13 Ekim 2012 Cumartesi

LO Share - Elegant Grace

To contact us Click HERE
 

I love this photo of my dd on pointe - elegant grace

If you would like to take a closer look, please follow one of these links:

Credits:
Feli Designs' Raindrop Dreams Bundle

TFL!!!

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)
Recent Activity:
  • New Members 1
Visit Your Group To unsubscribe, simply email computer-scrapping-unsubscribe@yahoogroups.com

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use • Send us Feedback .
__,_._,___

[OneStopSAP] Recharge any prepaid connection using airtel money

To contact us Click HERE
 

Now recharge any prepaid connection using airtel money from your mobile.   Register Now !  

__._,_.___ Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (4) Recent Activity:
  • New Members 50
Visit Your Group =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FREE SAP PREPARATION RESOURCES
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

<*> http://www.onestopsap.com - SAP Preparation Portal - Complete Resources on SAP Exam Preparation. Visit now at http://www.onestopsap.com

<*> http://forum.onestopsap.com - SAP Discussion Forum - Share all your experiences and discuss all the queries here at http://forum.onestopsap.com

<*> http://groups.yahoo.com/group/OneStopSAP/join - JOIN ONESTOPSAP GROUP - Join OneStopSAP group now and receive the latest information and preparation material on SAP now! http://groups.yahoo.com/group/OneStopSAP/join



---------------------------------------------------------------



Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
        Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
Join http://groups.yahoo.com/group/OneStopSAP/join

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use .
__,_._,___

*AD* CU ok frames with embellishments

To contact us Click HERE
 

41 CU ok Mix & Match black, red & white frames with 45 embellishments to decorate them with……http://ditzbitzandpieces.weebly.com/black-red-and-white.html

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)
Recent Activity:
  • New Members 1
Visit Your Group To unsubscribe, simply email computer-scrapping-unsubscribe@yahoogroups.com

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use • Send us Feedback .
__,_._,___

*AD* Freebie Halloween Frames with Embellishments

To contact us Click HERE
 

 

3 Freebie Halloween Frames with 20 embellishments to decorate them with embellishments……

http://ditzbitzandpieces.weebly.com/halloween-frames.html

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (1)
Recent Activity:
  • New Members 1
Visit Your Group To unsubscribe, simply email computer-scrapping-unsubscribe@yahoogroups.com

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use • Send us Feedback .
__,_._,___

How the FBI might've been owned (12M Apple records)

To contact us Click HERE
In recent news, hackers claimed to have stolen 12 million Apple device records from an FBI agent's laptop. I thought I'd post some comments.

The bug they claimed to have used isn't the current Java 0day, but a previous 0day. That Java 0day was being actively exploited in March 2012, as described in this MS TechNet article on CVE-2012-0507. The hackers claimed to have done this hack "during the second week of March 2012", which fits this timeline.

This was soon after the February 3 2012 release of an intercepted FBI conference call. This was a conference call of about 40 law enforcement agents from various parts of the world. Hackers were able to listen into the conference call because they somehow were able to intercept the e-mail message sent to all the agents listing the time and code to get in.

This e-mail was also published. That e-mail was sent directly to all 40 agents in the "To:" field (rather than "Bcc:"), which means their e-mail addresses were all exposed. That means every hacker on the Internet now has a list of the 40 officers in charge of hunting down LulzSec. The e-mail address of Chris Stangl (the guy whose notebook was hacked) is among those 40.

The obvious attack is for hackers to is to phish all 40 of those e-mail addresses. The phishing message would appear to come from the same sender, and simply point to a website hosting a Java app with that exploit. It might look like:
From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>Subject: Interception of Anon/Lulz Conference CallAll,Our conference call of January 27 was intercepted by hackersassociated with LulzSec. An audio recording was posted to theInternet. More details can be found here:http://totallyinnocent.com/no-java-exploit-here-at-all.htmlPlease contact me if you have any questions.Regards,TimSSA Timothy F. Lauster, Jr.Federal Bureau of Investigation202-651-3211 (w)202-651-3193 (f)
Where the URL would consist of some innocent looking site, but which would in fact host an evil page hosting a Java 0day. I'd guess that hackers got about 20% of those on the original list (or 8 out of 40).

The hackers can repeat this for every new 0day. For example, when the Metasploit module was released last week with yet another Java 0day, they could've phished that list of 40 agents yet again. Frankly, the FBI should consider all those e-mails burned. They should just assign the agents new addresses, then point the old ones to a special server that scrapes them for phishing 0day, to be notified every time hackers come up with new techniques.

One thing I'm trying to point out here is that hackers aren't necessarily smart, but operate from a set of well-known principles. If I have an e-mail list of victims, and a new 0day appears, I'm immediately going to phish with it. It's not Chinese uber APT hackers, it's just monkeys mindlessly following a script.


Or, it could've worked the other way around. Maybe that's how they intercepted that e-mail to be begin with, having used the Java 0day against Stangl's notebook computer. My point here is only that if I were a hacker who was a fan of LulzSec/Anonymous, and somebody dumped that list of FBI agents hunting LulzSec, I would certainly phish it at every opportunity.


Since that original e-mail list is all over the Internet, and the addresses should all be changed anyway, I'm reproducing it here for reference:

