- Page 3

  • the german drones can't be used in Ukraine because.....

    yeah you read it

    they will never go to Antartica


  • the military ships of the future don't look like ships

    In fact they are constructed to survive in electronic warfare attack and to keep attacks off that try to intercept communications (Tempest)

    If in the next war you can't defend yourself against the electronical signals and protect your own, than you have lost, no matter how big your bomb is

    by the way Russia is building an enormous Electronic warfare base in Kalingrad the Russian enclave that oversees the baltic sees (he is sending a few hundred electronic and cyberwarfare soldiers there)

  • #gamergate:how a small bunch of online SS-style bullish trolls bring down big gamessites

    These big gamers sites are all about the money, about having advertising and the advertisers all want to be hip and cool and not be embroiled in an online war between young women who happen to be gamers but of a different kind (even if professional gamer specialists say that women are the new market as the men market for gaming is already totally conquered and every industry looks for enormous expansion to be able to invest and develop and grow and diversify)

    but as they didn't win on the public forum about the place that women couldn't have in their gamers environment, they went on the attack against the firms who often lack the moral courage to withstand public campaigns and fight for the freedom of each to live, speak and breath whatever the sex, religion, race or political opinion

    "On October 1, the computing giant Intel pulled its ads from Gamasutra, a trade website for game developers, over an essay called "'Gamers' don't have to be your audience. 'Gamers' are over" by a journalist named Leigh Alexander. Intel had been successfully harassed by a small, contemptible crusade called "Gamergate"—a campaign of dedicated anti-feminist internet trolls using an ill-informed mob of alienated and resentful video game-playing teenagers and young men to harass and intimidate female activists, journalists, and critics.

    Unable to run Alexander out of game writing, as they had with the writer Jenn Frank, or force her from her home, as they did to the developer Brianna Wu, or threaten her from public engagements, as they did the following week to the critic and activist Anita Sarkeesian, Gamergate went after her publisher. And, in an unbelievable and embarrassing act of ignorance and cowardice, Intel capitulated. The company's laughable "apology," released late on that Friday afternoon, didn't cover up the fact of Gamergate's victory: Intel was not replacing its ads.

    And other advertisers followed suit and those big gamer communities are losing hundreds of thousands of dollars. But now it is time for the others to go back on the offense against the firms who didn't stand firm, who didn't defend our and your freedom and let the bullish gangs cry victory. Even in Football stadiums girls and women go with men to see the match and support their teams together. There are even women in the police, the army and other professions that were before solely for men. Why should gaming be different ? And every woman working for firms like Intel or buying products from Intel or distributing them should tell Intel they were wrong because by withholding their advertising because of a gang of people who have no respect for the rights of others they go against any moral leadership they claim in all of their social responsability ads.

    If women can be no part of the community there is no community.


  • hacking the announcement screens in a Belgian train

    well there are only two ways

    or you have only fysical access and that means that you have to open the door and type a new message in

    or it works wireless and than you have to observe the kind of system, look up the administrative password that probably will still be the same and than you log on with your wifi (look at the logons if you keep that) and set the message

    Stefaan is shit

    I'll have a look at it tomorrow in the train :) and report back to you later

    if I got more info (anybody knows the name of the system ?)

  • some belgian servers that use SHA1 that can be used to make a fake certificate

    this one is used by millions


    and so on and so on and so on

    but others are doing the right thing by disactivating SHA1 like Belgacom - nice

  • naughty users of sextoy site leaked

    well now you will be the joke

    maybe you need a spank

  • massive attacks against flashplayer - patch now

    "Regardless of where the exploit came from, users who have not yet installed the latest Flash Player updates should do so as soon as possible; especially companies, where automatic updates are typically disabled and the patch deployment process takes longer.


    Windows and Mac users should update to Flash Player, or if they’re using the extended support release. Users of Flash Player on Linux should upgrade to version The Flash Player plug-ins bundled with Google Chrome, Internet Explorer 10 and Internet Explorer 11 will receive patches though the update mechanisms of those browsers.


    Adobe also released updates for its AIR application runtime and software development kit (SDK), since the program bundles Flash Player.

