topbanner_forum
  *

avatar image

Welcome, Guest. Please login or register.
Did you miss your activation email?

Login with username, password and session length
  • Monday November 10, 2025, 11:09 pm
  • Proudly celebrating 15+ years online.
  • Donate now to become a lifetime supporting member of the site and get a non-expiring license key for all of our programs.
  • donate

Recent Posts

Pages: prev1 ... 12 13 14 15 16 [17] 18 19 20 21 22 ... 50next
401
Living Room / Re: Conficker - The Facts
« Last post by Ehtyar on March 30, 2009, 07:06 PM »
http://www.eweek.com...-Enterprises-718842/
Well I'm glad someone is reporting some sense, though that article was apparently written before Variant C was released, and thus does not take into account the new p2p update distribution mechanism.
[edit]
After further reading it seems the article was published very recently, but completely ignored both the enhanced domain generation algorithm and p2p update mechanism of Variant C in their conclusion. I'm a fan of their lack of sensationalism, but their lack of accuracy makes for a misguided conclusion.
[/edit]

Also wanted to add my thanks for the thoughtful post Ehtyar.  :up:
From one of your links i came across this article which looks like fun technical reading: http://mtc.sri.com/Conficker/
That article is directly linked in my summary (3rd link). It is where much of the information in the summary was sourced from.

I'm hoping that info is right  :)
It is.

Ehtyar
402
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 30, 2009, 05:31 AM »
My pleasure ewe. Perhaps I ought to start linking to explanations of some of the news stories that are being updated instead of broken.

Ehtyar.
403
Living Room / Conficker - The Facts
« Last post by Ehtyar on March 30, 2009, 05:27 AM »
Hi all.

Firstly, let me apologize for being so retarded as to have called this thing 'Conflicker' for the past month. I didn't find out I was wrong up until about two hours ago. I've only read about 50 news stories about it... Anyway...

Earlier today I finished watching Lesley Stahl's "freak out" on 60 Minutes and it struck me just how many times I'd read the same crap over the past month. I've decided that, to remedy the situation, at least amongst DonationCoder regulars, I will post this purely factual summary of the virus/trojan/worm/whatever Conficker. I am most certainly no Conficker expert, but I believe I can do a better job laying out the facts than much of the mass media, and I'll try to keep the tech talk down.

A huuuge thank you to SRI International for publishing their superb analysis of Conficker which has provided me with a couple of hours of very interesting reading. I highly recommend the more interested parties read it, it makes for a very enlightening read.

In September 2008, a vulnerability was disclosed in the Windows operating system that could allow an attacker to execute code on an unpatched machine with system level privileges. This vulnerability was soon plugged by Microsoft, and heavy press coverage meant that most people paying attention responded swiftly and updated their machines. Unfortunately, Microsoft does not permit pirated copies of Windows to be updated, leaving a large segment of the worlds population perpetually vulnerable.

In November 2008, a virus making use of this vulnerability to infect unpatched machines began sweeping across the globe. This virus is known as Conficker, and is estimated to have infected anywhere between 10-15 million computers worldwide. Since November, Conficker has seen 2 significant upgrades made to its initial form, known as Conficker.B and Conficker.C respectively. This summary will focus on the capabilities of variant C as one can expect this form to be the most prevalent.

It is worth mentioning that Microsoft along with several other corporations have banded together to form what they're a "cabal" in unity against Conficker. They worked to thwart variants A and B and would have succeeded were it not for the C variant.

Conficker infects its potential host by issuing a specially crafted Remote Procedure Call over port 445/TCP, causing the host to execute code embedded in the call which leads to the infection of the machine with Conficker. It is also capable of spreading via USB mass storage devices.

Interestingly, Conficker ignores Ukranian IP addresses thanks to an embedded database of IP address ranges and their geological locations. This is believed to be either a ploy to draw misguided attention to the Ukraine as the home of the virus writers, or a way of ensuring an apathetic response from the Ukrianian Government where Conficker is concerned.

