ID thieves ring busted with 111 participants
As the largest identity theft in U.S. history, the prosecutor referred to the now known case of credit card fraud. 111 participants, including bank tellers, retail clerks, waiters and criminal suspects are alleged to have ill-gotten gains in a half years more than 13 million U.S. dollars. As the District Attorney of Queens County, New York announced that, 86 of the suspects were arrested, going to 25 other still being sought.
The members of the gang had existed from ID thieves, con men, counterfeiters purchased tickets, fences and teams, the thousands of dollars worth of merchandise in stores throughout the United States. Earlier this week the police had a truck filled with electronic equipment, computers, shoes, watches and auxiliary resources and raw materials for forging credit cards found.
The credit card numbers come from different sources, the prosecutor said further data theft by cashiers and restaurant workers, on Internet forums and via dubious suppliers from countries like Russia, China and Libya. Several companies, including Apple, Best Buy, Nordstrom, Macy's and several financial institutions like Citi, Chase Bank and Bank of America should have helped in the investigation.
News about Computer, Programming, Webdesign and Developing. We are writing about Software and Hardware. We are testing Apple, HP, IBM, Dell, Acer and Asus in our Lab. Operating systems what we use are: Mac OS X, Microsoft Windows, UNIX and Linux. We handle Desktop and Server Systems.
Sunday, October 9, 2011
Free Firewall IPFire ported to ARM
Free Firewall IPFire ported to ARM
Marvel's system-on-a-chip (SoC) Kirkwood and compatible ARM processors are the first processors beyond the x86 world, which runs on the open-source firewall IPFire. The modular server distribution that is built on a minimalist, hardened core system is specialized for use as a firewall in small and medium-sized networks and so forth have always been tailored to black-box systems.
So far it worked but only with x86-compatible hardware GENRATION i586 (Pentium) or higher. Now available ARM-based mini-systems such as Global Scales dream plug or plug + guru on the roadmap of the developers. For this purpose they have submitted a first beta of the Kirkwood-porting. It is based on the not yet released version 2.11. A version for the ARMv7hi to follow soon.
Marvel's system-on-a-chip (SoC) Kirkwood and compatible ARM processors are the first processors beyond the x86 world, which runs on the open-source firewall IPFire. The modular server distribution that is built on a minimalist, hardened core system is specialized for use as a firewall in small and medium-sized networks and so forth have always been tailored to black-box systems.
So far it worked but only with x86-compatible hardware GENRATION i586 (Pentium) or higher. Now available ARM-based mini-systems such as Global Scales dream plug or plug + guru on the roadmap of the developers. For this purpose they have submitted a first beta of the Kirkwood-porting. It is based on the not yet released version 2.11. A version for the ARMv7hi to follow soon.
SQL Cloud: Google App Engine to extend MySQL service
SQL Cloud: Google App Engine to extend MySQL service
With cloud SQL Google opens its cloud computing service App Engine for database-driven applications. Google provides its users with a cloud MySQL database with JDBC support (Java Database Connectivity) and ready for Java DB API for Python. Via a web frontend to configure the user create its database instances, manage and monitor. Also the import and export the data it handles it. The administration of the database as their synchronous replication in geographically dispersed data centers or the patch and version management, Google.
On Thursday, Google announced a preview for a limited number of users. To use it, App Engine, registered users of the Google APIs Console to send a request to Google. During the preview phase, the service is free. At least 30 days before the start of the paid version of Google intends to announce the prizes.
With cloud SQL Google opens its cloud computing service App Engine for database-driven applications. Google provides its users with a cloud MySQL database with JDBC support (Java Database Connectivity) and ready for Java DB API for Python. Via a web frontend to configure the user create its database instances, manage and monitor. Also the import and export the data it handles it. The administration of the database as their synchronous replication in geographically dispersed data centers or the patch and version management, Google.
On Thursday, Google announced a preview for a limited number of users. To use it, App Engine, registered users of the Google APIs Console to send a request to Google. During the preview phase, the service is free. At least 30 days before the start of the paid version of Google intends to announce the prizes.
EU data protection stands up for Net Neutrality
EU data protection stands up for Net Neutrality
The European Data Protection Supervisor Peter Hustinx has voted against a permit for Internet providers to monitor network traffic in general. It could be they are not even allowed to filter individual services, to block or otherwise restrict. At the same time the Dutchman called for the maintenance of network neutrality. The concept of the open Internet due to the fact that information is transmitted to speak impartially, without regard to content, destination or source should, Hustinx said in a petition of the EU Commission ahead of a possible consultation [3] on net neutrality. A "serious debate" about this principle was to ensure that the confidentiality of communications users will be protected effectively.
Certain techniques such as "deep packet inspection" or other forms of network management can greatly interfere with the privacy worries of privacy advocates. Where it appears, especially when the contents of this online communications, including e-mails sent or received, websites visited or downloaded files revealed. Such deep cuts in a fundamental right would be avoided at all costs.
