunday, August 28.
Richard Clarke 9/11 Interview: Was There a CIA Cover-Up?
Did the CIA keep mum about two 9/11 hijackers because it tried and failed to recruit them? Anthony Summers and Robbyn Swan, authors of 'The Eleventh Day,' on whether there’s any truth behind ex-Bush official Richard Clarke’s claim.
Russia Green Lights $65 Billion Siberia-Alaska Rail and Tunnel to Bridge the Bering Strait!
The high speed railway and tunnel will be a private public partnership whose economic impact could be startling. 100 million tons of freight could be moved per year using the most efficient known way of transport. Proposed tidal energy plants could provide 10 gigawatts of energy and a string of wind power fields could churn a constant supply of clean energy, serving as a vital link to a worldwide energy grid. The tunnel alone would take fifteen years to complete — and an energy and railway network would take many more — but the project would significantly change the shipping and energy industry.
Sunday, August 21, 2011
Used KUBOTA Tractors, KUBOTA Tractors For Sale At TractorHouse.com
Sample Of KUBOTA Tractors Less than 40 HP
2011 KUBOTA B2620HSD, Call, MI
2007 KUBOTA L3400DT, US $14,500, PA
2002 KUBOTA L3010, US $8,900, MS
2009 KUBOTA BX2360, US $12,999, NY
2011 KUBOTA B3200HSD, Call, IL
2006 KUBOTA L3830HST, US $17,000, KS
2011 KUBOTA B2920HSD, Call, WA
1984 KUBOTA L245H, Call, PA
2005 KUBOTA L3830, US $25,200, GA
KUBOTA BX2350, US $10,000, MI
Saturday, August 20, 2011
Editing Community Kibin Helps You Proofread Your Writing Fast And For Free | TechCrunch
Tuesday, August 16, 2011
Scam: Just Gorgeus 2bedrooms/2bathrooms Apartment Downtown
"Fully furnished, the apartment has everything that you wished for,"
Just Gorgeus 2bedrooms/2bathrooms Apartment Downtown
Renovated spacious and clean apartment 2bd/2ba central location
Renovated spacious and clean apartment 2bd/2ba central location:
"Fully furnished, the apartment has everything that you wished for,"
Clean and Spacious Apartment Scam
Clean and Spacious Apartment 2bd/2ba Great Location:
"Fully furnished, Modern kitchen and bath, cable TV, Internet WI-FI, electricity/water/local phone, Nestled in a quiet, almost suburban-like setting,"
Monday, August 15, 2011
Summary of the Amazon EC2, Amazon EBS, and Amazon RDS Service Event
"We would like to share more details with our customers about the events that occurred with Amazon Elastic Compute Cloud (“EC2”), Amazon Elastic Block Store (“EBS”), and Amazon Relational Database Service (“RDS”) earlier this week, and what we are doing to prevent these sorts of issues from happening again. The service disruption primarily affected EC2 instances, RDS instances, and a subset of EBS volumes in a single Availability Zone in the EU West Region"
What is a Violation of Privacy?
"The problems with the privacy community are two things. First: they are creating a reality distortion field around your rights to privacy. Second: they cannot tell the difference between a potential violation and an actual violation."
Saturday, August 13, 2011
Tribeca Nylon Tri-fold Carry-on Garment Bag | Overstock.com
"The Garment bag was surprisingly attractive, spacious and apparently durable. Nice to have something that is functional and will fit in approved carry-on space"
Monday, August 8, 2011
Open Directory - Computers: Security: Policy: Sample Policies
Open Directory - Computers: Security: Policy: Sample Policies
"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."
Solid brass & solid nickel silver ID Tags
You only pay $5 shipping and handling.
- Self-adhesive backing.
- Adheres to leather, vinyl, metal, paper and other materials.
For fabric cases use either luggage tag style. - Needs no tools; simply apply with finger tip pressure.
Official Website Florida Department of Highway Safety and Motor Vehicles
"If you want to review the current status of your driver license, you can check that at no cost online by clicking here."
Friday, August 5, 2011
Meet Dark Tangent, the hacker behind Black Hat and DEF CON - CNN.com
Moss: The two are definitely interconnected. DEF CON started several years before Black Hat did because there was just no market for a commercial-type security con. Everything was underground or much more informal and when the Internet started growing up then all of a sudden companies were looking around for security information. A friend of mine suggested I should charge a lot more money and make a professional version of DEF CON."
Meet Dark Tangent, the hacker behind Black Hat and DEF CON - CNN.com:
China Suspected Of Shady RAT Attacks -- InformationWeekChina Suspected Of Shady RAT Attacks - security Blog
"Shady RAT--for remote access tool--is the name of the 'low and slow' attack detected by McAfee, and detailed in a report it released on Tuesday. According to McAfee, the attack successfully compromised at least 72 organizations, including 22 governmental agencies and contractors, 13 defense contractors, 23 businesses, and think tanks, political nonprofits, and other organizations."
Thursday, August 4, 2011
SDBJ Annual Awards Programs
"San Diego is home to some of the most successful companies and business people in the world. At the San Diego Business Journal we do more than just cover these standouts, we reward them for their success. Annually, the San Diego Business Journal presents special award ceremonies and educational seminars, celebrating the beacons of our region and providing top quality mentoring from the highest levels of the national business world."
San Diego Business Journal Online Store | San Diego Business Journal
• 51 weeks of the San Diego Business Journal
• The Annual Book of Lists [the Ultimate Reference Guide to San Diego County business
• All published Special Supplements
• VIP Access to www.sdbj.com
• Full and easy access to SDBJ archives
Wednesday, August 3, 2011
Rebuilding rural America through rural philanthropy
"From the Rural Tour, which I led two years ago — to the new White House Rural Council, which I chair — from broadband, to energy and microenterprises, the USDA’s ongoing focus has been jobs and opportunity for rural citizens. This kind of opportunity adds value to agricultural products, attracts industry and makes rural America competitive. But our work also goes to quality-of-life issues like education, healthcare and community services, and makes rural communities better places to live and raise families.
