Showing posts with label hackers. Show all posts
Showing posts with label hackers. Show all posts

Wednesday, December 13, 2006

Hackers Declaring Cyberwar on Facebook and Myspace

I've been seeing this headline pop up all over the place the last few days: Hackers Declaring War On MySpace, Facebook? My question is: who are these hackers? Is there a central organisation of hackers that have decided to declare this war? Should Facebook and MySpace fight back? The best defense, after all, is a good offense.
(SC Magazine) “If the hackers know you have a particular interest, this can be used to target you in a phishing attack. They know what you’re into and can exploit this to obtain more information from you such as credit card details,” he said. “People are putting far too much information online and into the hands of identity thieves. Young people in particular, need to be very careful as it may come back to haunt them.”
Those of us with an above average IQ know the vulnerability MySpace, Facebook, and other social networking sites present to our identity. Still, all this hubub begs the question: where are these hackers?

Furthermore, should I join up? I've been a hacker for years, and there's apparently some money in harvesting this information. Do these hackers have an HR department I can apply to?

It's simply ridiculous to use terms like CyberWar and hackers when it comes to stories like this, but still the media persists.

/rizzn

Thursday, December 7, 2006

Interesting New Form of Organised Crime

This from the Guardian:

Organised gangs are recruiting the next generation of internet criminals by approaching undergraduates on university campuses.

In some cases gangs offer to finance undergraduates' studies and plant them as sleepers within target businesses, according to a report on cybercrime which draws on intelligence from the FBI and British and European hi-tech crime units.

Greg Day, security analyst for McAfee, said: "A lot of these people go into chatrooms, discussion sites, and start a discussion. Organised crime is involved in that."

Inexperienced young hackers often talk to each other in an internet slang known as l33t, which helps gangs target them. One popular tactic is blackmail. "They'll say: 'We know you did this, we can shop you unless you come and work for us'. Sponsoring students through a degree is more likely to happen in less affluent countries like Russia or India."

The report warns: "There is a false economy of trust. People don't present personal information to strangers on the street, but building profiles online means that internet criminals can instantly access a mine of details - names and interests, pets and life stories."

Thursday, August 25, 2005

Jedi Hacker School Enrollment Now Closed for the Season

Howdy. 

My power’s out at my house, so I’m just sitting around the office waiting for sleep to overtake me.  I would sleep at my house, but I can’t see at all to walk the long corridor to my door, nor can I clean off my bed properly in the dark.  Call me short-bus, I just found it easier to get back in the car and drive to the office.  The hurricane seems to be over, for the most part.  I turned the Weather Channel back on my PDA since the WFOR stream has been permanently overloaded since the storm started. 

According to the current radar gimmick the last yellow band has passed my area.  Yay, happy.  These people are busting such nuts over this.  They’re making computer graphics of what they think Pompano Beach may look like with three feet of flood water.  Freakin’ dorks.

I’ve finished the queuing system, and it’s in Beta.  I need all the Blip users to keep a close eye on their RSS streams and let me know if they fail to generate within 15 minutes of creation, as that is the deadline set within the system for RSS/profile file creation.  It’s going to reduce the load on the server by 90% at least, which is great, and will be truly amazing once it’s migrated to the new server.

Since I’m such a Jedi Master coder, I’ve decided to take on a Padawan.  Kelly has been getting heavy into the art of design, and she’s been taking forays into backend coding.  I’ll be there to keep her from straying to the dark side (because uncertainty leads to doubt, which leads to fear, which leads to hate, which leads to Java.  *shiver*).

So say hey to Kelly, and congratulate her on her decision to train her mitochlorins to become little microscopic hackers.

/rizzn

Tuesday, September 7, 2004

Hackers in the News

There have been a number of hackers in the news over the hurricane/holiday weekend.  I haven't really been staying on top of this with all the hurricane coverage (as well as the ongoing debate between DJ Colonoscopy and myself), but here's what I've found recently:

Teen Hacker Controls Ebay
By Nick Farrell: Tuesday 07 September 2004, 12:30
GERMAN POLICE HAVE arrested a 19 year-old hacker who claims he managed to control the local domain of E-bay.

Apparently, the hack happened at the end of August when the teen managed to direct punters on the eBay.de site to a different domain name server (DNS).

What is scary is that the hacker is not exactly an expert, and had found the instructions on how to fudge the transfer when he stumbled across a web-page. The teen decided to request a transfer for several sites including Google.de, Web.de, Amazon.de and eBay.de for a laugh and was amazed when it worked.

According to the police spokesman, the teen didn't want to cause damage and was a little shocked when he was told that he had managed to become the new owner of eBay.de.

