Caano Geel

Nomads
  • Content Count

    1,812
  • Joined

  • Last visited

Posts posted by Caano Geel


  1. Faheema, ibti, ng, thank you for the welcome. Ibti I've seen my namesake, it's what happens when you disappear I guess. Anyhow I'm not sure I'm allowed to claim sole ownership of the name yet ... And maybe he's doing a better service to it than I ever could. ng, I'm old now, I wake up r early and fall asleep at 8.30. Sooo what's going down these days. Whose warring with who, who's ng courting for the hareem and what latest travesty are we all outraged with


  2. Garnaqsi, i thought you'd appreciate the full version. I came across it a few days back...

    this is a fantastic damnation of the post-colonialism power struggles, i didn't know that

    Careys Ciise Kaarshe's material was so political.. Does any one know the history behind this poem?

     

    http://www.youtube.com/watch?v=fQ4k3VcrTvcb

     

    my fav. verse ( forgive spelling issues)

     

    wuxuu yiri waa'taheyay, ma wiil iyo waalidkii baa iyaan kala weecan-kara?

    axdigu waaa ween yahayey, ma labadii wacad dhigtoo, walaahi isgu maraa is weydaarsada xumaan?

    wadaagey baad tahey'ee aan waaye is wahelin'ee, wan'yahow ha i goon wadnaha

     

    q. how do you embed the video, instead of just posting the url.


  3. One night, while reading a gruesome tale

    He read a passage that made him turn pale

     

    Such horrible news he could not survive

    For his beautiful wife had been buried alive!

    He dug out her grave to make sure she was dead

    Unaware that her grave was his mother’s flower bed

     

    (Tim Burton, 1982). Details here

  4. Ibti, not really the case sadly. I don't think i buy the good Dr's version of history. the civil rights movement of the 50's and 60's traces its roots back to the ghandi's philosophy of non-violent resistance.

     

    Black people in the Americas and Africa have a very long history of aggressive resistance to white domination- from the maroons in the Caribbean to the kingdoms of west africa, when in their means, people have resisted aggression with aggression - Haiti didn't become second-oldest republic in the western hemisphere via peaceful resistance.

     

    though this doesn't mean i disagree with your sentiment ;)


  5. morning all, it's been a while. my my, SOL has changed in my absence. i couldn't help but burst in on this enchanting set of exchanges.

     

    peacenow, he shouldnt' be banned. if the awaan can't feel free to express his views here - how ever much you may disagree with them - where and whom will he go to? you of all people should understand the need for a forum to exchange ideas freely.

     

    abwaan, i like you flirtation with controversy, but please be sure to pay back the good Norwegian people's tax money, before you go advocating their slaughter, let alone the miserable iraqis.

     

    btw. where are SOL's common-sense goons (sheh, ng, xiin, norf, serenity ...). why arn't these youngsters being whipped into shape!


  6. and dont' forget facebook doesn't give a flying monkey about your privacy

     

    google hack details from wired.com

     

    Google Hackers Targeted Source Code of More Than 30 Companies

     

    A hack attack that targeted Google in December also hit 33 other companies, including financial institutions and defense contractors, and was aimed at stealing source code from the companies, say security researchers at iDefense.

     

    The hackers used a zero-day vulnerability in Adobe Reader to deliver malware to the companies and were in many cases successful at siphoning the source code they sought, according to a statement distributed Tuesday by iDefense, a division of VeriSign. The attack was similar to an attack that targeted other companies last July, the company said.

     

    A spokeswoman for iDefense wouldn’t name any of the other companies that were targeted in the recent attack, except Adobe.

     

    Adobe acknowledged on Tuesday in a blog post that it discovered Jan. 2 that it had been the target of a “sophisticated, coordinated attack against corporate network systems managed by Adobe and other companies.”

     

    The company didn’t say whether it was a victim of the same attack that struck Google. But Adobe’s announcement came just minutes after Google revealed that it had been the victim of a “highly sophisticated” hack attack originating in China in December.

     

    Neither Google nor Adobe provided details about how the hacks occurred. Google said only that the hackers were able to steal unspecified intellectual property from it and had focused their attack on obtaining access to the Gmail accounts of human rights activists who were involved in China rights issues.

     

    But according to iDefense, whose customers include some of the 33 companies that were hacked, the attacks were well targeted and “unusually sophisticated” and aimed at grabbing source code from several hi-tech companies based in Silicon Valley as well as financial institutions and defense contractors.

     

    The hackers gained access to the company networks by sending targeted e-mails to employees, which contained a malicious PDF attachment. The malicious code exploited a zero-day vulnerability in Adobe’s Reader application.

     

    Zero day vulnerabilities are security flaws in software for which there is currently no patch. Adobe announced in mid-December that a new zero-day vulnerability in its Reader and Acrobat programs was being actively targeted by attackers. The company made the announcement after security researchers not affiliated with Adobe discovered attacks being conducted against the vulnerability. Adobe patched the critical vulnerability only on Tuesday this week.

