yeah you read it
they will never go to Antartica
In fact they are constructed to survive in electronic warfare attack and to keep attacks off that try to intercept communications (Tempest)
If in the next war you can't defend yourself against the electronical signals and protect your own, than you have lost, no matter how big your bomb is
by the way Russia is building an enormous Electronic warfare base in Kalingrad the Russian enclave that oversees the baltic sees (he is sending a few hundred electronic and cyberwarfare soldiers there)
These big gamers sites are all about the money, about having advertising and the advertisers all want to be hip and cool and not be embroiled in an online war between young women who happen to be gamers but of a different kind (even if professional gamer specialists say that women are the new market as the men market for gaming is already totally conquered and every industry looks for enormous expansion to be able to invest and develop and grow and diversify)
but as they didn't win on the public forum about the place that women couldn't have in their gamers environment, they went on the attack against the firms who often lack the moral courage to withstand public campaigns and fight for the freedom of each to live, speak and breath whatever the sex, religion, race or political opinion
"On October 1, the computing giant Intel pulled its ads from Gamasutra, a trade website for game developers, over an essay called "'Gamers' don't have to be your audience. 'Gamers' are over" by a journalist named Leigh Alexander. Intel had been successfully harassed by a small, contemptible crusade called "Gamergate"—a campaign of dedicated anti-feminist internet trolls using an ill-informed mob of alienated and resentful video game-playing teenagers and young men to harass and intimidate female activists, journalists, and critics.
Unable to run Alexander out of game writing, as they had with the writer Jenn Frank, or force her from her home, as they did to the developer Brianna Wu, or threaten her from public engagements, as they did the following week to the critic and activist Anita Sarkeesian, Gamergate went after her publisher. And, in an unbelievable and embarrassing act of ignorance and cowardice, Intel capitulated. The company's laughable "apology," released late on that Friday afternoon, didn't cover up the fact of Gamergate's victory: Intel was not replacing its ads.
And other advertisers followed suit and those big gamer communities are losing hundreds of thousands of dollars. But now it is time for the others to go back on the offense against the firms who didn't stand firm, who didn't defend our and your freedom and let the bullish gangs cry victory. Even in Football stadiums girls and women go with men to see the match and support their teams together. There are even women in the police, the army and other professions that were before solely for men. Why should gaming be different ? And every woman working for firms like Intel or buying products from Intel or distributing them should tell Intel they were wrong because by withholding their advertising because of a gang of people who have no respect for the rights of others they go against any moral leadership they claim in all of their social responsability ads.
If women can be no part of the community there is no community.
well there are only two ways
or you have only fysical access and that means that you have to open the door and type a new message in
or it works wireless and than you have to observe the kind of system, look up the administrative password that probably will still be the same and than you log on with your wifi (look at the logons if you keep that) and set the message
Stefaan is shit
I'll have a look at it tomorrow in the train :) and report back to you later
if I got more info (anybody knows the name of the system ?)
this one is used by millions
and so on and so on and so on
but others are doing the right thing by disactivating SHA1 like Belgacom - nice
well now you will be the joke
maybe you need a spank
"Regardless of where the exploit came from, users who have not yet installed the latest Flash Player updates should do so as soon as possible; especially companies, where automatic updates are typically disabled and the patch deployment process takes longer.
Windows and Mac users should update to Flash Player 188.8.131.52, or 184.108.40.206 if they’re using the extended support release. Users of Flash Player on Linux should upgrade to version 220.127.116.111. The Flash Player plug-ins bundled with Google Chrome, Internet Explorer 10 and Internet Explorer 11 will receive patches though the update mechanisms of those browsers.
Adobe also released updates for its AIR application runtime and software development kit (SDK), since the program bundles Flash Player.
this is the website http://www.sha2sslchecker.com
it offers a clear explanation and a information about how to set up your migration
"Federal officials warned companies Monday that hackers have stolen more than 500 million financial records over the past 12 months, essentially breaking into banks without ever entering a building.
"We're in a day when a person can commit about 15,000 bank robberies sitting in their basement," said Robert Anderson, Jr., executive assistant director of the FBI's Criminal Cyber Response and Services Branch.
The U.S. financial sector is one of the most targeted in the world, FBI and Secret Service officials told business leaders at a cybersecurity event organized by the Financial Services Roundtable. The event came in the wake of mass hacking attacks against Target, Home Depot, JPMorgan Chase and other financial institutions.
is anybody going to get some new legislation ? give more police and powers ? control more services if they are following regulations ? fine some people so they won't forget ?
nah, they don't panick when they give those numbers like that, so why should you
maybe it ain't true and it ain't so bad
because if it was really bad than he probably would be acting otherwise and would ask for resources and new regulations
we have published it here
because this has been used for years before it was patched now by Microsoft
and because it is and was used against critical infrastructure
and because it is published online and circulating freely
this is what a Russian commentator says
"current polls suggest that “there will be almost no pro-Russian deputies” in the Verkhovna Rada to be elected on October 26. And Putin needs to achieve his goals in the next few months before the situation in the occupied territories becomes “truly catastrophic” and potentially explosive for Russia itself.