The domain has now been returned to its rightful owner and the would be hacker is finding himself charged by Inspector Knacker of the Yard.

Hacker’s Reward – Target: the Motorola v710Posted Sep 6, 2004, 11:07 AM ET by Simon Spagnoletti
v710None too happy about the fact that Verizon has deliberately crippled Bluetooth on the Motorola V710, Jonathan A. Zdziarski is offering a bounty to anyone who can successfully hack the phone and restore the OBEX and OPP Bluetooth features which have been disabled. What do these do, you ask? Well, OBEX lets you transfer files between the phone and a computer, while OPP lets you send phonebook entries and other info to another phone or Bluetooth-enabled car (using a Bluetooth headset with the V710 works just fine). Useful features don’t you think? The prize is up to $882.72, a sum of money we’re hoping will be enough to tempt at least one kindly hacker into getting this done.
 

A hacker's tales from years in the Big House


Mercury News

Reformed hacker Kevin Mitnick spent five years in the Big House for breaking into corporate computer systems. Given his insider experience, he might want to start a career as a prison consultant now that Frank Quattrone, Martha Stewart and a whole new passel of white collar criminals are headed to the pokie.

In a recent interview, Mitnick, who got out of prison in 2000, said he did time with plenty of well-heeled inmates, including a judge and a senator, financier Ivan Boesky and Barry Minkow, founder of ZZZZ Best Carpet Cleaning -- the Enron of 1987.

Don't try to tell these guys that crime doesn't pay, though.

Mitnick said he had coffee one day with Boesky, whom he described as ``aloof.'' Boesky asked him what he was in for. After Mitnick explained, he said, Boesky asked him how much money he made off his crimes. When Mitnick replied he hadn't been in it for the money, Boesky was aghast. ``You're in PRISON, and you didn't try to make any money?'' Mitnick recalled Boesky asking him. ``Isn't that stupid?''

Being known as a computer hacker didn't ease Mitnick's time in prison, he said. Some guards suspected he had ``mystical powers'' and could take over the prison's computer network -- even though the terms of his sentence barred him from using computers for years. Once, in the prison law library, Mitnick said he sat down to work at a programmable electric typewriter and a nervous guard whisked him off to a disciplinary office.

``He immediately came over to me as if I was hacking into Norad,'' recalled Mitnick. ``It was comical.''

Joe Montana, Mac acolyte: Apple Computer's lead pitchman, Steve Jobs, was unable to make the launch of the company's new iMac G5 desktop computer in Paris last week.

So, Apple picked up a veteran pitchman who has hawked Schick razors, Coors beer, Fruit of the Loom underwear and Disneyland: legendary San Francisco 49ers quarterback Joe Montana.

Montana happened to walk into Apple's San Francisco store last week as executives unveiled the new, all-in-one iMac. Honest. Apple executives insisted that Montana's impromptu appearance was purely coincidental and not a publicity stunt.

Montana listened in on a press briefing, and then began extemporaneously extolling the virtues of the Mac. He said he uses Apple's video conferencing feature, iChat, to talk to his daughter. Sometimes, they even set a place for her at the dinner table, he said.

Needless to say, Greg Joswiak, Apple's vice president of hardware products was ecstatic about the encounter and Montana's enthusiasm for the iMac. ``That was my highlight.''

Dealmaking on the run: Technology veteran Eric Benhamou got more than a good workout with running partner Dan Kolkowitz. He found a new company to invest in and yet another job as chairman.

The two chatted while on long runs about Kolkowitz's latest venture idea. After more research, Benhamou was ready to invest some of his time and money in San Jose start-up Swan Labs, where Kolkowitz is the vice president of engineering.

Swan Labs specializes in products to boost the performance of software applications over wide-area networks.

``I became very convinced quickly that the market was going to be large and growing fast,'' said Benhamou, now Swan Labs' chairman. Benhamou Global Ventures also was part of the company's $15 million first round of funding.

Now a slot is opening up in Benhamou's busy schedule: This fall he plans to step down as the chairman of PalmSource. He already serves as chairman of 3Com, Cypress Semiconductor and palmOne.

[and finally, a post to prweb probably from Mortland himself]

Infamous Video Game "Hacker", Mortland Calls it Quits
(PRWEB) September 6, 2004 
It was on September 9th 2002 that SEGA Public Relations Officer Jeff Millian said that video games had been taken to far. He was very right. 2 years ago an unidentified hacker (now known as Mortland) caused over $16,000 thousand dollars in damage and financle loss to Sonic Team, developers to the hit video game Phantasy Star Online. The attack was web based and downed the developer’s server for 3 days. It was later discovered that it was in retaliation to a disagreement between the company and Mortland pertaining to the recognition of September 11th victims. “It was when the company said, “Were not in the business of grieving and making holidays” that I decided to down there servers” said 17 year old Mortland in a statement to a local newspaper on September 11th 2002.