MIME-Version: 1.0acceptlanguage: en-USAccept-Language: en-USContent-class: urn:content-classes:messageSubject: Anon-Lulz International Coordination CallDate: Fri, 13 Jan 2012 19:21:49 -0000X-MS-Has-Attach:X-MS-TNEF-Correlator:thread-topic: Anon-Lulz International Coordination Call From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>To: "Reichard, Gerald A." <Gerald.Reichard@ic.fbi.gov>,    <paul.hoare2@met.police.uk>,    <Raymond.Massie@met.police.uk>,    <trevor.dickey@met.pnn.police.uk>,    <Stewart.Garrick@met.police.uk>,    "Gillen, Paul G" <paul.g.gillen@garda.ie>,    "Gallagher, Colm" <colm.gallagher@garda.ie>,    <pim@nhtcu.nl>,<Gea@nhtcu.nl>,    <michel@nhtcu.nl>,    <olivier.nael@interieur.gouv.fr>,    <olivier.moalic@interieur.gouv.fr>,    <thierry.mezenguel@interieur.gouv.fr>,    <andre.dornbusch@iuk.bka.de>,    <peter.ericson@rkp.police.se>,    <stefan.kronqvist@rkp.police.se>,    <ulrika.sundling@rkp.police.se>,    <Jaap.Oss@europol.europa.eu>,    <valentin.gatejel@europol.europa.eu>,    "Helman, Bruce C. Jr." <Bruce.Helman@ic.fbi.gov>,    "Sporre, Eric W." <Eric.Sporre@ic.fbi.gov>,    "Buckler, Lesley" <Lesley.Buckler@ic.fbi.gov>,    "Geeslin, Robert C." <Robert.Geeslin@ic.fbi.gov>,    "Plunkett, William R." <William.Plunkett@ic.fbi.gov>,    "Roberts, Stewart B." <Stewart.Roberts@ic.fbi.gov>,    "Brassanini, David" <David.Brassanini@ic.fbi.gov>,    "Stangl, Christopher K."<Christopher.Stangl@ic.fbi.gov>,    "Patel, Milan" <Milan.Patel@ic.fbi.gov>,    "Ng, William T." <William.Ng@ic.fbi.gov>,    "Adams, Melanie" <Melanie.Adams@ic.fbi.gov>,    "Culp, Mark A." <Mark.Culp@ic.fbi.gov>,    "Arico, Nicholas J." <Nicholas.Arico@ic.fbi.gov>,    "Tabatabaian, Ramyar" <Ramyar.Tabatabaian@ic.fbi.gov>,    "Penalosa, Jensen" <Jensen.Penalosa@ic.fbi.gov>,    "Bales, Will" <Will.Bales@ic.fbi.gov>,    "Burton, Kevin C." <Kevin.Burton@ic.fbi.gov>,    "Nail, Michael A." <Michael.Nail@ic.fbi.gov>,    "Grasso, Thomas X." <Thomas.Grasso@ic.fbi.gov>,    "Thomas, Christopher T." <Christopher.Thomas@ic.fbi.gov>,    "Caruthers, John" <John.Caruthers@ic.fbi.gov>,    "Phoenix, Conor I." <Conor.Phoenix@ic.fbi.gov>,    "Hunt, Chad R." <Chad.Hunt@ic.fbi.gov>,    "Willett, Bryan G." <Bryan.Willett@ic.fbi.gov>,    "Patrick, Kory D." <Kory.Patrick@ic.fbi.gov>     All, A conference call is planned for next Tuesday (January 17, 2012) to discuss the on-going investigations related to Anonymous, Lulzsec, Antisec, and other associated splinter groups. The conference call wasmoved to Tuesday due to a US holiday on Monday.Date: Tuesday, January 17, 2012 Time: 4:00 PM GMTBridgeTN: 202-393-2430Access Code: 6513211# Please contact me if you have any questions. Regards, Tim SSA Timothy F. Lauster, Jr. Federal Bureau of Investigation 202-651-3211 (w) 202-651-3193 (f)

Other links:
explanation of UDID
finding your UDID
FBI denies it was their laptop

12 Ekim 2012 Cuma

LO Share - Grandpa

To contact us Click HERE
 

My Grandpa was a character. He and I were "telephone buddies". And, based on the photos I found when my Mom passed away, he must have liked his camera!!!

If you would like to take a closer look, please follow one of these links:

Credits:
Booland Designs' Antique Road Show Super Saver Bundle

TFL!!!

__._,_.___
Reply via web post Reply to sender Reply to group Start a New Topic Messages in this topic (5)
Recent Activity:
  • New Members 1
Visit Your Group To unsubscribe, simply email computer-scrapping-unsubscribe@yahoogroups.com

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use • Send us Feedback .
__,_._,___

[OneStopSAP] Openings for SAP Basis At Fujitsu | Opportunity for SAP Basis Administrator At Adobe - Latest Jobs

To contact us Click HERE
 

IndiaJobForum  

Latest SAP Jobs
 
Required SAP Fico At HReSource                     
http://www.indiajobforum.com/viewtopic.php?f=86&t=124713                                  
 
Requirement for SAP SD At Maxim India                        
http://www.indiajobforum.com/viewtopic.php?f=86&t=124712                                   
 
Openings for Abap Crm At Quadrangle                      
http://www.indiajobforum.com/viewtopic.php?f=86&t=124710                                   
 
Opportunity for SAP Basis Administrator At Adobe                       
http://www.indiajobforum.com/viewtopic.php?f=86&t=124709                                   
 
SAP Abap Professionals Required At PwC                       
http://www.indiajobforum.com/viewtopic.php?f=86&t=124708                                  
 
Required Sap Basis Consultant At Collabera                      
http://www.indiajobforum.com/viewtopic.php?f=86&t=124707                                    
 
Openings for SAP Basis At Fujitsu                        
http://www.indiajobforum.com/viewtopic.php?f=86&t=124705                                   
 
Requirement for SAP Basis At Shell                      
http://www.indiajobforum.com/viewtopic.php?f=86&t=124704                                   
 
 

__._,_.___ Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (1) Recent Activity:
  • New Members 52
Visit Your Group =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FREE SAP PREPARATION RESOURCES
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

<*> http://www.onestopsap.com - SAP Preparation Portal - Complete Resources on SAP Exam Preparation. Visit now at http://www.onestopsap.com

<*> http://forum.onestopsap.com - SAP Discussion Forum - Share all your experiences and discuss all the queries here at http://forum.onestopsap.com

<*> http://groups.yahoo.com/group/OneStopSAP/join - JOIN ONESTOPSAP GROUP - Join OneStopSAP group now and receive the latest information and preparation material on SAP now! http://groups.yahoo.com/group/OneStopSAP/join



---------------------------------------------------------------



Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
        Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
Join http://groups.yahoo.com/group/OneStopSAP/join

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use .
__,_._,___

[OneStopSAP] Limited time offer "Homeopathy Consultation worth Rs 1750@Rs 250 only"

To contact us Click HERE
 

  We have the perfect answer for all your health problems. Medical solutions from the leading homeopathy experts. Trust us and put your health in the safest hands.
  We provide complete medical solutions for the following:  
   
  • Acne/Pimples
  • Asthma
  • Addison's Disease
  • Allergic Rhinitis
  • Alopecia Areata
  • Ankylosing Spondylitis
  • Bronchitis
  • Cervical Spondylitis
  • Constipation
  • Depression
  • Eczema
  • Gastritis
  • Hair Loss
  • Hyperthyroidism
  • Lichen Planus
  • Migraine
  • Obesity
  • Osteoarthritis
  • Psoriasis
  • Sinusitis
  • Tonsillitis
  • Urticaria
  • Vitiligo/Leucoderma
  • Warts
      Click Here      

__._,_.___ Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (2) Recent Activity:
  • New Members 51
Visit Your Group =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FREE SAP PREPARATION RESOURCES
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

<*> http://www.onestopsap.com - SAP Preparation Portal - Complete Resources on SAP Exam Preparation. Visit now at http://www.onestopsap.com

<*> http://forum.onestopsap.com - SAP Discussion Forum - Share all your experiences and discuss all the queries here at http://forum.onestopsap.com

<*> http://groups.yahoo.com/group/OneStopSAP/join - JOIN ONESTOPSAP GROUP - Join OneStopSAP group now and receive the latest information and preparation material on SAP now! http://groups.yahoo.com/group/OneStopSAP/join



---------------------------------------------------------------



Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
        Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
Join http://groups.yahoo.com/group/OneStopSAP/join

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use .
__,_._,___

How the FBI might've been owned (12M Apple records)

To contact us Click HERE
In recent news, hackers claimed to have stolen 12 million Apple device records from an FBI agent's laptop. I thought I'd post some comments.

