Wednesday, November 10, 2010

Daughters Smelly Urine

ClamAV Security Essentials for Windows Avira AntiVir Personal

AntiVirus ClamAV is a free anti-virus scanner, developed by Clamav. Designed especially for email, however it is a file scanner that detects viruses, trojans, worms, etc ... Windows do not have protection functionality resident in the other resident systems operates with a multi-threaded daemon. It is multiplatform and multi.
http://www.clamav.net/download/

Platforms: Linux, Solaris, FreeBSD, OpenBSD, NetBSD, AIX, Mac OS X, and Windows (98/2000/XP NT / XP).

Top Funny Wedding Personal Inviatations

Waledac

Microsoft has released a desktop tool, free antivirus for users of Windows operating systems, Microsoft Security Essentials. This antivirus is easy to install and is updated automatically. Resident protection also has to block and eliminate various types of malware.
http://www.microsoft.com/Security_Essentials/

Platforms: Windows XP, Windows Vista and Windows 7.

Instructions Thermostat Programmable Noma



Avira Avira AntiVir Personal Edition offers a free desktop antivirus for personal purposes. Includes resident shield, protecting you from viruses, worms, Trojans, and has anti-phishing features and antidialer. Available in English and German.
http://www.free-av.com/en/download/1/avira_antivir_personal__free_antivirus.html

Platforms: Windows 2000/XP/Vista.

Thursday, November 4, 2010

How To Make A Computer Blueprints

expert believes that Stuxnet was created as a weapon for cyber warfare against Iran

Ralph Langner, a recognized expert in industrial security systems, has released the results of a study on the worm Stuxnet, which says there is a strong possibility that a nation has created the worm to attack an Iranian nuclear power plant.

Langner suspect the worm's only purpose is to serve as a weapon in a virtual war, which can be left without power an entire nation with just giving the order to the worm.

He speculated that the target of the worm is the Bushehr nuclear plant in Iran, which works with the Siemens program affected. Langner suspected technical problems suffered by the plant last year were caused by the worm Stuxnet. Moreover, the expert suspects that the large number of infections that have this country are because the attackers want to get to this plant.

The expert shares the suspicion that the worm is too sophisticated for him to have been created by a hacker ordinary, "this is not a simple pirate sitting in the basement of his parents. I believe that only one nation has enough resources to organize this attack. "

The main suspect of having developed the worm are the United States and Israel, according to Langner are two nations with more resources and motivation to attack Iran's nuclear plants.

"The attack combines an amazing amount of technical knowledge: just think of the number of unknown vulnerabilities exploited, stolen certificates, etc. This could only have been composed by a highly qualified team of experts, some with experience in control specific systems. "

Langner's study found that Stuxnet is not spyware, but a program designed to launch attacks to destroy and cause physical damage to systems with very specific settings Siemens.

"The problem is not Stuxnet. Stuxnet is history, "Langner said," The problem is the new generation of malware to come. "

Langner present the results of their study in a private conference in Maryland, to be attended by experts from Siemens.

Sources: The War Against Iran Has Already Started Forbes

Stuxnet Was Built to Attack Iran's Nuclear Program? PC World

Expert: WAS Stuxnet to sabotage Iran built nuclear plant
Cnet News




Wednesday, November 3, 2010

Pooping Lot Sign Pregnancy

A man may go to prison for attacking the sites that published their most shameful secrets

A man may go to prison for attacking the sites that published their most shameful secrets
A Kansas jury has convicted a man who formed a zombie network to launch denial of service attacks to magazines and newspapers published online articles that embarrassed.

Bruce Raisley, 49, issued a malicious program on the Internet in that it creates a botnet composed of 100,000 computers infected. The botnet was the sole purpose of launching a series of attacks denial of service (DDoS) at Rolling Stone magazine, The Radar and Perverted Justice, among others.

All these magazines had published an article about him in describing a virtual affair that ended up ruining his marriage.

all started with a fight between Xavier Von Erck Raisley and leader of the group Perverted Justice, which also belonged Raisley. Group members posing as minors to discover and expose pedophiles operating on the internet.

