Russian Cosmonauts Occasionally Infect the ISS with Malware


Published in: on November 12, 2013 at 4:52 pm  Leave a Comment  

10 awesome PC games that feel just like work

10 awesome PC games that feel just like work
Alex Cocilova @TheBrowncoat88 Nov 11, 2013


Published in: on November 12, 2013 at 3:48 pm  Leave a Comment  

Hackers leak 1 million Apple device IDs


To cap off a summer of devastating corporate data breaches, hackers yesterday posted online what might be the crown jewel of 2012 data dumps: 1 million identification numbers for Apple iPhones, iPads and iPod Touch’s, all purportedly stolen from the FBI.

There may also be an additional 11 million Apple device IDs yet to be released, many with users’ full names, addresses and telephone numbers attached.


“Why exposing [sic] this personal data?” asked the unnamed writer of the Pastebin posting announcing the data dump, who claimed to be affiliated with the anti-government hacktivist group AntiSec. “Well, we have learnt it seems quite clear nobody pays attention if you just come and say ‘Hey, FBI is using your device details and info and who the [expletive] knows what the hell are they experimenting with that,’ well sorry, but nobody will care.”

The FBI has asked other websites to remove the link to the Pastebin posting on the grounds that the posting is spreading malware. SecurityNewsDaily can find no evidence of embedded malware in the Pastebin page, but reminds users to run an anti-virus scan on any material downloaded from file-sharing sites.

“If this story is true, then the real question becomes one of why an FBI agent is carrying this personally identifiable information on his laptop, and what sort of security practices the FBI is taking to protect that information,” said Jennifer Granick, a digital-rights attorney who is currently the director of civil liberties at the Stanford Law School Center for Internet and Society.

Safe … for now
Users of the 1 million affected devices are, for the moment, probably not in any danger of identity theft or account takeovers. However, they may want to know why the FBI apparently had their device IDs on file.

“I’d say the owner has already been subject of theft, if Apple or a software manufacturer has been providing government agencies with the ability to track the identities of the devices’ owners,” said Jonathan Zdziarski, an iPhone forensics specialist with Chicago-based security firm ViaForensics. “I don’t think the UDID itself could be used to attack the owner.”

[ 10 Ways the Government Watches You ]

Apple unique device identification numbers (UDIDs) establish a single iOS device’s identity in the Apple ecosystem, letting iTunes and app developers know which device is running what.

UDIDs are what lock most iOS devices into installing only software from the iTunes App Store, and what let game developers keep track of each user’s high score.

The 88-megabyte file posted by AntiSec on several file-sharing sites is heavily encrypted, but the Pastebin posting offers detailed instructions for decrypting it using open-source software.

To check whether your iPhone, iPad or iPod Touch’s UDID might be among those affected, a software developer based in Florida has already posted a tool at

Apple UDIDs can be found by plugging an iOS device into a computer, opening iTunes and clicking on the device serial number displayed.

Mac-centric website MacOS Rumors has verified that many of the UDIDs in the data dump are genuine, but notes that “UDIDs themselves are rather harmless in isolation.”

However, New Zealand-based security researcher Aldo Cortesi has shown that thanks to disregard of Apple’s security guidelines by iOS game and app developers, it’s possible to determine a user’s identity through a UDID alone.

Hacker counterintelligence
The Pastebin post claims that the UDIDs were stolen thanks to an Anonymous hack into the laptop of FBI agent Christopher Stangl, a member of a New York-based cybercrime task force.

Stangl has spoken publicly on matters of cybersecurity, appearing in February 2011 on a panel discussion on cybercrime attended by SecurityNewsDaily. Two years earlier, he starred in a FBI recruitment video posted on Facebook.

Stangl was also among 44 American and European law-enforcement personnel copied on an email, sent in January 2012, inviting recipients to join a conference call to discuss efforts against the hacktivist groups Anonymous and LulzSec.

Anonymous intercepted the email and used it to eavesdrop on and record the conference call, which they then posted online in February 2012.

According to yesterday’s Pastebin post, hackers used a then-new Java exploit to get into Stangl’s machine.

