31 Ağustos 2011 Çarşamba

Come have Coffee and Code in Vancouver with me and Microsoft tomorrow

So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.

I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures

I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?

What: Coffee and Code in Vancouver
When: April 8th, 2009 from 9am - 2pm
Where: Wicked Cafe - 861 Hornby Street (Vancouver)

indir com nod32 nod32 keyleri nod32 keyler nod32 key

Backdoor:W32/Zxshell.A

Backdoor:W32/Zxshell.A is a DLL file with an exported function ("Install"), which is called to install the backdoor.

eset nod32 güncel key indir com nod32 nod32 keyleri nod32 keyler

Lockdown-evading Chrome Frame exits beta

http://www.flickr.com/photos/mayhem/5100490087/

Google, after working for months on a version of its Chrome Frame that can sidestep PC lockdown constraints, has released the first stable version of the plug-in for Internet Explorer.

Chrome Frame embeds a version of Google's browser into older versions of Microsoft's browser. Chrome Frame shows Web pages using the Chrome engine when Web programmers have set a flag that the software checks for.

One problem with the approach is that the very people who most need the technology often are those who don't have enough administrative privileges to install a newer browser than, say, the decade-old IE6. Thus Google wrote a version of Chrome Frame that hops over the lockdown barrier.

nod32 turkce nod32 full indir nod32 full download full nod32 download

Facebook, now with more(?) privacy!

When logging into Facebook today, I was greeted with a new set of controls. In the wake of the apparent success of Google+, it seems that Facebook would like to reassure their user base that they too can control who sees what you post, and who you tag. You can now easily tag who you’re with, where you are, and most importantly; who can see your posts.

esed nod32 keys est nod32 key

Impressions: Digital Forensics with Open Source Tools

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Ice IX, the first crimeware based on the leaked ZeuS sources

After rumors about the supposed merger between SpyEye and ZeuS, and the public release of the source of the latter, it was logical that the range of possibilities opened up even more for new cybercriminals into the ecosystem of crimeware.

Consistent with this, it was only a matter of time for the emergence of new packages based on ZeuS crimeware, which is now realized. Ice IX Botnet is the first new generation of web applications developed to manage centralized botnets through the HTTP protocol based on leaked ZeuS source code.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

What has happened to DNS Security?

It was not so long ago we saw Google blacklist complete sets of subdomains such as the co.cc domains. (http://www.seroundtable.com/co-cc-google-removal-13644.html) These were known to be hosting malicious websites. About the same time, I also started to investigate new ways of identifying domains connected to malicious content by analyzing the DNS information.

During my research I simply performed AXFR checks on domains that looked suspicious, but I quickly noticed that it was not only machines hosting phishing sites that have weak configurations in their nameservers. Many government sites, and nameservers handling TLD (Top Level Domains), allow AXFR. This is not a vulnerability in itself, but the information collected from the nameservers can be very valuable for attackers.

AXFR is the opcode for DNS zone transfer, this is a type of DNS requests that will allow you as en external person obtain all DNS information for a specific domain. It is used for administrators to replicate the databases containing the DNS data across a set of DNS servers. This also allows attackers to obtain all DNS data for a specific domain

Targetted attacks and hacktivism has been a very hot topic lately. This has put some pressure on governments, organisations and many large companies. We have seen that security has become a higher priority within companies, but it seems that most focus is on the new and technical vulnerabilities, which have resulted in the fact that old and trivial vulnerabilities are being forgotten.

One of my first checks was to see how many of the top level domains out there actually support AXFR. I based my research on the IANA TLD list available at http://data.iana.org/TLD/tlds-alpha-by-domain.txt. To my surprise about 30% out of all nameservers handling TLD allowed AXFR.

güncel key nod32 full nod32

Announcing Elevation of Privilege: The Threat Modeling Game

I have had the pleasure over the past few months to spend some time playing with an early rendition of " Elevation of Privilege: The Threat Modeling Game". According to Adam, "Elevation of Privilege is the easiest way to get started threat modeling".  I couldn't agree more. If you have a team that is new to the whole process of threat modeling, you will want to check it out. If you are at RSA this week, drop by the Microsoft booth and pick the game up for free. If you aren't, you can download it here.

EoP is a card game for 3-6 players. The deck contains 74 playing cards in 6 suits: one suit for each of the STRIDE threats (Spoofing, Tampering, Repudiation, Information disclosure, Denial of Service and Elevation of Privilege). Each card has a more specific threat on it.  You can see a short video on how to play and some more information about the game by checking our Adam's post here. In the end, it is a game that makes it possible to have more fun when thinking about threats. And that's a good thing.

Even more impressive is that they have released the game under Creative Commons Attribution license which gives you freedom to share, adapt and remix the game. So you if you feel you can improve up this, step up and let everyone know!!   

