29.11.2012 Views

Alternative View 2006 - for john schou

Alternative View 2006 - for john schou

Alternative View 2006 - for john schou

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

What Really Happened Jan_06.xls Seite 226<br />

12.03.<strong>2006</strong> X 22 In a smart site redirection, the attacker creates several identical copies of the<br />

spoofed site, each with a different URL, often hosted by different ISPs. When<br />

the phishing e-mails go out, all include a link to yet another site, a "central<br />

redirector." When the potential victim clicks on the e-mailed link, the<br />

redirector checks all the phishing sites, identifies which are still live, and<br />

invisibly redirects the user to one - Shoot them. Twice<br />

18.03.<strong>2006</strong> BAZ 22 Google muss der US-Regierung Protokolle über Suchanfragen von 50.000<br />

Internetadressen übergeben ... Der Richter lehnte aber die Forderung<br />

Washingtons nach der Bereitstellung von 5000 Schlüsselsuchbegriffen ab,<br />

über die die Nutzer auf die gesuchten Internet-Seiten gekommen waren<br />

10.04.<strong>2006</strong> Dailykos 22 NSA's and AT&T's Big Brother Machine, the Narus 6400 .. monitors 10 billion bits per<br />

second (bps) at level 4 and 2500 million bps at level 7. For reference, the 256K DSL<br />

line I am using equals .25 million bps. So one NarusInsight machine can look at<br />

about 39,000 DSL lines at once in great detail ... This is some really serious<br />

hardware with equally serious software<br />

12.04.<strong>2006</strong> X 22 NSA Can 'Vacuum' Emails Across Internet - the NSA uses powerful<br />

computers to "data-mine" the contents of Internet and telephone<br />

communications <strong>for</strong> suspicious names, numbers and words in an attempt to<br />

identify suspected terrorists<br />

13.04.<strong>2006</strong> X 22 AT&T is seeking the return of technical documents presented in a lawsuit that<br />

allegedly detail how the telecom giant helped the government set up a<br />

massive internet wiretap operation in its San Francisco facilities<br />

15.04.<strong>2006</strong> FOX 22 Virus hunters have discovered a new Trojan that encrypts files on an infected<br />

computer and then demands $300 in ransom <strong>for</strong> a decryption password<br />

27.04.<strong>2006</strong> Telepolis 22 wird seit Sommer letztes Jahres nicht nur per Kabel mit Internet versorgt, sondern auch über ein<br />

drahtloses Netz ... spätestens wenn Nokia und Motorola wie angekündigt .. die ersten Wimaxfähigen<br />

Handys auf den Markt bringen, wird kaum einer der Kids mehr über T-Mobile, Vodafone,<br />

O2 oder E-Plus telefonieren, sondern praktisch kostenlos übers Internet. Und zwar mit der<br />

ebenfalls kostenlosen Software Skype<br />

02.05.<strong>2006</strong> Infowars 22 Total regulation rules are close at hand, a new internet will kill free speech<br />

and weed out anything deemed "inappropriate" ... the sites would virtually be<br />

shut down<br />

05.05.<strong>2006</strong> X 22 Everyone Wants to 'Own' Your PC - LEGAL NOTICE: Use of this computer is<br />

billed at a rate of $5000 per second. Entry into this computer <strong>for</strong> any purpose<br />

constitutes acceptance of those terms. All legal remedies will be followed to<br />

secure payment of this debt<br />

07.05.<strong>2006</strong> Baltimore Sun 22 Two technology programs at the heart of the NSA's drive to combat 21stcentury<br />

threats are stumbling badly, hampering the agency's ability to fight<br />

terrorism and other emerging threats<br />

19.05.<strong>2006</strong> X 22 Say Goodbye To The Real Internet - The real issue is not the content on the<br />

Internet, but who gets to put content on the Internet, and how much they will<br />

have to pay to do so<br />

22.05.<strong>2006</strong> X 22 Trojan-Dropper.MSWord.1Table.bd spreads via targeted emails identified to be sent from China<br />

and Taiwan. Once you to download and try to open the infected file, it shows an error message.<br />

If you click on ‗Retry‘, the malicious file is replaced by a clean one immediately. By this time,<br />

Trojan-Dropper has already slipped into your computer, which then goes ahead and downloads<br />

‗Backdoor.Win32.Gusi‘. This backdoor can open a direct channel that connects to the remote<br />

attacker suspected to be sitting in China, to receive and execute commands<br />

22.05.<strong>2006</strong> X 22 A careless mistake by Microsoft programmers has shown that special access codes<br />

<strong>for</strong> use by the NSA have been secretly built into all versions of Windows<br />

22.05.<strong>2006</strong> CNN 22 Data on 26.5 million veterans stolen from home - The data included names,<br />

Social Security numbers and dates of birth <strong>for</strong> the veterans<br />

27.05.<strong>2006</strong> News.com 22 AT&T's attorneys this week filed a 25-page legal brief striped with thick black lines<br />

that were intended to obscure portions of three pages and render them unreadable<br />

(click here <strong>for</strong> PDF). But the obscured text nevertheless can be copied and pasted<br />

inside some PDF readers, including Preview under Apple Computer's OS X and the<br />

xpdf utility used with X11 - I opened the file in Acrobat 5.0 and was able to copy and<br />

paste the redacted text<br />

28.05.<strong>2006</strong> BAZ 22 Amnesty International hat eine Kampagne gegen Internet-Zensur gestartet ...<br />

kritisierte die Menschenrechtsorganisation Internet-Unternehmen wie Google,<br />

Yahoo oder Microsoft. Sie würden die Regierungen bei ihrem repressiven<br />

Vorgehen unterstützen<br />

30.05.<strong>2006</strong> Ynet News 22 [AI] says Microsoft complied with request by Israel police to hand over<br />

in<strong>for</strong>mation on [Vanunu]

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!