The bug they claimed to have used isn't the current Java 0day, but a previous 0day. That Java 0day was being actively exploited in March 2012, as described in this MS TechNet article on CVE-2012-0507. The hackers claimed to have done this hack "during the second week of March 2012", which fits this timeline.

This was soon after the February 3 2012 release of an intercepted FBI conference call. This was a conference call of about 40 law enforcement agents from various parts of the world. Hackers were able to listen into the conference call because they somehow were able to intercept the e-mail message sent to all the agents listing the time and code to get in.

This e-mail was also published. That e-mail was sent directly to all 40 agents in the "To:" field (rather than "Bcc:"), which means their e-mail addresses were all exposed. That means every hacker on the Internet now has a list of the 40 officers in charge of hunting down LulzSec. The e-mail address of Chris Stangl (the guy whose notebook was hacked) is among those 40.

The obvious attack is for hackers to is to phish all 40 of those e-mail addresses. The phishing message would appear to come from the same sender, and simply point to a website hosting a Java app with that exploit. It might look like:
From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>Subject: Interception of Anon/Lulz Conference CallAll,Our conference call of January 27 was intercepted by hackersassociated with LulzSec. An audio recording was posted to theInternet. More details can be found here:http://totallyinnocent.com/no-java-exploit-here-at-all.htmlPlease contact me if you have any questions.Regards,TimSSA Timothy F. Lauster, Jr.Federal Bureau of Investigation202-651-3211 (w)202-651-3193 (f)
Where the URL would consist of some innocent looking site, but which would in fact host an evil page hosting a Java 0day. I'd guess that hackers got about 20% of those on the original list (or 8 out of 40).

The hackers can repeat this for every new 0day. For example, when the Metasploit module was released last week with yet another Java 0day, they could've phished that list of 40 agents yet again. Frankly, the FBI should consider all those e-mails burned. They should just assign the agents new addresses, then point the old ones to a special server that scrapes them for phishing 0day, to be notified every time hackers come up with new techniques.

One thing I'm trying to point out here is that hackers aren't necessarily smart, but operate from a set of well-known principles. If I have an e-mail list of victims, and a new 0day appears, I'm immediately going to phish with it. It's not Chinese uber APT hackers, it's just monkeys mindlessly following a script.


Or, it could've worked the other way around. Maybe that's how they intercepted that e-mail to be begin with, having used the Java 0day against Stangl's notebook computer. My point here is only that if I were a hacker who was a fan of LulzSec/Anonymous, and somebody dumped that list of FBI agents hunting LulzSec, I would certainly phish it at every opportunity.


Since that original e-mail list is all over the Internet, and the addresses should all be changed anyway, I'm reproducing it here for reference:

MIME-Version: 1.0acceptlanguage: en-USAccept-Language: en-USContent-class: urn:content-classes:messageSubject: Anon-Lulz International Coordination CallDate: Fri, 13 Jan 2012 19:21:49 -0000X-MS-Has-Attach:X-MS-TNEF-Correlator:thread-topic: Anon-Lulz International Coordination Call From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>To: "Reichard, Gerald A." <Gerald.Reichard@ic.fbi.gov>,    <paul.hoare2@met.police.uk>,    <Raymond.Massie@met.police.uk>,    <trevor.dickey@met.pnn.police.uk>,    <Stewart.Garrick@met.police.uk>,    "Gillen, Paul G" <paul.g.gillen@garda.ie>,    "Gallagher, Colm" <colm.gallagher@garda.ie>,    <pim@nhtcu.nl>,<Gea@nhtcu.nl>,    <michel@nhtcu.nl>,    <olivier.nael@interieur.gouv.fr>,    <olivier.moalic@interieur.gouv.fr>,    <thierry.mezenguel@interieur.gouv.fr>,    <andre.dornbusch@iuk.bka.de>,    <peter.ericson@rkp.police.se>,    <stefan.kronqvist@rkp.police.se>,    <ulrika.sundling@rkp.police.se>,    <Jaap.Oss@europol.europa.eu>,    <valentin.gatejel@europol.europa.eu>,    "Helman, Bruce C. Jr." <Bruce.Helman@ic.fbi.gov>,    "Sporre, Eric W." <Eric.Sporre@ic.fbi.gov>,    "Buckler, Lesley" <Lesley.Buckler@ic.fbi.gov>,    "Geeslin, Robert C." <Robert.Geeslin@ic.fbi.gov>,    "Plunkett, William R." <William.Plunkett@ic.fbi.gov>,    "Roberts, Stewart B." <Stewart.Roberts@ic.fbi.gov>,    "Brassanini, David" <David.Brassanini@ic.fbi.gov>,    "Stangl, Christopher K."<Christopher.Stangl@ic.fbi.gov>,    "Patel, Milan" <Milan.Patel@ic.fbi.gov>,    "Ng, William T." <William.Ng@ic.fbi.gov>,    "Adams, Melanie" <Melanie.Adams@ic.fbi.gov>,    "Culp, Mark A." <Mark.Culp@ic.fbi.gov>,    "Arico, Nicholas J." <Nicholas.Arico@ic.fbi.gov>,    "Tabatabaian, Ramyar" <Ramyar.Tabatabaian@ic.fbi.gov>,    "Penalosa, Jensen" <Jensen.Penalosa@ic.fbi.gov>,    "Bales, Will" <Will.Bales@ic.fbi.gov>,    "Burton, Kevin C." <Kevin.Burton@ic.fbi.gov>,    "Nail, Michael A." <Michael.Nail@ic.fbi.gov>,    "Grasso, Thomas X." <Thomas.Grasso@ic.fbi.gov>,    "Thomas, Christopher T." <Christopher.Thomas@ic.fbi.gov>,    "Caruthers, John" <John.Caruthers@ic.fbi.gov>,    "Phoenix, Conor I." <Conor.Phoenix@ic.fbi.gov>,    "Hunt, Chad R." <Chad.Hunt@ic.fbi.gov>,    "Willett, Bryan G." <Bryan.Willett@ic.fbi.gov>,    "Patrick, Kory D." <Kory.Patrick@ic.fbi.gov>     All, A conference call is planned for next Tuesday (January 17, 2012) to discuss the on-going investigations related to Anonymous, Lulzsec, Antisec, and other associated splinter groups. The conference call wasmoved to Tuesday due to a US holiday on Monday.Date: Tuesday, January 17, 2012 Time: 4:00 PM GMTBridgeTN: 202-393-2430Access Code: 6513211# Please contact me if you have any questions. Regards, Tim SSA Timothy F. Lauster, Jr. Federal Bureau of Investigation 202-651-3211 (w) 202-651-3193 (f)

Other links:
explanation of UDID
finding your UDID
FBI denies it was their laptop

11 Ekim 2012 Perşembe

[OneStopSAP] Request your Free Best Practices!