When Conficker first infects a system, it follows the following process:
-Conficker first opens a random high-range port on any local firewall/router via UPNP. This port is used later on in the propogation process. It also retrived the external IP address of its host from a variety of websites which is also used in propogation.
-Conficker patches the vulnerability in Windows that allowed it to infects via an in-memory modification of the vulnerable service. The patch is made in such a manner that it will prevent viruses exploiting the same vulnerability from successfully infecting the host, but will permit newer Conficker variants to update the existing infection.
-Conficker makes further in-memory patches which are designed to prevent products which may threaten Conficker from retriving updates from the internet by preventing specific domains from resolving. Conficker also attempts to disable any patches or anti-virus software it is aware of currently running on the host.
-Conficker will then proceed to make regular attempts to propagate across the internet or the local area network via the method described above.

In its current form, Conficker is not an especially great threat. The only particularly malicious behavior exhibited by Conficker is its attempt to terminate and block anti-virus like software. The part of Conficker that has everyone so concerned is its built-in update mechanism.

Conficker was designed to be easily modified by its authors. On April 1, Conficker C will make its first attempt to retrieve new instructions from its author. Conficker C searches for new instructions from its masters in the following fashion:
-Conficker C will generate a list of 50,000 domain names, comprised of random strings, based on certain factors common to all Conficker infections,to which one of a possible 116 TLDs will be appended. 500 of these will then be selected by Conficker to check for new instructions.
-Each domain will be contacted by Conficker. If it finds a Windows binary is available from one of the domains, it will download, validate, and execute the update package.
-This process will be repeated every 24 hours.

Confickers update mechanism is extremely robust and well protected. It would seem its authors designed it speciifically to be invulnerable to attempts by those other than themselves to make available an update that, say, shut Conficker down. I won't go into the specifics here, but you can read them from the third paragraph of "Implications of Variant C" here.

It is a simple fact that there is indeed no telling what may become of Conficker thanks to this update mechanism, but I find it difficult to imagine an update bringing about the apocalypse as is predicted by many in the media. That said, I do advise everyone to keep their eyes peeled for any signs of Conficker on machines they maintain. I intend to keep this thread updated with news of any updates, should they be released, and I look forward to discussion.

Finally, please see this page at the Internet Storm Center for a listing of removal tools and instructions.

Ehtyar.
404
Living Room / Re: Tech News Weekly: Edition 12-09
« Last post by Ehtyar on March 30, 2009, 03:56 AM »
Woohoo, retardedness on the roll. Thanks again ewe.

Ehtyar.
405
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 30, 2009, 03:54 AM »
Thanks for clearing up my retardedness ewe. Would you believe that up until perhaps 2 hours ago I actually thought conficker was called conflicker. I've written it so on this forum at least a half dozen times and you're the first to call me on it, thank you.

I like the look of Clusty, will definitely give it a go.

I like your alternate headline :Thmbsup:

Ehtyar.
406
Site/Forum Features / Re: Update Your Browser! It's Obsolete!...
« Last post by Ehtyar on March 30, 2009, 03:49 AM »
But of course Joshua (though I suspect you mean evulklown). That is a bit of an inside joke though, and colossal asshat is just a little more fun to say :P

Ehtyar.
407
I also have a portable 500gb hard drive. It has virtually everything on it, because I can't stand finding myself without something when I need it. Not sure what I'd do if I didn't have my portable drive.

Ehtyar.
408
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 29, 2009, 11:43 PM »
It occurs to me that Google trying to make your results more relevant based on what you've searched for in the past would require cookies. I block cookies. Do either of you (Goth Man and J Man) block them also? If so, perhaps our bad experiences with Google are related to Google not being able to "improve" our results based on our past searches (not that those circumstances would give me even the slightest pause in eventually moving to another primary search engine).