Hustinx, the European Commission and encouraged the legislature to develop an appropriate active line in such fundamental issues of power politics. At a round table involving all relevant stakeholders, it is necessary to clarify how the data protection legal framework should apply to the base layer of the Internet. This guidance should be given as to when the network management techniques constitute a smooth transfer of data packets or were carried out purely for security purposes and so were legitimate. Next is to work out the cases in which a user to filter certain applications such as file sharing should at least give its consent. Data protection safeguards are adhered to it.
Depending on the results of such a probe might According Hustinx additional legal measures to ensure network neutrality prove necessary. In this case, the Commission should also propose policies to strengthen data protection laws, an expert advises. Access provider would be required, among other things, to offer non-monitored routes. The Brussels Commission published a notice in April to the open Internet, where any additional regulatory measures to ensure network neutrality into the game. First is to present the panel of European regulators for electronic communications (BEREC) but a comprehensive study on this topic.
The European Data Protection Supervisor Peter Hustinx has voted against a permit for Internet providers to monitor network traffic in general. It could be they are not even allowed to filter individual services, to block or otherwise restrict. At the same time the Dutchman called for the maintenance of network neutrality. The concept of the open Internet due to the fact that information is transmitted to speak impartially, without regard to content, destination or source should, Hustinx said in a petition of the EU Commission ahead of a possible consultation [3] on net neutrality. A "serious debate" about this principle was to ensure that the confidentiality of communications users will be protected effectively.
Certain techniques such as "deep packet inspection" or other forms of network management can greatly interfere with the privacy worries of privacy advocates. Where it appears, especially when the contents of this online communications, including e-mails sent or received, websites visited or downloaded files revealed. Such deep cuts in a fundamental right would be avoided at all costs.
Hustinx, the European Commission and encouraged the legislature to develop an appropriate active line in such fundamental issues of power politics. At a round table involving all relevant stakeholders, it is necessary to clarify how the data protection legal framework should apply to the base layer of the Internet. This guidance should be given as to when the network management techniques constitute a smooth transfer of data packets or were carried out purely for security purposes and so were legitimate. Next is to work out the cases in which a user to filter certain applications such as file sharing should at least give its consent. Data protection safeguards are adhered to it.
Depending on the results of such a probe might According Hustinx additional legal measures to ensure network neutrality prove necessary. In this case, the Commission should also propose policies to strengthen data protection laws, an expert advises. Access provider would be required, among other things, to offer non-monitored routes. The Brussels Commission published a notice in April to the open Internet, where any additional regulatory measures to ensure network neutrality into the game. First is to present the panel of European regulators for electronic communications (BEREC) but a comprehensive study on this topic.
CCC cracks State Trojans
CCC cracks State Trojans
Chaos Computer Club (CCC ) claims to the government spying software had been leaked, which became widely known under the term "Federal Trojan" or country-specific versions in Germany, for example, as a "Trojan Bavaria". The state investigators used Trojans to the so-called sources in Germany is currently the telecommunications interception (source telecommunication surveillance) to listen to voice over IP calls at the station before their encryption or after decryption at the receiver.
"The Dredge examined Trojans can not only highly intimate information, but also offer a remote control function for loading and executing any other malicious software," reads the CCC. "Due to arise from rough design and implementation errors also glaring security gaps in the infiltrated computers that can also take advantage of third parties", accuses the CCC from the investigating authorities.
A spokesman for the Interior Ministry confirmed to dpa that software solutions for the telecommunications interception sources are available for both the federal and at state level. "For the use of this software is it legal principles that must be followed when using," said the spokesman. For investigations at the federal level here as the BKA-law was relevant. There are also regulations in some states, including the use of source-monitoring center. Especially in Bavaria did it out yet, the Bavarian Justice Ministry had admitted mid-year that the "Trojan Bavaria" has already been used several times.
The efforts of secret online searches on the computers of suspects back to the year 2005, in the tenure of former Federal Interior Minister Otto Schily (SPD). Then put under the heading "Federal Trojan" A vigorous debate about the acceptability of such interventions in the privacy of the personal computer. The Federal Constitutional Court in February 2008 continued high legal hurdles for online searches. With the ruling, the court also created a new "computer fundamental right", the "fundamental right to ensure the confidentiality and integrity of information technology systems."
The Constitutional Court took not only the fishing operations of IT systems is very narrow limits, but also the first time put the dominion of the user about its information technology equipment from Park. They made it clear that should be changed in this private sphere, no data and only under very strict regulations about eavesdropping. The Basic Law describes a comprehensive system of protection that goes far beyond the information users published.
By the end of 2008 analyzed Mark Hansen of the Independent Centre for Privacy Protection Schleswig-Holstein and Dresdner computer science professor Andreas Pfitzmann also to erode the provisions on remote searches with the so-called federal Trojans not only data protection. The Federal Trojan could also provide no usable evidence in court.