To contact us Click HERE
 

Six Ways to Dial in Your Talent Strategy
Request your Free Best Practices!
http://yourprojectcode.tradepub.com/free/w_su57/prgm.cgi

Click here to get Free Oracle Magazine Receive Your Complimentary Best Practices NOW!
Learn the six steps to creating a business case for talent. What's the difference between a compliance-driven HR organization and a business-integrated HR organization? An HR strategy that is centered around an effective talent program. Because creating such a program doesn't come without cost, this best practices shows the six areas to focus on when making a business case for talent. Among them:
Search for your rainmakers
Build a talent pipeline
Get new hires up to speed quickly
But it doesn't stop there. It's business-critical input from the company that knows talent management better than anyone--SuccessFactors. Learn more about how they can help you take the talent in your organization to the next level.
Click here to Subscribe for Free Now!

or visit http://yourprojectcode.tradepub.com/free/w_su57/prgm.cgi

__._,_.___ Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (1) Recent Activity:
  • New Members 55
Visit Your Group =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FREE SAP PREPARATION RESOURCES
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

<*> http://www.onestopsap.com - SAP Preparation Portal - Complete Resources on SAP Exam Preparation. Visit now at http://www.onestopsap.com

<*> http://forum.onestopsap.com - SAP Discussion Forum - Share all your experiences and discuss all the queries here at http://forum.onestopsap.com

<*> http://groups.yahoo.com/group/OneStopSAP/join - JOIN ONESTOPSAP GROUP - Join OneStopSAP group now and receive the latest information and preparation material on SAP now! http://groups.yahoo.com/group/OneStopSAP/join



---------------------------------------------------------------



Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
        Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
Join http://groups.yahoo.com/group/OneStopSAP/join

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use .
__,_._,___

How the FBI might've been owned (12M Apple records)

To contact us Click HERE
In recent news, hackers claimed to have stolen 12 million Apple device records from an FBI agent's laptop. I thought I'd post some comments.

The bug they claimed to have used isn't the current Java 0day, but a previous 0day. That Java 0day was being actively exploited in March 2012, as described in this MS TechNet article on CVE-2012-0507. The hackers claimed to have done this hack "during the second week of March 2012", which fits this timeline.

This was soon after the February 3 2012 release of an intercepted FBI conference call. This was a conference call of about 40 law enforcement agents from various parts of the world. Hackers were able to listen into the conference call because they somehow were able to intercept the e-mail message sent to all the agents listing the time and code to get in.

This e-mail was also published. That e-mail was sent directly to all 40 agents in the "To:" field (rather than "Bcc:"), which means their e-mail addresses were all exposed. That means every hacker on the Internet now has a list of the 40 officers in charge of hunting down LulzSec. The e-mail address of Chris Stangl (the guy whose notebook was hacked) is among those 40.

The obvious attack is for hackers to is to phish all 40 of those e-mail addresses. The phishing message would appear to come from the same sender, and simply point to a website hosting a Java app with that exploit. It might look like:
From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>Subject: Interception of Anon/Lulz Conference CallAll,Our conference call of January 27 was intercepted by hackersassociated with LulzSec. An audio recording was posted to theInternet. More details can be found here:http://totallyinnocent.com/no-java-exploit-here-at-all.htmlPlease contact me if you have any questions.Regards,TimSSA Timothy F. Lauster, Jr.Federal Bureau of Investigation202-651-3211 (w)202-651-3193 (f)
Where the URL would consist of some innocent looking site, but which would in fact host an evil page hosting a Java 0day. I'd guess that hackers got about 20% of those on the original list (or 8 out of 40).

The hackers can repeat this for every new 0day. For example, when the Metasploit module was released last week with yet another Java 0day, they could've phished that list of 40 agents yet again. Frankly, the FBI should consider all those e-mails burned. They should just assign the agents new addresses, then point the old ones to a special server that scrapes them for phishing 0day, to be notified every time hackers come up with new techniques.

One thing I'm trying to point out here is that hackers aren't necessarily smart, but operate from a set of well-known principles. If I have an e-mail list of victims, and a new 0day appears, I'm immediately going to phish with it. It's not Chinese uber APT hackers, it's just monkeys mindlessly following a script.


Or, it could've worked the other way around. Maybe that's how they intercepted that e-mail to be begin with, having used the Java 0day against Stangl's notebook computer. My point here is only that if I were a hacker who was a fan of LulzSec/Anonymous, and somebody dumped that list of FBI agents hunting LulzSec, I would certainly phish it at every opportunity.


Since that original e-mail list is all over the Internet, and the addresses should all be changed anyway, I'm reproducing it here for reference:

MIME-Version: 1.0acceptlanguage: en-USAccept-Language: en-USContent-class: urn:content-classes:messageSubject: Anon-Lulz International Coordination CallDate: Fri, 13 Jan 2012 19:21:49 -0000X-MS-Has-Attach:X-MS-TNEF-Correlator:thread-topic: Anon-Lulz International Coordination Call From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>To: "Reichard, Gerald A." <Gerald.Reichard@ic.fbi.gov>,    <paul.hoare2@met.police.uk>,    <Raymond.Massie@met.police.uk>,    <trevor.dickey@met.pnn.police.uk>,    <Stewart.Garrick@met.police.uk>,    "Gillen, Paul G" <paul.g.gillen@garda.ie>,    "Gallagher, Colm" <colm.gallagher@garda.ie>,    <pim@nhtcu.nl>,<Gea@nhtcu.nl>,    <michel@nhtcu.nl>,    <olivier.nael@interieur.gouv.fr>,    <olivier.moalic@interieur.gouv.fr>,    <thierry.mezenguel@interieur.gouv.fr>,    <andre.dornbusch@iuk.bka.de>,    <peter.ericson@rkp.police.se>,    <stefan.kronqvist@rkp.police.se>,    <ulrika.sundling@rkp.police.se>,    <Jaap.Oss@europol.europa.eu>,    <valentin.gatejel@europol.europa.eu>,    "Helman, Bruce C. Jr." <Bruce.Helman@ic.fbi.gov>,    "Sporre, Eric W." <Eric.Sporre@ic.fbi.gov>,    "Buckler, Lesley" <Lesley.Buckler@ic.fbi.gov>,    "Geeslin, Robert C." <Robert.Geeslin@ic.fbi.gov>,    "Plunkett, William R." <William.Plunkett@ic.fbi.gov>,    "Roberts, Stewart B." <Stewart.Roberts@ic.fbi.gov>,    "Brassanini, David" <David.Brassanini@ic.fbi.gov>,    "Stangl, Christopher K."<Christopher.Stangl@ic.fbi.gov>,    "Patel, Milan" <Milan.Patel@ic.fbi.gov>,    "Ng, William T." <William.Ng@ic.fbi.gov>,    "Adams, Melanie" <Melanie.Adams@ic.fbi.gov>,    "Culp, Mark A." <Mark.Culp@ic.fbi.gov>,    "Arico, Nicholas J." <Nicholas.Arico@ic.fbi.gov>,    "Tabatabaian, Ramyar" <Ramyar.Tabatabaian@ic.fbi.gov>,    "Penalosa, Jensen" <Jensen.Penalosa@ic.fbi.gov>,    "Bales, Will" <Will.Bales@ic.fbi.gov>,    "Burton, Kevin C." <Kevin.Burton@ic.fbi.gov>,    "Nail, Michael A." <Michael.Nail@ic.fbi.gov>,    "Grasso, Thomas X." <Thomas.Grasso@ic.fbi.gov>,    "Thomas, Christopher T." <Christopher.Thomas@ic.fbi.gov>,    "Caruthers, John" <John.Caruthers@ic.fbi.gov>,    "Phoenix, Conor I." <Conor.Phoenix@ic.fbi.gov>,    "Hunt, Chad R." <Chad.Hunt@ic.fbi.gov>,    "Willett, Bryan G." <Bryan.Willett@ic.fbi.gov>,    "Patrick, Kory D." <Kory.Patrick@ic.fbi.gov>     All, A conference call is planned for next Tuesday (January 17, 2012) to discuss the on-going investigations related to Anonymous, Lulzsec, Antisec, and other associated splinter groups. The conference call wasmoved to Tuesday due to a US holiday on Monday.Date: Tuesday, January 17, 2012 Time: 4:00 PM GMTBridgeTN: 202-393-2430Access Code: 6513211# Please contact me if you have any questions. Regards, Tim SSA Timothy F. Lauster, Jr. Federal Bureau of Investigation 202-651-3211 (w) 202-651-3193 (f)

Other links:
explanation of UDID
finding your UDID
FBI denies it was their laptop

Bill and Melinda Gates deserve the Nobel Peace Prize

To contact us Click HERE
Nobody deserves a "Nobel Peace Prize" more than Bill and Melinda Gates. Few, if any, of the of Peace Prize winners of the last 20 years have had the impact of the Bill and Melinda Gates Foundation. It's not that their foundation is big (though at $35-billion, it is), but that it's effective. It's one of the few examples of a charity that actually gets results, rather than blindly throwing money at a problem, often making things worse.
Charities exist not to solve problem but to extract money from donors. I don't mean this in a snide way, but a in a non-judgemental description of the truth. I believe that charities are overwhelmingly run by people with good intentions. It's just that the reality of running a charity corrupts them.
A good method of measuring corruption is what's known as Dark Patterns, or the evil tricks websites use to extract money or email addresses from you. If a website aggressively opts-in to their email spam, it's a site that you should avoid in the future.
That's how we know charities are corrupt. Once you donate once, the charity will forevermore inundate you with junk-mail and spam asking for more donations. It's nearly impossible to get off their mailing lists. They behave like the evilest of marketing companies, because they are.
The same goes for the work they do. Getting results is far less important than showing results. A good example is the OLPC (One Laptop Per Child) charity that has shipped 2.4 million laptops to children in poor countries throughout the world. They have lots of glowing reports from classrooms that recently received their laptops, where children are encouraged to be excited about their laptops in order to receive more. But there's nothing on the OLPC site reporting on those children a few years later. OLPC has been shipping laptops to children long enough for the original recipients to be graduating from high-school. But yet, we never hear these stories -- only the stories from children who are excited by the laptop they received a month ago. As I write this, the latest English language article from their press page is about Rwanda. Despite having the laptops for 5 years, and be in a position to describe what the laptops have done, the article is all about the promise of what they will do. The potential of what the laptops can do is exciting and drives donations. The bitter reality of what really happens, as laptops break down, and as students go to work in fields where laptops are useless, is less exciting and will not drive donations.
What makes the Bill and Melinda Gates foundation different is that they aren't asking for donations. Consider this anti-dark-pattern: if you Google "donate to the bill and melinda gates foundation", the top result tells you this: "From time to time, people generously offer to contribute money to the foundation. We prefer that people give directly to our grantee organizations rather than to the foundation if they want to help advance the causes we’re passionate about. We have the stable funds we need to help us fulfill our mission, but our grantees often do not.".
In other words, they aren't corrupted by their donors.
For example, they undertook a project to reduce class size in classrooms in poor areas of the United States. They did this because "everyone knows" that class size is a problem that needs to be fixed. It's the sort of project that would get lots of donations, since it's so widely acknowledged to be a problem. But, after a few years of successfully reducing class size, the Gates foundation measured the results, and found that it didn't improve anything. Mathematicians have demonstrated that why "what everyone knows" is wrong, and that there is actually no evidence to believe big classes are a significant problem. Therefore, the Foundation shifted their money to other education projects instead. Had they been a traditional charity relying upon donations from well-meaning people wanting to reduce class size, this evidence of ineffectiveness wouldn't have stopped the charity from continuing the program.
The Gates demand for results means their charity works. Conversely, the track record of most charities is one of perpetuating problems rather than solving them. Most food aid to Africa goes to propping up corrupt governments who are responsible for the problem in the first place. In Africa, government officials will not allow your charity to operate unless you pay the requisite bribes. The Bill and Melinda Gates Foundation doesn't put up with that nonsense.
This is not only an argument of why the Gates is one of the few charities you should consider donating to, but also an argument why they deserve recognition, like the Nobel Peace Prize. And yet, the likelihood of this happening is near zero. Like charities, the Nobel Peace Prize doesn't go to people with results. Instead, it goes to promise of results. They gave President Obama the prize for his campaign rhetoric promising to end President Bush's foreign policies, but he's now widely criticized by peaceniks for continuing those policies. Likewise, numerous prizes have been given for solving the still unsolved Israel-Palestinian conflict.
Every year the Nobel committee is going to snub Bill Gates. I'm writing this down so that every year I can point this out, retweeting this blog.