Ehtyar.
409
Site/Forum Features / Re: Update Your Browser! It's Obsolete!...
« Last post by Ehtyar on March 29, 2009, 05:23 PM »
When reading Joshua's posts on DC, one must keep in mind his status as a colossal asshat <3 Joshua :Thmbsup:

Ehtyar.
410
General Software Discussion / Re: Tiny PPT Viewer? (That is not Microsoft...)
« Last post by Ehtyar on March 29, 2009, 05:16 PM »
Something wrong with OOo Impress? Instructions for portable here.

Ehtyar.
411
Site/Forum Features / Re: Update Your Browser! It's Obsolete!...
« Last post by Ehtyar on March 29, 2009, 06:24 AM »
No offense intended, but Yuk!! Not only is that bar at the top of the screen awful, but what the hell is IE doing on that site featured so prominently, with the other (read: better) browsers displayed to such a lesser extent, not to mention the complete lack of Opera, Chome et al. And what of the plethora of users unable to update their browsers because they're visiting on machines they don't have administrative access to?

Ehtyar.
412
You could add a noindex tag to the https pages, I'd imagine you can do that in the template somewhere.

if (!empty($_SERVER['HTTPS']))
    echo '<meta name="robots" content="noindex,nofollow" />';

Ehtyar.
413
Living Room / Re: Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 28, 2009, 08:19 PM »
IMO this headline is a little sensationalist, but I'm not the first on this forum to say that I'm finding Google's results to be less and less relevant as time goes on. Perhaps they've noticed too...

I've actually already had it happen on numerous occasions that I couldn't find ANY relevant information with google at all, but altavista did. Usually when you're looking for more unpopular/obscure stuff. I'm not a fan of google nor altavista. I find the altavista results in general worse, but for some reason every once and a while it does better with obscure searches.


You are to whom I was referring Goth Man, but I can't find the actual quote. I didn't respond to the first instance of you saying that because I didn't want to threadjack, but you're right on the money :up:

Ehtyar.
414
General Software Discussion / Re: Compliment-FF 3.0.8 is up
« Last post by Ehtyar on March 28, 2009, 07:12 PM »
He's probably complimenting them for patching their latest vuln so quick.

Ehtyar.
415
Living Room / Tech News Weekly: Edition 13-09
« Last post by Ehtyar on March 28, 2009, 07:05 PM »
The Weekly Tech News
TNWeekly01.gifHi all.
No meta-news this week. Enjoy :)
As usual, you can find last week's news here.


1. Worm Breeds Botnet from Home Routers, Modems
Spoiler
http://www.theregister.co.uk/2009/03/24/psyb0t_home_networking_worm/
http://www.darkreading.com/security/attacks/showArticle.jhtml?articleID=216300413
With the plethora of insecure router firmware, it was only a matter of time. psyb0t is the first code found in the wild exploiting consumer networking equipment, but it effects only device that run Linux Mipsel.

Security researchers have identified a sophisticated piece of malware that corrals consumer routers and DSL modems into a lethal botnet.

The "psyb0t" worm is believed to be the first piece of malware to target home networking gear, according to researchers from DroneBL, which bills itself as a real-time monitor of abusable internet addresses. It has already infiltrated an estimated 100,000 hosts. It has been used to carry out DDoS, or distributed denial of service, attacks and is also believed to use deep-packet inspection to harvest user names and passwords.


2. Aussie Classification Site Hacked in Censorship Protest & Australia Denies List Leaked
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/australian-classification-board-web-site-gets-pwned.ars
http://www.theregister.co.uk/2009/03/26/aussie_hack_censor/
http://www.linuxinsider.com/story/66573.html
It appears Australia's hacking community is not a fan of their Government's proposal to censor the internet and they've made it known by defacing the website of the department responsible for maintaining the list.
In related news, the Government has, since the initial release of the list, denied it is the list intended for use in censoring the internet.

The Australian government agency charged with classifying movies and video games has reportedly been hacked in protest of the nation's controversial ISP-level Internet filtering scheme. The culprits replaced the website's introductory text with a comical message which characterizes the government's censorship program as an attempt to "control and sheepify the nation."