“During the second week of March 2012, a Dell Vostro notebook, used by Supervisor Special Agent Christopher K. Stangl from FBI Regional Cyber Action Team and New York FBI Office Evidence Response Team was breached using the AtomicReferenceArray vulnerability on Java,” the posting states. “During the shell session some files were downloaded from his Desktop folder one of them with the name of ‘NCFTA_iOS_devices_intel.csv’ turned to be a list of 12,367,232 Apple iOS devices including Unique Device Identifiers (UDID), user names, name of device, type of device, Apple Push Notification Service tokens, zipcodes, cellphone numbers, addresses, etc. the personal details fields referring to people appears many times empty leaving the whole list incompleted on many parts.”

“No other file on the same folder makes mention about this list or its purpose,” adds the writer of the Pastebin post.

“CSV” is the Windows filetype associated with a list of comma-separated values, which separate database entries with a comma and can be read by Microsoft Excel and many other applications.

“NFCTA” may refer to the National Cyber-Forensics & Training Alliance, a Pittsburgh-based non-profit organization that, in its own words, “functions as a conduit between private industry and law enforcement with a core mission to identify, mitigate and neutralize cybercrime.”

It is not clear why an FBI agent would have a database of 12.4 million iOS device UDIDs on his laptop, nor why the NFCTA would have provided them to him.

Requests for comment by SecurityNewsDaily to Apple and the NFCTA were not immediately returned. An FBI spokeswoman said the bureau was aware of the reports but had no further comment.

Sprechen Sie Deutsch?
In a blog posting this morning, Errata Security CEO Robert Graham theorizes that the hackers may have used the intercepted FBI email to “ spear phish ” the email’s recipients, luring them to a rigged website that would have loaded the brand-new, or “zero-day,” Java exploit onto their machines.

“If I have an email list of victims, and a new [zero]-day appears, I’m immediately going to phish with it,” wrote Graham. “It’s not Chinese uber APT [advanced persistent threat] hackers, it’s just monkeys mindless[ly] following a script.”

Graham Cluley, a security researcher with the British firm Sophos, pointed out today that the Pastebin writer may be a native German speaker thanks to an impolite message in German to Mitt Romney at the end of the post. The stilted English grammar, frequent use of the preposition “so” to begin sentences, a reference to Austrian banks and a Goethe quotation also indicate a German-language connection.

As might be expected, the writer makes shout-outs to Anonymous, WikiLeaks, the Syrian rebels and the imprisoned Russian punk band Pussy Riot, and criticizes National Security Agency head Gen. Keith Alexander’s appeal in July to hackers to join the government.

But the writer also cites Jack Henry Abbott, the prison-based writer who was paroled in 1981 thanks to the efforts of famed author Norman Mailer. Abbott killed another man six weeks into his parole and spent the rest of his life in prison.

The writer also uses the Latin phrase “argumentum ad baculum,” or “appeal to the stick,” the proposition that arguments, however flawed, can be won through use of force.

In a dig at the press, the writer also demands that Adrian Chen, a technology reporter at the gossip blog Gawker who has written extensively on Anonymous, humiliate himself on camera.

“No more interviews to anyone till Adrian Chen get featured in the front page of Gawker, a whole day, with a huge picture of him dressing a ballet tutu and shoe on the head,” the posting says. “No Photoshop.”

Update 1:30 p.m. ET, Sept. 4: A law enforcement official who spoke to NBC News on condition of anonymity said that there is no evidence the FBI ever requested the Apple data through the legal process. It’s believed to be likely a hoax designed to infect other users because of malware in the posting. No evidence, so far, of any FBI computers being compromised, though that is still being checked.

Published in: on September 4, 2012 at 8:11 pm  Leave a Comment  

Fans resurrect Half-Life video game

Fans resurrect Half-Life video game

Half-Life screenshot The blocky graphics of the original game are getting an overhaul with the updated version
Continue reading the main story

Related Stories

After eight years of work, fans are about to release an updated and expanded version of classic video game Half-Life.

Called Black Mesa, the resurrected game will be made available as a free download on 14 September.

The update has been put together using programming tools released by Half-Life creator Valve.

It will have improved graphics, better physics and environmental effects and a tweaked story line.

News about the long-awaited update broke at the weekend when a countdown timer appeared on the Black Mesa project webpage.

A forum message posted soon after revealed that eager players would not get an improved version of the entire game on 14 September.

Carlos Montero, leader of the 40-strong Black Mesa development team, said it decided to release a shorter version instead of making people wait longer for the whole thing.

Alien intrusion

The large chunk of Half-Life that is finished lets players guide hero Gordon Freeman to a section of the original gameplay known as Lambda Core. Finishing this first chunk should take players between eight to 10 hours.