That was 2 years ago. To date Mortland has taken down 32 web forums, vandalized over 20 websites, and has been kicked off the servers to 11 games. “I’m just using the game to its full potential, it’s a shame no one else does.” Said Mortland who has finally decided to call it quits. Now at 19 and finishing up his schooling in Boise Idaho from studying Nursing, he has decided to enjoy the finer things in life. “I was always hating everyone, I was sick of everyone. But now I have simply decided to ignore them all and divorce my self from the human race. It worked out really well.”

When asked about the level of intensity agenst the sites that he attacked he responded, “When your pumped full of drugs all the time you do things for the stupidest reasons, I guess I just like messing with video gamers.” “I mean that isn’t how it always was, There were good reasons to some of my messages agenst some of the people I hit.” “I think I will try going into entertainment soon write now.” “I am just writing random thoughts on my web blog that you’re all welcome to visit at http://www.crazylife.org/~mortland”.

Wednesday, August 25, 2004

Electronic Jihad To Strike Thursday? Don't Bet On It

By Gregg Keizer, TechWeb News
A coordinated attack against the Internet, dubbed an "electronic jihad," may be as close as tomorrow, one security firm warned Wednesday. Other experts, however, were dubious.

According to a report on the Russian news service RIA Novosti, Eugene Kaspersky of the Moscow-based Kaspersky Labs has warned about a large-scale attack that might be delivered by Islamic terrorists.

Kaspersky and other security analysts have noted claims on Arabic-language Web sites that announced an attack will launch August 26. The main targets -- no surprise -- of the attack would be against political and financial Web sites in the U.S., Israel, and Western European nations, Kaspersky alleged.

"The hackers who have proclaimed 'electronic jihad' have enough experience and resources to paralyze the Internet for several hours at least," Kaspersky was quoted as saying. "It is ghastly enough that these people have mentioned 'electronic jihad' for the first time."

Executives at Kaspersky Labs were unavailable for comment, but as of mid-day Wednesday, the security company's Web site rated virus activity as "green," indicating that everything's "normal."

But since even Kaspersky has no firm details, other security professionals said it's unlikely anything out of the ordinary would happen Thursday.

"We don't think anything really major will happen," said nearby F-Secure, an anti-virus firm based in Finland, in a statement on its Web site. "Why would anybody announce an attack like this beforehand?"

Cupertino, Calif.-based Symantec agreed. "We don't see anything unusual developing," said a Symantec spokesperson Wednesday. Symantec operates a global network of threat detection sensors, dubbed DeepSight Threat Network; DeepSight hasn't spotted any evidence of an impending attack, the spokesperson added.

"We don't see anything substantiated," said Ken Dunham, the director of malicious code research for Reston, Va.-based iDefense. "We're certainly not expecting any major global event that will affect the Internet as a whole."

But while Dunham pooh-poohed the idea of a general strike against the Web on Thursday, he believes politically- and/or religiously-motivated attacks are a sure thing at some point.

"We've definitely seen an increase in hacker activism, and religious and politically-motivated attacks," he said. More important, said Dunham, is the move by various groups toward hacking. "We're beginning to see a shift toward a convergence of major motives," he added, such as activist groups taking on some of the characteristics of organized crime gangs when it comes to hacking. But rather than after a financial windfall, these attackers are after disruption pure and simple.

"With the tools and abilities now circulating in the hacker community, the situation's likely to be more disruptive and coordinated in 2004 and 2005. It's a dangerous situation, like oil and fire."

Attackers like the ones cited by Kaspersky, said Dunham, are likely "middle- to low-class hackers without the skills necessary to attack heavily guarded Web sites, such as financial services sites, but could hammer less well-defended servers."

But even then Dunham's hedging his bets. "The current situation is the most dangerous and difficult we've ever seen, what with the high number of zero-day attacks against Internet Explorer and the fact that some attacks have hit fully-patched computers at will."

"There's a lot out there to be concerned about," he concluded.

[view source]

Now playing: dimitri from paris - abstract jazz lounge

Tuesday, August 24, 2004

International hacker ring busted

p2pnet.net News:- A large international network of hackers who stole computer programmes, films and music and then sold them on the black market has been broken up by Polish police.