Congratulations to the SDL team at Microsoft for creating an innovative way to approach the concept of threat modeling.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri

Will the FDA regulate social media? (Q&A)

CNET asks the new Digital Health Coalition why many pharmaceutical companies are afraid to venture onto Facebook, Twitter, and Google+.

esed nod32 indir nod32 nod32 güncel key nod32 guncel key

Backdoor:W32/Spyrat.D

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Malware Calendar Wallpaper for August 2011

Here's our malware wallpaper for August, highlighting some notable malware-related events from the past.

1280x800 | 1680x1050 | 1920x1200 | 2560x1600

indir com nod32 nod32 keyleri

Expect to Hear "IDS Is Dead" (Again)

nod32 key esed nod32 download nod32 serialleri esed nod32 indir

Backdoor:W32/Backdoor

A remote administration utility that bypasses normal security mechanisms to secretly control a program, computer or network.

nod32 guncel key eset nod32 guncel key eset nod32 güncel key indir com nod32

Exploit:W32/PDF-Payload.Gen

Exploit:W32/PDF-Payload.Gen is a Generic Detection for Portable Document Format (PDF) files that attempt to exploit vulnerabilities in the popular Adobe Acrobat Reader program.

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

New Chromebook, Old Flash Player

This week my Samsung Chromebook finally arrived. My interest in this platform had been especially piqued after my colleague Costin Raiu's excellent analysis following the Chromebook's introduction.

Google claims Chromebooks are so secure they don't need anti-malware. Such a statement obviously got me interested in the system's defenses.

Imagine my surprise when I was confronted with the following:

esed nod32 indir nod32

Check Out MANDIANT Job Postings

nod32 turkce nod32 full indir nod32 full download full nod32 download

How to Make Your Google Accounts More Secure

http://www.flickr.com/photos/notoriousxl/3030271346/

How to Make Your Google Accounts More SecureAbout a month ago I received an email from Blizzard Entertainment stating that a new World of Warcraft account had been started using my personal Gmail address. Someone with the user name of "Zhang" was hoping to do a little night elf adventuring using my data. I got on the phone with Blizzard right away, and they canceled the account faster than you can say Ogrimmar.

"Oh yeah," the Blizzard rep added, "you might want to change your Gmail password." I realized at that point that I'd been hacked, just like high-ranking U.S. officials were in June and just now, as Iranian citizens have been. There was a moment of horror as I realized what kind of private data someone with access to my account could find about me.

For many of us, a Gmail password is not just a Gmail password. It's a passport to our Google Docs account, our AdWords campaigns, our personal Google calendars, Google Docs, and more. That's not to mention access to Gmail itself, through which someone can find tax returns, private email conversations, and other data to pull off identity or credit card theft. If you are using Google business apps, you risk damage to your company if staff members' accounts are insecure.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

The iPhone 5 might be thinner than the iPhone 4, and have it's volume buttons moved (Digital Trends)

Digital Trends - Tis the season for iPhone rumors and leaks, and today’s rumor is coming all the way from Greece. The website Greek-iPhone has what it believes to be the iPhone 5’s camera sensor. The new sensor flirts with a few of our preexisting rumors so even though it seems odd that Apple would lose a camera from a phone the story seems to check out.

esed nod32 antivirus nod32 turkce nod32 full indir nod32 full download

30 Ağustos 2011 Salı

TaoSecurity Security Effectiveness Model

est nod32 serial 64 bit nod32

Flying phishers: cybercriminals targeting frequent flyer miles

We wrote in our predictions for 2011 about cyber attacks that steal everything. In fact cybercriminals are interested in stealing all kinds of data, including the miles you accumulate in frequent flyer programs. Customers of Brazilian airline companies are being targeted by a flood of phishing messages whose goal is to steal customer’s accounts and their miles in the frequent flyer programs maintained by local airlines. The miles stolen from customers are becoming a new kind of currency among Brazilian cybercriminals and phishers, who can use them to issue tickets for themselves, sell tickets to other criminals or use them in barter schemes.

The attacks involve the sending of phishing messages in mass mailings that promise more points in a frequent flyer program or offer a supposed prize. In some attacks the customer is asked to re-register on a fake website:

"Register now and earn more miles in the frequent flyer program"

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Expect to Hear "IDS Is Dead" (Again)

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Apache squashes 'Apache killer' bug

http://www.flickr.com/photos/rustybrick/4954064745/

Maintainers of the open-source Apache webserver have fixed a severe weakness that attackers are exploiting to crash websites.

Flaws in Apache's HTTP daemon made it easy to crash servers using publicly available software released last week. The bugs in the way the HTTPD processed multiple web requests that involved overlapping byte ranges allowed attackers to overwhelm servers by sending them a modest amount of traffic.

An advisory on Apache's website said the bug, formally known as CVE-2011-3192 has been fixed in version 2.2.20. ?We consider this release to be the best version of Apache available, and encourage users of all prior versions to upgrade,? the advisory stated. "Active use" of the attack tool has been observed.

esed nod32 serial esed nod32 antivirus nod32 turkce nod32 full indir

Reflecting on our Windows 7 birthday party

So this week my buddy Charlie and I threw a Windows 7 party for the IT pro community in Vancouver, BC at the Microsoft office.