In the all-important war against pictures of boobies on the Internet, the government of Australia has spared no expense. In 2006, after conducting a study which determined that ISP-level filtering was not feasible, the nation spent $116 million to develop Internet filtering software that parents could install on computers. When this software was easily circumvented by children, the government decided to try again with an $89 million ISP-level filtering scheme based on a blacklist devised by the Australian Communication and Media Authority (ACMA).


3. Firefox Exploit Sends Mozilla Into 'High-Priority Fire Drill' Mode
Spoiler
http://www.theregister.co.uk/2009/03/26/new_firefox_exploit/
An arbitrary code execution exploit against all supported versions of Firefox has caused Mozilla to rush out a patch. Version 3.0.8 is available for auto-update now.

Mozilla's security team is rushing out a fix for its flagship Mozilla browser following the public release of attack code that targets a previously unknown vulnerability.

The exploit was released Wednesday online. It attacks a vulnerability present on Windows, Mac and Linux versions of the browser and could be used to surreptitiously execute malware on the machines of users who browse booby-trapped websites. The flaw is classified as a boundary condition error that targets Firefox's XML parsing features according to SecurityFocus.


4. Leaked Memo Says Conficker Pwns Parliament
Spoiler
http://www.theregister.co.uk/2009/03/27/conficker_parliament_infection/
According to an allegedly leaked memo, the British House of Commons computer system has been infected with Conficker.

The House of Commons IT systems has reportedly been infected by the infamous Conficker superworm, which has previously infected millions of Windows PCs and affected the operation of hospitals, military and large corporate systems.

Political blog Dizzy Thinks first reported that a memo sent out to parliamentary IT network users on Tuesday night warned that Conficker had disrupted the operation of parliamentary systems.

The infection has reportedly prompted a clean-up operation as well as a temporary ban on the use of mass storage devices, including MP3 players, on parliamentary systems.



5. Researchers Poke Holes in Super Duper SSL
Spoiler
http://www.theregister.co.uk/2009/03/28/ev_ssl_spoofing/
It has been revealed that EV SSL certificates are also vulnerable to man-in-the-middle attacks, as standard SSL certificates are, due to a flaw in the SSL implementations of browsers.

Websites that use an enhanced form of digital authentication remain just as vulnerable to a common form of spoofing attack as those that use less costly certificates, two researchers have found.

Previously, so-called extended validation secure sockets layer certificates (or EV SSL) were believed to be immune to man-in-the-middle attacks, in which an interloper on a hotel network or Wi-Fi hotspot sits between an end user and the site she is visiting. When researchers demonstrated one such attack in December, SSL issuers proudly proclaimed that the more expensive EV certs were impervious to the technique.


6.  Google's Tweaked Search Results May Keep Us Googling Longer
Spoiler
http://arstechnica.com/web/news/2009/03/googles-latest-changes-help-users-keep-them-longer.ars
IMO this headline is a little sensationalist, but I'm not the first on this forum to say that I'm finding Google's results to be less and less relevant as time goes on. Perhaps they've noticed too...

Google's search results pages are continually being refined to better fit people's search habits. The latest updates come in the form of longer result descriptions and an expanded list of related searches, which Google says should "help guide users more effectively to the information they need."

Those who use Google on a daily basis know that the handful of words thrown at you when you perform a query aren't always enough to help you decide whether a link is worth clicking. That's why Google has decide to expand the text descriptions offered with each result, with the keywords of the query highlighted in bold. The search giant says this works best with long, detailed queries.


7. German Cops Raid [Home of] Wikileaks [Associate] After Internet Blacklist Posted
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/german-cops-target-wikileaks.ars
German police have raided the home of a man associated with Wikileaks under a warrant written for "distribution of pornographic material", believed to have been catalyzed by the release of the Australian censorship list on Wikileaks.

German police on Tuesday raided the homes of Theodor Reppe, owner of the German domain for the controversial whistleblower site Wikileaks. According to Wikileaks itself, police told Reppe he was targeted because of his links to the site, and official documents indicate the search was meant to uncover evidence of "distribution of pornographic material." Though Wikileaks itself doesn't host porn, site administrators believe the impetus for the raids may be their recent publication of a secret Australian blacklist of banned sites, which includes the URLs of numerous sites that host child pornography.