Police in Gorzow Wielkopolski, western Poland, smashed a ring involving more than 100 people and active in Poland, the US, Australia, Britain and Slovakia, police spokeswoman Agata Salatka told Agence France-Presse.

Five Polish computer programmers thought to be the group's leaders were arrested and face up to eight years in prison, she said.

The hackers got into the computers in universities and technical institutes in several countries, "using the large memory of the powerful computers to stock, without the knowledge of the owners, the most modern programmes, music, games and the most recent films," AFP quotes Salatka as saying.

The gang was "shadowed" by Gorzow Wielkopolski police last October, aided by the FBI and police in Britain and Slovakia, adds the story.

[via source]

Feds: Anger drove Varian hacker: `Disgruntled' ex-programmer accused of erasing code

By Jay Fitzgerald
Tuesday, August 24, 2004

A vindictive software programmer upset about his cancelled contract snuck into Varian Semiconductor Equipment Associates Inc.'s computer system and zapped out e-commerce coding he and others had been developing, U.S. Attorney Michael Sullivan charged yesterday.
     Patrick Angle, 34, now of Columbus, Ind., was hit with one charge of intentionally damaging a protected computer system, Sullivan's office said yesterday.
     Angle and his attorney could not be reached for comment yesterday.
     According to Sullivan's office, Angle became ``disgruntled'' with Varian after working as a full-time employee and then later as an independent contractor.
     Angle started working for Varian in 2001, moving his family from Indiana to New Hampshire, where he regularly commuted to Varian's headquarters in Gloucester. His job: developing Varian's e-commerce software that would allow the firm to conduct business with its vendors.
     Angle later moved back to Indiana, with the intention of performing his duties via the Internet from his Midwest home. But Varian made him a contract employee without benefits, a move Angle ``resented'' and believed violated agreements, Sullivan's office said.
     He was told last September his contract would be terminated. Nine days later, Sullivan's office said, Angle logged into Varian's computer system from his home and deleted the coding he had been developing with others and tried covering his cyber tracks by altering computer logs.
     The action was to ``vent his frustration with Varian,'' prosecutors said.
     The software code was later retrieved ``at great expense,'' costing Varian $26,455, Sullivan's office said.
      A spokesman for Varian could not be reached for comment.
     If convicted, Angle faces a maximum sentence of 10 years in prison and a fine of $250,000.
      Sullivan's office has been aggressively pursuing computer hackers.

Monday, August 23, 2004

Virus alert: Rbot sets your webcam to spy on you

Jo Best : silicon.com : August 23, 2004

A new worm has been discovered in the wild that's not just settling for invading users' PCs - it wants to invade their homes too.

The Rbot-GR virus follows a fairly traditional malware route of exploiting Microsoft security vulnerabilities and installing a Trojan horse on infected machines. However, the worm also spies on users by taking control of their webcam and microphone, then sending images and soundtracks back to the hackers, according to antivirus firm Sophos.

As well as getting an insight into homes and businesses across the world, the worm also allows the malware writer to take a look at information on the infected machine's hard drive and to steal passwords, as well as launching denial-of-service attacks.

Graham Cluley, senior technology consultant at Sophos, said that the virus could be used for industrial espionage - or simply by a nosey hacker to take a look into people's bedrooms.

"Whether this worm is the work of professional snoopers or lusty teenagers - it's hard to say for certain. What we do know if that there have been a few hundred different versions of the Rbot worm, all of which have been designed to gain some kind of remote access to innocent users' data. This one goes further by also specifically collecting webcam footage," Cluley said. "It seems more and more hackers are building a cocktail of different functionality into their creations."

For those who have the virus, they may be unaware their every move could be being tracked by remote hackers. An infected webcam may show an "active light" when it's being used but for webcams without such light, there's no giveaway the hacker is watching.

There is, however, one simple way to dodge the prying eyes of the malware merchants - just unplug or switch the webcam off when it's not in use.

Wednesday, August 18, 2004

Web page to help with installation of WIndows anti-hacker security patch

Information Technology Systems and Services (ITSS) has created a Web page that will walk Microsoft Windows XP users on campus through a major update being released worldwide this month to make the operating system less vulnerable to computer hackers and viruses.

Downloading of "Service Pack 2" will change how Internet Explorer handles pop-up windows, consequently affecting users of business applications such as Kronos, PeopleSoft and Oracle Financials. The Web page that ITSS has set up will guide staffers through the installation process and the reconfiguration of Windows XP once it has been updated.