The CCC emphasized the so-called source-monitoring center should be used exclusively for the interception of Internet telephony. This is ensured by technical and legal measures. The software enables analyzed but a much broader attack. It has been shown that "in practice an effective separation of the exclusive telecommunications monitoring and sniffing the big attack by Trojans is possible or even desired only".
The analysis of the code have shown that the functions far beyond the interception of communications and violated the explicit provisions of the Constitutional Court. The software can download some of the network more programs and controlled remotely run, the extensibility of the full function of the Federal Trojan can be provided from the start, could it simply be browsing, reading, writing and manipulating files on the computers operated by alleged suspects . "Even a large digital eavesdropping and Spähangriff is possible by remotely accessing the microphone, the camera and the computer's keyboard is" stressed the CCC.
In addition to the monitoring functions of the CCC revealed by the analysis but also serious security gaps that are torn by the infiltration of the Trojan on to search computers and be listened. "The amounts derived screenshots and audio data are encrypted on incompetent manner, the commands of the control software at the trojan unverschlüssselt even completely," reads the CCC. Neither the commands to the Trojan horse whose answers are still protected by some form of authentication or integrity assurance only. "Thus, not only unauthorized third party remote control over the Trojans, but only moderately skilled attacker already present themselves as the authorities on a specific instance of the trojan and deliver bogus data. There is even an attack on the regulatory infrastructure possible."
The consequences to be drawn are, according to the CCC to see: "The secret infiltration of information technology systems by state authorities must be stopped." The Hackers Club also calls "all the hackers and those interested in technology" to analyze the binaries of the trojan on. In addition, we gladly accept additional copies of the Trojan state.
Chaos Computer Club (CCC ) claims to the government spying software had been leaked, which became widely known under the term "Federal Trojan" or country-specific versions in Germany, for example, as a "Trojan Bavaria". The state investigators used Trojans to the so-called sources in Germany is currently the telecommunications interception (source telecommunication surveillance) to listen to voice over IP calls at the station before their encryption or after decryption at the receiver.
"The Dredge examined Trojans can not only highly intimate information, but also offer a remote control function for loading and executing any other malicious software," reads the CCC. "Due to arise from rough design and implementation errors also glaring security gaps in the infiltrated computers that can also take advantage of third parties", accuses the CCC from the investigating authorities.
A spokesman for the Interior Ministry confirmed to dpa that software solutions for the telecommunications interception sources are available for both the federal and at state level. "For the use of this software is it legal principles that must be followed when using," said the spokesman. For investigations at the federal level here as the BKA-law was relevant. There are also regulations in some states, including the use of source-monitoring center. Especially in Bavaria did it out yet, the Bavarian Justice Ministry had admitted mid-year that the "Trojan Bavaria" has already been used several times.
The efforts of secret online searches on the computers of suspects back to the year 2005, in the tenure of former Federal Interior Minister Otto Schily (SPD). Then put under the heading "Federal Trojan" A vigorous debate about the acceptability of such interventions in the privacy of the personal computer. The Federal Constitutional Court in February 2008 continued high legal hurdles for online searches. With the ruling, the court also created a new "computer fundamental right", the "fundamental right to ensure the confidentiality and integrity of information technology systems."
The Constitutional Court took not only the fishing operations of IT systems is very narrow limits, but also the first time put the dominion of the user about its information technology equipment from Park. They made it clear that should be changed in this private sphere, no data and only under very strict regulations about eavesdropping. The Basic Law describes a comprehensive system of protection that goes far beyond the information users published.
By the end of 2008 analyzed Mark Hansen of the Independent Centre for Privacy Protection Schleswig-Holstein and Dresdner computer science professor Andreas Pfitzmann also to erode the provisions on remote searches with the so-called federal Trojans not only data protection. The Federal Trojan could also provide no usable evidence in court.
The CCC emphasized the so-called source-monitoring center should be used exclusively for the interception of Internet telephony. This is ensured by technical and legal measures. The software enables analyzed but a much broader attack. It has been shown that "in practice an effective separation of the exclusive telecommunications monitoring and sniffing the big attack by Trojans is possible or even desired only".
The analysis of the code have shown that the functions far beyond the interception of communications and violated the explicit provisions of the Constitutional Court. The software can download some of the network more programs and controlled remotely run, the extensibility of the full function of the Federal Trojan can be provided from the start, could it simply be browsing, reading, writing and manipulating files on the computers operated by alleged suspects . "Even a large digital eavesdropping and Spähangriff is possible by remotely accessing the microphone, the camera and the computer's keyboard is" stressed the CCC.
