Caano Geel

  • Content Count

  • Joined

  • Last visited

About Caano Geel

  • Rank
  1. Faheema, ibti, ng, thank you for the welcome. Ibti I've seen my namesake, it's what happens when you disappear I guess. Anyhow I'm not sure I'm allowed to claim sole ownership of the name yet ... And maybe he's doing a better service to it than I ever could. ng, I'm old now, I wake up r early and fall asleep at 8.30. Sooo what's going down these days. Whose warring with who, who's ng courting for the hareem and what latest travesty are we all outraged with
  2. A fortuitous happening bought me to SOL this morning, and memories came flooding back. Hello good netizens of SOL, it has been too long. What did i miss
  3. The guys and girls of the world wide somali students and professionals are doing some great work -- I can see a few of the SOL old-guard in the pics. You can find more details here .. Please give them your support.
  4. Garnaqsi, i thought you'd appreciate the full version. I came across it a few days back... this is a fantastic damnation of the post-colonialism power struggles, i didn't know that Careys Ciise Kaarshe's material was so political.. Does any one know the history behind this poem? my fav. verse ( forgive spelling issues) wuxuu yiri waa'taheyay, ma wiil iyo waalidkii baa iyaan kala weecan-kara? axdigu waaa ween yahayey, ma labadii wacad dhigtoo, walaahi isgu maraa is weydaarsada xumaan? wadaagey baad tahey'ee aan waaye is wahelin'ee, wan'yahow ha i goon wadnaha q. how do you embed the video, instead of just posting the url.
  5. mr adam/chimera, thank you for the music links, you've made my day .. and probably my week..
  6. Caano Geel