     

    In the case of the recent attack on Google and the other companies, once a recipient clicked on the malicious PDF attachment, a backdoor Trojan program called Trojan.Hydraq was installed on their machine in the form of a Windows DLL, according to iDefense.

     

    IDefense says that when Google discovered the malware on its systems in December, it found that the code was communicating with a server set up to receive information stolen from the targeted companies.

     

    “It was configured in such a way that it was able to receive a massive amount of data being exfiltrated to it,” says an iDefense spokeswoman who asked not to be named.

     

    Google was able to determine, by examining the server, that the hackers had struck numerous other companies, she said. Google said in its Tuesday announcement that 20 other companies had been hacked. But iDefense found evidence that at least 33 were targeted.

     

    The recent attacks bear a strong resemblance to another attack that occurred in July 2009, which targeted about 100 IT companies, iDefense says. In that earlier attack, the hackers also sent targeted e-mail to companies with a malicious PDF attachment, but it’s unclear how successful that attack was.

     

    According to Ryan Olson, an analyst for iDefense, the attacks in July and December targeted different vulnerabilities. The one in July affected Adobe’s Reeader, Acrobat and Flash applications, which it patched Jul. 30. The vulnerability the hackers are believed to have used in December also affected Reader and Acrobat.

     

    iDefense obtained samples of the malicious codes used in the July attack and the more recent one and found that although the malware was different in the two attacks, the programs both communicated with similar command-and-control servers. The servers each used the HomeLinux DynamicDNS to change their IP address, and both currently point to IP addresses belonging to a subset of addresses owned by Linode, a US-based company that offers Virtual Private Server hosting.

     

    “The IP addresses in question are . . . six IP addresses apart from each other,” iDefense said in its statement. “Considering this proximity, it is possible that the two attacks are one and the same, and that the organizations targeted in the [recent] Silicon Valley attacks have been compromised since July.”

     

    Olson told Threat Level that the attackers are “incredibly good” at finding new exploits and infecting the right people but that nothing he’d seen in the malware indicated they were above average in writing malicious code.

     

    “The sophistication here is all about the fact they were able to target the right people using a previously unknown vulnerability,” he says.

     

    The iDefense spokeswoman told Threat Level that her company waited a week to disclose details about the attack until after Google went public with the news that it had been hacked. She said it’s her understanding that Google’s source code was targeted in the hack attack.

     

    Google did not immediately respond to a request for comment from Threat Level.

     

    Adobe’s announcement didn’t discuss specifically whether hackers had stolen its source code but said that it had “no evidence to indicate that any sensitive information — including customer, financial, employee or any other sensitive data — has been compromised” in the attack.


  7. Originally posted by peasant:

    interesting steps indeed. only if i could afford a static ip i would dream erecting a server someday but too bad that isnt today. Hopefully in the future though..

    there are a bunch of services which provide you with a free dynamic dns - i.e. your ip changes, they change where your hostname points to - typically it is just a small script that runs on your machine and sends you current ip address to the hostname holder. anyhow check these out http://www.opendns.c om/support/dynamic_i p/, and http://www.dyndns.co m/services/dns/dyndn s/


  8. Originally posted by rudy-Diiriye:

    for Mac u gonna pay 2x more. U r a programmer so u best bet is 64-bit system. U looking for Desktop or a laptop?

    ....

    thanks Rudy, true about the price. however, i have more work machines than i can count, and tend to use screen and emacs when i work from home anyway, so as long as i have a net-connection, beefy cpu's aren't a problem. What i'm really after is my first enjoy and not work at computer. My concern with a pc. is that it won't long before i'm frustrated with xp and the likes and have set up yet another hotchpotch beast.

     

    p.s. i like the sound of a 36" display, what make/model is it? and any recommendations and what are your electric bills like with it :S


  9. Cons, I like the site, but too much javascript for my system. As you can see from the screenshot below - even when mjama.com scripts are enabled, various frames are not correctly displayed

     

    sysinfo: Mozilla/5.0 (X11; U; Linux i686; en-US; rv:1.9.0.12) Gecko/2009072221 Iceweasel/3.0.12 (Debian-3.0.12-1)

     

    aQ21Z.png

     

    cheers


  10. Hi people,

    I'm thinking of getting my first non-stitched-up-toge ther machine for home. I need something small, i don't play games so don't need that much power, but would like to run my entertainment stuff- i.e. tv. dvd's. any recommendation?

     

    p.s. i was thinking a MAC mini, but having not really used MACs, would appreciate info on what they are like, how much software can you get for free and etc.

     

    thanks


  11. I know you're right, but i auto associate murdoch with sulphor.

    [edit] and it makes me feel like i'm dishonouring the memory of my rage against the machine t-shirts of yesteryear