In addition to the monitoring functions of the CCC revealed by the analysis but also serious security gaps that are torn by the infiltration of the Trojan on to search computers and be listened. "The amounts derived screenshots and audio data are encrypted on incompetent manner, the commands of the control software at the trojan unverschlüssselt even completely," reads the CCC. Neither the commands to the Trojan horse whose answers are still protected by some form of authentication or integrity assurance only. "Thus, not only unauthorized third party remote control over the Trojans, but only moderately skilled attacker already present themselves as the authorities on a specific instance of the trojan and deliver bogus data. There is even an attack on the regulatory infrastructure possible."
The consequences to be drawn are, according to the CCC to see: "The secret infiltration of information technology systems by state authorities must be stopped." The Hackers Club also calls "all the hackers and those interested in technology" to analyze the binaries of the trojan on. In addition, we gladly accept additional copies of the Trojan state.
Saturday, October 8, 2011
The technique of the uprising
The technique of the uprising
During the protests in the Middle East and North Africa, activists have used modern technology such as probably never before. But how great the influence of social media and Web video really was - and in what ways they were used?
They are young, they constantly say "fuck", and even the name of their group "Takriz" is an obscenity: The slang term is based on the Arabic word for testicles. Nevertheless, it would be totally wrong, understand Takriz just as insignificant bunch of young men with a penchant for expletives: The Takrizards or short Taks have promoted since the late nineties, the change in Tunisia, and they have contributed much to the fact that ultimately large Parts of the people dared to stand up against the regime. The rest is almost history: President Ben Ali had to flee, and the neighbors in the region began the "Arab Spring".
Founded in 1998, after Takriz own account at the beginning of a tiny "cyber-Think-Tank", was the freedom of speech and called for affordable Internet access. The members communicated mostly via the net. Because "we could be anonymous online," says fetus, a technology consultant with an MBA degree, who speaks six languages and by his own admission was a hacker, because he was not the high cost of telephone and Internet in Tunisia could afford. Foetus want his real name as well as the other Taks betray in any case - they see themselves more in the fight against the followers of Ben Ali, in their view of the same wood are corrupt.
The freedom in the young medium of the Internet was short-lived: In August 2000 the Takriz website was blocked in Tunisia by the government. But other deals closed the gap. A core-Tak named SUX launched the first Arab-African social network, called SuXydelik. Zouhair and Yahayaoui, then a Tak in the thirties with the online name "Ettounsi" - the Tunisians - founded the satirical Web magazine TuneZine. He was in Tunisia to fame - and later arrested and tortured. In 2005 he died at the age of 37 from a heart attack.
Ettounsi was not the only one of Tak, who got to do with the regime. The first years of the new millennium, they are also called "years of human hunting" - many stopped their political activities and went into exile. Others were radicalized by the prosecution but only as Riadh "Astrubal" Guerfali, a law professor who lives in France. Together with the Tunisian exile Sami Ben Gharbia, he found innovative ways to use technology: the two sites crawled by airplane enthusiasts and found a video that demonstrated how the First Lady with the hated Präsidentenjet flew to the shops. They "geo-bombing" the presidential palace by him in Google Earth and Google Maps with linked videos, criticizing human rights in Tunisia where he who had looked at the palace at Google, in an instant access to these videos.
Another innovation was a close relationship of Takriz to football fans. "Mosques and stadiums have long been the only places where young people could drain in the Middle East, their anger and frustration," says James M. Dorsey, a senior fellow at the Nanyang Technological University in Singapore and author of the blog "The Turbulent World of the Middle East Soccer ". "Football is little attention," says Dorsey, "because the violence-prone fans are not bomb the World Trade Center." But they are fighting in pubs, often against the police.
The idea of utilizing these combat readiness for political purposes was, as if in a game of the Tunisia Cup 1999 came to an outbreak of violence with many wounded and several dead. The Taks quickly recognized the advantages of working with the "ultras", as the most extreme football fans are called. Over several seasons, built on a web forum for ultras SUX different teams. A variety of special North African Ultras character of a political rather quickly spread among the football-crazy youth of Tunisia and also in Egypt, Algeria, Libya and Morocco. When the Revolution began, the ultras were playing a whole new game: You were such a thing as the quick reaction force of the protest movement.
What ultimately led to the overthrow of Ben Ali, had a long history: Already in 2008 it came in the mining region of Tunisia, near the town of Gafsa, working conditions for many months to protest against corruption and bad. At its height police forces fired on demonstrators, sharp, one of whom was killed, injured 26, there were hundreds of arrests. The riots, however, remained localized, largely because the security forces isolated the area from the outside world.
In Egypt, there were 2008 labor protests in the Nile Delta city of Mahalla in the. For the sixth April of textile workers were planning a strike. Ahmed Maher, a 27-year-old civil engineer and activist who learned about it and decided to organize in support of demonstrations in Cairo and a nationwide shopping boycott. For this purpose he used leaflets, blogs, internet forums, and a Facebook page.
