Tuesday, May 26, 2009
Going Deep, Going Fast!!!
Who gets a patch???
Your Home D-Link Security...
Big Ups to DropBoks
For small online file storage, give this crew a peep.
Explanation: DropBoks is a little website that allows you to securely store your files online. No bells and whistles, just simplicity. Size: Your account has 1 GB of storage space. You can upload/download files (any format) as large as 50 MB. Security: Log in, and DropBoks switches to HTTPS . Your files are encrypted, authenticated, and secure. Cost: It's free, though we offer the option to upgrade your account for a small monthy cost if you like.
Check out their blog:
http://dropboks.wordpress.com
Wednesday, May 13, 2009
Are Virtualized Systems Better???
Powerpoint Holes...
Monday, May 11, 2009
Holes in McAfee...
Cyberwar Rules...Really???
Facebook Spam Scam...
Monday, May 04, 2009
Two Words: Ken Stone
Well, as promised, I now have a new FCP Discussion board. A special thanks to Christoph Vonrhein, of CHV-Electronics fame, he's the guy who builds all those great FC Studio plugins. He put this new board together for me.
As my old board was so heavily spammed, this new board does require a one time registration, "Create A New Profile". After you register you will receive an email, in the email, you must click on the link that is contained in the email to complete the registration process.
Some requested features have been added.
The ability to go back and edit your own post/reply after it has been posted.
There is a Tool Bar in the Message field that will allow you to customize your message.
You can now "Attach a file" (image) that will be automatically be uploaded with your post or reply and will be stored on my server (so you don't need an ISP account). If you attach a photograph wider than 920 pixels, the image will be scaled down to 920 pixels. You can Save the image, control (right-click) on the image and choose, 'Save Image to Desktop', or simply click on the image and drag it to your desktop.
Attach a file
Valid attachments: jpg, jpeg, gif, png, tif, tiff.
No file can be larger than 2 MB
2 file(s) can be attached to this message
There is also a "Private Message" feature to contact a board member privately. To use this feature, click on "Private Messages" in the menu bar. This will open a new window. Under Options, click on 'Send a PM'. A message window will appear. In the "To: Select Recipient" drop-down menu, select the board memeber that you want to communicate with. The recipient will receive an email and will also see a 'highlighted' link that says, "You have a new Private Message' in the menu bar at the top of the Discussion board window in his/her Browser. Click on this link (or on the link in the PM email) to view your PM and reply.
There is a 'Back' buton, it is called 'Message List'.
As this board is still a 'work in progress', please let me know if there is anything else that I can do to improve your posting experience, or if things are not working right for you.
Enjoy,
--ken
iPlotz: wireframe your ideas...
iPlotz allows you to rapidly create clickable, navigable mockups and wireframes for prototyping websites and software applications.
Create a project, add wireframe pages with design components and discuss your creations with others.

With iPlotz you can create clickable, navigable wireframes to create the experience of a real website or software application. You can also invite others to comment on the designs, and once ready, you can then manage the tasks for developers and designers to build the project.

Holes in Adobe Reader...
Another Adobe Reader security hole emerges. Security experts are recommending that people disable java_script in Adobe Reader following reports of a vulnerability in the popular portable document format reader on April 28. The vulnerability appears to be due to an error in the “getAnnots()” java_script function and exploiting it could allow someone to remotely execute code on the machine, according to an advisory from the US-CERT. “US-CERT encourages users and administrators to disable java_script in Adobe Reader to help mitigate the risk,” the post said. “To disable java_script in Adobe Reader, open the General Preferences dialog box. From the Edit-Preferences-java_script menu, uncheck ‘Enable Acrobat java_script.’” All currently supported shipping versions of Adobe Reader (8.1.4, 9.1 and
7.1.1 and earlier) are vulnerable and Windows, Macintosh and Unix platforms are affected, Adobe said in an advisory. The company said it would release updates for all the platforms but did not yet have a time frame for that. “We are currently not aware of any reports of exploits in the wild for this issue,” the advisory said.