The final section yet to be finished takes place in the alien Xen dimension. An expanded Xen section would be released at an unnamed date in the future, said the team.

First person shooter Half-Life was released in 1998 and gave players the task of guiding government scientist Gordon Freeman through the Black Mesa research complex battling aliens and thwarting their attempt to invade Earth. The game has been hugely influential since its release.

Half-Life creator Valve released an updated version of the game in 2004 that was built around its Source game code or engine. That official update of Half-Life was generally regarded as unsatisfactory and led to the Black Mesa project which aimed to do a better job.

The project uses an updated version of Source which leads to improvements in physics, lighting and allows for far more subtlety in the facial expressions of characters.

The Black Mesa team has also edited the storyline to beef up the more engaging parts of the game and eliminate the slower parts.

Published in: on September 4, 2012 at 3:51 pm  Leave a Comment  

The Hall of Fame OldFiles Network

Windows jealous of DOS

This is indeed a cool site for those of us DOS lovers.

We are a generation born under the legacy of the DOS prompt . Yes! for  hundred millions of us, this is the reason why we still love the retro- speed and stability of DOS, rather than the monotonous interaction through zillions of mouse clicks in the slow pace of the Windows environment.

Many school graduates do not dive into the depth,  and do not taste the power behind the shell, saved for a few lines of commands learned in a hurry in order to pass the A plus exam;  sad but true.

Have fun!

and for those who love nothing but graphics here is a good site below with history of graphics environments:

Published in: on July 6, 2007 at 1:16 am  Leave a Comment  

Microsoft signs technology pact with Linspire

“Announcing the latest in a series of pacts with Linux sellers, Microsoft said late Wednesday that it has inked a deal with Linspire, a company it once sued for trademark infringement.

The two companies made peace in 2004, with Linspire agreeing to shed its Lindows name and Microsoft paying the company $20 million. Linspire also got the right to use certain Windows Media codecs and settled Microsoft’s trademark infringement claims.

Under the latest deal, the two will be working more closely in a variety of areas, including instant messaging and Web search. In addition, purchasers of Linspire’s paid Linux version will get intellectual property protection against any legal action by Microsoft for using the Linux desktop software. Linspire doesn’t plan to include either the Microsoft technology or the patent protection in its no-charge Freespire product.

“We’re going to include it with Linspire, and we are not going to raise the retail price,” Linspire CEO Kevin Carmony said Wednesday.

It’s just the latest in a series of Linux-related deals. Things started last November when Microsoft and Novell struck a controversial arrangement that provided, among other things, patent protections for users of Novell’s Suse Linux. Microsoft has since struck a deal with Xandros as well.

Microsoft also has noted that Linux protections have been part of its recent cross-licensing pacts, including patent-swap deals with LG, Samsung and Fuji Xerox.

“What this deal is evidence of is this continued effort by a variety of Linux providers and Microsoft to build a bridge between our different platforms,” said David Kaefer, Microsoft general manager of intellectual property licensing.

The companies did not go into the financial terms of the deal, but Kaefer said, “Clearly both of us expect to make money on the arrangement.”
As part of the deal, Linspire will make Microsoft’s Live Search the default search engine in Linspire and will get an extension to its license of the Windows Media technology, including access to Windows Media 10 codecs.

Microsoft also will license some fonts and voice over IP technology for use in instant messaging, while Linspire will join an effort to create translators between Office 2007’s XML file formats and the OpenDocument format. ”

Published in: on June 19, 2007 at 12:42 pm  Leave a Comment  

Safari the Fastest Web Browser in the Planet Beta released for Windows


Mac Emulation Resources » Ultimate Mac Emulation…Safari For Windows. Not Even Kidding

“Ultimate Mac Emulation…Safari For Windows. Not Even Kidding It’s here and it’s actually a surprise. We knew we were going to hear about secret-until-now features about Leopard. We figured there would be talk about iPhone’s third party capabilities. But this takes the cake. Safari on Windows? I seriously thought he was joking. Nope. No joke. I am typing this on Safari 3 on my BlackBook, and I highly recommend (and if I could, I would even require) that you download Safari 3 whether you’re a Windows or Mac user. The speed on this is blazing. Leaves Firefox in the dust! You can click here to download it. I suggest you do so ASAP. I can’t even begin to express the urgency one should do this in. UPDATE: Two days after the download and I’ve had not even one crash. I Ran it side by side with Firefox and I actually became impatient with Firefox 2. Maybe Firefox 3 will change things, but right now Safari 3 is much faster. Have any mac users with this beta had any crashes? I have yet to have any at all, and I run pretty resource-hungry websites. I have only noticed one bug. On the game iLike in Facebook, the game tells me there is an error receiving my answer the first time, but the second time it works. Other than that though, absolutely nothing.”

