Latest Top Virus Warnings
Todays Fry's AdCheck out the AMD XP2600+ w/ mobo at the bottom of Page One. The mobo is crap but the cheapest price for a 2.6Ghz Proc is $84 on pricewatch.com. On Page Two, there is a 2.8 Ghz 533Mhz Pentium 4 with ECS motherboard but the motherboard is crap. The chip would go for $156 on Pricewatch so it's still a good deal. There is a Maxtor 120 Gb for $90 also. Have fun at Fry's this weekend
Fry's Deals Page OneSection from Page Two
Staging the capture of Bin Ladensource:
InfowarsHyping the Impending Staged Capture of Bin Laden
Infowars.com
March 17, 2004
Alex Jones' White House source told him in 2002 that bin Laden had died of natural causes and that he was on ice, to be rolled out right before the election. Read our story behind this story today from CNN:
Drone may have spotted bin Laden in 2000
CNN
March 17, 2004
WASHINGTON (CNN) -- U.S. officials say CIA surveillance aircraft video that they think shows Osama bin Laden in 2000 was "highly classified," and that the CIA will investigate who leaked it to the media.
The CIA often investigates when unauthorized material is leaked to the media, U.S. officials said.
No decision has been made on whether the matter would be referred to the U.S. Department of Justice.
NBC News aired the footage Tuesday. CNN has broadcast it as well.
The video, taken from an unarmed and unmanned surveillance aircraft over Tarnak Farm in Afghanistan in the fall of 2000, shows a tall man dressed in a white robe.
A senior intelligence official said the tape is genuine and that analysts think the figure in white is bin Laden.
The sprawling agricultural complex was a meeting place for senior al Qaeda leaders, and a training camp for scores of al Qaeda operatives.
Pentagon and CIA officials have copies of the videotape.
The possibility that the figure in the tape might have been bin Laden helped speed the decision to arm the Predator drone aircraft with "Hellfire" missiles, which can be fired by remote control, officials said.
With the technology available in 2000, it would have taken three to seven hours to strike the Tarnak Farm site with cruise missiles or bombs, U.S officials said.
In 1998, President Clinton ordered cruise missile strikes on suspected terrorist training camps in eastern in Afghanistan where intelligence suggested bin Laden might be. In the time it took for the cruise missiles to reach their target, officials say bin Laden moved to another location. That attack killed at least 21 Pakistanis, but missed bin Laden.
In November 2002, the CIA used an armed Predator to execute a senior al Qaeda official who was riding in a car in Yemen.
Steve Coll, in his recently published book "Ghost Wars," says that the Clinton administration at one time planned to seize bin Laden at Tarnak Farm but never carried out the mission, in part over concerns about killing innocent women and children, as well as legal disagreements within the administration.
--------------------------------------------------------------------------------------------
Flashback: Jones: Intelligence Sources Confirm bin Laden is Dead
(Originally published August 2002)
Please note: Alex has warned that this might be disinfo and the fact that we're reporting on it pre-emptively may cause them to change the script.
----------------------------
Alex Jones, the radio talk show host based in Austin Texas, claims to have received inside intelligence that suggests Osama bin Laden is dead and will be publicly pronounced so by the Bush administration just before the next presidential election in November, 2004.
Jones' credibility soared on September 11th after he predicted the previous July that the globalists would use bin Laden to attack lower Manhattan, New York, with reference to the World Trade Center, in order to advance their agenda to create a one world government and a police state.
On his Thursday August 15th daytime broadcast, Jones stated, "I have it from high level [sources] from inside the Bush administration...that bin Laden died of natural causes and that his family has given the body to the CIA, that they're gonna roll him out right before the election, that he\'s on ice right now. They will claim they killed him right before the election."
Jones gave a caution that the intelligence could be disinformation but claimed that his base in Austin was extremely close to the Bush administration and similar information received in the past had been credible.
Furthermore, Jones stated that his intelligence contacts also told him that the attack on Iraq won't take place for another couple of years. This matches the leaked output from the June 2002 Bilderberg meeting, where the European arm of the New World Order were furious at the Anglo-American establishment for advancing the agenda far too quickly. They prefer the 'stepping-stones' method to world government, whereby people can be incrementally conditioned and won over. The Europeans feel that the 'Problem-Reaction-Solution' paradigm is being rashly abused by President Bush and his controllers to the point where many have seen right through it. September 11th was a sloppy operation to say the least.
On July 15th, the BBC reported the caims of an influential Arabic newspaper editor, Abdel-Bari Atwan, who said that reliable sources informed him that bin Laden was alive but keeping a low profile until the next terror attack in the US. German foreign intelligence also backed the fact that bin Laden may have been wounded but is still in reasonably good health.
However, just three days later, the FBI's counter-terrorism chief, Dale Watson went on the record to say that bin Laden was 'probably dead.' At a law enforcement conference, Watson said, "Is (Bin Laden) alive or is he dead? I am not really sure of the answer... I personally think he is probably not with us anymore but I have no evidence to support that."