Police in both Dresden and Jena appear to have coordinated in simultaneous searches of Reppe's residence, and asked him to turn over passwords associated with the Wikileaks.de domain, which they reportedly hoped to disable. But Wikileaks says that Reppe, who also hosts a popular server for the anonymous Tor routing network, is not actively involved with its operations beyond holding the registration for the .de domain and mirroring an archive of Congressional Research Service reports released by the site earlier this year.


8. Google Searches for Holy Grail of Python Performance
Spoiler
http://arstechnica.com/open-source/news/2009/03/google-launches-project-to-boost-python-performance-by-5x.ars
Discussion thread by 40hz: https://www.donationcoder.com/forum/index.php?topic=17636
Google are porting the Python script interpreter (CPython) to the LLVM (Low Level Virtual Machine) library in the hopes that will provide a significant performance improvement.

Google's Python engineers have launched a new project called Unladen Swallow, which aims to bring a major performance boost to the Python programming language by making runtime speed five times faster. The project is being implemented as a branch of the conventional CPython runtime and will be fully source-compatible with regular Python applications and native extensions. This will make it possible to eventually merge the improvements into Python trunk.

The goal of the Unladen Swallow project is to use LLVM, the Low Level Virtual Machine compiler infrastructure, to build a just-in-time (JIT) compilation engine that can replace Python's own specialized virtual machine. This approach offers a number of significant advantages. As the developers describe in the project plan, the project will make it possible to transition Python to a register-based virtual machine and will pave the way for future optimizations.


9. The Pirate Bay to Roll Out Secure €5 Per Month VPN Service
Spoiler
http://arstechnica.com/telecom/news/2009/03/the-pirate-bay-to-roll-out-secure-vpn-service.ars
The Pirate Bay will soon go public with a service, called IPREDator, that allows users to cover their tracks when torrenting with a secure VPN for €5 (USD $6.6) a month.

The Pirate Bay is planning to launch a paid VPN service for users looking to cover their tracks when torrenting. The new service will be called IPREDator, named after the Swedish Intellectual Property Rights Enforcement Directive (IPRED) that will go into effect in April. IPREDator is currently in private beta and is expected to go public next week for €5 per month.

IPREDator is clearly a response to the introduction of IPRED in Sweden, which will allow law enforcement and copyright holders to request the personal details of suspected infringers. The copyright holders will then be able to make direct contact with the accused users and presumably threaten them with lawsuits.


10. Security Fears Spark Linux Drive in Iran
Spoiler
http://www.theage.com.au/articles/2004/09/21/1095651288238.html
The Iranian Government has switched exclusively to Linux.

Iran has become the latest country to edge towards ditching Windows in favour of Linux, even if its refusal to abide by copyright laws means that the country does not pay a penny to Bill Gates.

According to Mohammad Sephery-Rad, the man in charge of the government's computer systems, long-term political and security considerations have sparked a major initiative to make the switch.



Ehtyar.
416
Living Room / Re: Anti-Necrospamming
« Last post by Ehtyar on March 26, 2009, 11:09 PM »
IMO closing old threads is not a good idea. April put it as I might've. But I'm all for Mouse Man's idea.

Ehtyar.
417
Living Room / Re: Steamworks Makes DRM Obsolete?
« Last post by Ehtyar on March 25, 2009, 08:20 PM »
They could've used watermarking to compliment any DRM scheme they've used in the past which they never did. I really don't understand why, given all their efforts thus far have led them to a dumbed-down less-effective version of watermarking.

Ehtyar.
418
Living Room / Re: Steamworks Makes DRM Obsolete?
« Last post by Ehtyar on March 25, 2009, 07:55 PM »
I can't imagine them getting through this even remotely unscathed. I imagine unwrapping this will be no more difficult than unwrapping the protection they've been using up until this point.