Get Your Free Estate Planning Guide from LegalZoom - scam spam email from Legal Zoom

To contact us Click HERE
Find a Lawyer FREE Now!
Subject: Get Your Free Estate Planning Guide from LegalZoom 
Sent by: LegalZoom 
Sent Via Email Address: legal@theastrogeek.com 
Determination: Dishonest Spammer. Since legal zoom lets these dishonest people spam, who lie and cheat to beat spam filters, who can you not trust?


This is an advertisement. This message has been sent to you through an affiliate of LegalZoom. To be excluded from getting future emails, you can unsubscribe here (http://theastrogeek.com/) . 101 N. Brand Blvd., 11th Floor, Glendale, CA 91203

Here is the hidden text use by this legal zoom affiliate in order to defeat spam filters.

At the first gesture of morning, flies began stirring. Inman's eyes and the long wound at his neck drew them, and the sound of their wings and the touch of their feet were soon more potent than a yardful of roosters in rousing a man to wake. So he came to yet one more day in the hospital ward. He flapped the flies away with his hands and looked across the foot of his bed to an open triple-hung window. Ordinarily he could see to the red road and the oak tree and the low brick wall. And beyond them to a sweep of fields and flat piney woods that stretched to the western horizon. The view was a long one for the flatlands, the hospital having been built on the only swell within eyeshot. But it was too early yet for a vista. The window might as well have been painted grey. Had it not been too dim, Inman would have read to pass the time until breakfast, for the book he was reading had the effect of settling his mind. But he had burned up the last of his own candles reading to bring sleep the night before, and lamp oil was too scarce to be striking the hospital's lights for mere diversion. So he rose and dressed and sat in a ladderback chair, putting the gloomy room of beds and their broken occupants behind him. He flapped again at the flies and looked out the window at the first smear of foggy dawn and waited for the world to begin shaping up outside. The window was tall as a door, and he had imagined many times that it would open onto some other place and let him walk through and be there. During his first weeks in the hospital, he had been hardly able to move his head, and all that kept his mind occupied had been watching out the window and picturing the old green places he recollected from home. Childhood places. The damp creek bank where Indian pipes grew. The corner of a meadow favored by brown-and-black caterpillars in the fall. A hickory limb that overhung the lane, and from which he often watched his father driving cows down to the barn at dusk. They would pass underneath him, and then he would close his eyes and listen as the cupping sound of their hooves in the dirt grew fainter and fainter until it vanished into the calls of katydids and peepers. The window wanted only to take his thoughts back. Which was fine with him, for he had seen the metal face of the age and had been so stunned by it that when he thought into the future, all he could vision was a world from which everything he counted important had been banished or had willingly fled. By now he had stared at the window all through a late summer so hot and wet that the air both day and night felt like breathing through a dishrag, so damp it caused fresh sheets to sour under him and tiny black mushrooms to grow overnight from the limp pages of the book on his bedside table. Inman suspected that after such long examination, the grey window had finally said about all it had to say. That morning, though, it surprised him, for it brought to mind a lost memory of sitting in school, a similar tall window beside him framing a scene of pastures and low green ridges terracing up to the vast hump of Cold Mountain. It was September. The hayfield beyond the beaten dirt of the school playground stood pant-waist high, and the heads of grasses were turning yellow from need of cutting. The teacher was a round little man, hairless and pink of face. He owned but one rusty black suit of clothes and a pair of old overlarge dress boots that curled up at the toes and were so worn down that the heels were wedgelike. He stood at the front of the room rocking on the points. He talked at length through the morning about history, teaching the older students of grand wars fought in ancient England.

 ________________________________

To cancel your subscription: follow here >> .UnderstandEnergy 1616 N Poinsettia Pl OFC Los Angeles, CA 90046
Find a Lawyer FREE Now!
Information about spammers who promote Legal Zoom on the domain name: theastrogeek.comRegistrant Contact: theastrogeek.com 
UNDERSTAND ENERGY () 1616 N POINSETTIA PL 
OFC LOS ANGELES, CA 90046 

USAdministrative Contact:  theastrogeek.com 
UNDERSTAND ENERGY (postmaster@theastrogeek.com) 
+1.4243544333 
1616 N POINSETTIA PL 
OFC LOS ANGELES, CA 90046 
USTechnical Contact: theastrogeek.com 
UNDERSTAND ENERGY (postmaster@theastrogeek.com) 
+1.4243544333 
1616 N POINSETTIA PL 
OFC LOS ANGELES, CA 90046 
USStatus: LockedName 

Servers: 
dns1.registrar-servers.com 
dns2.registrar-servers.com 
dns3.registrar-servers.com 
dns4.registrar-servers.com 
dns5.registrar-servers.com 

Creation date: 31 May 2012 19:28:00 
Expiration date: 31 May 2013 11:28:00 

Find a Lawyer FREE Now!

Irish Sausages - funny Irish joke

To contact us Click HERE
Shamus and Murphy fancied a pint or two but didn't have a lot of money. Between them they could only raise the staggering sum of one Euro.

Murphy said 'Hang on, I have an idea.'

He went next door to the butcher's shop and came out with one large sausage.

Shamus said 'Are you crazy? Now we don't have any money at all!'

Murphy replied, 'Don't worry - just follow me.'

He went into the pub where he immediately ordered two pints of Guinness and two glasses of Jamieson Whiskey.

Shamus said 'Now you've lost it. Do you know how much trouble we will be in? We haven't got any money!!'

Murphy replied, with a smile. 'Don't worry, I have a plan. Cheers! '

They downed their Drinks. Murphy said, 'OK, I'll stick the sausage through my zipper and you go on your knees and put it in your mouth.'

The barman noticed them, went berserk, and threw them out.

They continued this, pub after pub, getting more and more drunk, all for free.

At the tenth pub Shamus said 'Murphy - I don't think I can do any more of this. I'm drunk and me knees are killing me!'

Murphy said, 'How do you think I feel? I can't even remember which pub I lost the sausage in.'

