Friday, December 30, 2011

Rivets are bayonets - Drive them home!

Rivets are bayonets - Drive them home!

The amazing poster colletion at the Library of Congress.

Featured Articles: The Rustock takedown

Featured Articles

"The Rustock takedown was the second major botnet takedown Microsoft has spearheaded within the last two years. In 2010, Microsoft asked for and received a court order that shut down a number of malicious domains used by the Waledac botnet. (See the Security Intelligence Report website for more information.) As part of that effort, Microsoft filed a John Doe lawsuit against the anonymous operators of the Rustock botnet, based in part on the abuse of Microsoft trademarks in the bot’s spam."

UNODC crime and criminal justice statistics

UNODC crime and criminal justice statistics

Cross-national UNODC crime statistics for over 120 countries are available on this page covering the period 2003 to 2008. Statistics on police-recorded offences and identified victims are available by crime type. Statistics on the response of the criminal justice system are divided according to police, prosecution, court and prison statistics.

Thursday, December 29, 2011

UNODC Resources: data and analysis

Resources: data and analysis:

One of the key tasks of UNODC is to produce and disseminate accurate drugs and crime statistics at the international level.

E-ZPass New York - Close Account Form

E-ZPass New York - Close Account Form

In order to process your request to close your account, please complete, sign and return this form along with the tag(s) to the address below or at one of our Walk-In Customer Service Centers:

Verizon to Charge Customers $2 Fee When Paying Bills Online

Verizon to Charge Customers $2 Fee When Paying Bills Online or Over the Phone Starting January 15 – Droid Life

Time to set up “auto pay” through your Verizon Wireless account. According to our sources, Big Red will start charging you a $2 fee both over the phone and online for your monthly bill transaction unless you have your account set up to pay automatically.

Information Warfare, 1995

Information Warfare

The National Computer Security Association sponsors an annual International Conference on Information Warfare.

Wednesday, December 28, 2011

Recent Links on Varied Topics

Samsung 4G LTE Mobile Hotspot

It's small and portable and it fits easily in a purse, pocket, or briefcase. No more lugging a brick-sized gizmo around to stay connected. Because of how little it weighs, convenience and portability are greatly enhanced.

Macrium Reflect FREE Edition - Information and download

One to try?

iTunes - Podcasts - DEFCON 3 [Audio] Speeches from the Hacker Convention. by The Dark Tangent

DEFCON 3 was held August 4-6th 1995 at the Tropicana in Las Vegas. Past speeches and talks from DEF CON hacking conferences in an iTunes friendly m4b format.

How do I transfer Palm contacts to Address Book?

First off, launch your Palm desktop application, then from the File menu choose Export. You'll get a window that looks like this:

About Us | Steven K Carpentry

Carpentry & Handyman Services to businesses and residences in San Diego county. If you’re looking for an experienced carpenter then look no further.

Saturday, December 24, 2011

ECOR® | Innovative Nature-Engineered™ Products

ECOR® | Innovative Nature-Engineered™ Products:

"Ecor® | The Shape of Green to Come ™
Ecor® is an innovative environmental core technology offering an extensive new generation of highly versatile, strong, lightweight, three-dimensional engineered molded fiber (3dEMF) panel products manufactured from an almost unlimited variety of readily-available, low-cost and underutilized raw material sources."

'via Blog this'

Corrugated Packing Material | honeycomb board | corrugated sheet | coroplast

Corrugated Packing Material | honeycomb board

"Honeycomb board is a lightweight, tough and durable packing material consisting of a honeycomb core sandwiched between kraft linerboard. Amazingly light and incredibly strong, honeycomb board is an excellent alternative to cardboard."

'via Blog this'

What is BlogThis! ? - Blogger Help

What is BlogThis! ? - Blogger Help

"BlogThis! is an easy way to make a blog post without visiting blogger.com. Once you add the BlogThis! link to your browser's toolbar, blogging will be a snap."