Ehtyar.
419
It's extremely difficult, if not impossible to find objectivity and true journalism in mass media. Television and (most) of the newspapers are out at the start. I've found you tend to hear about a lot of things on radio that isn't published elsewhere (particularly bad moves by the government, however small), but a lot of the bigger stations tend to have a pretty blatant political preference which naturally colors a good portion of the stories they run.

It sounds lame, even to me, but it is my hope that eventually online services such as twitter and regular blogs will take over from the media, and the people will start reporting the news. I'd be interested to hear what people thing of everyday citizens being the journos of the future.

Ehtyar.
420
Living Room / Tech News Weekly: Edition 12-09
« Last post by Ehtyar on March 22, 2009, 04:52 AM »
The Weekly Tech News
TNWeekly01.gifHi all.
Sorry for the short one this week folks, there just wasn't enough stuff to fill the usual 10 slots but I hope you like the choices this week :)
As usual, you can find last week's news here.


1. New DNS Trojan Taints Entire LAN from Single Box
Spoiler
http://www.theregister.co.uk/2009/03/16/dns_hijacking_trojan/
http://arstechnica.com/security/news/2009/03/new-version-of-dns-server-trojan-flushm-spotted-in-the-pipe.ars
Not entirely new per-se, but certainly improved. A recently discovered variant of Trojan.Flush.M is running amok, poisoning the DNS of machines connected over LAN via establishment of a rogue DNS server.

Internet security experts are warning of a new rash of malware attacks that can hijack the security settings of a wide variety of devices on a local area network, even when they are hardened or don't run on Windows operating systems.

Once activated, the trojan sets up a rogue DHCP, or dynamic host configuration protocol, server on the host machine. From there, other devices using the same LAN are tricked into using a malicious domain name system server, instead of the one set up by the network administrator. The rogue DNS server sends the devices to fraudulent websites that in many cases can be hard to identify as impostors.


2. Air France Trials Biometric Boarding Cards
Spoiler
http://www.theregister.co.uk/2009/03/19/france_fingerprint_cards/
Airline Air France is trialling a new boarding pass system that uses RFID coupled with fingerprint ID to permit automated boarding of aircraft.

Air France has started trialling RFID-equipped smartcards which store passenger fingerprints to allow automated boarding.

The card contains an encrypted version of forefinger and thumb prints. It can be used at a dedicated gate, which checks the card, compares it to the passenger's finger or thumb print and, assuming the dabs match, opens the gate.


3.  Intel CPU-level Exploit Could Be Tempest in a Teapot
Spoiler
http://arstechnica.com/security/news/2009/03/storm-over-intel-cpu-security-could-be-tempest-in-a-teapot.ars
http://www.theregister.co.uk/2009/03/19/intel_chip_vuln/
http://www.internetnews.com/hardware/article.php/3811311/Researchers+Warn+on+Security+Flaw+in+x86+Chips.htm
A flaw in Intel's recent CPU designs could allow code to be executed with System Management Mode privileges, which would make it practically undetectable by any current form of antivirus scanning.

Johanna Rutkowska of Invisible Things Lab has been making headlines ever since she announced her development of a seemingly undetectable rootkit she dubbed "Blue Pill." While that project is now defunct, Rutkowska has continued her research into hardware virtualization technology. Her more recent efforts have focused on Intel platforms and the company's Trusted Execution Technology; Intel released a BIOS update to fix several security vulnerabilities Invisible Things Lab discovered back in August of 2008. On Thursday, March 19, Rutkowska and fellow team member Rafal Wojtczuk released details of yet another Intel-focused exploit—is the CPU manufacturer's security sandbox not up to snuff?

Before we discuss the flaw in particular, let's take a quick moment and review the ring security model. The term "ring" refers to protective rings that encircle the OS kernel. Ring 3 (defined as "Applications" in the diagram below) is where users and programs should spend the vast majority of their time. Applications should never need access to Ring 0 or kernel mode, as it amounts to writing the application a literal carte blanche to modify, change, or delete anything it wants. One of the features Intel's Vanderpool (VT) technology offers is the ability to virtualize an OS starting from what we might call "Ring -1." An OS launched from Ring -1 can therefore run its own Ring 0 operations and is more effectively sandboxed from the host operating system.