Given the approach of winter and the reluctance of the EU to put its gas supplies at risk by a new round of sanctions, Putin has every reason to move quickly. And “if Russian forces and their allies in the Donbas do not achieve real successes, perhaps, they will attack along the entire line of the border
and later today one of the rebel leaders said that the ceasefire is over
while new pictures have emerged from Russian military transports to Ukraine
the elections are near and very clear, there will hardly be any prorussian elected, so Putin has nothing to win if the elections take place because he can't lose anything
so don't be surprised if we have some surprises in the coming week
wow this will stirr some problems in the trust relationship
the president of the BND was briefing the Parliamentary commission about the indications and thoughts he had about the shooting of the airline but he doesn't had any proof. Only one member of the commission didn't understand it like this and told Der Spiegel that the intelligence agency BND had enough evidence.
perfect for the Russians
and the stories about the stolen BUK's from Ukraine were also planted.
omnipresence of mobile lights and police is the new communitypolicing in crime ridden NY neighborhoods
first at night they place mobile lights with generators everywhere where there is not enough light
there is no darkness as cover, you can see in the parks everything and everybody around you
and the drug streetcorners are being taken over by cops, every corner a few of them
not stopping and checking on everybody but being there to convince you that this is neither the time nor the place to do some crime there
and to keep everybody wondering what it is all about
nobody is communicating the official policies and strategies
why is this important because the whole western world has studied the policies they have used in NY to diminish crime (zero tolerance) and the defects of some other policies
what works in NY will be copied by police forces all over the western world
"Facebook is looking for your stolen passwords. On Friday, the social network announced that it built a system that will actively search sites for stolen credentials and then reference that data with its own records. "This is a completely automated process that doesn't require us to know or store your actual Facebook password in an unhashed form," Facebook security engineer Chris Long wrote in a post. "In other words, no one here has your plain text password." If there is a match, users will be notified by Facebook.
there are other volunteer and commercial services that say that they are doing the same thing but you have to trust them that they scrape everything instantly and that they don't miss out one publication on websites that are under watch (because they are on holiday for example).
It is a system I have been trying to sell as an idea to the cert.be and to dns.be to do for the .be emailadresses and domains that were leaked, but each had doubts if it would fall within their mission (but publishing blablabla websites was no problem). It is even not that expensive and the hosting websites will even be happy because you can notify them of illegal information on their sites.
At the least I think the two big ISP's in Belgium should do it for their domainnames and dns.be for the belgian .be domainnames. That would already cover a big part of the stolen identities market.
And speed is important. One has to notify the sites, people and hosters as fast as possible after publication. This is the rat race.
Facebook has now shown that it can be done. Maybe facebook should make its code accessable to other partners (Gmail, yahoo, microsoft, aol, etc....)
watch live here nothing happening absolutely nothing live now
this is like 1939 the other way round when Hitler proposed to Stalin (not the other way round) to invade Poland as a secret part of their non-aggression pact
Maybe we understand now better why Poland and the other eastern countries are so afraid of Putin because he is so unpredictable and capable of anything
would you ever believe that he was capable of doing or saying this ?
And another thing 'the prime minister of Poland is talking with Putin and he knows that Putin is recording this conversation' (for propaganda goals). Does he still think he is a KGB operative playing spy or agent provocateur ? it is a mad mad world with people like this
Normally when you start the iphone you will still get a warning but if you ignore this because you don't understand it, than in fact you are giving everything away to the Chinese government
"This is clearly a malicious attack on Apple in an effort to gain access to usernames and passwords and consequently all data stored on iCloud such as iMessages, photos, contacts, etc. Unlike the recent attack on Google, this attack is nationwide and coincides with the launch today in China of the newest iPhone. While the attacks on Google and Yahoo enabled the authorities to snoop on what information Chinese were accessing on those two platforms, the Apple attack is different. If users ignored the security warning and clicked through to the Apple site and entered their username and password, this information has now been compromised by the Chinese authorities. Many Apple customers use iCloud to store their personal information, including iMessages, photos and contacts. This may also somehow be related again to images and videos of the Hong Kong protests being shared on the mainland.
it is one thing to get into a network
it is a second thing to get to the confidential data
but the most difficult thing is getting it out without being detected
but if this is possible, it very easy (unless you have blocked the export of multimedia)
In the UK a database has been set up that will make it possible to limit the number of duplicate pictures and quicker find links between the pictures. It is called CAID
"The CAID database is also part of a larger international effort called Project Vic that seeks to classify images held by forces around the world.Richard Brown from the International Centre for Missing and Exploited Children, which is helping co-ordinate Project Vic, said the two initiatives were using the same protocols to ensure images could be swapped back and forth easily.Seven other countries were already helping with Project Vic and more were expected to sign up soon, he said.
"It is groundbreaking for law enforcement, tool providers, non-profits and industry to all stand together and agree on the need to standardize the approach to such egregious crimes," Mr Brown told the BBC
standardizing could be done in many other sectors of cybercrime or malware
The primary user-facing change since the 3.6 series is the transition to Firefox 31-ESR.
especially if you are living in a dictatorship, you should download the latest update because there are too many vulnerabilities in the older ones