...supenoed Facebook for her current address?
Almost all the reports are getting the gist of the paper wrong -- any press summation that doesn't go into the paper to understand it will get it wrong. The paper goes into deep detail that Apple has several services that, while protected by several layers of security that could be bypassed, can transfer data in the clear. There are also several services that don't have any obvious connecting software.
It's a rather deep hacker-style dive into iOS.
A good video about this is by TWiT Network. At http://twit.tv/sn465 Security Now ep 465 has expert Steve Gibson explain the actual paper.
A Tumblr site popped up a few days ago called OpenSSL Valhalla Rampage. The blogger there is going through all the commits and posting the juicy funny comments there. This includes killing... and rekilling... VMS support (which reminds me of Maxim 37: there is no such thing as overkill...), stripping out now-stupid abstractions and optimizations of the unoptimizables, and more.
An offer of over $300 in value! Get yours now!
* Based on purchase of a Model B from direct authorized sellers. Does not include shipping or purchase at authorized resellers. Must be run from a Raspbery Pi computer board. Storage, display, keyboard, mouse, and power supply not included. Model A does not include Ethernet.
Someone get those call logs! I bet he called and nobody listened!
Seriously. Search for home, BLIP! and you're there.
I've posted them up on my G+ account, so I'll just link to that instead of repeating myself here. Just remember, though, I come from a 3G to a 4 to a 5.
Link to Original Source
LibAV's a badly forked version that's several revisions behind FFmpeg. Plus, this is Debian -- non-free codecs like H.264 are stripped out and are probably really supported by a seperate non-free repository.
I'd rather strip LibAV out and compile my own version of FFmpeg for faster encodes.
1. Open up the compromizing email's headers. Locate the first ISP beyond yours -- 99% of the time it's not there's. Contact THAT company.
2. File a complaint with the FCC. They are getting more active against exploits.
3. Locate your Attorney General's office and ask if there are any state laws against spam. There is one in Maryland that is compatible with CAN SPAM, and has been tested in the courts. If you got one, lawyer up and sue the company -- some companies only respond by judicial inquiry.
4. Blacklist the company publicly.
True, but then they'd be hit with proof: The spam that hit the spamtrap from that IP address. They keep those things!
UCEProtect isn't the first one to get sued. It won't be the last.
There is a reason you are listed:
* You have spam originating from your system for too long of a time.
* You are unresponsive to reports.
So, your entire network range is listed. Everyone is bouncing emails. Everyone is complaining to you, and you've noticed. You've been forwarded the site, and you're contemplating just paying them off... except that it just won't work. You'll be relisted again, and with reason -- someone on your network spammed and nobody's listening.
* If you haven't done so, open up abuse@ and point it to somebody with the power to diagnose, disable, and close accounts.
* If the guy behind abuse@ doesn't have said above power, GIVE IT TO HIM.
* If the guy behind abuse@ does, but doesn't use it, FIRE HIM.
* If you haven't done so, disable outbound port 25 at your border router with the exception of an out-bound SMTP server.
* Put an outbound spam filter in place.
If you are unwilling to do the above, then there is one last thing you will eventually do: CLOSE SHOP.
Simply put, do it Mythbusters/Alton Brown style. Their recent episode of Mythbusters did a full dinner that was cooked by the car's engine.
Gentoo saw the license expiring, and did a proactive thing: flipped the "fetch restriction" flag back on, forcing users to pull it manually and slap it into the right place to install/upgrade.