The page at www.stanford.edu/dept/itss/ess/pc/xpsp2/index.hml also contains a tool that will assist with the reconfiguration and that should be downloaded and run after users have completed the update. Microsoft initially made the patch available to Windows XP users in mid-August, through an automatic-update service built into the operating system.

But not everyone uses the automatic update, which will deliver the patch to a limited number of Windows XP users worldwide per day, said Jay Stamps, an ITSS technical support consultant. Service Pack 2 should be available through the Microsoft Windows Update site, http://windowsupdate.microsoft.com, in late August. Stamps said that date is approximate because Microsoft has changed the release date several times.

Even with a fairly fast Internet connection, the installation could take two hours or longer to complete, and the download requires at least 1.8 gigabytes of free disk space, Stamps said. He added that the majority of computers on campus are PCs.

The need to install the patch isn't as urgent for Windows XP users who downloaded Service Pack 1 and subsequent updates. But as soon as they have time, ITSS recommends they download Service Pack 2 because it "offers real improvements in Windows security." Those with additional questions are asked to submit a help request at http://helpsu.stanford.edu.

[View Source]

Now playing: Various Artists - DJ Dee-Kline - I Don't Smoke

Thursday, February 12, 2004

Congressional Report Dumps on CAPPS II


Last year, when Cogress let the TSA go ahead with CAPPS II, its controversial passenger-profiling databse, it attached a set of eight supposedly measurable standards that the system would need to pass to be funded. Now, in utterly unsurprising news, a Congressional probe has found that CAPPS is failing those standards with flying colors.


According to the report, the TSA failed to address privacy concerns, failed to find a way of dealing with false positives, failed to secure the system safe from hackers, and failed to show that the system would help in finding potential terrorists.

The report's fierce criticism may prevent CAPPS II from being funded at all. Yay.


[via LawMeme]

Monday, February 2, 2004

[Rizzn's Note: Slashdot/Alterslash has an excellent Q&A session with Adam Davidson up on their sites right now combining two very interesting spheres of influence: a LUG (Linux Users Group) in IRAQ.  Quotes below.]


Answers On LUGs, Life, and Linux in Iraq - by Roblimo (36% noise) View Skip
Adam Davidson is an American reporter who has been in Baghdad for many months, and in his ‘spare time’ helped start Iraq’s first LUG. We sent him your questions last week, and he’s replied in great detail, not only about the LUG itself but also with a rare ‘geek’s eye view’ of daily life in Baghdad, and comments about how the Iraqi IT infrastructure (and laws controlling it) are being (re)built.


[California Cybercafe Regulation Decision Released]


Activate Tinfoil Hat! - by American AC in Paris (Score: 5, Insightful) Thread
What the iLug needs most is: 
1. Money. 
2. Information. 
3. Technical help.


Free software, hackers, and Iraq, all wrapped up into the same organization? Danger! Danger! Potential terrorist organization detected!


Seems only a few weeks ago we would have run the risk of getting our asses detained for violationg the Patriot Act. Now that this part of the Patriot Act has been ruled unconstitutional, though, we’re safe to help these guys out.


<voiceover style=“announcer:campy-1950’s-sci-fi;”> or are we? </voiceover>


[via AlterSlash]

Zombie Army of MyDoom Drives SCO from Its URL:
Under intense DDoS bombardment from the approximately one million MyDoom-infected computers, SCO abandoned ship at www.sco.com in favor of the more-of-a-mouthful www.thescogroup.com. SCO plans to return in about two weeks, after the deluge is scheduled to end.


When it comes to vulnerabilities in our information infrastucture, we're only a couple of small steps away from skilled hackers being able to delete anyone they dislike from the Internet. That's scary, and some of the possible reactions are even scarier.


[via LawMeme]

Monday, November 10, 2003

OSINT: FBI on look-out for foreign government hackers

How seriously does the U.S. government take computer intrusion? Seriously enough for the threat of foreign hacking to take a prominent role in new rules governing the FBI's national security investigations issued by U.S. Attorney General John Ashcroft this week.

[ The Register ]

Monday, November 3, 2003

TheJacksonChannel.com - Technology - 'Drive-By Hackers' Target Wireless Computer Networks

'Drive-By Hackers' Target Wireless Computer Networks

Home, Office Systems Are Vulnerable



POSTED: 3:08 p.m. EST November 3, 2003



SAN DIEGO -- Do you have wireless Internet? If you do, you've also got a potential security problem on your hands.



Hackers can intercept your signals while going past your home, your office and anywhere else you can take a laptop, or a hand-held computer. What they can do with those signals could ruin your life and many others.