Further evidence to suggest that bin Laden is deceased can be garnered from the fact that his eldest son, Saad bin Laden, has taken over the command of the al-Qaeda terror network. In a story that was syndicated across the mainstream spectrum, the Saudi pan-Arab daily Asharq Al-Awsat reported that, "Saad bin Laden has been in charge of the organisation since the US offensive against al-Qaeda bases in Afghanistan." This disclosure "substantiates the theory that bin Laden was killed or seriously wounded" in the US-led military campaign, the paper said.
As Reuters reported last year, bin Laden has ten or more look-alikes around the globe. It will be down to military propaganda organs like CNN to decide on whether and when bin Laden is dead, totally independent of what really occured.
Cable taps into wiretap lawAt least one cable operator is starting to comply with a federal law that has long required telecommunications carriers to help police conduct electronic surveillance, according to a source familiar with the company's plans.
Time Warner Cable is the first cable company to begin trying to adhere to the Communications Assistance For Law Enforcement Act, the source said. Cable companies are not yet required to comply with the 1994 wiretap law, but they see the writing on the wall.
Vernon Irvin, executive vice president at security vendor VeriSign, said during a recent interview that his company had signed a deal with a "major cable operator" in the United States to help it follow CALEA. He did not identify the provider, but the source tagged Time Warner as the company. A Time Warner representative did not have an immediate comment.
more at
cnet
Hackers Have It Easier Than Eversource: CRN
Symantecs twice-annual Internet Security Threat Report paints a menacing picture, and its one that security professionals know all too well. Data from the companys customers as well as from its global DeepSight Threat analysis system shows the trends. A report released Monday by the security firm says attackers are having an easier time exploiting vulnerabilities. They are increasingly using backdoors to gain access to compromised systems, and they are trying to turn a quick buck with stolen confidential information. During all of 2003, according to Symantecs data, the number of easily-exploited vulnerabilities climbed by about 10 percent from the year before, marking the first time that vulnerabilities so classified broke the two-thirds mark. In 2003, fully 70 percent of all security vulnerabilities were simple for attackers to manage. The reasons are two-fold, said Brian Dunphy, the director of Symantecs managed securities services group. More vulnerabilities, such as those affecting Web services, take very little exploit expertise, and more hackers are relying on already-published exploit code and easily-available tools to craft new attacks. Other security analysts besides those at Symantec have harped on the same subject, and the proof in the trend has been as recent as 2004s wave of worms, due in part to the release of source code to such malware as MyDoom and Netsky into the underground.
Video Games do create violenceA 13-year-old Hong Kong boy flew into a rage and threatened his parents with a kitchen knife after his father pulled the plug on his computer game, police said on Monday.
"The boy's mother told police the boy was thrashing about with a knife. Nobody was charged," a police spokeswoman said.
The father managed to overpower the boy and no one was injured in the fracas early on Sunday morning, a local newspaper reported.
The father pulled the plug on the game at around midnight when the boy refused to stop playing and go to bed.
source:
CNN
Where there is good DSL there is moneyBroadband Internet service Speakeasy on Tuesday said it landed $24 million in series D financing, its largest amount to date. The investment was led by venture capital firms 3i and BV Capital.
Seattle-based Speakeasy will use the funds to complete its network expansion, grow its presence in top markets, and develop new products such as a Net phone service. Speakeasy also plans to beef up its access services for online gamers and will introduce new products and services for the market. The company said it reached profitability in 2003 and surpassed $50 million in sales. Speakeasy provides broadband access to homes and businesses.
How-To Book May Help HackersText includes previously unknown techniques for exploiting software flaws.
Paul Roberts, IDG News Service
Monday, March 15, 2004
A new book on writing code to exploit security flaws in software is raising eyebrows in the technical community. The book publishes "zero day," or previously unknown, techniques for exploiting vulnerable systems, including those running Microsoft Windows.
The Shellcoder's Handbook: Discovering and Exploiting Security Holes, by Jack Koziol, David Litchfield, Dave Aitel, Chris Anley, Sinan Eren, Neel Mehta, and Riley Hassell, is an advanced guide to writing software exploits. The book is intended as a resource for network administrators who are interested in closing security holes. However, the book also contains working examples of code (http://www.pcworld.com/news/article/0,aid,109108,00.asp) for exploiting vulnerable systems and previously unpublished techniques for launching attacks such as heap overflows and kernel attacks, according to two of the book's authors.
Shellcode is a term that describes small pieces of computer code that launch operating system shells, or command interfaces such as the common C:\ command line interface on Microsoft DOS. Shellcode is often a component of attacks in which malicious hackers use software exploits to get control of vulnerable systems.
The book is being published by John Wiley & Sons; it is scheduled to be released on March 22, 2004. It contains chapters on a variety of attack types, including stack overflows, heap overflows, and format string bugs. The authors discuss everything from writing Windows shellcode to exploiting security holes in Hewlett-Packard's Tru64 operating system, according to a description of the book published on the Wiley Web site.