The office could only handle 80 people, and we simply had to turn people away. Sorry to those who weren't allowed to come. Many people came early, and hung out in the hallway even before they were allowed in.

With almost a 100 people in that hallway just out of the elevator, that hall was WARM. I felt bad for some of the people as you could tell they were overheating. But we weren't ready to let them in as we set up the rooms with different Windows 7 systems.

When we did open the doors it was a mad rush for everyone to get in where it was cooler and they could grab a cold one and cool down. Thankfully everyone was patient and polite. Thanks to everyone for that!

Once they got in, there were several different rooms that they could go hang out in. In one room, Charlie had brought a HP Media Touchsmart so people could experience the new multi touch functionality of Windows 7. Kerry Brown, a fellow MVP with experience in Windows shell, stayed in the room teaching people all the new shell features like Libraries, Jump Lists etc, and I am told schooled some admins on the nitty gritty of Power Shell. Good job Kerry! Thanks for helping out!!!

It was interesting as everytime I looked in that room, people were surrounded around the device playing with the TouchPack games and with Virtual Earth. It was interesting to hear my buddy Alan comment that his experience on his iPhone with multitouch, especially with Google Earth, was far superior to what he was seeing there. Maybe that is something Microsoft can take away from that. Of course, big difference on a 24 inch monitor and a small iPhone screen. But the point is well taken.

We had the biggest crowds when we did demos in the main presentation room. When I was presenting on DirectAccess security I had my good friend Roger Benes (a Microsoft FTE) demonstrate how Microsoft used DirectAccess themselves. Using the Microsoft guest wireless he connected seamlessly to Microsoft's corpnet, which allowed us to demonstrate the policy control and easy of use of the technology. I am told a lot of people enjoyed that session, with several taking that experience back to their own office to discuss deployment. Thats always good to hear.

Charlie impressed the crowd showing how to migrate from Windows XP and Vista to Windows 7. He demonstrated Windows Easy Transfer and Anytime Upgrades and took the time to explain the gotchas in the experience. He even had me demonstrate XP mode on my laptop so people could see how they could maintain application compatibility with a legacy Windows XP virtualized on Windows 7.

Of course, I had a lot of fun hanging out in the far back room. I got to demonstrate some of the security stuff built into Windows 7 like BitLocker, AppLocker and BitLocker to Go. I was even asked about Parental Controls which I couldn't show on my laptop since its domain joined, but was able to show on a demo box Roger had brought for people to play with.

Some of the more interesting things I helped facilitate was asking my buddy Alan to bring his Macbook in. He is a great photographer who works with Linux and OSX a fair bit, on top of using Windows. Actually, all the photos you see in this post were taken by him. Thanks for sharing them Alan!

Anyways, I convinced him to let us use his Macbook to install Windows 7. He reluctantly agreed, as you can see from the picture below when he was looking at the Snow Leopard and Windows 7 media together. :-)

We had a fair number of people crowd around his Macbook as he went through the process of installing Bootcamp and deploying Windows 7. Interestingly enough, it flawlessly converted that Apple hardware into a powerful Windows 7 system in about 20 minutes.

Charlie and I were REALLY busy. We had presented on different sessions in different rooms throughout the night. Actually, I very rarely even saw him except for a few times when he called me in to help out with a demo. Sorry we couldn't party more together Charlie. And my apologies to those that were looking forward to our traditional "Frick and Frack" show where we banter back and forth.

Many of you may not know that outside of computers, I am an avid indie filmmaker. Actually, that is giving me too much credit. I am an amateur cinematographer at best, who had high hopes that I would get a chance to film everyone's impressions throughout the party. Unfortunately, I was so busy presenting, I had almost NO TIME to get any film recorded. *sigh* Alan did get a snap of a rare moment when I actually caught someone on film.

Of course I can't complain too much. I had a great time getting to show all the neat features in Windows 7, and answering the tonnes of questions that people had.

Of course, when the night finally wound down, it was nice to close out the party and watch the Vancouver skyline change. When we were done, we had the opportunity to hang with our IT friends in Vancouver and bring in the birth of Windows 7.

I have several people I would like to thank for making the evening possible. Charlie and I couldn't have done it without the support of people like Graham from VanTUG, Jas from VanSBS and Roger from Microsoft. Speaking of Microsoft, I have to give a shout out to Sim, Sasha and Ljupco in the MVP team who helped us get through all the red tape to throw the party at Microsoft's office. And many thanks to Brent, Alan and Kerry for helping us out throughout the event. My thanks to all of you.

I hope everyone had a good time. And if anything, Charlie and I hope you learned something that will help you deploy and use Windows 7 in your organizations. Happy birthday Windows 7. Welcome to a new world without walls!

P.S. All the pictures you see here were taken by Alan and used with his permission. You can check out some of his other amazing work at bailwardphotography.com.

eset nod32 guncel key eset nod32 güncel key

Trojan:BASH/QHost.WB

Trojan:BASH/QHost.WB hijacks web traffic by modifying the hosts.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

You're LinkedIn's latest advertising star - didn't you know?