  • test if the SSL certificate uses SHA1 and can be falsified (disable SHA1)

    this is the website http://www.sha2sslchecker.com

    it offers a clear explanation and a information about how to set up your migration

  • US officials warn latest hack campaign of the year got 500 million financial records

    "Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.

    "We're in a day when a person can commit about 15,000 bank robberies sitting in their basement," said Robert Anderson, Jr., executive assistant director of the FBI's Criminal Cyber Response and Services Branch.

    The U.S. financial sector is one of the most targeted in the world, FBI and Secret Service officials told business leaders at a cybersecurity event organized by the Financial Services Roundtable. The event came in the wake of mass hacking attacks against Target, Home Depot, JPMorgan Chase and other financial institutions.

    and ?

    is anybody going to get some new legislation ? give more police and powers ? control more services if they are following regulations ? fine some people so they won't forget ?

    nah, they don't panick when they give those numbers like that, so why should you

    maybe it ain't true and it ain't so bad

    because if it was really bad than he probably would be acting otherwise and would ask for resources and new regulations

  • the code for the dangerous PPTX attacks used by Chinese APT is published

    we have published it here


    because this has been used for years before it was patched now by Microsoft

    and because it is and was used against critical infrastructure

    and because it is published online and circulating freely

  • #ukraine : the ceasefire may come to an end soon

    this is what a Russian commentator says

    "current polls suggest that “there will be almost no pro-Russian deputies” in the Verkhovna Rada to be elected on October 26.  And Putin needs to achieve his goals in the next few months before the situation in the occupied territories becomes “truly catastrophic” and potentially explosive for Russia itself.


    Given that confluence of events, the Moscow commentator says, it is likely that “soon Russian forces and separatists will step up their military activities in an attempt to defeat the Ukrainian army, to cast doubt on the legitimacy of the parliamentary elections, and to provoke in Ukraine a political crisis” that will end either by making the current regime more willing to make concessions or by bringing to power a pro-Moscow government.


    Given the approach of winter and the reluctance of the EU to put its gas supplies at risk by a new round of sanctions, Putin has every reason to move quickly. And “if Russian forces and their allies in the Donbas do not achieve real successes, perhaps, they will attack along the entire line of the border

    and later today one of the rebel leaders said that the ceasefire is over

    while new pictures have emerged from Russian military transports to Ukraine

    the elections are near and very clear, there will hardly be any prorussian elected, so Putin has nothing to win if the elections take place because he can't lose anything

    so don't be surprised if we have some surprises in the coming week

  • German parliamentary commission that controls BND leaked wrongly the #MH17story

    wow this will stirr some problems in the trust relationship

    the president of the BND was briefing the Parliamentary commission about the indications and thoughts he had about the shooting of the airline but he doesn't had any proof. Only one member of the commission didn't understand it like this and told Der Spiegel that the intelligence agency BND had enough evidence.

    perfect for the Russians

    and the stories about the stolen BUK's from Ukraine were also planted.


  • omnipresence of mobile lights and police is the new communitypolicing in crime ridden NY neighborhoods

    first at night they place mobile lights with generators everywhere where there is not enough light

    there is no darkness as cover, you can see in the parks everything and everybody around you

    and the drug streetcorners are being taken over by cops, every corner a few of them

    not stopping and checking on everybody but being there to convince you that this is neither the time nor the place to do some crime there

    and to keep everybody wondering what it is all about

    nobody is communicating the official policies and strategies


    why is this important because the whole western world has studied the policies they have used in NY to diminish crime (zero tolerance) and the defects of some other policies

    what works in NY will be copied by police forces all over the western world

  • Facebook scrapes stolen passwords online and notifies its users - why not others

    "Facebook is looking for your stolen passwords. On Friday, the social network announced that it built a system that will actively search sites for stolen credentials and then reference that data with its own records. "This is a completely automated process that doesn't require us to know or store your actual Facebook password in an unhashed form," Facebook security engineer Chris Long wrote in a post. "In other words, no one here has your plain text password." If there is a match, users will be notified by Facebook.

    there are other volunteer and commercial services that say that they are doing the same thing but you have to trust them that they scrape everything instantly and that they don't miss out one publication on websites that are under watch (because they are on holiday for example). 

