Another way is to look for known source code keywords. You can start by looking for code that imports low level cryptography libraries such as:
C/C++: OpenSSL, Crypto++
Python: PyCrypto, M2Crypto
Java: Java Crypto Extension, BouncyCastle
Then look for routines that perform encryption and decryption. If there’s some code to handle error while decrypting, and/or no sign of MAC usage, then it’s high probability you have found a target for the Padding Oracle attack. Regardless of which method one uses, the most important thing is to analyse and understand the meaning of error messages returned by the target upon receiving mangled ciphertexts. In short, you need to know when the padding is VALID, and when it’s INVALID.
While Microsoft isn't making headlines in the consumer market, over the last decade they have pretty much caught up with or surpassed the competition in the business space (ex: Java, Oracle, PHP, Amazon EC2...). They have however recently started focusing on consumers again with Windows 7 and Windows Phone 7.
And while Apple's per quarter revenue is catching up with Microsoft, in terms of gross profit Microsoft still has about twice the margins that Apple does, which makes sense because software is cheap to produce and distribute. The research and development numbers show that Microsoft spends twice as much of their profits (8 times the total amount) that Apple does, which also makes sense because all Apple really does is find new suppliers with smaller/cheaper/better parts.
Not to mention large investments in online search, software as a service, and cloud computing. With the exception of their Online Services Division (MSN, Bing, Hotmail, advertising) Microsoft makes significant income from each of their product divisions and has more than twice the income that Apple does. Many of their business products are doing very well, and Sharepoint recently became their latest billion dollar sales product.
I will admit that Apple's products are more popular than Microsofts, but that is because they are tailored to the consumer market. Most business uses Microsoft because it costs less and makes users more productive. I personally think that the Zune HD and Windows 7 are great consumer products, and the Windows Phone 7 is designed to compete with the iPhone as opposed to the Palm OS for Windows Mobile, so it will be interesting to see how the next 10 years progresses.
It reported there had been an internet image showing a gun-toting man with a hand-written message reading: "Tomorrow last day of school. We gonna fuck up the bullies and leave this world 11/06/2010."
Another message said: "Tested it at firing range, we have two shotguns as well, it's locked in but tomorrow I have a key. St Aelred's Catholic Technology College, England, watch BBC."
If anything like that is posted publicly I would hope more than just the FBI would report it to the authorities.
Here is a great overview of the technique that was used:
http://www.virusbtn.com/pdf/conference_slides/2009/Maciejak-Lovet-VB2009.pdf
While they are targeting IIS and MSSQL the real issue is developers that don't sanitize the parameters that get sent to the database. The SQL is encoded in at least 2 different layers, so the only keywords that appear in the URL are
Jailbreaking an iPhone constitutes copyright infringement and a DMCA violation, says Apple in comments filed with the Copyright Office as part of the 2009 DMCA triennial rulemaking. This marks the first formal public statement by Apple about its legal stance on iPhone jailbreaking.
It is easier to write an incorrect program than understand a correct one.