There are millions of hackers who can break into a wireless computer or even a Palm Pilot or Blackberry. They are called drive-by hackers, and they gain access by picking up the wireless broadcasts from some distance away.



They like to get in their cars and go "war driving," as they call it. Most don't misuse the data they find, but there are plenty of hackers out there who could do incredible harm.



To see how it is done, television station KNSD sent a reporter war driving with San Diego computer security consultant George Spillman.



"I'm going to start scanning here as we're driving down the road, and it's going to start naming off the (access points) as we pick them up," Spillman said.



After 15 minutes of war driving past shopping centers, apartment complexes and suburban neighborhood, Spillman logged hundreds of access points, or APs, for wireless networks. Too many are open doors for signal-stealing hackers who can learn your passwords, read your e-mail, use your credit card numbers and turn your home computer system into a weapon, the station reported.



"They could be loading spam. They could be loading viruses on the Internet," Spillman said. "You could have child pornographers using your system. You could have terrorists driving by your house, using your system to send a message. And the only traceable route back to it is you. It stops at your house."



Hackers don't need exotic equipment to do this. All they need is a laptop computer with a consumer wireless card.



"We took this one apart and soldered in an external connection so we can use it with a secondary antenna," Spillman said.



Serious hackers use equipment to enhance the signals. And they can get all the technology they need right off the shelf at your local mall.



Many of the wireless networks being sold to consumers offer security measures to keep hackers out. But the hackers look for countermeasures, and the good ones find them.



Experts say you can make your system harder to hijack by taking basic precautions with your wireless network:

Encrypt

Change passwords frequently

When you're gone or asleep, shut everything down



If you don't feel like that is enough, a company called Downtown IT will go to your home or business and secure your system for you. Get more information at the company's Web site.

Copyright 2003 by TheJacksonChannel.com. All rights reserved. This material may not be published, broadcast, rewritten or redistributed.

Wednesday, October 22, 2003

Internet group starts anti-hacker initiative

: "Internet group starts anti-hacker initiative

Wed Oct 22 @ 08:02 (Reads: 70)

Source: Computer Weekly



The Internet Software Consortium (ISC) has launched an internet crisis co-ordination centre to help protect the system from hackers. The Operations, Analysis and Research Center (OARC) will be used to study and monitor internet traffic so that technicians will be able to differentiate high-demand traffic spikes from high-intensity attacks on root servers. So far, members of the OARC include the Internet Society, Cisco Systems, MCI, XO Communications, UltraDNS, TLD operator Afilias and Verio, as well as many of the operators of the global root DNS name servers. 'In our application, it's very difficult to determine what 'normal' internet traffic conditions are. So we're going to have to define 'normal' and go from there,' said Paul Vixie, chairman of the ISC, which provides services for the internet's Domain Name System (DNS). Before the root server attacks in October last year, when all 13 of the internet's root DNS servers were hit by intruders in a massive distributed denial-of-service attack, there was no group set up to protect the DNS system globally. In the attack, DNS servers - which provide the vital translation services needed for converting a web name into a corresponding numerical IP address - were clogged with useless traffic."

Tuesday, September 23, 2003

[rizzn's note: It always seems that these Pakistani and India rivalry hacking/cracking/virus writing contest things they have always end up showing the ineptitude of the hax0rs involved. I don't know why that is. All I can offer is that every person from Pakistan and India in hacking chatrooms and mailing lists are always asking me for advice on how to hack hotmail and yahoo mail, which should give you some idea of the intellect at work. If it doesn't, all I can say is it's a hax0r thing, you wouldn't get it.]

Politically motivated worm fails to spread

Reuters - September 23, 2003, 09:00 BST
The latest in a string of Yaha worms created by rival hackers from both India and Pakistan has been released

Hackers claiming to be from India have launched their latest strike in a cyber-spat with Pakistan by unleashing a new variant of the "Yaha" Internet email worm, antivirus firm Sophos says.

The worm, written by a group calling itself the Indian Snakes, does not appear to be spreading or causing any damage, said Chris Wraight, a technical consultant at UK-based Sophos.

The Yaha-Q worm, the latest in a string of Yaha worms released by hackers from both countries since December, leaves a back-door on an infected machine and sends itself to people listed in the email address book, Wraight said.

It also tries to disable anti-virus software and commands the computer to launch a denial-of-service attack on five Pakistani Web sites, he said. Such an attack is designed to shut down a Web site by sending so many repeat requests to the Web server that it becomes overloaded.

The Pakistan Web sites it tries to attack are those of the main government Web site, the government's Computer Bureau, a community "portal" site, Internet service provider Comsats and the Karachi Stock Exchange, according to Sophos.