Raisley left the group after the fight and Von Erck retaliated by pretending to "Holly", a woman seduced him on the internet. Raisley came to love and trust both in Holly that he sent explicit photos of himself and decided to leave his wife to start a serious relationship with her.

But a woman did not appear when Raisley finally going to meet in person to his new love and went to meet her at an Arkansas airport with a bouquet of flowers. In its place was a photographer hired by Von Erck who documented the disgraceful situation.

Von Erck history published in the Journal of Perverted Justice and shared with other virtual magazines and media. This public humiliation was that his wife began divorce proceedings and Raisley lost contact with his son.

was why the hacker decided to attack the websites of the journals that published his story, an action that could make it happen 10 years behind bars.

Federal agents and Slovenia CERT found that the two domains in control of the malware were registered under the name of Raisley. Authorities searched the suspect's home and found a USB storage device with the malicious program used to create the botnet.

Still, Raisley pleaded not guilty and faced a six-day trial, but a jury of 7 women and 5 men found him guilty of the charges against him. The judge shall render its decision on 7 January.

Sources: Sex, lies, and botnets: the saga of Perverted Justice
The Register

Convicted Sex-sting target half sites of Attacks on Cnet News

Programmer Found Guilty for Creating Botnet DDoS Softpedia

Welcome Statements Examples

6 years in prison for a cybercrime that laundered the money stolen from Internet

6 years in prison for a cybercrime that laundered the money stolen from the Internet
A California man has been sentenced to six years in prison for participating in the criminal activities of a group cybercriminals steal users' bank data on the Internet.

Cesar Carranza, 28, admitted guilt in December and said he was responsible for laundering the money that criminals stole their victims.

Cybercriminals will send the stolen money to make him a virtual currency online payment system e-Gold. It stressed that the three owners of e-Gold have trouble with the law because they are accused of having managed a money transfer business without a license to do so.

Carranza, to the Internet using the name 'uBuyWeRush', gained notoriety in the world of cybercrime, and worked with cybercriminals Matsim well known as "Matksik" and Yastremskiy, which led to Albert Gonzales to launch virtual attacks largest U.S..

The criminal also increased its popularity in the forum for hackers, as CarderPlanet and Shadowcrew, and even became a trusted seller on these sites, which are now closed.

estimated Carranza helped launder about $ 2.5 million dollars stolen between April 2004 and November 2006.

Sources: Man Gets 6 Years for Money Laundering for Cyber-crooks eWeek

Macaron Cookies Recipes

Student of 17 years is responsible for having made known XSS vulnerability on Twitter Microsoft removes 281,491

17-year-old responsible for having made known XSS vulnerability in Twitter
A middle school student says he was the first surfer to discover and exploit Twitter XSS vulnerability affecting users when passing the mouse over the tweet altered.

Delphin Pearce, an Australian of 17 years known on Twitter as @ zzapha, said he discovered that he could insert JavaScript code in the tweets and began to publish codes of curiosity to see if we could exploit this vulnerability.

"I just did to see if they could do (...) if they really could execute JavaScript with a tweet," said Delphin.

Hackers exploit the vulnerability by showing pop-ups, offering spreading pornographic videos and tweets altered, which maddened the network for five hours until he managed to control the situation.

In theory, the vulnerability could be used to steal passwords from Twitter, but the javscript code had a maximum of 140 characters, as any tweet, so this did not happen and no major damage was caused.

Delphin said he had no malicious intent and did not know it would cause a big problem. "When I posted the tweet I had no idea he would expand so much. Had not even imagined, "said the young.

"I found a vulnerability, did not create any worm to replicate automatically. I have understood that it is not illegal, "said Delphin," I hope I get in trouble! ".

Rumor vulnerability had been discovered more than a month, but Twitter still had not patched. Moreover, some people doubt that Delphin was the first person to discover and exploit it.

Sources: Revealed: The 'hacker' who started the 'mouseover worm' That Took down Twitter - to 17-year-old Australian schoolboy Daily Mail

Australian 17-year-old Takes blame for chaos Twitter AFP

WAS
Twitter worm unleashed by 17-year-old Australian
Guardian Unlimited