4. EFF Shines Sunlight On Docs It Has "pried" from the Feds
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/its-sunshine-week-a-nonpartisan.ars
The Electronic Frontier Foundation has scanned and made available online all documents it has retried through FOI requests from the government as a part of Sunshine Week 2009, a call for greater government transparency.

It's Sunshine Week, a nonpartisan celebration of (and request for) government transparency. Most of transparency concerns aren't technical in nature—open meetings and open records law are two of the biggies—but the Electronic Frontier Foundation's contribution to Sunshine Week looks to be a boon to tech journalists and advocacy groups.

The EFF has put its entire archive of government documents online. These have been "pried loose from secretive government agencies" through Freedom of Information Act requests and lawsuits over the years, but EFF has scanned and indexed all of them, then created a custom search engine to make browsing or digging much easier.


5. First Rule of Internet Censorship: Hide the Block List
Spoiler
http://arstechnica.com/tech-policy/news/2009/03/first-rule-of-internet-censorship-hide-the-block-list.ars
Discussion started by Ehtyar: https://www.donationcoder.com/forum/index.php?topic=17511.0
A list of soon-to-be-blocked websites for Australian Internet users has been leaked to the public by an insider from the Australian Communications and Media Authority.

Australia's telecom regulator, the Australian Communications and Media Authority (ACMA), has the authority to blacklist Internet sites, authority used almost exclusively to address childhood sex pictures (children's rights groups don't like the "child porn" label, which suggests a degree of agency that children involved in the practice don't have). But it also came to light recently that ACMA is willing to blacklist pages that simply list the censored websites, even though they contain no offensive images.

The Sydney Morning Herald noted today that ACMA's blacklist even includes certain Wikileaks pages, including a list of Denmark's censored websites (3,863 blocked). The page is apparently included on the theory that a massive list of sites with "lolita" and "youngyoung" in the their domain names is basically an invitation to Australians who might not otherwise know where to go to get an underage fix.


6. Browsers Bashed First in Hacking Contest
Spoiler
http://www.securityfocus.com/news/11549
Most of the major browsers were first to fall in the Pwn2Own hacking contest, with Google Chrome the last man standing after the first day of hacking.

Miller — a principal analyst at Independent Security Evaluators — found two flaws in Apple's Safari Web browser more than a year ago and prepped the easier-to-exploit issue for last year's competition, he said. Following an announcement that this year's contest would focus on browsers as well as mobile devices, Miller more fully researched the leftover security flaw and found that it remained exploitable.

"I found this bug ... last year, but like all good researchers, I sat on the issue," he said after being declared the first winner.

Following Miller's reprise, a computer-science student from Oldenburg University in Germany captured a pint-sized Sony Vaio computer and his own $5,000 by exploiting a previously unreported vulnerability in Internet Explorer 8. The student, who would only give his first name "Nils," declined requests for an interview until he also had a chance to attack the other browsers as well.


7. What IBM Might Gain by Buying Sun Microsystems (Thanks 40hz)
Spoiler
http://arstechnica.com/business/news/2009/03/report-ibm-eyes-sun.ars
http://www.linuxinsider.com/story/Sun-IBM-Deal-Just-Doesnt-Add-Up-66534.html
It appears Sun Microsystems has been looking to sell up with their books in poor shape, and IBM has apparently taken an interest. Hopefully 40hz will weigh in with his opinion, as he has an interesting opinion on the subject.

A report in today's Wall Street Journal claims that Sun's execs have been shopping the company around recently and that IBM is an interested party. The report indicates that if the talks between the two companies go well, a deal could be announced fairly soon. The number allegedly being floated by IBM is $10 to $11 per share for Sun, which would put the total size of the deal at $8 billion.