Yaha-Q arrives in an email attachment but also can spread via shared network drives, such as at corporations. It tries to sneak past firewalls and other security software to get onto Web servers directly, Wraight said.

In addition to storing taunting messages against Pakistan on the computer, it sends messages to Roger Thompson, technical director of malicious code research at TruSecure in Herndon, Virginia, and to a female virus writer known as "Gigabyte," Sophos said.

Gigabyte wrote a virus in January to counter an earlier version of Yaha that was designed to attack her Web site.

"I do not plan on writing a new 'counter attack' or getting further involved with these people in any way," she wrote in an email.

Thompson said he has commented in the past that previous versions of Yaha were politically motivated.

The worm is not spreading because it is being blocked by antivirus and other security software, and because people are becoming more suspicious of email and not clicking on mysterious attachments, Wraight said.

Sunday, September 21, 2003

Dioxin Research
[rizzn's note: This is mostly a personal note. I'm doing research into Dioxin contamination for a project I'm working on. Likely I'll not ever use the scientific data, as my side of the project relates more to the business side, but it's always good to do your homework.]

Hybrizyme
People throughout the world need and want a clean environment and a safe food supply. It is our hope that the research we do and the products that we sell help achieve that end.

Hybrizyme is developing an inexpensive test that measures the levels of dioxin-like chemicals. Currently, dioxin analysis costs range from $900 to $1,800 per sample and can only be performed in highly specialized laboratories. During a recent dioxin crisis in Belgium where citizens were exposed to dioxin-tainted meat, the need for low cost health assessment studies and environmental monitoring was clearly demonstrated. A cost-effective test also would enable scientists to expand research efforts to study the health effects of dioxins.

Dioxin is an unintended byproduct of a variety of processes including forms of chemical manufacturing, incineration of municipal garbage and medical waste, open burning and the manufacture of chlorine-bleached paper products. Exposure to certain dioxins in animals and humans has been associated with biochemical and toxicological effects. The EPA is currently conducting a major reassessment of dioxin service. EPA scientists are providing much of the
data needed to assist in the risk assessment.

Hybrizyme's technology measures levels of dioxin compounds in a sample using a recombinant Ah receptor. The Ah receptor present in humans and animals mediates most, if not all, of the harmful effects associated with exposure to these compounds. Once in the body, dioxin-like compounds bind to Ah receptors and initiate a cascade of biochemical effects leading to toxicological consequences. How tightly or loosely these compounds bind to the Ah receptor is one of the determining factors of their toxicity.

www.dixonins.nl
Since the Belgian dioxin-chicken crisis in 1999, the kaolinitic clay contamination with dioxins and the citrus pulp contamination with dioxins, consumers’ concern exists about the safety of food. The key-contaminants causing the concerns in these crises were dioxins and PCBs.

These accidents revealed a need for continuous monitoring of the quality and safety of our food. However, currently there is not enough capacity within the European Union (EU) to measure dioxins in food and feed which is being fed to animals for agricultural products. Besides, the quality of the data produced by food control laboratories is sometimes limited due to the absence of a broad range of certified reference materials to check the quality of the data.

The DIFFERENCE project (Dioxins in Food and Feed – Reference Methods and New Certified Reference Materials) will focus on the development, optimisation and validation of alternative (screening) techniques for analysis. These techniques should allow a reliable, simple and low-cost determination of dioxins and PCBs in order to guarantee a widespread implementation throughout the EU.

Furthermore, the DIFFERENCE project aims at the production and testing of five candidate certified reference materials (milk product, meat, fish, fish oil and feed) which allow laboratories to improve the quality of the produced data.
The project has started at 1 February 2002 and will last for 36 months. The objectives of this project are outlined on this website as well as a glimpse on the obtained results. The website also covers background information (related info), relevant literature and possibilities to get in contact with the coordinator for more information.

DEFINITONS
recombinant
An organism or cell in which genetic recombination has taken place or material produced by genetic engineering.

Ah Receptor
See this page or my copy.



[Listening to: (hackers)_11_(eyes,lips,body)_ramshackle - - (01:05)]
I'm having one of the best conversations I've had in ages, with swordsaintzero. It's one of those conversations you can only have with someone you've known for years and years. It's peppered with references we know about each other and people we mutually know. It's about how he was published in slashdot and I was published in 2600. It's about our takes on transhumanism. It's about becoming foglets. It's about gentoo. It's about being rich and being poor. Its about robots. It's about the Matrix.

Then we got to talking about how we are getting old. He tells me about his granpa's and gramma's passing, his little sister getting married.

