Jump to content

Byte-ul

Active Members
  • Posts

    2175
  • Joined

  • Last visited

  • Days Won

    30

Everything posted by Byte-ul

  1. Pune value with sales de aici: https://steamdb.info/calculator/
  2. Times New Roman - Dup? zeci de încerc?ri, Coreea de Nord a produs o petard?; amenin?? c? o va detona de Revelion
  3. La multi ani!
  4. Ce metoda ai folosit pentru decriptarea stringurilor?
  5. Varianta mea: (probabil cea mai simpla) int n = 5; int i = n/3*199 + (n%3)/2*149 + (n%3)%2*99;
  6. Nu faceti si un tutorial cum se face chestia asta? Mi-am stors creierii cu el si degeaba.
  7. Momentan are doar 3 nivele. Voi mai adauga in timp altele:) Au rezolvat: Level 1: @Gio33 Pentru a demonstra ca ati rezolvat un nivel, trimiteti-mi PM cu linkul pastebin de la finalul acestuia. Bafta! // daca gasiti greseli, spuneti rapid si o sa fixez. // sa nu va puna dracu sa imi hackuiti site-ul.
  8. Voi sunte?i spar?i? Orice 2 numere impare adunate dau un num?r par. Deci ?i orice 4 numere impare adunate dau tot un num?r par. E imposibil.
  9. https://rstforums.com/forum/62932-modificari-forum-9.rst#post596619
  10. La nivelul 3, avand in vedere ca este reprezentat in hex, se pot inversa caracterele intre ele, doua cate doua. Spre exemplu, 458656 devine 546865. Apoi utilizati un site care permite conversia hex>string si aflati solutia.
  11. botz este contul pe care il foloseam pentru bot. Probabil tot Maximus l-a banat si pe acela.
  12. Nu, nu pot intra. Care ar fi motivul pentru care voi sta 5 zile "pe tusa"?
  13. Avand in vedere ca s-a facut un thread special pentru asta, am decis sa repostez aici avand in vedere ca nu s-a rezolvat.
  14. @Maximus mi-a dat ban pe chat dupa ce i-am spus sa isi mute botul pe canalul RSTech (si el mi-a zis acelasi lucru si apoi a dat kick la bot) Doresc sa isi ceara scuze, nu am facut nimic ca sa merit acel ban.
  15. Esti retard? Ce parola criptata ai pus tu in primul post, si ce parola ai pus acum? Ai facut ca handicapatu' md5 la un string de 18 caractere si faci lumea batuta in cap. Esti prost de puti. // si ca sa nu isi iroseasca nimeni timpul, screenshot cu fisierele (uitati-va la data) http://i.imgur.com/7U4DtV3.png
  16. Chinese hackers brought down all major Afghanistan Government websites by hacking an official CDN network used in the country.The experts of the*ThreatConnect Intelligence Research Team (TCIRT) recently reported the operation, dubbed Operation Helmand, run by a group of Chinese hackers that attacked the entire Afghan government web network.*The hackers*allegedly used a targeted cross-site scripting (XSS) “drive-by” attack on the principal*Content Delivery Network (CDN) used in Afghanistan. The CDN platforms are an essential component for publishing on the web, they allow to *dynamically deliver web content to public and private entities. Compromising a CDN it is possible to reach a wide audience, for this reason they represent*a privileged target for threat actors. An attacker can exploit a CDN platform for example to serve malicious content and compromise visitor’ systems. In the specific case, the attackers run a targeted cross-site scripting (XSS) “drive-by” attack that leveraged a single CDN to spread a malicious Java applet through the major Afghanistan websites. The hacking campaign reportedly hit the network run by Afghan Ministry of Communications and IT (MCIT), the attackers used a JavaScript to compromised the CDN available at the following URL:*[http:]//cdn.afghanistan[.]af/scripts/gop-script.js [img width=480,height=279]http://securityaffairs.co/wordpress/wp-content/uploads/2014/12/CDN-Afghanistan-hacking.jpgThe hackers have brought down the websites of the main*Afghan government agencies, including Education, Finance, Foreign Affairs, Justice and Women’s Affairs, and foreign websites that receive contents from the same CDN like the Australian embassy. Below the list of affected websites: [http:]//canberra.afghanistan[.]af/en (Afghan Embassy in Canberra, Australia)[http:]//herat.gov[.]af/fa (Herat Province Regional Government)[http:]//mfa.gov[.]af/en (Ministry of Foreign Affairs)[http:]//moci.gov[.]af/en (Ministry of Commerce and Industries)[http:]//moe.gov[.]af/en (Ministry of Education)[http:]//mof.gov[.]af/en (Ministry of Finance)[http:]//moj.gov[.]af/fa (Ministry of Justice)[http:]//mowa.gov[.]af/fa (Ministry of Women’s Affairs)[http:]//oaacoms.gov[.]af/fa (Office of Administrative Affairs and Council of Ministers)The experts speculate that the Chinese Intelligence adopted a watering hole technique because it is looking with great interest to the Afghanistan after the US and NATO have reduced their troops in the country. The researchers collected evidences that the watering hole attacks coincided with a meeting on infrastructure development and bilateral cooperation in Kazakhstan between China’s Prime Minister Li Keqiang and Afghanistan’s government chief executive officer Abdullah Abdullah.The researchers, analyzing the EXIF metadata of the image of Keqiang meeting, discovered that the image used to serve the malware was modified a few hours after it appeared to be taken at the meeting. * * The Operation Helmand is quite similar to other attacks observed in South East Asia, the experts noticed also many similarities with another*watering hole attack uncovered this summer, when a malicious Java file was served on the website of the Greece embassy in Beijing during a diplomatic meeting to Athens. Afghanistan CDN network compromised by Chinese hackers | Security Affairs