Published in: on June 18, 2007 at 3:57 am  Leave a Comment  

Web Browser won’t load images


Saturday, June 16, 2007

Web Browser won’t load images- (in Explorer or Firefox)

On a yahoo newsgroup web site I tried to view some pictures or images and Firefox Web Browser version 2.0 or Microsoft Windows Internet Explorer 7.0 failed to download the jpeg images. As soon as I disabled Zone Alarm Pro firewall the problem was solved.

The firewall was blocking access to those images and I did not know why.

To solve the problem I just opened Zone Alarm Pro console and clicked on PRIVACY then on site LISTING menu I selected and allowed PRIVATE HEADER. When I reloaded the page on both web browsers then the images were visible.

Published in: on June 18, 2007 at 3:05 am  Leave a Comment  

Windows Vista DVD: Who Are Those People In That Picture?

Windows Vista DVD: Who Are Those People In That Picture?

Windows Vista Virtual Easter Egg:

Kwisatz has discovered a picture of three guys on the Windows Vista DVD cover. Who are they? What’s the purpose? Does Bill Gates know about it?

I guess it’s just a prank, but by whom?

He has taken the photos with a Nikon 5700 (click on images to enlarge):
He also says there are three more holographic pictures on the cover, but he hasn’t been able to figure out what’s depicted in them.

Do you have a Vista DVD and a microscope?

Head over to the Kwisatz site (spanish language) for more photos.

Update: Paul McNamara over at NetworkWorld sent a mail to the Microsoft PR agency to ask about their identity. The PR agency: “No comment”.

Update: I see some people are suggesting the hologram could be an anti-piracy measure. But, then again, the pictures are on the cover, not on the DVD itself.


Labels: entertainment, informatics, picture, technology

Published in: on June 14, 2007 at 1:07 am  Leave a Comment  

In Linux is difficult and almost an undaunting ta…

In Linux is difficult and almost an undaunting task the configuration of a wireless network. But the good news is that a direct connection to a DSL AT & T modem works like a champ using a distro such as Ubuntu or Red Hat. Other than that: Linux is faster than Windows and more flexible and intuitive. If you are too attached still to windows and wants something that looks similar to Linux try Lindows now called Linspire, but bear in mind that this bistro is not free.

The Linux support forums are outstanding and best of all free of charge And by the way you don’t spend too much time in linux seeking for viruses and spyware.

[b]Multitasking makes it possible for a single user to run multiple applications at the same time.[/b]

Linux reminds me a lot of the old 0S/2 and Amiga Preemptive multitasking/time-sharing capabilities. With Windows in the other hand for example and with the slow loading of an application such as MS word it seems like it takes “forever” to show up. In Unix/ Linux this is the opposite, with hardly any waiting period.

To explain it better: Linux/Unix operating system is designed as preemptive multitasking giving better results as far as system responsiveness and scalability. Although in many of the official “status quo” definitions Windows falls into this also preemptive multitasking category and MS techies would affirm cathegorally that I’m wrong by me saying otherwise or that Windows’ approach is based more on the concept of cooperative multitasking (a process which explicitly yield to other processes) instead. But based in the actual Windows XP poor performance and -in this context- I still think Windows behaves more like a cooperative multitasking system and it is not in essence a true multitasking operating system, because Windows is really multi-threading and not multitasking. And my conclusion is based on what I have seen and not by what Microsoft claims to be. I do not think Windows is truly multi-tasking, but appears to be imitating multitasking based on its kernel, just like appears to imitate Apple superior operating system since MS released Windows 95 is been trying constantly to be number one. MS is disappointing users and this has been proven recently with the hurdles and flaws exhibited by its latest incarnation of Windows Vista.

Please, don’t believe what I say and just give Apple a chance and for now you could even try Linux for free. As a matter of fact Mac OS architecture is derived from Unix. 🙂

If you don’t have enough money for a Laptop give consideration to a Desktop. I think Mac-Mini is a good option for beginners.

Published in: on June 12, 2007 at 1:10 am  Leave a Comment