'via Blog this'

Save On Discount Utrecht Honeycomb Board 42x30x1/2 - 10pk & More Corrugated Cardboard at Utrecht

Honeycomb Board 42x30x1/2 - 10pk & More Corrugated Cardboard at Utrecht:

Honeycomb board is a sheet material in which the medium is made from a paperboard honeycomb. The medium is sandwiched between paperboard liners. Compared to both cardboard and foam core, it has good structural characteristics.

asada's memorandum (The Day I Saw Van Gogh's Genius in a New Light)

asada's memorandum (The Day I Saw Van Gogh's Genius in a New Light)

The event’s main objective was to educate the public about the diversity of color vision which exists in our society.

Wednesday, December 21, 2011

Researchers demo cloud security issue with Amazon AWS hijacking attack

Researchers demo cloud security issue with Amazon AWS hijacking attack

Researchers from the Horst Goertz Institute (HGI) of the Ruhr-University Bochum (RUB) in Germany have demonstrated an account hijacking attack against Amazon Web Services (AWS) that they believe affects other cloud computing products as well.

The attack uses a technique, known at XML signature wrapping or XML rewriting, that has been known since 2005 and exploits a weakness in the way Web services validate signed requests.

The 6 Stages of Exposing Yourself with Content Marketing | Content Marketing

The 6 Stages of Exposing Yourself with Content Marketing | Content Marketing | Social Media Consulting - Convince & Convert:

To study the relative merits of content creation and dissemination, we declared there to be 6 stages on the content marketing continuum (6 stages of opening the kimono in the parlance of the presentation).

Taking Down the Giant: Be the Thought Leader Your Customers Are Looking For

Taking Down the Giant: Be the Thought Leader Your Customers Are Looking For

Write about the ecosystem that your solution resides in. Offer help to the person that’s buying your solution with tips, tricks, and how-to articles. Identify, contact, and build relationships with the influencers (authors, bloggers, analysts, etc.) in your industry.

How do you define good content? | OpenView Blog

How do you define good content? | OpenView Blog

1. Substance – First and foremost, the content items you post need to be substantive enough to make it worth the reader’s time. Keep in mind that “substantive” doesn’t necessarily mean “long”; in fact some articles might even be too long for online publication. It means that the content you’re creating adds standalone value to the page. In other words, people can read this one page and get something out of it.

Content Marketing Tips and Resources

Content Marketing Tips and Resources

Have a minute? Check out this series of short video primers with content marketing expert Joe Pulizzi.

What Does Your Content Marketing Strategy Say About YOU? | OpenView Labs

What Does Your Content Marketing Strategy Say About YOU? | OpenView Labs

Baer shares his six stages of the content marketing continuum, offering real world examples of these content marketing strategies in action.

7 Basic Content Marketing Principles for the Corporate Marketer | Content Marketing Institute

Basic Content Marketing Principles for the Corporate Marketer | Content Marketing Institute:

Yes, every business wants to boost sales and build brand awareness; but the truth of the matter is that to reach those goals you must first succeed in building an online conversation around the content objects you produce.

Monday, December 19, 2011

Malware developer AMA : IAmA

IAmA Malware developer AMA : IAmA

I develop malware for profit, ask me anything. I'm not giving any background, I'll let the answers do the talking.

Sunday, December 18, 2011

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

Norton Study Calculates Cost of Global Cybercrime: $114 Billion Annually

Sept. 7, 2011 – Symantec Corp. (Nasdaq: SYMC) For the first time a Norton study calculates the cost of global cybercrime: $114 billion annually1. Based on the value victims surveyed placed on time lost due to their cybercrime experiences, an additional $274 billion was lost2. With 431 million adult victims globally in the past year and at an annual price of $388 billion globally based on financial losses and time lost, cybercrime costs the world significantly more than the global black market in marijuana, cocaine and heroin combined ($288 billion).

Cybercrime: A Shocking Picture of the Problem - Norton Community

Cybercrime: A Shocking Picture of the Problem - Norton Community

"Cybercrime costs $388 billion dollars in annual losses globally and it affected almost 7 in 10 adults last year.