Saturday, May 02, 2009
F-stops vs T-stops
f/number
Definition: Setting of lens diaphragm that determines amount of light transmitted by lens. * Equal to focal length of lens divided by diameter of entrance pupil. * f/numbers are, for convenience and by convention, placed on a scale in which each standard f/number step (f/1, f/1.4, f/2, f/2.8, f/4, f/5.6, f/8, f/11, f/16, f/22, f/32, f/45, f/64 and so on) represents a doubling in the amount of light transmitted e.g. f/4 transmits twice as much light as f/5.6; conversely, f/16 transmits a quarter of f/8. * Since f/number is usually calculated from simple physical dimensions, different lens designs, varying focus and the use of accessories may all affect the actual amount of light projected: one lens set to e.g. f/8 may not give quite the same exposure as another lens set to f/8...
T-number
Definition: f/number of a lens corrected for the light loss during transmission through the lens. * f/number of a perfectly transmitting lens which would give the same illuminance on the axis as that produced by the test lens. * Equals the f/number divided by the square root of transmittance (assuming a circular aperture) e.g. if transmittance is 50% (only half light entering system exits the system), square root of a half is 1/C2, so T-number is one stop more than the f/number, so a relative aperture of f/4 with transmittance 50% is a T/5.6 lens. * Also known as T-stop. Assuming the ideal The f/number of a lens is defined by simple geometry (one length divided by another) so it assumes that the lens passes all of the light entering it. But no lens does: each interface between media of different refractive indexes causes a loss. Modern lenses are amazingly efficient so losses are in practice very small and, at any rate, losses are automatically compensated by through-the-lens metering. T-numbers are important in film industry, where TTL metering is not common. ..
So the T stop is an accurate corrected transmission reference for a particular lens as opposed to the theoretical maximum. Both use the same exposure scale...
Thanks D. Rasberry
Friday, May 01, 2009
The Top Banks...
Here is a list of the 50 largest banks and savings institutions in the United States ranked by total deposits in thousands of dollars.
as of June 30,2007
Bank of America
North Carolina 5,728
596,584,899
JPMorgan Chase Bank
Ohio
3,108
439,996,000
Wachovia Bank
North Carolina
3,103
314,850,000
Wells Fargo Bank
South Dakota
3,255
263,664,999
Citibank
Nevada
1,036
210,289,000
Washington Mutual Bank
Washington
2,180
202,706,306
SunTrust Bank
Georgia
1,747
114,579,848
U.S. Bank
Ohio
2,590
113,097,080
Regions Bank
Alabama
2,087
88,388,815
Branch Banking and Trust Company
North Carolina
1,484
83,720,251
National City Bank
Ohio
1,451
82,374,824
HSBC Bank USA
Delaware
455
75,342,071
World Savings Bank, FSB
California
287
73,247,967
Countrywide Bank
Virginia
2
60,616,621
PNC Bank
Pennsylvania
836
59,188,198
Keybank
Ohio
965
57,286,597
ING Bank, fsb
Delaware
1
54,161,553
Merrill Lynch Bank USA
Utah
3
51,601,084
Sovereign Bank
Pennsylvania
745
49,134,698
Comerica Bank
Michigan
395
41,797,801
Union Bank of California
California
331
40,650,535
Commerce Bank
Pennsylvania
398
40,126,588
North Fork Bank
New York
356
38,059,484
Fifth Third Bank
Michigan
775
37,990,237
LaSalle Bank National Association
Illinois
138
34,653,022
E*TRADE Bank
Virginia
2
33,197,825
Bank
of the West
California
Citibank (South Dakota) N.A.