10 Ekim 2012 Çarşamba

[OneStopSAP] Requirement for SAP Fico Lead At HTC | Openings for Sap.abap At IBM - Latest Jobs

To contact us Click HERE
 


 

Home Home
SAP Jobs | SAP Downloads | SAP Articles | SAP Training Institutes | SAP Faqs

Click here to Join SAP group for Latest Updates
http://groups.yahoo.com/group/onestopsap/join


Latest Jobs in SAP

 
Openings for SAP Abap At WDC
http://www.onestopsap.com//sap-jobs/details/openings-for-sap-abap-at-wdc-1176.asp

 
 
SAP Basis Required At SAP India
http://www.onestopsap.com//sap-jobs/details/sap-basis-required-at-sap-ind-1175.asp

 
 
Required SAP BI Consultants At Magna Infotech
http://www.onestopsap.com//sap-jobs/details/required-sap-bi-consultants-at-1174.asp

 
 
Openings for SAP Abap Consultant At Future Focus
http://www.onestopsap.com//sap-jobs/details/openings-for-sap-abap-consulta-1173.asp

 
 
Openings for SAP Abap BSP At Shreyas
http://www.onestopsap.com//sap-jobs/details/openings-for-sap-abap-bsp-at-s-1172.asp

 
 
Requirement for SAP Fico Lead At HTC
http://www.onestopsap.com//sap-jobs/details/requirement-for-sap-fico-lead-1171.asp

 
 
SAP Fico Lead Required At Arctern
http://www.onestopsap.com//sap-jobs/details/sap-fico-lead-required-at-arct-1170.asp

 
 
Required SAP Abap At PwC
http://www.onestopsap.com//sap-jobs/details/required-sap-abap-at-pwc-1169.asp

 
 
Openings for Sap.abap At IBM
http://www.onestopsap.com//sap-jobs/details/openings-for-sap-abap-at-ibm-1168.asp

 
 
Requirement for SAP Basis At Hackett Group
http://www.onestopsap.com//sap-jobs/details/requirement-for-sap-basis-at-h-1167.asp

 
 
Opportunity for Sap Basis Consultant At Collabera
http://www.onestopsap.com//sap-jobs/details/opportunity-for-sap-basis-cons-1166.asp

 
 

__._,_.___ Reply to sender | Reply to group | Reply via web post | Start a New Topic Messages in this topic (1) Recent Activity:
  • New Members 52
Visit Your Group =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
FREE SAP PREPARATION RESOURCES
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=

<*> http://www.onestopsap.com - SAP Preparation Portal - Complete Resources on SAP Exam Preparation. Visit now at http://www.onestopsap.com

<*> http://forum.onestopsap.com - SAP Discussion Forum - Share all your experiences and discuss all the queries here at http://forum.onestopsap.com

<*> http://groups.yahoo.com/group/OneStopSAP/join - JOIN ONESTOPSAP GROUP - Join OneStopSAP group now and receive the latest information and preparation material on SAP now! http://groups.yahoo.com/group/OneStopSAP/join



---------------------------------------------------------------



Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
        Join http://groups.yahoo.com/group/OneStopSAP/join
      Join http://groups.yahoo.com/group/OneStopSAP/join
    Join http://groups.yahoo.com/group/OneStopSAP/join
  Join http://groups.yahoo.com/group/OneStopSAP/join
Join http://groups.yahoo.com/group/OneStopSAP/join

Yahoo! Groups Switch to: Text-Only, Daily Digest • Unsubscribe • Terms of Use .
__,_._,___

Learn to read Wikipedia! Part 2

To contact us Click HERE
In my last post, I pointed out how you should check your facts by reading Wikipedia. In that case, it was about the Colorado Batman shooting, which was already a couple weeks old. The same applies to the Wisconsin Sikh temple shooting, which is only hours old. I googled "wikipedia 2012 shooting sikh" and came up with http://en.wikipedia.org/wiki/Wisconsin_Sikh_Temple_Shooting. The content is brief, because very little is known as this point. We don't know who the gunman was or why he did it. Presumably, in the next day, we'll discover the identity of the gunman, which will presumably lead to hints as to his motivation.

What's interesting about the Wikipedia article is that it just contains the facts. Contrast to this to the nonsense on "real news" outlets like CNN, which first confused Sikhs with Muslims/Hindus, then apologized for the mistake and mentioned how unfair it was that Sikhs are murdered on the mistaken belief that they are Muslims, and then apologized again for implying that Muslims deserve to be shot. (I don't know this first hand -- but this is what my Twitter feed is reporting about CNN's reporting). The known facts are few, but that doesn't stop CNN from doing it's best to fill out the "reporting" anyway.

TV news like CNN has been under fire recently from the likes of Jon Stewart ("The Daily Show") and Aaron Sorkin ("The Newsroom"), though neither present reasonable alternatives (well, Sorkin does present an alternative, just one that discards the most important ethics of journalistic impartiality).

I'm not sure criticism like this is warranted. People tune into CNN either for the breaking news or entertainment. Once CNN breaks the news with so little facts, they've really got nothing better to do than sit their twiddling their thumbs.

I think the mistake is to believe that CNN should even be considered "real news". Wikipedia is an excellent source, so are written sources like The Economist. They have problems, but their worst is still better than the best of TV news. Rather than trying to reform TV news, I think we just start ignoring it -- except as a source of entertainment.

Review: "Virtually True" by Adam Penenberg

To contact us Click HERE
Adam Penenberg was a tech writer for Forbes during the dot-com craze, famous for the Stephen Glass affair, and is now a journalism professor. He recently published a "cyberpunk" novel called "Virtually True", so I thought I'd write a review of it.
This book is very Gibson-esque (written in the style of William Gibson's Neuromancer). This is both a compliment and a criticism. On one hand, if you like cyberpunk, then this is very much the sort of cyberpunk book you are looking for. On the other hand, it sometimes feels too much like a copy of Gibson's work. The beginning is a bit more confusing than the average cyberpunk (a genre known for being confusing). The middle bogs down, and much of it can safely be skipped. But the end is satisfying. It's "pulp cyberpunk" -- not the best example of the art, but still interesting because there are so few works in the genre, most of which are out of date (Penenberg's characters communicate via cell phone technology and look things up on the web, things missing from older cyberpunk). An interesting thing about the book is that the main character is a journalist, with the author being a journalist. Thus, it's a bit autobiographical, showing you how journalists see the world. The Internet is remaking journalism by driving down the cost of content (and hence, throwing journalists out of work), and this book reflects how journalists feel a bit downtrodden at the moment.I wasn't particularly thrilled with the book, but people who read cyberpunk are an odd lot, so there's a good chance many will thoroughly enjoy it.

How the FBI might've been owned (12M Apple records)

To contact us Click HERE
In recent news, hackers claimed to have stolen 12 million Apple device records from an FBI agent's laptop. I thought I'd post some comments.

The bug they claimed to have used isn't the current Java 0day, but a previous 0day. That Java 0day was being actively exploited in March 2012, as described in this MS TechNet article on CVE-2012-0507. The hackers claimed to have done this hack "during the second week of March 2012", which fits this timeline.