"Norton Cybercrime Report 2011, a study on the impact of cybercrime that included a survey of over 12,000 adults in 24 countries. This provides an important and accurate picture of the scope of cybercrime globally and the results are shocking! Every day of the past year, over 1 million online adults in 24 countries experienced cybercrime. This can also be broken down to 50,000 victims per hour, 820 victims per minute, or 14 victims every second. In just the last 12 months 44% of people have been a victim of cybercrime while only 15% have been a victim of physical crime in the same period. "

Credit Card Fraud: How Big Is The Problem? | Practical eCommerce

Credit Card Fraud: How Big Is The Problem? | Practical eCommerce

Across the board, the cost of managing fraud exceeds the cost of fraud itself by as much as 300 percent, according to preCharge's report.

Public records shed light on American Express plans

Public records shed light on American Express plans in Whitsett data, center, building - Burlington Times News

In the year since American Express decided to build a massive data center in eastern Guilford County, much has happened, but most of it didn't make headlines.

Saturday, December 17, 2011

Thursday, December 15, 2011

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chronicle of Higher Education

Why Privacy Matters Even if You Have 'Nothing to Hide' - The Chronicle Review - The Chronicle of Higher Education

One of the characters in Henry James's 1888 novel, The Reverberator, muses: "If these people had done bad things they ought to be ashamed of themselves and he couldn't pity them, and if they hadn't done them there was no need of making such a rumpus about other people knowing."

Wednesday, December 14, 2011

Report on UK cybercrime statistics reveals culprits and responders

Report on UK cybercrime statistics reveals culprits and responders

While most agreed that cybercrime awareness was important in beating cybercrime, 45% of respondents said they had no cybersecurity-related training in the last year. Only 24% of UK respondents received face-to-face training, which most people agreed was the most effective.

London Conference on Cyberspace - The Nation

London Conference on Cyberspace - The Nation

The London Conference on Cyberspace (1-2 November 2011) We are writing to inform you that the Foreign Secretary will be chairing the London Conference on Cyberspace from 1 - 2 November this year.

London Conference on Cyberspace: Chair's statement

London Conference on Cyberspace: Chair's statement

Quoting the UK Foreign Secretary William Hague: "Earlier this year I proposed the following principles for governing behaviour in cyberspace, and called for a more focussed and inclusive dialogue between all those with a stake in the Internet – civil society and industry as well as governments - on how we might implement them..."

  1. The need for governments to act proportionately in cyberspace and in accordance with national and international law;
  2. The need for everyone to have the ability – in terms of skills, technology, confidence and opportunity – to access cyberspace;
  3. The need for users of cyberspace to show tolerance and respect for diversity of language, culture and ideas;
  4. Ensuring that cyberspace remains open to innovation and the free flow of ideas, information and expression;
  5. The need to respect individual rights of privacy and to provide proper protection to intellectual property;
  6. The need for us all to work collectively to tackle the threat from criminals acting online; and
  7. The promotion of a competitive environment which ensures a fair return on investment in network, services and content.

Erase All Data Before Selling Your iPhone

Erase All Data Before Selling Your iPhone

With the arrival of iPhone 4, you may consider selling your existing iPhone and upgrade to the new one. Whether you plan to sell your old iPhone on eBay or through a store, make sure you completely erase all data on your device.

Tuesday, December 13, 2011

Russia: Election Day DDoS-alypse

Russia: Election Day DDoS-alypse Global Voice:

Global Voices is an international community of bloggers who report on blogs and citizen media from around the world.

Friday, December 9, 2011

Thursday, December 8, 2011

History of Ultimate bet - How Ultimatebet.com Started - UB History |

History of Ultimate bet - How Ultimatebet.com Started - UB History |: Ultimate Bet is an online poker room that runs off the Cereus Poker Network, along with its sister site, Absolute poker (AP).