LinkedIn made a bad social advertising call, but we should know better than to trust social media...

(silicon.com - Sales & Marketing)

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

Nokia hack reveals developer details

The intrusion resulted in the attacker redirecting visitors to the Nokia Developer Community forum to a page berating Nokia for its server security.

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Startup tries to put sociability back into movies (AP)

In this publicity image released by flickme.com, Mitch Galbraith, CEO of flickme.com is shown at the companies' office in San Mateo, Calif. Digital movies might not yet have the equivalent of a theater experience, with roaring crowds chomping on popcorn, but they are getting more social. Studios have increasingly looked to social media and Facebook, in particular, as a distribution platform. The early inroads have been experimental, but social streaming is a bright new hope for a Hollywood looking to counter sagging DVD sales. (AP Photo/flickme.com)AP - Streaming movies might not yet have the equivalent of a theater experience, with roaring crowds crunching on popcorn, but they are getting more social.


esed nod32 indir nod32

Keeping up with the hackers (chart)

This handy chart provides a timeline of the computer attacks and hacks that have happened over the past few months.

nod32 full indir nod32 full download full nod32 download est nod32 serial

White House pledges new Net privacy approach

A White House aide says that the new approach, expected to be announced this fall, will feature "privacy law without regulation."

nod32 full download full nod32 download est nod32 serial 64 bit nod32

Why a post-riot social media crackdown is doomed to fail

Steve Ranger's Notebook: And why it would be a nightmare for all if it worked...

(silicon.com - Security)

nod32 full indir nod32 full download full nod32 download est nod32 serial

Apple files patent application to learn the sound of your voice

http://i.i.com.com/cnwk.1d/i/tim/2011/08/27/Screen_shot_2011-08-27_at_10.26.46_A

Apple, which recently filed a patent application for a technology to keep screens on mobile devices free of fingerprints, is upping the ante by filing for a new application that could keep you fingers from even touching the screen in the first place.

The application is for what Apple calls User Profiling for Voice Input Processing, which it describes as being able to identify your voice and understand complex commands. Need to make a playlist? No problem, just ask. Need to call your friend? Just say so. The patent application says all these commands are possible: play, call, and search. According to the application, it would allow the user to "find my most played song with a 4-star rating and create a Genius playlist using it as a seed."

Apple's interest in voice commands is not new. In April 2010, Apple bought Siri, a small company that created an app that let users operate their iPhone with voice commands. Apple is expected to deeply integrate voice navigation technology from Siri into the upcoming iOS 5.

nod32 guncel key güncel key nod32

Keeping up with the hackers (chart)

This handy chart provides a timeline of the computer attacks and hacks that have happened over the past few months.

nod32 keyler nod32 key esed nod32 download nod32 serialleri

Trojan:W32/Generic

A trojan, or trojan horse, is a seemingly legitimate program which secretly performs other, usually malicious, functions. It is usually user-initiated and does not replicate.

esed nod32 indir nod32 serial nod32 güncel keyleri nod32 keyleri güncel

Feedback from Latest TCP/IP Weapons School 3.0 Class

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Shady Ops

The ShadyRAT whitepaper spectacle coincided with the start of the Blackhat USA 2011 conference. While it was noted that AV vendors reliably detect related ShadyRAT downloader components, discussion of other components were absent. The downloaders vaguely mentioned in the report have been reliably detected by Kaspersky Lab products for years.

More information was provided later on another vendor's site. But whitepaper readers were left with only a dive into the high level data compiled by the attackers’ web monitoring components and no actionable information presented.

Meanwhile, over on the HBGary blog, the more interesting descriptions of the meat of the backdoor components and communications were discussed - something sysadmins can do something about.

We also added detection of this component and variants like it as Backdoor.Win32.Shady.a (Trojan-Downloader.Win32.Agent.szfj), which was actually used early 2011 and after several months, still active and detected only by Sophos.

This prolonged absence of detection is both acutely problematic and symptomatic of active, determined groups. These Shady backdoors are especially interesting for their style of covert communications with hidden messages appearing in HTML source text on both compromised and managed sites.

nod32 guncel key eset nod32 guncel key

The Weekly Round-Up: iPhone 5 theory frenzy and iPad competitors get real

Smartphone speculation and why Amazon could be a tablet winner...

(silicon.com - Hardware)

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Bejtlich Leading Session at IANS

nod32 turkce nod32 full indir nod32 full download full nod32 download

FTC commissioner calls for new 'do not track' approach

J. Thomas Rosch suggests ad networks could "answer under oath questions about their information practices" to create "do not track" whitelists and blacklists for the Web.

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

29 Ağustos 2011 Pazartesi

Impressions: XBox 360 Forensics

esed nod32 antivirus nod32 turkce

Impressions: Android Forensics

nod32 keyleri nod32 keyler nod32 key esed nod32 download

Backdoor:WinCE/PhoneCreeper.A

Backdoor:WinCE/PhoneCreeper.A provides unauthorized remote access to a mobile device.