One month after the protests of 6 April Maher was arrested, beaten for hours and threatened with rape. Upon his release, he held a press conference at which he announced spontaneously, the "movement 6 April to start. " It should be the core of a secular-oriented youth movement in Egypt - a counterweight to the youth movement in the Muslim Brotherhood.
For Taks in Tunisia Ben Ali was re-elected in 2009, the straw that broke the camel's back. Foetus found himself before another decade, "Ben Ali and his mafia," because he believed that the Tunisians for resistance had too much fear. "So we have increased the pressure in the stadium and started making trouble on the Internet," he says, "we have decided to fuck absolutely everyone." On Facebook, the opposition activists berated for their timidity.
To heat the street youth, Takriz shrink from a little back. On 11 August 2010 marked the tenth anniversary of the censorship of Takriz website. She recalled with the publication of a photograph, on the one Tak urinated on a picture of Ben Ali. The youth minister was not amused and called Takriz "monster with a black heart that hide in dirty places and the Internet". Because the group was perfectly timed their action: The next day was to start a pet project of Ben Ali - the UN event, "2010 International Year of Youth: Dialogue and Mutual Understanding".
The summer of 2010 was also the prelude to the revolution in Egypt. On 6 June was a young programmer named Khaled Said in an Internet cafe in Alexandria, as he was dragged by two plainclothes police on the street and beaten to death, allegedly, he had resisted his arrest. His family say he was obsessed with video, to see the police in drug trafficking.
Said was released a symbol of the Revolution, when his brother Ahmed on Facebook terrible photos of the dead. Then formed the group "We are all Khaled Said," which won a major influence virtually overnight. Mostafa Hassan, a burly local activist, saw the photos on his cell phone and called over his own Facebook page now for protests outside the police station. More than a dozen protesters were arrested and severely beaten. After further actions, including one played lawsuit against the Mubarak family in front of the house of Said, Mostafa was jailed for six months.
The long, hot summer boiled over the next revolution. The global financial crisis became apparent, the price of food rose, and Ramadan in the scorching August brought long days without food or drink. Neither Tunisians nor Egyptians had much to celebrate.
Early December, then reached the Egyptian ruling party in the run-off elections to parliament nearly 80 percent of the seats - Human rights groups described the vote as the most fraudulent in the country so far. But it was Tunisia, where a little later the Revolution broke out first right on 17 December 2010 put the vegetable traders in the town of Sidi Mohamed Bouazizi Bouzid himself on fire to protest against a series of humiliations by petty officials. Peaceful protests following the action met with harsh reactions - it was reported only on the Internet, the media fearful of the country remained silent.
But the death of Bouazizi brought together hitherto isolated pockets of resistance. Takriz the leadership knew that Ben Ali would seal off the town of Sidi Bouzid - as in 2008 during the protests in Gafsa. So they quickly sent additional Taks there before roads were blocked and Internet access.
The area in the hinterlands of Tunisia ...
During the protests in the Middle East and North Africa, activists have used modern technology such as probably never before. But how great the influence of social media and Web video really was - and in what ways they were used?
They are young, they constantly say "fuck", and even the name of their group "Takriz" is an obscenity: The slang term is based on the Arabic word for testicles. Nevertheless, it would be totally wrong, understand Takriz just as insignificant bunch of young men with a penchant for expletives: The Takrizards or short Taks have promoted since the late nineties, the change in Tunisia, and they have contributed much to the fact that ultimately large Parts of the people dared to stand up against the regime. The rest is almost history: President Ben Ali had to flee, and the neighbors in the region began the "Arab Spring".
Founded in 1998, after Takriz own account at the beginning of a tiny "cyber-Think-Tank", was the freedom of speech and called for affordable Internet access. The members communicated mostly via the net. Because "we could be anonymous online," says fetus, a technology consultant with an MBA degree, who speaks six languages and by his own admission was a hacker, because he was not the high cost of telephone and Internet in Tunisia could afford. Foetus want his real name as well as the other Taks betray in any case - they see themselves more in the fight against the followers of Ben Ali, in their view of the same wood are corrupt.
The freedom in the young medium of the Internet was short-lived: In August 2000 the Takriz website was blocked in Tunisia by the government. But other deals closed the gap. A core-Tak named SUX launched the first Arab-African social network, called SuXydelik. Zouhair and Yahayaoui, then a Tak in the thirties with the online name "Ettounsi" - the Tunisians - founded the satirical Web magazine TuneZine. He was in Tunisia to fame - and later arrested and tortured. In 2005 he died at the age of 37 from a heart attack.
Ettounsi was not the only one of Tak, who got to do with the regime. The first years of the new millennium, they are also called "years of human hunting" - many stopped their political activities and went into exile. Others were radicalized by the prosecution but only as Riadh "Astrubal" Guerfali, a law professor who lives in France. Together with the Tunisian exile Sami Ben Gharbia, he found innovative ways to use technology: the two sites crawled by airplane enthusiasts and found a video that demonstrated how the First Lady with the hated Präsidentenjet flew to the shops. They "geo-bombing" the presidential palace by him in Google Earth and Google Maps with linked videos, criticizing human rights in Tunisia where he who had looked at the palace at Google, in an instant access to these videos.
