Re: the java angle....
But some javascript methods can trigger a native java context within particular browsers / configurations.
Or havent you discovered that with the latest revision of it?
257 publicly visible posts • joined 3 Mar 2010
The "happy as larry ecosystem"
Very much agreed --- "The fact that many developers do write awful code does not mean this is universally applicable."
Its interesting how it refers to the layers... of the OSI model? However this is different from knowing ITIL or other frameworks, which are (ab)/used commonly.
Doesnt cloud require hardware? even on a client and server side.
I guess an Operational Developer is better than a dysfunctional one though?
Fundamentally, I'd rather leave GPs out of my comment.
Aurora and RSA I believe had links with the TDSS (TDL) rootkit? Which ironically, Russian-based Kaspersky were the first AV company to make a tool to 'fix'
Night Dragon sounds similar to stuxnet style according to a whitepaper by Mcafee?
Whilst TitanRain, ShadyRAT sound like they go hand in hand? -- Like bugware would or Kryptik (which even sounds like a little russian gimmic?)
The chinese might use honeypots in order to identify threats to their networks (Provided they have sufficient HIPS and IDS solutions) --- I guess the great firewall of china was built for this purpose, perimeter control? --- Oh wait, it was to censure the population?
Next will the Arabic nations be to blame? Since I've noticed a trend of turkish / arabic groups on Zone-H.org?
AV is only as good as the heuristics it uses, its not a fully comprehensive security package!
Either way, It'll all seem to go in circles? :-/
How many will have upgraded or even noticed Quicktime 7.7.3 was released recently! New Apple TV and iOS revisions? with all this finger pointing at Java and Flash, since Apple kits are supposedly 'exempt' from vulnerability? --- the common fanboi attitude -- perhaps even a misconception?
At least Apple are trying to take a proactive approach! I'll give them kudos for that! But not for the prior TIFF bugs!
Although, He who throw stones in glass houses be a little silly? Since no company could ever be perfect and it is unrealistic to believe so. Issac Newtons law of gravity isn't it? Or is it Murphy's law?
Web services are usually easy targets, since theres the issue of 'upgrading the platform' but 'forgetting' to upgrade the code running through the platform to suit, so they rarely do either usually, unless its break-fixing, mainly due to service level agreements.
I severely doubt application layer/multi vectors or spoofing or poisoning attacks are any "new" tactic, but it would make, theoretically, logical sense to get the maximum bang for your buck in the "criminal underworld"?
DNS specs have changed considerably in the last 10 years and the invention of IPv6, this is why some networks have modified their servers for their clients 'stupidity' without knowing/measuring the full extent of their changes.
JRE is Java Runtime Environment (the interpretter), which can run on a number of devices, most commonly phones .e.g. JAR files, possibly even COD/ALX coded files? Just as SQLite appears to be a standard these days for phone databases?
Servers would, presumably, require the JRE in order to serve it to a client? :-/
I could think of some instances where upnp may be required, for instance two users within the same address space require using ports between the ranges of such and such for a certain amount of time.
What I believe this to mainly focus upon is explicitly external-facing devices. (which at least takes the remote out of the equation, but not neccessarily the local)
A good network admin should monitor and have something in place for this kind of unusual activity anyway! UPnP, and later variants: SSDP and HNAP/SOAP has been around long enough?
Its known as Peering issues
the Root AS nodes can sometimes drop routes between one another for various reasons e.g. maintenance ... it can also be a web cache issue, or a dns resolution issue between A and C with B being any node inbetween.
Try running (on the 'affected' machine) a traceroute to find the peer where it stops at, or an nslookup
If it returns a server failure on nslookup, the DNS server you are asking cannot request it (so check your machines DNS configuration and change it manually to the IP's of the dns servers you wish to query?)
DNS cache poisioning is usually where it redirects to a separate website, usually for malware.
Depending upon NAT routing and DNS Daemon type (relays/proxies for instance), depends on whether it resolves the DNS resolution internally or externally
Externally, this may not be possible? Else you may need to manually configure the config from the router (in Wordpad, since some formats are incompatible with notepad editing)
Classic! Agreeable,,,
"1.3GB encrypted file titled Warhead-US-DOJ-LEA-2013.AES256"
1.3GB x [DOJ / AES256(4seeds)] = Easy and quick for petaflops? (when given some thought)
The anomaly is... DoJ and Warhead don't usually fit, so thus DoD is irrelevant and speculative.
Though, I dont think they'd even be bothered with that route, they'd be more likely to catch 'em and demand the keys, else lock 'em up for longer! Somebody will cough up! >_<
Whilst we're all still alive and not in prison:
The system clearly failed in its design to 'rehabilitate' offenders... Because thats what it was designed to do?
It failed to identify a 'victim' to fund the charades... that was willing to take the case further...
It failed to convict a supposed offender, unless after his suicide / death counts? ...
It failed to add in any remorse for actions directly or indirectly of politicians or of those in power...
I wonder why he wanted to 'break rules' in the first place?
As the title reads... Just as never turning the machine on will eliminate all except for WAKE ON technologies.
Its true that... if you have no plan to use it, or need it, why is it installed... However lets be realistic... Its not half as bad as Adobe's issues given most users probably werent aware that 11.5.502.146 was released recently since code for prior versions went public... and could easily be blocked by decent AV heuristics... because it mainly targets JMX classes in java.
Now lets focus upon more pressing matters such as... nginx, IIS 8 and Apache 2.4.3 ... IE 7,8,9 and 10 connection handling overruns which result in a DoS... and can be performed remotely!
Simple solution is there, its been made...
This solves the issue with NAT'ing which is Directly unneccessary and hardly secured. DNAT versus SNAT
Now would someone please masquerade (oops, serenade) the 6-to-4 ... http://en.wikipedia.org/wiki/6_to_4
then they could assign us all ipv6 addresses without needing to affect anybody?
Theres one too many in the IT world, and elsewhere trying to get their leg over just to keep up with the jones' next door.
Americans on the other hand, this is not intended to offend, but can (yes CAN) tend to be a little OTT or overly dramatic as if its a religious calling.
What I believe is needed is more compassion within industry (notice industry and not commercial!), less 'one sided or unfair competition' and to put it simply, more morals and acceptance that every man has his vice, and that this is what selfish acts (particularly by government departments) can effectively lead to.
I wonder if they trust the right people to know what they're looking for in certain areas.... Since tradgedies such as this can result from what I call the 'leg humper' syndrome, particularly since nobody is perfect.
Are you sure it had the "apparent" Conficker-B infection in the DCIM.exe (backdoor.GENERIC) and Autorun (Downadup.B) files?
Given the vmx in the sys restore is infected under what appears to be a SERVICE SID... with Conficker.K variant?
Since some antiviruses have been known to report false positives, purely for certain MD5 checksums...
And the machine appears to have a newer variant? are you sure the machine isnt infected itself? or its an extremely mis-matching virus scan/signature?
It is not a kernels fault for driver development, not knowing which code this is reference to though...
ioctl() does exactly what it says on the tin...
input <|> output control...
You can't blame a kernel for shoddy driver development! I've seen many a dodgy driver code in my time due to exception handling being missed out or broken! some causing some right old mayhem for device and machine. Not exclusive to linux either!