64 bit nod32 esed nod32 4 nod32 esed nod32

BART tackles its 'Big Brother' moment

At hearing to discuss why transit authorities cut cell phone access during a protest rally, Orwell metaphors and hand-wringing rule the day.

nod32 esed nod32 indir nod32 nod32 güncel key

Trojan:W32/AntiAV

Also known as a trojan horse program, this is a deceptive program that performs additional actions without the user's knowledge or permission. It does not replicate.

est nod32 key esed nod32 serial

Is Twittering safe?

So Susan has been on my case about Twitter for some time now. In a recent round table we were recording she "beat me up" about it, and tonight on IM we had a good discussion about the REAL vs PERCEIVED risks in Twitter.

Susan's biggest complaint is that security minded individuals shouldn't be blindly recommending the use of Twitter without educating the user on 'safe-twittering'. I would say that same logic exists for setting up web pages, blogs and the use of social networking sites like Facebook.

She stepped that up a bit tonight when she blogged her discomfort in the fact the RSA Conference was recommending Twitter as well.

So in an effort to stop spreading the FUD about Twitter insecurity, I wanted to share some of my thoughts through a quick set of safe twittering rules.

@DanaEpp's 5 Rules of Safer Twittering


  • Never share information in a tweet that you wouldn't share with the world. You can never expect to take it back once it's on the Internet. Even though you can delete a tweet, 3rd party clients may still have it archived. If you feel you want to share private thoughts through Twitter, consider using a "Private Account" and limited it to only people you trust and want to share with. Of course, remember nothing prevents your friends from sharing your tweets with the world. So never share private information on Twitter. Ever. it's just easier that way.
  • There is no assurance that a Twitter account is the person you believe it is. Deal with it. Anyone can register an account if it doesn't already exist. As a real world example, for some time @cnnbrk was NOT an official CNN account, even though most of the Twitter world thought it was. It wasn't until recently that CNN bought the account from James Cox (the account holder) for an undisclosed amount of money. Another example is the fact that one of Susan's Twitter accounts was actually created by a fellow SBS MVP, and not actually her. :-)
  • Never click on links in a tweet, unless you trust the URL. If unsure, don't click! The worms that were used to attack Twitter came from people getting users to go to profile pages etc that they had control over for some interesting script attacks. With only 140 chars, its common to "shorten" the URL. Which means you might be clicking on a link blind. That's fine. But only trust shortened URLs that can be previewed BEFORE you go to it. As an example, my recommendation is to use something like TinyURL. However, here is the trick. When you create a TinyURL, use the preview mode. As an example, if you want to send someone to my blog you can use http://tinyurl.com/silverstr to go directly. However, if you use http://preview.tinyurl.com/silverstr it will stop at TinyURL.com and let the user SEE the link before they actually get to it. That is much safer. If using TweetDeck, select TinyURL as the provider, and when it creates the shortened url, simply add "preview." in front of "tinyurl.com".
  • Use a 3rd party Twitter client instead of using the Twitter.com website directly. I am a fan of TweetDeck and Twitterfon, but there are tons of different clients out there. Why? It is the lesser of two security evils as it relates to web based attacks in Twitter. Most clients have ways to reduce or turn off linking, prevents the script attacks in profile viewing and generally is just an easier environment to stay protected in. Are these clients free of attack? Of course not. But its another layer of defense. Of course... you need to have trust in your client. But that's a story for another day ;-)
  • You never know who is following you. Remember that. As you use Twitter more and more, you never know who might be watching. I recently had someone who has been trying to get an interview with me who follows me on Twitter, knew where I was having coffee one day because of a tweet I wrote (and it's geotag) and ended up coming down to confront me with his resume. Which was inappropriate in my books. But my own fault. I wasn't too concerned.. but it definitely gave me pause when considering my daughter uses Twitter and could be as easily found. Nothing like the potential of being stalked. GeoTagging makes it way to easy to find you. Remember that.

Look, Twitter is addictive. Simple. Short. Fast. A great way to see the thoughts of others you might care about. Ultimately though... like any other Internet based technology it has the potential to be abused... and put you at risk. No different than websites or blogs.

So be careful. Follow these rules and enjoy the conversation!

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

Defcon descends on Las Vegas

I'm here at Defcon watching the hacker masses share their information. As usual, it's incredibly crowded, but the new venue at the Rio hotel is a welcome upgrade. Las Vegas is as hot and crazy as ever. It's never a boring visit.

So far there have been some great talks, and I'd like to highlight a few favorites.

The talk by Moxie Marlinspike; "SSL and the Future of Authenticity" covering the shortcomings of the Certificate Authority system, was an eye-opening look into how broken this system is. As always, Moxie is an engaging and relevant speaker, and his solution is based around a distributed system with multiple authorities verifying the site you're connecting to. With a few kinks still to work out, it's an interesting idea, and certainly it's time to move away from the current model.