Fully Functional Exploits
Also contained in the guide are fully functional examples of software exploits, according to coauthor Dave Aitel, founder of Immunity of New York City, a security consulting company.
"The book is trying to teach you how to write exploits, so of course there are exploits," he says.
Aitel contributed chapters on heap overflows and Windows exploits, as well a technique for finding flaws in network communications protocols called fuzzing, he says.
The information contained in the new book is essential to administrators who want to secure the computer systems under their management, he says.
"It's hard to get context on a [software] vulnerability if you don't know how to exploit it. People who know how to write exploits make better strategic decisions," he says.
Coauthor Chris Anley agrees and says The Shellcoder's Handbook is not a cookbook for hackers.
"This isn't a collection of exploits. It's a book that tells you how to find the bugs and understand what the impact of the bugs is," says Anley, a director at Next Generation Security Software in Surrey, UK.
"We wanted to make a book that describes from basic through advanced level what exploits can do," he says.
Covering the Basics
The book is structured like a primer. Early chapters focus on basic concepts like stack overflows and use examples written for the open-source Linux platform. Later chapters focus on more complicated problems and obscure operating systems such as Sun Microsystems' Solaris and HP's Tru64, Anley says.
The book pulls together information that could be obtained from security discussion groups (http://www.pcworld.com/news/article/0,aid,103853,00.asp) on the Internet or from a university-level network security administration course, say Anley and fellow coauthor David Litchfield, also of Next Generation Security Software.
However, The Shellcoder's Handbook also delves into more arcane exploit-writing topics that are not commonly discussed, such as format string bugs, which address vulnerabilities in the way some programs written in the C programming language output data. And a chapter titled "Alternative Payload Strategies" discusses ways in which an exploit writer can subtly manipulate a compromised machine other than to produce a shell prompt, such as extracting data from a database or tampering with cryptographic services, Anley says.
The Shellcoder's Handbook and other books like it stir up controversy within the information technology security community about whether researchers should publicly disclose holes in software products, says Alan Paller, director of research at The SANS Institute.
Authors who publish software exploits walk a fine line between informing the public and lowering the bar for malicious hackers, he says.
"You don't want to make writing an exploit as easy as fixing a car," Paller says.
However, Paller believes that IT professionals who defend networks from attack benefit more from books like The Shellcoder's Handbook than do attackers.
"In the security world there's lots of advice, and a lot of it doesn't make much sense. So if you understand why you have to do certain things and can connect the defense back to an actual attack, that helps," he says.
With no warning...Microsoft's Hotmail Users Shut Out for Hours
SEATTLE (Reuters) - The Hotmail online e-mail service, operated by Microsoft Corp. was down for most of the working day on Friday, affecting "a significant portion of MS customers."
The world's largest software maker said that Hotmail, as well as MSN Messenger and other related services operated by its MSN Internet business, were down from around 8:30 a.m. Pacific time (1630 GMT).
"We sincerely apologize for any inconvenience and disruption this may be causing our customers," a Microsoft spokesman said.
Redmond, Washington-based Microsoft said it had identified the cause of the problem, adding that service would be fully restored within a few hours before the end of Friday.
No customers are at risk of losing data, Microsoft said.
Hrm, maybe all those promotions are no challenge to KazaaApple Computer said Monday that it has sold 50 million songs through its iTunes Music Store--a substantial number but far below its goal of selling 100 million songs by April.
Apple falling short of iTunes goal | CNET News.com
It almost sounds like a script-kiddies east coast/west coast warSymbiot launches DDoS counter-strike tool
source: ZDNet UK
Security company Symbiot is about to launch a product that can hit back at hackers and DDoS attacks by lashing out with its own arsenal of tricks, but experts say it may just be a bit too trigger-happy Symbiot, a Texas-based security firm, is preparing to launch a corporate defence system at the end of March that can fight back against distributed denial-of-service (DDoS) and hacker attacks by launching a counter-strike. In advance of the product launch, Symbiots president, Mike Erwin, and its chief scientist, Paco Nathan, have outlined a set of "rules of engagement for information warfare", which they say should be part of corporate security policy to help companies determine their exact response to an incoming attack. "Until today, security solutions have been totally passive in nature. Merely erecting defensive walls around the perimeter of an enterprise network is not an adequate deterrent," said Erwin, who argues that to have a complete defence in place, offensive tactics must be employed. The company said it bases its theory on the military doctrine of "necessity and proportionality", which means the response to an attack is proportionate to the attacks ferocity. According to the company, a response could range from "profiling and blacklisting upstream providers" or it could be escalated to launch a "distributed denial of service counter-strike". Security experts expressed alarm at the companys plans.
Holy Space Shit(CNN) -- Scientists may have discovered the solar system's 10th planet, more than 3 billion kilometers further away from the sun than Pluto.
Read about it here
archives