Another innovation was a close relationship of Takriz to football fans. "Mosques and stadiums have long been the only places where young people could drain in the Middle East, their anger and frustration," says James M. Dorsey, a senior fellow at the Nanyang Technological University in Singapore and author of the blog "The Turbulent World of the Middle East Soccer ". "Football is little attention," says Dorsey, "because the violence-prone fans are not bomb the World Trade Center." But they are fighting in pubs, often against the police.
The idea of utilizing these combat readiness for political purposes was, as if in a game of the Tunisia Cup 1999 came to an outbreak of violence with many wounded and several dead. The Taks quickly recognized the advantages of working with the "ultras", as the most extreme football fans are called. Over several seasons, built on a web forum for ultras SUX different teams. A variety of special North African Ultras character of a political rather quickly spread among the football-crazy youth of Tunisia and also in Egypt, Algeria, Libya and Morocco. When the Revolution began, the ultras were playing a whole new game: You were such a thing as the quick reaction force of the protest movement.
What ultimately led to the overthrow of Ben Ali, had a long history: Already in 2008 it came in the mining region of Tunisia, near the town of Gafsa, working conditions for many months to protest against corruption and bad. At its height police forces fired on demonstrators, sharp, one of whom was killed, injured 26, there were hundreds of arrests. The riots, however, remained localized, largely because the security forces isolated the area from the outside world.
In Egypt, there were 2008 labor protests in the Nile Delta city of Mahalla in the. For the sixth April of textile workers were planning a strike. Ahmed Maher, a 27-year-old civil engineer and activist who learned about it and decided to organize in support of demonstrations in Cairo and a nationwide shopping boycott. For this purpose he used leaflets, blogs, internet forums, and a Facebook page.
One month after the protests of 6 April Maher was arrested, beaten for hours and threatened with rape. Upon his release, he held a press conference at which he announced spontaneously, the "movement 6 April to start. " It should be the core of a secular-oriented youth movement in Egypt - a counterweight to the youth movement in the Muslim Brotherhood.
For Taks in Tunisia Ben Ali was re-elected in 2009, the straw that broke the camel's back. Foetus found himself before another decade, "Ben Ali and his mafia," because he believed that the Tunisians for resistance had too much fear. "So we have increased the pressure in the stadium and started making trouble on the Internet," he says, "we have decided to fuck absolutely everyone." On Facebook, the opposition activists berated for their timidity.
To heat the street youth, Takriz shrink from a little back. On 11 August 2010 marked the tenth anniversary of the censorship of Takriz website. She recalled with the publication of a photograph, on the one Tak urinated on a picture of Ben Ali. The youth minister was not amused and called Takriz "monster with a black heart that hide in dirty places and the Internet". Because the group was perfectly timed their action: The next day was to start a pet project of Ben Ali - the UN event, "2010 International Year of Youth: Dialogue and Mutual Understanding".
The summer of 2010 was also the prelude to the revolution in Egypt. On 6 June was a young programmer named Khaled Said in an Internet cafe in Alexandria, as he was dragged by two plainclothes police on the street and beaten to death, allegedly, he had resisted his arrest. His family say he was obsessed with video, to see the police in drug trafficking.
Said was released a symbol of the Revolution, when his brother Ahmed on Facebook terrible photos of the dead. Then formed the group "We are all Khaled Said," which won a major influence virtually overnight. Mostafa Hassan, a burly local activist, saw the photos on his cell phone and called over his own Facebook page now for protests outside the police station. More than a dozen protesters were arrested and severely beaten. After further actions, including one played lawsuit against the Mubarak family in front of the house of Said, Mostafa was jailed for six months.
The long, hot summer boiled over the next revolution. The global financial crisis became apparent, the price of food rose, and Ramadan in the scorching August brought long days without food or drink. Neither Tunisians nor Egyptians had much to celebrate.
Early December, then reached the Egyptian ruling party in the run-off elections to parliament nearly 80 percent of the seats - Human rights groups described the vote as the most fraudulent in the country so far. But it was Tunisia, where a little later the Revolution broke out first right on 17 December 2010 put the vegetable traders in the town of Sidi Mohamed Bouazizi Bouzid himself on fire to protest against a series of humiliations by petty officials. Peaceful protests following the action met with harsh reactions - it was reported only on the Internet, the media fearful of the country remained silent.
But the death of Bouazizi brought together hitherto isolated pockets of resistance. Takriz the leadership knew that Ben Ali would seal off the town of Sidi Bouzid - as in 2008 during the protests in Gafsa. So they quickly sent additional Taks there before roads were blocked and Internet access.
