23 posts • joined 14 Dec 2011
Not new ,enterprising ,but not real smart ,doesnt make a profit ,exposes his companies IP to the opposition ,stupid ,will get caught and be taken through the ringer and either serve time or pay back lots of $ ,or both .
Most people have heard of the enterprising manager who hires subcontractors ( firm) to provide
a service to the firm he is employed in ,but he actually owns ,or his wife or cat and then gets caught ,
goto : above & line 2.
Linux Benchmark AMD fx8350 whips the Intel i7 Extreme
So what does this make the ms winbloze operating system ?.
And wheres the linux benchmarks ,as the specs show ,the amd has it all over the intel processor ,in theory ,so it must the piece of crap winbloze operating system .
do the math !. and some linux benchmarks .
Re: Get attacks at SSH all the time...
open the address in a browser (mime) bet it still shows ssh server ...:) no matter what port it is open on.
sshguard is a better idea.
Most likely to be used on citizens ?,as what modern military doesnt have self healing high grade networks ,not above ground or in emp shielded environs?,with no cabling,or cabling that is not emp susceptible.
Used within a laser beam and it could be interesting,otherwise not.
1 - Dear Gov ,We ask permission for the sins we committed in the past to be now approved ,of course gov that letter of approval will be expedited by the (cough) copy of the quarantined gdrive we found behind the sofa ,,sent directly to you at a cost of ( in QLD dollars) of 1c per open network ..ahh.
2- Dear gov ,we are so glad you still support us in lobbying for all wireless router manufacturers to ship all routers in default mode,ie no protection.
Tanks a million
"governments that allow them the freedoms"
That sounds like an oxymoron to me.
Time to take the red pill.
ROFLING -along ,oxmorons stick together -like a gay marriage !.
Scotty beam me up .
Tin foil hat ( with lidar absorbing surface paint -available )paint gun with laser and lidar jamming ,lock onto drone ,blast it .
Summer job - Paint house with lidar absorbing material ,paint car ,paint everything - LOL.
Sales of lidar absorbing paint ---->
ether reality ..sniff :('
Now how did our border router wan interface move to promiscuous mode with those fake snmp controls,oh snmp must have been enabled with a blank write pwd,must look at that .
Self righteous arrr-holes,sitting there typing on your porn ridden pox boxes paid for by your mumma.
Bet you have piles from sitting on your arrs @t your help desk all day.
Lying in your beds many years from now ....& ...
They (you) may take our lives but they will never take our freedom....
"Alba gu bra"
Where did Linus quote this ,please provide .
Why would you do this ( except in a vm on linux) ,it would like trying
to mate a chevy with a volvo and see what pops out :).
PLS Fix It Redmond
As the OP mentioned most of the exploits are rehashed OLD ( 10 years +) ,yes the year 1985-2002.
Somewhat strange that MS hasnt heard of regression testing,and ffs normal release testing.
And due to the entwinement/entrapment of the OS with the stupid browser nobody uses anymore,
most of the bloated apps are affected by the exploits in a roll on affect.
For crying out loud the browser was the cause of most of the issues for the last 10 years ,remove it
or make it an add-on for those who need to use it :?.
Unless they get off on the media attention and mayhem of patch Tuesday .
Re: El Reg a bit slow
Must have the dirt first and then the tools first before you digg.
And what disclosure policy do you think they have ? ,its not like the public domain,and
its all after the fact by a lead time of 30 days at a minimum,if at all.
Much like the LTPT and the private keys previously lifted from the company that generated
and protected the keys,how many sites and secure areas do you think that affected ?,and
the question again is what was the disclosure period ?.
El Reg a bit slow
El Reg ,no mention of the fact that these hosting servers were also hosting cough SIO and Police Records .
Security 542 ( & 101) for the feds is required .
Although self righteous ,those anon crowd are making a point with the pathetic security of the publics
Most of the public service dont understand how the could works ...
Sack em .
All good ,most of the graphics controllers and bios chips for the last 10 years have them ,your in safe hands girls and boys ,:),for your own protection of course :(. ,now where was i ,thats it ,i lost my keys ,when i find them i can decrypt that spurious low level traffic that isnt firewalled .
Re: Tinfoil hats on standby...
had this resolution since the 70's...?
Thats an affirmative Houston ,foil hat also spotted and pin holed ....ROFL
Guiding missiles since 1968 ! ,accuracy 1m +- 0.38 inches.
Morpheus -Inside the matrix
pwned : Sad ! and apathetic.
With most of their hardware made in the ch ,and back doors being placed in this hardware
at board level since the 90's ,remember the motherboards and other hardware which flash installed a windows app ?,and that was 10+ years ago.
This places said ":green zone" equipment through a fw like a dose of the salts ,elimating any perimeter defenses.
What the blazes is the mil net doing near the www anyways ; | ffs
The game of misinformation is a good one ,and watch it being played is like a slow game of poker .
+1 ; Levente Szileszky
" Re: The National Socialist Pride Gap
The basic problem is that a PhD could mean a lot or nothing, it really depends on the subject "
We need to down greed and start manufacturing again ,other wise we will permanently transfer the skills and dollars offshore ,which is whats happening .
The Sauce be with you -Luke
Encrypt compile :hash ; yes .
Proprietary Siemens DTE lab required to determine proprietary payload ,without source or decompile availability.
AV vendors will have a time de-mangling encrypted code w/o said keys,even with a rs485 sniffer
on some of the end points.
If the AV vendor can disassemble the code,they can find out the author ,now who wishes this to happen ?,nobody ,so AV vendor wont ,all they can do is look for the network signatures,ie payload .
Most likely written and compiled on with the same proprietary platform that the siemens drive software is written,assembler derivative ,so that any other payloads which the av vendor,i doubt the av vendor knows what the payload is ,unless they have a lab full of siemens drives and controllers and the closed source code they are trying to work out .
Read proprietary compiler /;..and where did the authors get that from ? ,reeks of .
As with symantec the source is the key ,and if the av vendors have the source ,or they are playing dumb ?and have the source .....
I somewhat agree..
Subnet blocking can be required if you are running a service on a port ,most spi firewalls are set to block.,not very useful for half open connections and scans that are usually not done via the interested parties actual position /source country.
As anon mentioned $ billion of business are carried out with legitiamate CN businesses,most of which are external countries with MF bases in the CN.
Either way its hard to prove that it actually eminated from their subnet,although dns A' records
show it to some CN uni etc .
Where dns poisoning has been used in the past and a LOT of dns records showed ownership from cn suubnets ,doesnt mean cn were carrying out the attacks.
To accurately determine that ip is attacking your system requires more investigation and other parties involvement outside of your subnet.
Attacks appearing to be from the uk can be made via others in any country and vis versa,whether botnets are used or not .
Public internet needs a revamp on the old arpanet,isp's need to allow people to configure their service for in traffic and out ,some have gone this way as it does save the isp data $ as you mentioned ,and also protects the end point customer .
Most decent ' corporate services also provide this form of sla .
Cheers & Merry Christmas & NY .
So they have finally found these default passwords.
And what idiot put the plc & scada near a wan connection .
These devices like any system are prone to physical access issues
from someone with knowledge .
Layered security model required ,which includes physical security application & monitoring .
So what happened to SOX & COBIT for critical infrastructure in the US ?.
- Opportunity selfie: Martian winds have given the spunky ol' rover a spring cleaning
- Spanish village called 'Kill the Jews' mulls rebranding exercise
- Reddit users discover iOS malware threat
- Pics R.I.P. LADEE: Probe smashes into lunar surface at 3,600mph
- Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'