The Once and Future War | World Policy Institute

The Once and Future War | World Policy Institute: There’s no one better qualified to explore the innovations of war on and off the battlefield. From the British Defense Ministry in Whitehall, General Shaw spoke with World Policy Journal editor David A. Andelman and outgoing managing editor Justin Vogt.

Cybercriminals offer complex infection services

Cybercriminals offer complex infection services: Services for fraudsters utilizing malware are not new – AV checkers, malware encryption and malware infection services have existed in the criminal underground market for several years.

However, recent research has indicated changes in service scope and price due to service convergence and demanding buyers.

Report Details China's Electronic Espionage Apparatus

Report Details China's Electronic Espionage Apparatus: A report which details China's electronic espionage and intelligence apparatus has been released by researchers at the Project 2049 Institute.

The report, titled "The Chinese People's Liberation Army Signal Intelligence and Cyber Reconnaissance Infrastructure",

Brazilian Banking Trojan Poses as Microsoft Anti-Malware Tool | Malware & Computer Viruses | Anti-Virus Software & Web Browser Security | SecurityNewsDaily

Brazilian Banking Trojan Poses as Microsoft Anti-Malware

The Trojan affects "ntldr," the default boot loader on Windows machines, explained Kaspersky Lab expert Fabio Assolini. Identified as Trojan-Downloader.Win32.VB.aoff, the Trojan originated in Brazil, and spreads as a link attached to emails.

Wednesday, December 7, 2011

InterfaceLIFT: Icons sorted by Date

InterfaceLIFT: Icons sorted by Date

There are 1080 desktop icon sets listed below, sorted by the date they were posted to the site, beginning with the most recent content. You are on page 4 of 108.

SuperDuper!

SuperDuper!

SuperDuper is the wildly acclaimed program that makes recovery painless, because it makes creating a fully bootable backup painless. Its incredibly clear, friendly interface is understandable, easy to use...

True!

How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011" 13-Inch, 15-Inch, and 17-Inch MacBook Pro models? What type of hard drive do these models support? Can one replace the hard drive with an SSD? @ EveryMac.com

Good video instructions

How do you upgrade the hard drive in the "Mid-2009," "Mid-2010" "Early 2011," and "Late 2011"Pro models?

...the basic procedure is to turn off the notebook, disconnect cables, and let it cool; flip it over and unscrew the bottom plate, discharge static electricity, unscrew the retaining bar, disconnect the SATA connector, remove the mounting screws, install the new drive, and reassemble the computer.

Saturday, December 3, 2011

Hotel Esprit Bratislava : Welcome

Hotel Esprit Bratislava Map

This ancient city with over two millennia of history is one of the youngest capitals in Europe. Since 1919 Bratislava has been the capital of the Slovak Republic and it is currently regarded as one of the fastest developing cities in Europe. Bratislava represents an important centre of trade, culture and art and its huge potential is chiefly in its excellent transport connections with Vienna, Prague and Budapest.


View Larger Map

Hotel Esprit Bratislava : Welcome

Hotel Esprit Bratislava

Welcome to the new design hotel, Hotel Esprit, which creates a unique atmosphere for you thanks to its stylish interior and carefully selected decor. The hotel is situated in the immediate vicinity of Incheba exhibition centre, the historic city centre and Bratislava Castle.

Budget Light-weight Pulpboard Coasters

Budget Light-weight Pulpboard Coasters

Promote your message while your guests enjoy their beverage with Customized Pulpboard Coasters. Promotional Round Coasters keep your brand or message in plain sight in bars, restaurants, nightclubs, and at private or corporate events.

Friday, December 2, 2011

Lawmaker calls for FTC probe into Carrier IQ | Reuters

Lawmaker calls for FTC probe into Carrier IQ | Reuters: U.S. Representative Edward Markey on Friday asked the Federal Trade Commission to investigate whether software maker Carrier IQ violated millions of mobile phone users' privacy rights.

Thursday, December 1, 2011