Another talk, by Daniel Garcia, called "UPnP Mapping" demonstrated an issue quite widespread on the internet. UPnP (Universal Plug and Play) is a interoperability system developed by Microsoft, with the idea that devices could added to a network with zero setup. It's never worked very well at best, and at worst, it can provide a remote party all sorts of information about your device from the Internet. Mr. Garcia demonstrated a tool where he was able to scan a network block, create a list of vulnerable routers, and then even issue commands. In some cases these routers could be used as an open proxy, or many other more malicious purposes.

esed nod32 key esed nod32 keys est nod32 key esed nod32 serial

Impressions: Android Forensics

est nod32 serial 64 bit nod32 esed nod32 4 nod32

Apple gives Tim Cook 1 million shares (AP)

AP - Apple has given Tim Cook 1 million shares of restricted stock as he takes over as reins of the company from Steve Jobs. At current prices, the stock package is worth more than $383 million.

full nod32 esed nod32 keyleri

Come have Coffee and Code in Vancouver with me and Microsoft tomorrow

So John Bristowe, Developer Evangelist for Microsoft Canada will be hosting a Coffee and Code event in Vancouver tomorrow from 9 to 2 at Wicked Cafe. Come join him and fellow Microsoft peers Rodney Buike and Damir Bersinic as they sit and share their knowledge over a cup of joe.

I will be there too, and will be available if anyone wants to talk about secure coding, threat modeling with the SDL TM or if you want to talk about integrating AuthAnvil strong authentication into your own applications or architectures

I do hope to see some of you there. And if I don't... I will be seeing you at #energizeIT right?

What: Coffee and Code in Vancouver
When: April 8th, 2009 from 9am - 2pm
Where: Wicked Cafe - 861 Hornby Street (Vancouver)

nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler

Backdoor:W32/Zxshell.A

Backdoor:W32/Zxshell.A is a DLL file with an exported function ("Install"), which is called to install the backdoor.

esed nod32 keys est nod32 key esed nod32 serial esed nod32 antivirus

Samsung supports Android, others with new ChatON service (Appolicious)

Appolicious - Samsung?s hedging its bets across mobile operating systems with its new instant messaging service ChatON. Based on its own software platform Bada, ChatON will come pre-installed on Samsung devices running on major platforms, including Android, BlackBerry and Bada. The messaging app also supports iOS devices, giving Samsung an expansive grab of the market. With smartphone sales exceeding Apple?s, Samsung could have a strong entry into this crowded space, as the handset maker hopes to further lure consumers to its devices.

indir nod32 nod32 güncel key nod32 guncel key eset nod32 guncel key

Spyware:Android/Flexispy.K

Spyware:Android/Flexispy.K is a commercially available monitoring program.

indir nod32 nod32 güncel key

Can any browser be considered 'safe'?

A recent NSS Labs report on browser security rates Internet Explorer versions 8 and 9 head-and-shoulders above Google Chrome, Firefox, Safari, and Opera for blocking socially engineered malware, but these results may be misleading.

esed nod32 4 nod32 esed nod32 indir nod32

Irene takes out some East Coast cellphone service (AP)

AP - Wireless networks fell quiet Sunday in some coastal areas of North Carolina and southern Virginia, but calls were going through in most areas affected by Tropical Storm Irene, the Federal Communications Commission said.

full nod32 download est nod32 serial 64 bit nod32 esed nod32 4

The Weekly Round-Up: iPhone 5 theory frenzy and iPad competitors get real

Smartphone speculation and why Amazon could be a tablet winner...

(silicon.com - Hardware)

est nod32 key esed nod32 serial esed nod32 antivirus nod32 turkce

Why a disconnected society is far more dangerous than a connected one

A social media kill switch might also kill off our communities...

(silicon.com - Security)

nod32 güncel keyleri nod32 keyleri güncel

Check Out MANDIANT Job Postings

nod32 guncel keyler nod32 guncel key güncel key nod32 full nod32

Google+ fake invites = malware

These days, invites to the new social network created by Google are a popular subject among users that want to try it.

If a subject is popular it also can be used by cybercriminals as a trick to infect curious users - and Brazilian cybercriminals have already started sending fake invites with malicious links pointing to malware, specifically Trojan bankers.

Today we found one of them targeting Portuguese speakers:

nod32 esed nod32 indir nod32 nod32 güncel key

28 Ağustos 2011 Pazar

Time to party! Windows 7 is here!

It's only a few days away. The official launch of Windows 7 is here!

And of course, that means its time to party!!! You may have heard about the Windows 7 House Parties that are being thrown all around the world. Basically thousands of small groups of people are getting together to see what Windows 7 can do.

Personally, I thought we needed to do more. So fellow MVP and friend Charlie Russel and I decided we would throw our own party. But focused on IT pros and not the consumer angle. We plan to have a lot of fun, showing the cool features of Windows 7 for IT pros like BitLocker, AppLocker and DirectAccess. We plan to bring a bunch of laptops and show new shell extensions, Powershell, new multitouch features and basically sit around and enjoy hours of Q&A for those that haven't tried it yet. We are even planning on installing Windows 7 on a guest's Macbook to show how well it does using Bootcamp on Apple hardware and even on small netbooks.