The area in the hinterlands of Tunisia ...
IT Security
IT Security
The Internet pervades more and more areas of life - and even dragged there a malware. Social networks and mobile devices are considered highly endangered. But will always acted only when something happens.
First came the warnings, then threats of seizure, and eventually even an arrest warrant: One or more persons were found on the Internet, the birth of Tina resentment and goods will be delivered under their own name for several thousand euros to different addresses. Because the warnings and threats to the delivery addresses were lost into the void, a seller off the collection agency that took the trouble to research where a woman actually lived with the specified name and birth date. No sooner had this information, resentment has been bombarded with requests for payment. "It sounds ridiculous, but I'm afraid to open the mailbox," said Groll, a professional editor of the weekly newspaper "Die Zeit", in an article for "time line" of the ugly experience, which in late 2009 began.
Another example: In fact, insulin pumps are a practical thing. Held several times a day even to put syringes, diabetics can wear such a pump on your belt and carry it to their body's blood sugar-lowering hormone through an implanted tube continuously; latest devices work even with body sensors that measure glucose levels and transmit to the pump. Still, that's a problem, such as diabetics and the IBM security expert Jay Radcliffe found out: his own pump, a product of the U.S. medical technology provider Medtronic, is unsafe. Malicious people can exploit a gap in the radio module in order to increase the flow of insulin to decrease or stop completely. The name of the manufacturer Radcliffe made public only in late summer, after he had tried several times unsuccessfully to move quietly to a Medtronic reaction. Now it is from there, at least the next generation of equipment should be safe.
The cases of resentment and Radcliffe are all different and yet stand for the same problem: the dangers of networking. It was enough in the past mostly to keep the programs of their own computer with current and good to use virus scanners and firewalls, home users and businesses today need to deal with a whole new set of threats. Social networks provide criminals sensitive personal data free house, ever more powerful mobile phones offer an additional avenue for hacker attacks, and the computerization of more and more products and production processes - from networked medical technology and smart meters to industrial control systems - also formerly insular devices and systems makes target of attacks from a distance.
"The threat picture has become more diverse, both in terms of type of malware as well as the nature of the gaps", says Markus Schaffrin, head of the department of e-business with the Internet Association of Eco. For home users, he still sees so-called Trojan horse - as the biggest problem - programs that perform functions hidden malware or steal data. That it is the large numbers, has been widely talked about, and also that it is not a good idea to click on attachments in e-mails from strangers. However, the cyber criminals to think long and always respond in more sophisticated ways to take control over the computers of their victims.
Most popular hunting ground for the online gangster has been developed in record time, the social network Facebook - parallel to the rise of the most visited website in the world. This June saw the service more than a billion page views of 870 million visitors, well above second-placed YouTube, which came to 100 billion page views and 790 million visitors. More than 750 million people worldwide are now active on Facebook, of which about 20 million in Germany. And according to a survey by IT security firm Sophos, almost every second of these users have already seen attempts to steal him on Facebook or access to foist malicious software.
This is also not surprising, because Facebook, according to its young founder Mark Zuckerberg is not as simple website understands, but as a platform: a type of Internet on the Internet, with its own e-mail and chat service that own programs - and a very peculiar notion of handling of personal data By default, everything betrays a member of Facebook is about, visible to every other member - including the birth date, which, like the case of an editor shows resentment may be sufficient for an identity theft already. Some information can be hidden or omitted. Name, address and gender are always retrieved and displayed. And the public display of the buddy list can be switched off though, but is still all Facebook applications - and therefore damaging - are available.
As a "beautiful story for hackers" referred Sascha Pfeiffer, a security expert at Sophos, the fast-growing social network. Facebook is replacing on the way, e-mail as the most popular medium for spreading malware. Specifically, two factors contribute to this: Facebook users trust their local friends - if they get one of which a supposedly interesting link sent, please click relatively safely out, but according to a survey does well every third user, and another 20 percent call even completely Links to third-party set. Secondly, according to Pfeiffer, was a perfectly Facebook "smooth surface", in which even experienced users can not see exactly what action is created by clicking - often the user will run back and forth across multiple servers. To illustrate the expert recommends, once the network to the Internet Explorer and connect your device sound to use: The browser is for everyone else unnoticed forwarding a brief crack of himself - "that's a very nice chatter."
Their initial attacks often take Facebook with a hacked profile of any member. Meanwhile, the attacker gain access, for example, by including in supposedly simple Facebook originating e-mails ask for it - there are still unsuspecting surfers to this trick ....
The Focus article in detail:
Development: Social networks provide numerous opportunities for attacks
Hacker: The insider knowledge of the scene is always in demand
Cloud Computing: Rentable computing power can be abused as a weapon
Company protection: a new cyber-defense center to secure industrial plants
Interview: IT specialist Ralph Langner over Internet-based sabotage
Smart meters: Smart meters can spy on the consumer
The Internet pervades more and more areas of life - and even dragged there a malware. Social networks and mobile devices are considered highly endangered. But will always acted only when something happens.