Assuming that IBM is actually interested in buying Sun, the obvious question is "why?" There is a ton of overlap between the two companies' product lines, so it's hard to see a lot of complementarity there. In fact, such a deal would seem overwhelmingly to be about one thing for IBM: shrinking the competition. Suns execs would pocket fat bonuses, and the former Silicon Valley high-flyer would be chopped up and absorbed into the belly of the Big Blue beast. Parts of Sun's business with no volume and hence no real future in the present market (things like the SPARC processor family) would be end-of-lifed, while some software assets and other IP could be picked up and used by IBM.


8. Boffins Sniff Keystrokes With Lasers, Oscilloscopes
Spoiler
http://www.theregister.co.uk/2009/03/19/keyboard_sniffing_demo/
Security researchers continue to develop less obtrusive methods of keylogging. One method uses a laser microphone, the other reads electrical pattern changes effected by keystrokes.

CanSecWest Researchers have devised two novel ways to eavesdrop on people as they enter passwords, emails, and other sensitive information into computers, even when they're not connected to the internet or other networks.

Exploiting vibrational patterns and electromagnetic pulses that emanate with every character entered, the Italian researchers are able to remotely sniff keystrokes from significant distances. The techniques use inexpensive equipment and can be hard for targets to detect, making them ideal for snooping on unsuspecting people in the office or building next door.



Ehtyar.
421
Living Room / Australian Internet Censorship List Leaked
« Last post by Ehtyar on March 18, 2009, 11:00 PM »
Sorry for such a random update people, but this was just too juicy for me to wait for Tech News Weekly for.

As those of you who read Tech News Weekly are aware, the Australian government intends to implement an Internet censorship program based on a list of domain names or URLs that will be "filtered" (read: blocked) to Australian Internet users under the banner of "child protection". As one might imagine, those of us in the Australian community aware of the implication of such censorship are outraged beyond description.

Earlier today, news reached us that, like Thailand, Denmark and Norway before us, Australia has had its secret block list leaked to Wikileaks. This will, hopefully, be a major blow to the credibility of those crusading for implementation of this program, and will certainly be a source of incredible embarrassment to the Government and their corporate cronies.

Currently, most of the fuss revolves around the fact that the list includes some very unreasonable domains, including those belonging to abortion clinics and even a dentist surgery, but more importantly this breach makes available to everyone and anyone a hive of illicit and illegal material that it was originally designed to keep from us. I'll leave it to you to locate the list if you so wish, as it does contain some spectacularly objectionable material.

Please join me in congratulating the retarded Australian Government for being such ignorant and utterly irresponsible tossers, and for officially making said description known to the world in such a spectacular fashion :Thmbsup: :Thmbsup:

Ehtyar.
422
Living Room / Re: Free Hugs Campaign Video.. Wow.. A Must See..
« Last post by Ehtyar on March 17, 2009, 05:05 PM »
Wish I'd been at the QVB or Daling Harbour on those days, that would've been awesome.

YEAH AUSSIES!!!! (except cops and rangers)

Ehtyar.
423
Living Room / Re: Tech News Weekly: Edition 11-09
« Last post by Ehtyar on March 17, 2009, 03:10 PM »
Well...in a perfect world that may be true. But in the real world, Justice is neither blind nor unbiased; and a great many people and institutions are, in fact, very much above the law.

And that's pretty much the way it's always been throughout the history of human civilization.

 8)
+1

Ehtyar.
424
Living Room / Re: Tech News Weekly: Edition 11-09
« Last post by Ehtyar on March 17, 2009, 02:41 PM »
Unless they asked Hotmail and Gmail for permission to use their servers that way then they should be held liable for breaking the law.
Agreed, perhaps one might ask them why they didn't spam their own mail servers?

Ehtyar.
425
I'm afraid after reading it through a few times I still get lost in your explanation. My only recommendation is that all validation go server side, but I understand that that's not always an option.

Ehtyar.
Pages: prev1 ... 12 13 14 15 16 [17] 18 19 20 21 22 ... 50next