This was soon after the February 3 2012 release of an intercepted FBI conference call. This was a conference call of about 40 law enforcement agents from various parts of the world. Hackers were able to listen into the conference call because they somehow were able to intercept the e-mail message sent to all the agents listing the time and code to get in.

This e-mail was also published. That e-mail was sent directly to all 40 agents in the "To:" field (rather than "Bcc:"), which means their e-mail addresses were all exposed. That means every hacker on the Internet now has a list of the 40 officers in charge of hunting down LulzSec. The e-mail address of Chris Stangl (the guy whose notebook was hacked) is among those 40.

The obvious attack is for hackers to is to phish all 40 of those e-mail addresses. The phishing message would appear to come from the same sender, and simply point to a website hosting a Java app with that exploit. It might look like:
From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>Subject: Interception of Anon/Lulz Conference CallAll,Our conference call of January 27 was intercepted by hackersassociated with LulzSec. An audio recording was posted to theInternet. More details can be found here:http://totallyinnocent.com/no-java-exploit-here-at-all.htmlPlease contact me if you have any questions.Regards,TimSSA Timothy F. Lauster, Jr.Federal Bureau of Investigation202-651-3211 (w)202-651-3193 (f)
Where the URL would consist of some innocent looking site, but which would in fact host an evil page hosting a Java 0day. I'd guess that hackers got about 20% of those on the original list (or 8 out of 40).

The hackers can repeat this for every new 0day. For example, when the Metasploit module was released last week with yet another Java 0day, they could've phished that list of 40 agents yet again. Frankly, the FBI should consider all those e-mails burned. They should just assign the agents new addresses, then point the old ones to a special server that scrapes them for phishing 0day, to be notified every time hackers come up with new techniques.

One thing I'm trying to point out here is that hackers aren't necessarily smart, but operate from a set of well-known principles. If I have an e-mail list of victims, and a new 0day appears, I'm immediately going to phish with it. It's not Chinese uber APT hackers, it's just monkeys mindlessly following a script.


Or, it could've worked the other way around. Maybe that's how they intercepted that e-mail to be begin with, having used the Java 0day against Stangl's notebook computer. My point here is only that if I were a hacker who was a fan of LulzSec/Anonymous, and somebody dumped that list of FBI agents hunting LulzSec, I would certainly phish it at every opportunity.


Since that original e-mail list is all over the Internet, and the addresses should all be changed anyway, I'm reproducing it here for reference:

MIME-Version: 1.0acceptlanguage: en-USAccept-Language: en-USContent-class: urn:content-classes:messageSubject: Anon-Lulz International Coordination CallDate: Fri, 13 Jan 2012 19:21:49 -0000X-MS-Has-Attach:X-MS-TNEF-Correlator:thread-topic: Anon-Lulz International Coordination Call From: "Lauster, Timothy F. Jr."<Timothy.Lauster@ic.fbi.gov>To: "Reichard, Gerald A." <Gerald.Reichard@ic.fbi.gov>,    <paul.hoare2@met.police.uk>,    <Raymond.Massie@met.police.uk>,    <trevor.dickey@met.pnn.police.uk>,    <Stewart.Garrick@met.police.uk>,    "Gillen, Paul G" <paul.g.gillen@garda.ie>,    "Gallagher, Colm" <colm.gallagher@garda.ie>,    <pim@nhtcu.nl>,<Gea@nhtcu.nl>,    <michel@nhtcu.nl>,    <olivier.nael@interieur.gouv.fr>,    <olivier.moalic@interieur.gouv.fr>,    <thierry.mezenguel@interieur.gouv.fr>,    <andre.dornbusch@iuk.bka.de>,    <peter.ericson@rkp.police.se>,    <stefan.kronqvist@rkp.police.se>,    <ulrika.sundling@rkp.police.se>,    <Jaap.Oss@europol.europa.eu>,    <valentin.gatejel@europol.europa.eu>,    "Helman, Bruce C. Jr." <Bruce.Helman@ic.fbi.gov>,    "Sporre, Eric W." <Eric.Sporre@ic.fbi.gov>,    "Buckler, Lesley" <Lesley.Buckler@ic.fbi.gov>,    "Geeslin, Robert C." <Robert.Geeslin@ic.fbi.gov>,    "Plunkett, William R." <William.Plunkett@ic.fbi.gov>,    "Roberts, Stewart B." <Stewart.Roberts@ic.fbi.gov>,    "Brassanini, David" <David.Brassanini@ic.fbi.gov>,    "Stangl, Christopher K."<Christopher.Stangl@ic.fbi.gov>,    "Patel, Milan" <Milan.Patel@ic.fbi.gov>,    "Ng, William T." <William.Ng@ic.fbi.gov>,    "Adams, Melanie" <Melanie.Adams@ic.fbi.gov>,    "Culp, Mark A." <Mark.Culp@ic.fbi.gov>,    "Arico, Nicholas J." <Nicholas.Arico@ic.fbi.gov>,    "Tabatabaian, Ramyar" <Ramyar.Tabatabaian@ic.fbi.gov>,    "Penalosa, Jensen" <Jensen.Penalosa@ic.fbi.gov>,    "Bales, Will" <Will.Bales@ic.fbi.gov>,    "Burton, Kevin C." <Kevin.Burton@ic.fbi.gov>,    "Nail, Michael A." <Michael.Nail@ic.fbi.gov>,    "Grasso, Thomas X." <Thomas.Grasso@ic.fbi.gov>,    "Thomas, Christopher T." <Christopher.Thomas@ic.fbi.gov>,    "Caruthers, John" <John.Caruthers@ic.fbi.gov>,    "Phoenix, Conor I." <Conor.Phoenix@ic.fbi.gov>,    "Hunt, Chad R." <Chad.Hunt@ic.fbi.gov>,    "Willett, Bryan G." <Bryan.Willett@ic.fbi.gov>,    "Patrick, Kory D." <Kory.Patrick@ic.fbi.gov>     All, A conference call is planned for next Tuesday (January 17, 2012) to discuss the on-going investigations related to Anonymous, Lulzsec, Antisec, and other associated splinter groups. The conference call wasmoved to Tuesday due to a US holiday on Monday.Date: Tuesday, January 17, 2012 Time: 4:00 PM GMTBridgeTN: 202-393-2430Access Code: 6513211# Please contact me if you have any questions. Regards, Tim SSA Timothy F. Lauster, Jr. Federal Bureau of Investigation 202-651-3211 (w) 202-651-3193 (f)

Other links:
explanation of UDID
finding your UDID
FBI denies it was their laptop