"A lot's changed," he said.

"No kidding. We're growing up, buddy," I replied.

"I dont want to. It's like the whole 21 to 23 thing -- I'm 25 now." He sighed. "Fucking old man, my body hurts all the time, I think about things like insurance, I have a kid."

"I'm only a year behind you," I said. "I found a grey patch in my beard the other day."

"I am fucking salt and pepper. My whole head." I imagine he shakes his head in disbelief. "I feel silly when i go in hottopic! I feel like th old creepy guy. How fucked up is that?"

"I know!" I exclaim. Because I do. "Lord.. what happenned?"

"Our cron jobs are fscked up. I swear to god I want to change to a slower distro -- 70+ years and a permanent reboot are not cool, man."

You know that strange nostalgic feeling you get sometimes? Maybe? Do you get that? Or is that just me? Anyways, I'm permeated by it right now. I miss a lot of my friends from Texas, and right now, I am missing the days that swordsaintzero and I used to share. What's sad is that now we're both in places that'll never lead back to that time. We'll always be friends, and I presume that evn if he or I strike it big, we'll never be too big for our britches to talk to each other. But it'll never be like it was back in the day, sitting on the steps outside the apt on University. It won't be like us just wandering aimlessly in downtown Dallas half-assed looking for trouble, but really there to talk about geeky things.

I'm sure the future holds bigger and better things. Much bigger and better things. And some of those include things that ssz and I will share together, I'm sure. And when those come along, I might think they are better than back in the day.

But right now I'm enjoying the feeling of missing being in the constant company of an old dear friend.

/rizzn
[Listening to: (hackers)_04_(open_up)_leftfield - - (06:53)]

Saturday, September 20, 2003

April42089: back
April42089: did ya miss me?!
Unclespam21: yay!!
Unclespam21: yep;-)
rzndourdn: i cried.
April42089: :-Dgood
rzndourdn: because you were gone
April42089: im sure
Unclespam21: no he did
Unclespam21: he actualy wants 2 marry u
rzndourdn: it's true
April42089: ok
April42089: i already have 5 husbands, whats 1 more?
Unclespam21: a hell of a honey moon
rzndourdn: Wow.
April42089: heh
Unclespam21: ha
rzndourdn: is unclespam one of your husbands?
April42089: yea
Unclespam21: :-!
Unclespam21: i thoght was only me and adina
April42089: nope, u were wrong
rzndourdn: so one of your husbands is a girl?
April42089: no, shes my wife
rzndourdn: oh!
April42089: got like 4 wives
rzndourdn: sweet sweet polygamy
April42089: lol
Unclespam21: ha whos the bitch?
Unclespam21: haha
rzndourdn: so do you ever get together with all of them and have orgies?
April42089: of course
April42089: sqeek
rzndourdn: *oils april's hinge*
April42089: n english my teacher said not to talk and rite b4 that i said sqeek, so she looked at me and said...no squeeking ether
April42089: uh...my hinge doesnt need oiling thank u very much
rzndourdn: oh.
rzndourdn: i figured it did
rzndourdn: you were squeeking
April42089: no, no, no
/rizzn
[Listening to: (hackers)_04_(open_up)_leftfield - - (06:53)]

FlyDLUX Update

I am starting to get hits on my hits on my website with the words FlyDLUX and FRAUD coming from Google. As an insider in the company, let me just put forth that FlyDLUX was always intended to be a legitimate company and if it continues to survive still intends to be a legitimate company. It has the unique opportunity to provide the public with a low cost alternative to international and first class air fare. The problems with the company and the reason we were unable to fulfill our duties to our customers is soley the fault of bad management, simply put. Key people within the company, already discussed on this website, were integral in the near demise of this company (and we aren't out of the woods yet).

Strict management of time and funds is what is needed by diligent members of the management in this company (something I and Rick hope to oversee personally) to keep its nose clean and afloat.

Let me repeat - the management of FlyDLUX and it's staff -- to be specific: Mark Hopkins, Richard Rice, Lawrence Finkelstein, Barry Falber, Matthew Finkelstein, Krystin Lewis, and any other or employee contractor under this office's employ -- never intended to defraud anyone of their money. Any failure to deliver services was due to our strategic partner's negligence, someone who technically has no ownership in the company, but has continually misappropriated funds we've paid him to purchase bulks of airline tickets.

Presuming our company is able to financially move forward this week, this person (previously discussed in this blog) has agreed to personally repay the monies to people that have been affected by his actions.

More on this news as it develops.

/rizzn
[Listening to: (hackers)_04_(open_up)_leftfield - - (06:53)]