61 posts • joined Saturday 22nd January 2011 17:56 GMT
It is very much a different DocRoot for HTTP and HTTPS on this website, you get 404 on anything over HTTPS that works fine on HTTP.
It doesn't work that way.
But the US have a nice contract with the EU over data sharing anyway..
Could have been a nice money spinner for BSkyB, just redirect the DNS (hijack the DNS transmissions if need be) and drop the user to a page
"THIS WEBSITE IS BLOCKED, here have an advert"
That was my exact thought, if you are working from home you need an ISP that serves as "business class"
Not a race to the bottom residential ISP
Re: How bad can it be?
"Over 3 per cent of Facebook's CPU time is spent on sorting out privacy, Zuckerberg says."
"And that is 3% too much" He muttered forgetting his microphone was live
Re: How do people find time for all the admin?
I don't think so. I syced my Facebook list with my phone and all the infomation in there was wrong....
Re: I see trouble ahead......
That's buggy software that will cause that, teh application (most SIP applications do) should have an option to ONLY use Wifi data.
A UK school used RFID in the school uniforms
I wonder how that worked out
Nothing in this strikes me to have had "sophistication"
Automated scanners of vulnerable PHP/web applications have been around since god knows when. Uploading a PHP script that then does the DDOS isn't hard...
Re: A question to hackers or security people
It means that the attacker can execute code on your system, usually that code will just be a dropper. Meaning it communicates with a HTTP server and grabs a binary. Then it executes it.
Whatever you program that binary to do, the computer will do...
So if you create a piece of malware that allows for VNC access, the attacker will get that
Re: The Offence?
Torrents...you start giving out the smallest chunk of data you have downloaded to anyone else who wants it.
So if you download a torrent that the original uploader never uploaded more than 99% of, you are uploading that 99% of "failed download" to everyone else.
To these legal people, sharing parts of the content is enough to claim infringment.
Re: Some models even advertise their MAC address on the case of the device!
Every piece of networking equipment has a MAC address, this is a public bit of info (meaning this is broadcasted if you are in range/plugged into that network)
This is because network cards communicate to each other with their MAC addresses on a switched network. Not by their IP. OSI model..
The Wireles MAC is broadcasted with the SSID, this is how your wireless device CAN (but usually doesn't) see the difference between two AP's with the same SSID.
Re: Can more people
The normal internet has kiddie porn/drugs/etc on it. Do you not support this network.
Stop paying your ISP for connectivity then.
I don't know, it sounds like they might have had a development server with web access that used the production DB server
Terrible security managment.
SSL works on trust. If you can prove that you are the owner of google.com a CA will generate a certificate for it.
If you check your OS/Browser CA list you will see lot's of interesting already trusted CA's in there (including governments)
All it takes is for one of them to produce a certificate or give the gov the ability to generate certs and all your data can be decrypted by a MITM
This is possible without any "black box" that they want. The ISP can see connections from IP X to IP Y at Z date/time. This is no matter how encrypted the content is.
This is the same as the phone records.
So why do they need to snoop?
That domain is Null Routed (meaning its pointing to 127.0.0.1 or ::1)
The firmware is being served up from your box.
Drops and Cashers
They transfer the funds to some idiot who thinks he is working for their fake company, they say they have accidently overpayed them and they need to transfer some of the money via Western Union or Moneygram or another anonymous service.
They also sometimes just set up fake accounts with stolen identities.
Once things are inside the mail system there are two people who can open it, Her majesty the queen and yourself.
The police etc can only intercept post if it is sat in customs.
At their current level they struggle with these types of things. You have to take it into consideration when desinging.
That or you do them seperatly and glue them together
It is mostly used by internet miscreants now.
For some reason it's the fraudsters/spammers favourite way to communicate.
The email messages claim that the recipient has infringed copyright of DigiProtect Ltd and request payment of £1,665 – payable to ACS:Law – to prevent a threatened court action under the UK Copyrights, Design and Patents Act. The address for payment is adjacent to ACS:Law's former London offices.
Last time I checked, Greece isn't in the UK so the UK law they are using doesn't apply.... Some EU law does though
And how does that work to block phising attempts....
There is already a project which lists when data has been lost
>the US Chamber of Commerce and Bank of America reportedly hired the data intelligence company HBGary Federal to protect their servers and attack any adversaries of these institutions. In response, Anonymous hacked servers of HBGary Federal's sister company and hijacked the CEO's Twitter account.
That was because HBGary couldn't even secure their own servers enough before being able to give any advice for security....
I can't believe NATO haven't even looked into HBGary was "hacked" before they can call Anonymous a threat...