South Dakota
4
32,892,908
Manufacturers and Traders Trust
Company
New York
673
32,811,138
Harris National Association
Illinois
226
30,725,670
The Bank of New York
New York
9
29,601,000
Chase Bank USA,
Delaware
3
29,565,966
Marshall and
Ilsley Bank
Wisconsin
321
28,899,307
TD BankNorth
Maine
626
28,092,910
Fifth Third Bank
Ohio
415
27,054,097
USAA Federal Savings Bank
Texas
1
25,267,329
Citizens Bank of Pennsylvania
Pennsylvania
415
24,485,743
The Huntington National Bank
Ohio
424
24,121,042
Citizens Bank of Massachusetts
Massachusetts
262
23,713,359
LaSalle Bank Midwest
Michigan
268
23,435,977
Compass Bank
Alabama
420
23,405,240
First Tennessee Bank
Tennessee
259
21,763,800
Charter One Bank
Ohio
490
21,270,835
Capital One
Louisiana
354
20,567,194
Discover Bank
Delaware
2
20,343,620
UBSBank
Utah
1
20,222,245
Morgan Stanley Bank
Utah
1
19,535,000
Colonial Bank, National Association
Alabama
321
16,663,063
Banco Popular de Puerto Rico
Puerto Rico
202
15,269,000
TD Bank USA, National Association
New York
1
15,246,862
What's up with Puerto Rico???
Puerto Rico sites redirected in DNS attack. An attack on the main domain name system registrar in Puerto Rico led to the local Web sites of Google, Microsoft, Yahoo, Coca-Cola, and other big companies being redirected for a few hours on April 26 to sites that were defaced, according to security firm Imperva. Those sites and others including PayPal, Nike, Dell, and Nokia, were redirected to sites that were black except for messages in hacker lingo saying that the sites had been hacked. However, the sites themselves were not hacked, the chief technology officer at Imperva, said on April 27. A group calling itself the “Peace Crew” claimed that they used a SQL injection attack to break into the Puerto Rico registrar’s management system, he said. “We are seeing more and more of these DNS-related attacks and seeing them scale up,” he added. While the sites that visitors were redirected to were obviously not the legitimate sites, DNS redirects could be used to send unsuspecting Web surfers to phishing sites pretending to be banks where they would be prompted to provide sensitive information. People should use the SSL (Secure Sockets Layer) protocol for encrypting communications with sensitive sites and use anti-phishing technology in the browser that colors part of the URL address bar green or red based on the safety level of the site being visited.
Protect your PC running Windows OS...
Bitlocker, TPM won’t defend all PCs against VBootkit 2.0. Trusted Platform Modules and BitLocker Drive Encryption can protect Windows 7 computers against a bootkit attack unveiled recently but these technologies will not be available on a large portion of computers, leaving millions of users unprotected when Microsoft releases its next version of Windows. VBootkit 2.0 is proof-of-concept code that was unveiled by security researchers of NVLabs, at the Hack In The Box (HITB) security conference held in Dubai recently. The code, which is just 3KB in size, allows an attacker to take control of a Windows 7 computer by patching files as they are loaded into the system’s main memory. Because no software is modified on the computer’s hard disk, the attack is nearly undetectable. VBootkit 2.0 is an updated version of an earlier tool, called VBootkit 1.0, that can take control of a Windows Vista computer by a similar method. With VBootkit 2.0, once an attacker has taken control of the Windows 7 computer during the boot process they are able to get system-level access to the computer, the highest level possible. They can also remove user passwords to gain access to protected files and strip DRM (digital rights management) protection from multimedia files. The passwords can then be restored, hiding any evidence that it was compromised. “There is no fix for this. It cannot be fixed. It is a design problem,” one of the program designers said during his presentation last week, referring to Windows 7’s assumption that the boot process is safe from attack. In response, a Microsoft representative said Windows 7’s support for Trusted Platform Module (TPM) and BitLocker Drive Encryption (BDE) means the attack is “void,” downplaying the threat to users.
17 is Now An Adult....If You are a hacker...
