Forgot your password?
typodupeerror

Comment: Abused Women (Score 1) 171

by Grisstle (#46212533) Attached to: Old cellphones, in my household ...
Locally, my old personal cell phones and surplus work cell phones get donated to Sasktel (local telecom) who refurbish the phones or strip the good parts for re-use and the 'new' refurbs go to battered women's shelters to help women escaping domestic abuse. Having a phone is crucial to independence and getting a job.

+ - A Mercenary Approach to Botnets->

Submitted by CowboyRobot
CowboyRobot (671517) writes "The incentives are high for many businesses and government agencies to not be too heavy handed in combating the global botnet pandemic. There's money to be had and, with each passing day, more interesting ways are being uncovered in how to package the data, and how to employ it. It used to be that the worlds of bug hunters and malware analysts were separate and far between. In the last couple of years the ability to analyze malware samples and identify exploitable vulnerabilities in them has become very important. Given that some botnets have a bigger pool of victims than many commercial software vendors have licensed customers, the value of an exploit that grants reliable remote control of a popular malware agent is rising in value. In many ways, botnets have become a golden goose to those charged with gathering intelligence on the populations of foreign entities. The bulk of the victim's data is useful for mapping populations, communication profiles, and as egress points for counter intelligence exercises. Then, given how many botnet victims there are, the probability that a few "interesting" computers will have succumbed along the way is similarly high — providing direct insight in to a pool of high value targets."
Link to Original Source

+ - New Windows XP Zero-Day Under Attack-> 1

Submitted by wiredmikey
wiredmikey (1824622) writes "A new Windows kernel zero-day vulnerability is being exploited in targeted attacks against Windows XP users. Microsoft confirmed the issue and published a security advisory to acknowledge the flaw after anti-malware vendor FireEye warned that the Windows bug is being used in conjunction with an Adobe Reader exploit to infect Windows machines with malware.

Microsoft described the issue as an elevation of privilege vulnerability that allows an attacker to run arbitrary code in kernel mode. An attacker could then install programs; view, change, or delete data; or create new accounts with full administrative rights."

Link to Original Source

+ - Google Is Building A Way To Launch Chrome Apps Without Installation

Submitted by Anonymous Coward
An anonymous reader writes "Google really wants Chrome apps to take off. Not only has the company added rich notifications, in-app payments, and an app launcher into its browser, but now it’s developing ephemeral apps that launch by just clicking a link. There are two separate components here. Ephemeral apps (you can enable this under the chrome://flags/#enable-ephemeral-apps flag) let you try a Chrome app before installing it. Linkable ephemeral apps (under the chrome://flags/#enable-linkable-ephemeral-apps flag) meanwhile allow you to launch said apps from hyperlinks."

+ - ScareMail Tries to Disrupt NSA Email Surveillance->

Submitted by Okian Warrior
Okian Warrior (537106) writes ""Are you on the NSA’s email watchlist? Do you want to be? The ScareMail project is designed to mess with the NSA’s email surveillance programs.

Benjamin Grosser has written a plugin for many popular web browsers that uses an algorithm to generate a clever but ultimately useless narrative in the signature of your email using as many probable NSA search terms as possible. The idea behind this is if enough people use it, it will overload the NSA’s search results, ultimately making their email keyword tracking useless.

Ben has a video describing the project.""

Link to Original Source

Comment: Re:Really? (Score 1) 104

by Grisstle (#45549851) Attached to: Free Software Foundation Announces 2013 Holiday Giving Guide
Is that it? Really? Throwing a string of vulgarities together does not a troll make. Try again. The vulgarities could work if you could redo that post as a Haiku. Can you handle a haiku? (http://en.wikipedia.org/wiki/Haiku). Or a Jeopardy post! This act entails taking a dick up the ass and allowing the person ramming your butt to ejaculate in your arse. What is an anal creampie? Honestly, it's like you're new at trolling or don't understand the concept of trolling as an art.

+ - MS handing NSA access to encrypted chat & email->

Submitted by kaptink
kaptink (699820) writes "Microsoft helped the NSA to circumvent its encryption to address concerns that the agency would be unable to intercept web chats on the new Outlook.com portal. The agency already had pre-encryption stage access to email on Outlook.com, including Hotmail. The company worked with the FBI this year to allow the NSA easier access via Prism to its cloud storage service SkyDrive, which now has more than 250 million users worldwide. Microsoft also worked with the FBI's Data Intercept Unit to "understand" potential issues with a feature in Outlook.com that allows users to create email aliases. Skype, which was bought by Microsoft in October 2011, worked with intelligence agencies last year to allow Prism to collect video of conversations as well as audio. Material collected through Prism is routinely shared with the FBI and CIA, with one NSA document describing the program as a "team sport"."
Link to Original Source

God is real, unless declared integer.

Working...