I also wanted to send a message out to the Vancouver IT community to clear up some misconceptions. This is a party hosted by Charlie and myself. This is NOT a Microsoft event. Microsoft was gracious enough to let us use their facility and even sprung for some of the cost for pizza. However, they never planned this out. Nor did the local VanTUG and VanSBS groups.

Our party is an INVITATION ONLY event. Because we are limited in our own budget and constrained in where we could have the party... we only have enough room for 75 people. So we could only allow a certain number of our friends to come. Charlie and I decided the best way to handle this would be to simply invite who we wanted, and then open it to our friends at the local user groups on a first come, first served basis. This is why there is a cap on the registration on the event, and why it booked up so quickly.

I am hearing through the grapeline that there is a LOT of descent in the Vancouver IT community who feel that Microsoft, VanTUG and VanSBS did a poor job organizing this. >LET ME BE CLEAR. This is a personal party that Charlie and I organized. If you were lucky enough to get an invitation and registered, great. But if you didn't, don't take it out on Microsoft, the local usergroups or their leaders. It's not their fault!!!

We are using our own money and time to throw this party. Please be considerate and respect that we couldn't invite all of you. I am happy to see there is so much excitement about Windows 7 and that you wanted to party with us. And I am sorry if you feel it isn't fair that you didn't get invited. Please feel free to share your own Windows 7 experience, and host your own party. We may be the only IT pro party during the Windows 7 launch, but nothing says you can't have your own!

So party on. Welcome to a new world. Welcome to Windows 7!

nod32 güncel key nod32 guncel key eset nod32 guncel key eset nod32 güncel key

SF subway sets public debate on cell shutdown

BART, the transit system targeted by hackers after it cut cell service in its subway prior to a protest, posts a letter to customers explaining its position and announcing a public meeting on the issue.

nod32 guncel key güncel key nod32

Impressions: Digital Forensics with Open Source Tools

eset nod32 guncel key eset nod32 güncel key indir com nod32 nod32 keyleri

ZeuS-in-the-Mobile for Android

The first version of ZeuS-in-the-Mobile (ZitMo), malware which targets mTANs, was discovered in the end of September 2010. In that case it was targeting Symbian smartphones. Later on, ZitMo versions for Windows Mobile and Blackberry were found. It comes as no surprise that cybercriminals have created new and sophisticated pieces of mobile malware for Symbian and Windows Mobile; more surprising is that Blackberry devices were also targeted; and even more surprising is that until July 2011 there was no evidence of ZitMo for Android’s existence. And now please ‘welcome’ ZeuS-in-the-Mobile for Android.

The first fact that must be mentioned is that ZitMo for Android differs from Symbian, Windows Mobile and Blackberry versions a lot. The functionality and logic of ZitMo for Symbian, Windows Mobile and Blackberry is the same: C&C cell phone number, SMS commands, and the ability to forward SMS messages from a particular number, as well as the ability to change C&C.

The functionality and logic of ZitMo for Android is far more primitive. The APK file itself has a 19k size. It passes itself off as a security tool from the ‘Trusteer’ company. If a user installs the malicious application then the following ‘Trusteer Rapport’ icon will appear in the main menu:

And that’s what going to be on the screen after clicking on the application’s link:

As I said previously, ZitMo for Android is very primitive. Its functionality consists only of the ability to upload all incoming SMS messages (with mTANs also) to a remote web server http://******rifty.com/security.jsp in the following format:

f0={SMS_sender_number}&b0={SMS_text}&pid={infected_device_ID}

The first attacks with ZeuS-in-the-Mobile for Android started probably in early June. But how does ZitMo for Android actually infect devices? Nothing has changed in this area.

nod32 full download full nod32 download est nod32 serial 64 bit nod32

70% of Hongkongers use same password for multiple accounts

http://www.flickr.com/photos/arkokoley/5517425057/

About 70 percent of Hongkers use the same password for an average of seven online accounts, said City University of Hong Kong (CityU) and PayPal Hong Kong Tuesday when unveiling results of the Online payment Security Survey.

According to the two organizations, the survey was commissioned by PayPal Hong Kong and designed and executed online by CityU during two weeks in August 2011. More than 1,200 responses were collected from Hong Kong netizens aged 18 or above, with about, 75 percent of respondents in the age group of 22 to 39 age, said the two organizations in a statement. More than 50 percent of respondents have a university degree and the average income of the respondents is HKD$15,000 per month, the two organizations added.

Survey results indicated that while 38 percent of respondents are concerned about sharing personal information online, 60 percent of these people reported that they never update their online passwords or only do so when required.

Tags: 

nod32 serial nod32 güncel keyleri nod32 keyleri güncel güncel nod32 keyleri

Exploit:W32/MSWord6.Gen

The identifies a Microsoft Word document that has been modified to perform an unauthorized, malicious action.

indir com nod32 nod32 keyleri

SQL Injection Challenge and Time-Based Security

nod32 keyleri güncel güncel nod32 keyleri nod32 guncel keyler nod32 guncel key

Reflecting on our Windows 7 birthday party

So this week my buddy Charlie and I threw a Windows 7 party for the IT pro community in Vancouver, BC at the Microsoft office.