The way they have hired technical experts to help them with this makes it sound like all they have to go on is an IP address. They will have to spend more money to subpoena the service providers now...
I wonder how this would go as a small wardiving box
Which? Computing said: "It actually feels like part of the operating system. They also liked the way you can group messages into conversations. It said Hotmail's advertising is unobtrusive compared to rivals and it has good spam filters.
Hotmail has a horrible interface and the adverts are in the way.
The FON still shows the same external IP as accessing the website as the real account holder. For the police to access the account holders information they must contact BT and request details. Which at this point BT will supply both access lists for the real router and also the Fon router.
Thats not how the hidden volumes work. When you mount the outer "safe" volume you see the WHOLE of the encrypted space. So this means the oute volume + hidden volume. You have thresholds between the two where you can store files, once you go over the size of the outer volume you overwrite the hidden volume and break it.
Unless you mount the hidden volume you cannot see it. It is just a block of encrypted data that is contained within the outer volume.
It does sound like a lot of finger pointing and going "nanana you have problems too"
The way that something was patched a long time ago and they are releasing just sounds like they are trying to discredit the browsers. No code is 100% secure but most code isn't written by Microsoft...
Stupidity has no end...
It says that requirements on registration for checking ages is "not affective". What do they expect them to do? Ask for scans of your driving license, passport and birth certificate?
Most of the "children" on these sites just lie about their age anyway and there is only one way to stop it. That is through education. The same aswell goes with the privacy thing. The children should be educated about the dangers of the internet and be under supervision of their parents.
If it was a DDOS you would see a spike in traffic and also a spike in CPU usage. If it was a error in programming there is no increase in traffic but a spike in CPU usage. These usually identify what is causing it to happen.
Who runs their IT systems...
As much as people shout homophobia on this there are quite a few females that seem to think it is appropriate to have their display pictures on that sight wearing next to no clothing.
The same goes for the males aswell.
At my station if one train is late and the train that was supposed to arrive after that arrives before.
(Train A is late, Train B makes it to the station before A)
The boards show that Train A is on time, right up until Train B pulls into the platform. they then reset and show what train Train B actually is. A number of times this happened to me and I nearly got the wrong train.
My station also has lot's of downtime with their boards, they go through constant reboot loops (showing some nice configuration info on them)
IP is disabled but they are all controlled over serial. Im guessing the data comes through to a computer that then distributes it over serial to the boards.
Though legally they would be required to take applications from males they will probably bin it.
It's not like advertising that type of thing publicly is shunned. I've seen "Female Only" positions in the Job Centre.
What an absolute idiot.
This guy has videos on his Youtube account showing off his botnet. He also has admitted in another video that he is 15.
Im waiting for the FBI to arrive at his house now that his information is known. What has he gained from this? Not a sausage. Not even fame..
The credit cards wont be given to the marketing agency. This would a breach of many things and their merchant accounts would be removed.
Play.com doesn't store actual card numbers but an merchant token that allows them to process transactions. Even this if stolen is useless.
I think a lot of this song has taken inspiration from Youtube spoof videos.
The lyrics do follow the form of quite a lot of the parodies that are around, same aswell for the type of video.
What surprises/confuses me is that she is friends with people who can drive and at one point drives off in a car. She is 13. Also a lot of this seems to go around about "partying" on the weekend.
Partying at the age of 13 is quite a lot different...
"storage, processing and transmission of data"
That is what a router does, data is temporarily stored in memory, processed and then transmitted again. The key itself is stolen from the device which could also count as storage.
Just because it doesn't have 300GB doesn't mean data is not stored.
This tool is only in defence of HTTP flood. This is different to the majority of DDOS attacks that are used such as SYN Flood and UDP Flood which are higher up the protocol stack. They are both harder to detect too.
The dropping of packets is an interesting one though, that could help slow down some DDOS.
"We believe consumers will be more prepared to make purchases on .XXX sites, safe in the knowledge their payments will be secure"
Are they doing some uber duper vetting on websites before they allow them to have a domain. Do they require that penetration tests will be required on all parts of the website including the 3rd party payment processor?
I don't think so somehow...
- Facebook offshores HUGE WAD OF CASH to Caymans - via Ireland
- Microsoft teams up with Feds, Europol in ZeroAccess botnet zombie hunt
- Justin Bieber BEGGED for a $200k RIM JOB – and got REJECTED
- Review Bigger on the inside: WD’s Tardis-like Black² Dual Drive laptop disk
- Inside Steve Ballmer’s fondleslab rear-guard action