First came the warnings, then threats of seizure, and eventually even an arrest warrant: One or more persons were found on the Internet, the birth of Tina resentment and goods will be delivered under their own name for several thousand euros to different addresses. Because the warnings and threats to the delivery addresses were lost into the void, a seller off the collection agency that took the trouble to research where a woman actually lived with the specified name and birth date. No sooner had this information, resentment has been bombarded with requests for payment. "It sounds ridiculous, but I'm afraid to open the mailbox," said Groll, a professional editor of the weekly newspaper "Die Zeit", in an article for "time line" of the ugly experience, which in late 2009 began.
Another example: In fact, insulin pumps are a practical thing. Held several times a day even to put syringes, diabetics can wear such a pump on your belt and carry it to their body's blood sugar-lowering hormone through an implanted tube continuously; latest devices work even with body sensors that measure glucose levels and transmit to the pump. Still, that's a problem, such as diabetics and the IBM security expert Jay Radcliffe found out: his own pump, a product of the U.S. medical technology provider Medtronic, is unsafe. Malicious people can exploit a gap in the radio module in order to increase the flow of insulin to decrease or stop completely. The name of the manufacturer Radcliffe made public only in late summer, after he had tried several times unsuccessfully to move quietly to a Medtronic reaction. Now it is from there, at least the next generation of equipment should be safe.
The cases of resentment and Radcliffe are all different and yet stand for the same problem: the dangers of networking. It was enough in the past mostly to keep the programs of their own computer with current and good to use virus scanners and firewalls, home users and businesses today need to deal with a whole new set of threats. Social networks provide criminals sensitive personal data free house, ever more powerful mobile phones offer an additional avenue for hacker attacks, and the computerization of more and more products and production processes - from networked medical technology and smart meters to industrial control systems - also formerly insular devices and systems makes target of attacks from a distance.
"The threat picture has become more diverse, both in terms of type of malware as well as the nature of the gaps", says Markus Schaffrin, head of the department of e-business with the Internet Association of Eco. For home users, he still sees so-called Trojan horse - as the biggest problem - programs that perform functions hidden malware or steal data. That it is the large numbers, has been widely talked about, and also that it is not a good idea to click on attachments in e-mails from strangers. However, the cyber criminals to think long and always respond in more sophisticated ways to take control over the computers of their victims.
Most popular hunting ground for the online gangster has been developed in record time, the social network Facebook - parallel to the rise of the most visited website in the world. This June saw the service more than a billion page views of 870 million visitors, well above second-placed YouTube, which came to 100 billion page views and 790 million visitors. More than 750 million people worldwide are now active on Facebook, of which about 20 million in Germany. And according to a survey by IT security firm Sophos, almost every second of these users have already seen attempts to steal him on Facebook or access to foist malicious software.
This is also not surprising, because Facebook, according to its young founder Mark Zuckerberg is not as simple website understands, but as a platform: a type of Internet on the Internet, with its own e-mail and chat service that own programs - and a very peculiar notion of handling of personal data By default, everything betrays a member of Facebook is about, visible to every other member - including the birth date, which, like the case of an editor shows resentment may be sufficient for an identity theft already. Some information can be hidden or omitted. Name, address and gender are always retrieved and displayed. And the public display of the buddy list can be switched off though, but is still all Facebook applications - and therefore damaging - are available.
As a "beautiful story for hackers" referred Sascha Pfeiffer, a security expert at Sophos, the fast-growing social network. Facebook is replacing on the way, e-mail as the most popular medium for spreading malware. Specifically, two factors contribute to this: Facebook users trust their local friends - if they get one of which a supposedly interesting link sent, please click relatively safely out, but according to a survey does well every third user, and another 20 percent call even completely Links to third-party set. Secondly, according to Pfeiffer, was a perfectly Facebook "smooth surface", in which even experienced users can not see exactly what action is created by clicking - often the user will run back and forth across multiple servers. To illustrate the expert recommends, once the network to the Internet Explorer and connect your device sound to use: The browser is for everyone else unnoticed forwarding a brief crack of himself - "that's a very nice chatter."
Their initial attacks often take Facebook with a hacked profile of any member. Meanwhile, the attacker gain access, for example, by including in supposedly simple Facebook originating e-mails ask for it - there are still unsuspecting surfers to this trick ....
The Focus article in detail:
Development: Social networks provide numerous opportunities for attacks
Hacker: The insider knowledge of the scene is always in demand
Cloud Computing: Rentable computing power can be abused as a weapon
Company protection: a new cyber-defense center to secure industrial plants
Interview: IT specialist Ralph Langner over Internet-based sabotage
Smart meters: Smart meters can spy on the consumer
Subscribe to:
Posts (Atom)