The office could only handle 80 people, and we simply had to turn people away. Sorry to those who weren't allowed to come. Many people came early, and hung out in the hallway even before they were allowed in.

With almost a 100 people in that hallway just out of the elevator, that hall was WARM. I felt bad for some of the people as you could tell they were overheating. But we weren't ready to let them in as we set up the rooms with different Windows 7 systems.

When we did open the doors it was a mad rush for everyone to get in where it was cooler and they could grab a cold one and cool down. Thankfully everyone was patient and polite. Thanks to everyone for that!

Once they got in, there were several different rooms that they could go hang out in. In one room, Charlie had brought a HP Media Touchsmart so people could experience the new multi touch functionality of Windows 7. Kerry Brown, a fellow MVP with experience in Windows shell, stayed in the room teaching people all the new shell features like Libraries, Jump Lists etc, and I am told schooled some admins on the nitty gritty of Power Shell. Good job Kerry! Thanks for helping out!!!

It was interesting as everytime I looked in that room, people were surrounded around the device playing with the TouchPack games and with Virtual Earth. It was interesting to hear my buddy Alan comment that his experience on his iPhone with multitouch, especially with Google Earth, was far superior to what he was seeing there. Maybe that is something Microsoft can take away from that. Of course, big difference on a 24 inch monitor and a small iPhone screen. But the point is well taken.

We had the biggest crowds when we did demos in the main presentation room. When I was presenting on DirectAccess security I had my good friend Roger Benes (a Microsoft FTE) demonstrate how Microsoft used DirectAccess themselves. Using the Microsoft guest wireless he connected seamlessly to Microsoft's corpnet, which allowed us to demonstrate the policy control and easy of use of the technology. I am told a lot of people enjoyed that session, with several taking that experience back to their own office to discuss deployment. Thats always good to hear.

Charlie impressed the crowd showing how to migrate from Windows XP and Vista to Windows 7. He demonstrated Windows Easy Transfer and Anytime Upgrades and took the time to explain the gotchas in the experience. He even had me demonstrate XP mode on my laptop so people could see how they could maintain application compatibility with a legacy Windows XP virtualized on Windows 7.

Of course, I had a lot of fun hanging out in the far back room. I got to demonstrate some of the security stuff built into Windows 7 like BitLocker, AppLocker and BitLocker to Go. I was even asked about Parental Controls which I couldn't show on my laptop since its domain joined, but was able to show on a demo box Roger had brought for people to play with.

Some of the more interesting things I helped facilitate was asking my buddy Alan to bring his Macbook in. He is a great photographer who works with Linux and OSX a fair bit, on top of using Windows. Actually, all the photos you see in this post were taken by him. Thanks for sharing them Alan!

Anyways, I convinced him to let us use his Macbook to install Windows 7. He reluctantly agreed, as you can see from the picture below when he was looking at the Snow Leopard and Windows 7 media together. :-)

We had a fair number of people crowd around his Macbook as he went through the process of installing Bootcamp and deploying Windows 7. Interestingly enough, it flawlessly converted that Apple hardware into a powerful Windows 7 system in about 20 minutes.

Charlie and I were REALLY busy. We had presented on different sessions in different rooms throughout the night. Actually, I very rarely even saw him except for a few times when he called me in to help out with a demo. Sorry we couldn't party more together Charlie. And my apologies to those that were looking forward to our traditional "Frick and Frack" show where we banter back and forth.

Many of you may not know that outside of computers, I am an avid indie filmmaker. Actually, that is giving me too much credit. I am an amateur cinematographer at best, who had high hopes that I would get a chance to film everyone's impressions throughout the party. Unfortunately, I was so busy presenting, I had almost NO TIME to get any film recorded. *sigh* Alan did get a snap of a rare moment when I actually caught someone on film.

Of course I can't complain too much. I had a great time getting to show all the neat features in Windows 7, and answering the tonnes of questions that people had.

Of course, when the night finally wound down, it was nice to close out the party and watch the Vancouver skyline change. When we were done, we had the opportunity to hang with our IT friends in Vancouver and bring in the birth of Windows 7.

I have several people I would like to thank for making the evening possible. Charlie and I couldn't have done it without the support of people like Graham from VanTUG, Jas from VanSBS and Roger from Microsoft. Speaking of Microsoft, I have to give a shout out to Sim, Sasha and Ljupco in the MVP team who helped us get through all the red tape to throw the party at Microsoft's office. And many thanks to Brent, Alan and Kerry for helping us out throughout the event. My thanks to all of you.

I hope everyone had a good time. And if anything, Charlie and I hope you learned something that will help you deploy and use Windows 7 in your organizations. Happy birthday Windows 7. Welcome to a new world without walls!

P.S. All the pictures you see here were taken by Alan and used with his permission. You can check out some of his other amazing work at bailwardphotography.com.

nod32 serialleri esed nod32 indir nod32 serial nod32 güncel keyleri