    One night, while reading a gruesome tale He read a passage that made him turn pale Such horrible news he could not survive For his beautiful wife had been buried alive! He dug out her grave to make sure she was dead Unaware that her grave was his mother’s flower bed (Tim Burton, 1982). Details here
  7. ^ yes, what did you complain about?
  8. ^how did you decide you were gonna complain about it before you saw it?
  9. Ibti, not really the case sadly. I don't think i buy the good Dr's version of history. the civil rights movement of the 50's and 60's traces its roots back to the ghandi's philosophy of non-violent resistance. Black people in the Americas and Africa have a very long history of aggressive resistance to white domination- from the maroons in the Caribbean to the kingdoms of west africa, when in their means, people have resisted aggression with aggression - Haiti didn't become second-oldest republic in the western hemisphere via peaceful resistance. though this doesn't mean i disagree with your sentiment
  10. Re: My Name Is Muhammad well done??!
  11. Emperor, congrats on finally locating the Empress. Sorry i couldn't make it to the glorious bariis fest.
  12. morning all, it's been a while. my my, SOL has changed in my absence. i couldn't help but burst in on this enchanting set of exchanges. peacenow, he shouldnt' be banned. if the awaan can't feel free to express his views here - how ever much you may disagree with them - where and whom will he go to? you of all people should understand the need for a forum to exchange ideas freely. abwaan, i like you flirtation with controversy, but please be sure to pay back the good Norwegian people's tax money, before you go advocating their slaughter, let alone the miserable iraqis. btw. where are SOL's common-sense goons (sheh, ng, xiin, norf, serenity ...). why arn't these youngsters being whipped into shape!
  13. and dont' forget facebook doesn't give a flying monkey about your privacy google hack details from Google Hackers Targeted Source Code of More Than 30 Companies A hack attack that targeted Google in December also hit 33 other companies, including financial institutions and defense contractors, and was aimed at stealing source code from the companies, say security researchers at iDefense. The hackers used a zero-day vulnerability in Adobe Reader to deliver malware to the companies and were in many cases successful at siphoning the source code they sought, according to a statement distributed Tuesday by iDefense, a division of VeriSign. The attack was similar to an attack that targeted other companies last July, the company said. A spokeswoman for iDefense wouldn’t name any of the other companies that were targeted in the recent attack, except Adobe. Adobe acknowledged on Tuesday in a blog post that it discovered Jan. 2 that it had been the target of a “sophisticated, coordinated attack against corporate network systems managed by Adobe and other companies.” The company didn’t say whether it was a victim of the same attack that struck Google. But Adobe’s announcement came just minutes after Google revealed that it had been the victim of a “highly sophisticated” hack attack originating in China in December. Neither Google nor Adobe provided details about how the hacks occurred. Google said only that the hackers were able to steal unspecified intellectual property from it and had focused their attack on obtaining access to the Gmail accounts of human rights activists who were involved in China rights issues. But according to iDefense, whose customers include some of the 33 companies that were hacked, the attacks were well targeted and “unusually sophisticated” and aimed at grabbing source code from several hi-tech companies based in Silicon Valley as well as financial institutions and defense contractors. The hackers gained access to the company networks by sending targeted e-mails to employees, which contained a malicious PDF attachment. The malicious code exploited a zero-day vulnerability in Adobe’s Reader application. Zero day vulnerabilities are security flaws in software for which there is currently no patch. Adobe announced in mid-December that a new zero-day vulnerability in its Reader and Acrobat programs was being actively targeted by attackers. The company made the announcement after security researchers not affiliated with Adobe discovered attacks being conducted against the vulnerability. Adobe patched the critical vulnerability only on Tuesday this week. In the case of the recent attack on Google and the other companies, once a recipient clicked on the malicious PDF attachment, a backdoor Trojan program called Trojan.Hydraq was installed on their machine in the form of a Windows DLL, according to iDefense. IDefense says that when Google discovered the malware on its systems in December, it found that the code was communicating with a server set up to receive information stolen from the targeted companies. “It was configured in such a way that it was able to receive a massive amount of data being exfiltrated to it,” says an iDefense spokeswoman who asked not to be named. Google was able to determine, by examining the server, that the hackers had struck numerous other companies, she said. Google said in its Tuesday announcement that 20 other companies had been hacked. But iDefense found evidence that at least 33 were targeted. The recent attacks bear a strong resemblance to another attack that occurred in July 2009, which targeted about 100 IT companies, iDefense says. In that earlier attack, the hackers also sent targeted e-mail to companies with a malicious PDF attachment, but it’s unclear how successful that attack was. According to Ryan Olson, an analyst for iDefense, the attacks in July and December targeted different vulnerabilities. The one in July affected Adobe’s Reeader, Acrobat and Flash applications, which it patched Jul. 30. The vulnerability the hackers are believed to have used in December also affected Reader and Acrobat. iDefense obtained samples of the malicious codes used in the July attack and the more recent one and found that although the malware was different in the two attacks, the programs both communicated with similar command-and-control servers. The servers each used the HomeLinux DynamicDNS to change their IP address, and both currently point to IP addresses belonging to a subset of addresses owned by Linode, a US-based company that offers Virtual Private Server hosting. “The IP addresses in question are . . . six IP addresses apart from each other,” iDefense said in its statement. “Considering this proximity, it is possible that the two attacks are one and the same, and that the organizations targeted in the [recent] Silicon Valley attacks have been compromised since July.” Olson told Threat Level that the attackers are “incredibly good” at finding new exploits and infecting the right people but that nothing he’d seen in the malware indicated they were above average in writing malicious code. “The sophistication here is all about the fact they were able to target the right people using a previously unknown vulnerability,” he says. The iDefense spokeswoman told Threat Level that her company waited a week to disclose details about the attack until after Google went public with the news that it had been hacked. She said it’s her understanding that Google’s source code was targeted in the hack attack. Google did not immediately respond to a request for comment from Threat Level. Adobe’s announcement didn’t discuss specifically whether hackers had stolen its source code but said that it had “no evidence to indicate that any sensitive information — including customer, financial, employee or any other sensitive data — has been compromised” in the attack.
  14. why? and what will you do with the knowledge and the networks that you see/collect info on?
  15. Originally posted by peasant: interesting steps indeed. only if i could afford a static ip i would dream erecting a server someday but too bad that isnt today. Hopefully in the future though.. there are a bunch of services which provide you with a free dynamic dns - i.e. your ip changes, they change where your hostname points to - typically it is just a small script that runs on your machine and sends you current ip address to the hostname holder. anyhow check these out http://www.opendns.c om/support/dynamic_i p/, and m/services/dns/dyndn s/