Teenaged hacker decreed for 11 months. A teen computer hacker who controlled several systems in botnet attacks has to face an imprisonment of 11 months in an adolescent prison. The 17 year old from Worcester, Massachusetts, referred to N.H. in court records or by his online name Dshocker, beseeched guilty of system fraud, four cases of wire cheating, and interstate threats during November 2008. N.H. also obtained stolen credit card numbers and purchased goods and services from them both for himself as well as for others. He assisted several carders purchase goods from these stolen cards teaching an associate who worked for a big shipping firm to redirect the packages of goods either to himself or to other carders. While announcing his punishment in the second week of April 2009, he was also granted two years probation period. Federal prosecutors informed that from November 2005 to May 2008, the accused also hacked the commercial computer systems to steal details and spread bogus bomb threats. As per the U.S. Attorney Office, the teenager issued orders to a control server commanding a network of thousands of systems to assail the target system, collapsing it or turning it slow, refuting services of that computer to the users. That is called “distributed denial of service attack.” The accused also confessed to obtaining unauthentic access to several systems repeatedly, which includes Road Runner, Comcast and Charter Communications, and robbed customer data. He also gained unauthentic access to the proprietary software and firmware of a company to amend cable modems, enabling him and others free web access.
How Smart are Hackers??? Smart Enough....
Cybercriminals adopt industrial methods to enhance effectiveness. Cybercriminals have become industrialized to increase their effectiveness. They are increasingly using encryption to cover their tracks and prevent forensic investigators from recovering evidence, according to a security researcher for SecureWorks. The researcher, speaking at the RSA Security Conference in San Francisco on April 23, said the criminals are using virtual private networks to siphon stolen information from hacked companies so the stream of exiting data often goes undetected by the victim. They have also wised up to encrypting their hard drives so even when they are captured by authorities, evidence stored on their computers cannot be cracked. A security consultant and operator of MyNetWatchman, who spoke on a panel with the researcher, described malware-distribution services that help malicious-code creators infect machines with viruses and keystroke logging programs. The entrepreneurs behind the distribution services control legions of hacked computers corralled into botnets, and charge customers (other hackers and spammers) for the privilege of running their own malware on the hacked machines. The going rate for infection distribution varies from $5 per 1,000 computers in Asia to $130 for 1,000 installations in the United States. The distribution services are just one example of the ways that criminals in the computer underground have become industrialized to trade niche skills and expertise. The security consultant also described anonymization VPN services catering to the underground that use hijacked botnet computers to hide a criminal’s tracks. Using a VPN client, a criminal can choose any hacked system or node on the botnet through which to tunnel his traffic or access a victim’s bank account.
Lawmakers Re-Exmaine Internet...HAHAHAHAHA
Lawmakers to re-examine Internet-sharing software. A House committee is reopening its investigation of Internet services that let computer users distribute music and movies online amid reports the same software was exploited to gain unauthorized access to government and private data. The House Oversight and Government Reform Committee sent letters Monday to the Justice Department, Federal Trade Commission and The Lime Group, which runs LimeWire, a popular file-sharing service. The letters sought information about any such breaches and what the current administration and company are doing to protect against them. Asked about the renewed investigation, a LimeWire spokeswoman responded, “We at LimeWire understand that Internet safety is paramount, and we strive to offer peer-to-peer’s most secure technology.” She said the company had worked with other P2P providers and regulators to develop and implement protections, including changes in default settings; file-sharing controls; shared folder configurations; and sensitive-file-type restrictions. “Our newest version, LimeWire 5.0, by default, does not share sensitive file types such as spreadsheets or documents,” she said. “In fact, the software does not share any file or directory without explicit permission from the user.”
Want to sell a Nokia Cellphone??? Why??
Nokia: We don’t know why criminals want our old phones. The mystery why cybercriminals want a discontinued Nokia phone is not getting any clearer. Hackers have been offering up to US$32,413 in undergrounds forums for Nokia 1100 phones made in the company’s former factory in Bochum, Germany. The phone can allegedly be hacked so as to facilitate illegal online banking transfers, according to the Dutch company Ultrascan Advanced Global Investigations. Nokia maintains the phone’s software is not flawed. “We have not identified any phone software problem that would allow alleged use cases,” the company said in an e-mailed statement. The 1100 can apparently be reprogrammed to use someone else’s phone number, which would also let the device receive text messages. That capability opens up an opportunity for online banking fraud.
Bot Monster Hunt...