    It is a system I have been trying to sell as an idea to the cert.be and to dns.be to do for the .be emailadresses and domains that were leaked, but each had doubts if it would fall within their mission (but publishing blablabla websites was no problem). It is even not that expensive and the hosting websites will even be happy because you can notify them of illegal information on their sites.

    At the least I think the two big ISP's in Belgium should do it for their domainnames and dns.be for the belgian .be domainnames. That would already cover a big part of the stolen identities market.

    And speed is important. One has to notify the sites, people and hosters as fast as possible after publication. This is the rat race.

    Facebook has now shown that it can be done. Maybe facebook should make its code accessable to other partners (Gmail, yahoo, microsoft, aol, etc....)


  • aren't these pretty barricades in Hong Kong (but where are the protestors gone ?)

    watch live here nothing happening absolutely nothing live now


  • Mad Putin proposed to Poland in 2008 to invade #ukraine and take possession of 5 western provinces

    this is like 1939 the other way round when Hitler proposed to Stalin (not the other way round) to invade Poland as a secret part of their non-aggression pact


    Maybe we understand now better why Poland and the other eastern countries are so afraid of Putin because he is so unpredictable and capable of anything

    would you ever believe that he was capable of doing or saying this ?

    And another thing 'the prime minister of Poland is talking with Putin and he knows that Putin is recording this conversation' (for propaganda goals). Does he still think he is a KGB operative playing spy or agent provocateur ? it is a mad mad world with people like this

  • the Chinese government put some espionageware in the new iphones

    Normally when you start the iphone you will still get a warning but if you ignore this because you don't understand it, than in fact you are giving everything away to the Chinese government

    "This is clearly a malicious attack on Apple in an effort to gain access to usernames and passwords and consequently all data stored on iCloud such as iMessages, photos, contacts, etc. Unlike the recent attack on Google, this attack is nationwide and coincides with the launch today in China of the newest iPhone. While the attacks on Google and Yahoo enabled the authorities to snoop on what information Chinese were accessing on those two platforms, the Apple attack is different. If users ignored the security warning and clicked through to the Apple site and entered their username and password, this information has now been compromised by the Chinese authorities. Many Apple customers use iCloud to store their personal information, including iMessages, photos and contacts. This may also somehow be related again to images and videos of the Hong Kong protests being shared on the mainland.

  • how to exfiltrate confidential data as videofiles without being detected

    it is one thing to get into a network

    it is a second thing to get to the confidential data

    but the most difficult thing is getting it out without being detected

    but if this is possible, it very easy (unless you have blocked the export of multimedia)

    source http://www.darkreading.com/attacks-breaches/in-plain-sight-how-cyber-criminals-exfiltrate-data-via-video-/a/d-id/1316725?

  • international coordinated police effort to classify and organize seized childporn pictures

    In the UK a database has been set up that will make it possible to limit the number of duplicate pictures and quicker find links between the pictures. It is called CAID

    "The CAID database is also part of a larger international effort called Project Vic that seeks to classify images held by forces around the world.Richard Brown from the International Centre for Missing and Exploited Children, which is helping co-ordinate Project Vic, said the two initiatives were using the same protocols to ensure images could be swapped back and forth easily.Seven other countries were already helping with Project Vic and more were expected to sign up soon, he said.


    "It is groundbreaking for law enforcement, tool providers, non-profits and industry to all stand together and agree on the need to standardize the approach to such egregious crimes," Mr Brown told the BBC

    standardizing could be done in many other sectors of cybercrime or malware

  • if you use TOR you should upgrade your tor client NOW

    "The first release of the 4.0 series is available from the Tor Browser Project page and also from our distribution directory.

    This release features important security updates to Firefox. Additionally, due to the POODLE attack, we have also disabled SSLv3 in this release.

    The primary user-facing change since the 3.6 series is the transition to Firefox 31-ESR.

    especially if you are living in a dictatorship, you should download the latest update because there are too many vulnerabilities in the older ones