Rural America abounds with potential, but we must better use a powerful tool capable of also improving opportunity in rural America: philanthropic partnerships.
Our rural communities need more investment, innovation and networks.
To unleash the wealth and capital that exist in our rural communities we need funding from many sources. That is why I traveled to Kansas City this week to address the Rural Philanthropy Conference of the Council on Foundations."
White space rural broadband moves one step closer
"The Institute of Electrical and Electronics Engineers (IEEE), the organisation that helped ignite the Wi-Fi revolution nearly a decade ago, has published a new wireless standard that promises to bring broadband access to under-served rural areas.
Called IEEE 802.22, the new specification has been designed to take advantage of those portions of the radio frequency spectrum that are increasingly available as digital television switchover schemes make progress around the world.
With support for both VHF (very-high frequency) and UHF (ultra-high frequency) TV bands, sites as far as 100 kilometres away from a single transmitter could enjoy broadband speeds typical of more densely populated areas."
Tuesday, August 2, 2011
Jeep Grand Cherokee WJ - Roof rack cross bars
"The rail end caps, two at the rear and two at the front, are attached with plastic clip tabs. To remove or install the adjustable crossrails, the two rear caps must be removed. The easiest way to remove them is to pry out one side with a trim stick or your fingers while pulling the cap up from the back (front side of vehicle). Note the location of the lock tabs in the photo above. The edges of the caps can be sharp so it's best to use a rag or glove to protect your fingers while pulling them off. When re-installing, make sure to align the end tab and check that they are completely seated on all sides."
Shotguns > Hunting > O/U on GunsAmerica.
"BEAUTIFUL - WEATHERBY ORION III - .20 GA. - OVER/UNDER SHOTGUN. FIELD MODEL - 26' BARRELS - 2 3/4' OR 3' CHAMBER - WALNUT STOCK - SILVER ENGRAVED RECEIVER - SELECTIVE BARRELS - AUTO EJECTORS - CHOKES"
Monday, August 1, 2011
Sunday, July 31, 2011
How to Enable Intel VT and AHCI on a Napa/Santa Rosa platform Phoenix BIOS Vaio laptop
"Before you attempt this modification, make sure that the BIOS on your SZ is updated to these versions: R0112N0 for Napa SZs or R0122S5 for Santa Rosa SZs."
Internet monitoring software for businesses
"Know what your employees are doing online?
Avoid non-work related employee Internet use
Block unwanted downloads of dangerous files
Enforce your privacy & security policies
Monitor & control employee Internet usage in real time"
Friday, July 29, 2011
In Perspective: Right Now, Apple Has More Cash On Hand Than Treasury
"As of Wednesday, the Treasury reported it had $73.768 billion cash on hand. What the Obama administration has been saying is that that number will dwindle to a point where the U.S. will not be able to pay its financial obligations, unless it's allowed to borrow more money.
$73.768 billion sounds like a lot of money, but to put it in perspective, Apple Insider points out that in its third quarter earning's report, Apple said it had $76.156 billion in cash."
Ant Video Downloader - Ant.com
"Go to any video site and play any video. The download button from our add-on will be activated."
Open Directory - Computers: Security: Policy: Sample Policies
"Defines acceptable use of IT equipment and computing services, and the appropriate employee security measures to protect the organization's corporate resources and proprietary information."
RIT - Information Security: Policy and Standards
"What are Policy and Standards?
Policy defines the strategy and direction of RIT’s approach to a particular issue; in this instance information security. All policies are grouped together in the Institute Policies and Procedures Manual.
Standards are created by the Information Security Office to help the RIT community implement the Information Security Policy.
The Information Security Policy (and standards) apply to the entire RIT community, including students, faculty, staff, external business associates, and volunteers."
Thursday, July 28, 2011
Researchers Build a Botnet Playground
"Researchers have created their own botnet and unleashed it on 98 servers running 3,000 copies of Windows XP to better understand how they operate. The team from ESET and Ecole Polytechnique de Montreal needed to keep the Waledac botnet from infecting other computers, and took a cue from 'Battlestar Galactica.' They physically disconnected the servers from the Ecole Polytechnique's network, and only loaded software from DVD."
Raising a Botnet in Captivity - Technology Review
Researchers created their own, imprisoned, network of zombie computers to better learn how to take down those at large on the Internet."
Tuesday, July 26, 2011
Not All Free Identity Theft Services are Created Equal
"Do you really want to give this to a company you’ve never done business with before—especially one that’s offering you something for free?
Think long and hard about who has your best interests at heart before accepting a complimentary identity theft service."
UPDATE: Booz Allen Hamilton Issues Statement on Hack
"The leak is being touted as 'Military Meltdown Monday' and includes 'logins of military personnel—including personnel from US CENTCOM, the Marine Corps, various Air Force facilities, Homeland Security, State Department staff, and what looks like private sector contractors,' according to the Gizmodo article."
Weapon Systems Specs Stolen in Contractor Breach
Reuters reports that a classified US military weapons system will now need to be redesigned after specs and plans for the system were stolen from a defense contractor database in a breach earlier this year.
Defense officials have announced plans to shore up information networks to prevent the future losses of sensitive and classified materials."
Saturday, July 23, 2011
Donating Blood Questions and Answers
FDA has always allowed individuals diagnosed with hemochromatosis to donate blood."