Cops hunting monster-botnet builders. The FBI and British law enforcement authorities are trying to hunt down hackers responsible for the largest botnet ever known to the IT world, according to a California-based Internet security company. Finjan’s Chief Technology Officer has told the Financial Times that six people based in Ukraine are suspected of compromising 1.9 million computers worldwide in just two months — many of them in the United States. London’s Metropolitan Police department confirmed to CBS News on Wednesday that their e-crime unit was investigating a botnet created by Ukrainian hackers. The Met would not say what other agencies they are working with, but they do often work with other agencies on cases involving international cyber-crime, including the FBI. According to Finjan, nearly half of the infected computers were in the United States and almost 80 percent of the infected computers were running Internet Explorer, while 15 percent were using the Firefox Web browser, CNET reported. Some critics have said Finjin has not provided evidence that this is the biggest botnet ever.
Adobe Reader Exploit
F-Secure says stop using Adobe Acrobat Reader. With all the Internet attacks that exploit Adobe Acrobat Reader people should switch to using an alternative PDF reader, a security expert said at the RSA security conference on April 22. Of the targeted attacks so far this year, more than 47 percent of them exploit holes in Acrobat Reader while six vulnerabilities have been discovered that target the program, the chief research officer of security firm F-Secure, said in a briefing with journalists. Just last month, Adobe issued a fix for an Acrobat Reader hole that attackers had been exploiting for months, after issuing a patch for a critical vulnerability in Flash player the month before. In 2008, the favored targeted attack vector was Microsoft Word, which had 15 known vulnerabilities, compared to Acrobat Reader’s 19, and which represented 34.5 percent of the attacks, compared to 28.6 percent for Acrobat Reader, he said. Top-level executives, defense contractors, and other people who have access to specific sensitive corporate or government information are subject to targeted attacks where an attacker sends a file that has malicious code embedded in it. Once the file is opened, the computer is infected typically with a back door that then steals data. PDF and Flash browser plug-ins are also used in attacks known as “drive-by downloads” in which malware is surreptitiously downloaded onto a computer while the user is surfing the Web. The number of PDF files used in attacks rose from 128 between January 1 and April 16 last year to more than 2,300 in that same time period during this year, the chief research officer said.
Twitter Worm...
Teen takes responsibility for Twitter worms. As a second Twitter exploit began circulating on the micro-blogging site on April 12, a teenager from Brooklyn told CNET News he created both worms because he was bored and wanted to draw attention to the Twitter flaw. Much like the April 11 StalkDaily worm, the “Mikeyy” worm posts unwanted messages to users’ pages. The “Mikeyy” worm began spreading on the micro-blogging site on April 12, posting messages such as “Mikeyy I am done...,” “MikeyyMikeyy is done.,” and “Twitter please fix this, regards Mikeyy.” A 17-year-old Brooklyn resident told CNET News in an interview that he created the worm “out of boredom.” “I thought about it later and basically did it because I was bored,” he said. “And I did not think Twitter would fix (the flaw) very soon. But I did not think it would spread as far or as fast as it did.” Twitter said it has closed the hole that allowed the worm to spread. “We have taken steps to remove the offending updates, and to close the holes that allowed this ‘worm’ to spread,” Twitter said in a statement on April 11. “No passwords, phone numbers, or other sensitive information were compromised as part of this attack.” However, the creator of the worm said he released the second worm exploiting the original flaw on April 12, after Twitter claimed to have closed the holes. He also said that he had not yet been contacted by Twitter representatives.
New Skype vulnerability discovered
A new phishing attack demonstrated by researchers at Secure Science allows hackers to gain access to a user’s Skype client and then pose as a financial institution or proxy outbound calls. The technique is called “SkypeSkrayping” and is similar to a phishing attack only a bit more interactive. According to the report, sing either an inline frame (“iframe”) or image (“img”) tag, attackers could add a Specific Call Forwarding Number, grant attacker ability to receive the victim’s incoming call, obtain a Skype-To-Go Number, and/or grant an attacker the ability to access victim’s voicemail, speed dial, and outbound calling via Spoofed Caller-ID. The company’s IT department is working on resolving the problem.