  17. Microsoft Scripting Guy, Ed Wilson, is here. This morning, I decided to make a cup of orange spice tea. I did not even do it manually. I used a tea bag. I know, I know, I know. But hey, sometimes I like the convenience of opening a tea bag and filling the cup with hot water. Boom! I am done. This is especially true when I have a good bag of tea—not some of the cheaper tea that one might purchase at a big-box discount store that sells everything from car batteries to peanut butter. Indeed, over the years, I have found that there are some companies that put high quality tea leaves in their little bags. The same might be said of a TCP/IP configuration. I mean, I might enjoy writing a script that calls a variety of WMI classes to manually configure the TCP/IP configuration of my workstation—but hey, it is certainly easier to use DHCP. In fact, when the results are the same, there is no reason to waste my time doing things manually. It is the end result that is the goal. Like a fine cup of hot tea, results count. So whenever DHCP is available, I use it. There are times when I resort to my scripts, but that is generally for test environments when I do not want to take the time to configure a DHCP server. The same is basically true for finding the results—I can use the*Get-NetIPAddress*function from the*NetTCPIP*module to retrieve my IP configuration information. This is great because the function returns an object that is easily manipulated. In addition, I do not need to remember esoteric, confusing switches and parameters. Instead, because it is Windows PowerShell, everything is consistent. Finding informationTo find functions that provide information, I can use the*Get-Command*cmdlet. I am interested in the verb*Get*and the module*NetTcpIp.*Here is the command and the output from the command: PS C:\> gcm -Verb get -Module NetTCPIP CommandType**** Name * * * * * * * * * * * * * * * * * * * *ModuleName**************** ----------- * * * * * * * *---- * * * * * * * * * * * * * * * * * * * * * * * ----------**************** Function****** *Get-NetCompartment * * * * * * * * * * * * NetTCPIP****************** Function******* Get-NetIPAddress * * * * * * * * * * * * * * * NetTCPIP****************** Function******* Get-NetIPConfiguration * * * * * * * * * * * NetTCPIP***** ************* Function******* Get-NetIPInterface * * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetIPv4Protocol * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetIPv6Protocol * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetNeighbor * * * * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetOffloadGlobalSetting * * * * * * * *NetTCPIP****************** Function******* Get-NetPrefixPolicy * * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetRoute************************************** NetTCPIP****************** Function******* Get-NetTCPConnection * * * * * * * * * * * NetTCPIP************* ***** Function******* Get-NetTCPSetting * * * * * * * * * * * * * * *NetTCPIP****************** Function******* Get-NetTransportFilter * * * * * * * * * * * * NetTCPIP****************** Function******* Get-NetUDPEndpoint * * * * * * * * * * * * * NetTCPIP****************** Function******* Get-NetUDPSetting * * * * * * * * * * * * * * *NetTCPIP****************** Using Get-NetIPAddress functionFrom the previous list, I decide I want to use the*Get-NetIPAddress*function to explore the configuration of my network adapters. Unfortunately these days, a single laptop may have more than a dozen things that are considered network adapters. In fact, most are virtual of some sort. But nearly always, there are at least two real network adapters: wireless and wired. Depending on what is going on, one or both of the adapters may be bound to TCP/IP and may have assigned IP addresses. At the most basic, I simply type the function name, and it returns information. This is shown here: As I look over this output, I see that there is IPv6 in additon to IPv4. I am interested in IPv4. Note**For performance reasons, if at all possible, always filter to the left of the Windows PowerShell pipeline,* not to the right. To filter only IPv4, I could pipe the output to*Where-Object. The command might look something like the following: Get-NetIPAddress | where addressfamily -eq 'ipv4'* But that is a lot of work, and it violates the rule of trying to filter on the left side of the Windows PowerShell pipeline character if at all possible. In this case, the*Get-NetIPAddress*function has a parameter that will accomplish the same thing as the previous command. Here is the revision: Get-NetIPAddress -AddressFamily IPv4 The cool thing is that I do not have to type the previous command completely. This is because the Windows PowerShell ISE command completion feature pops up with suggestions. This is shown here: I simply need to select the appropriate choice from the list to complete my command. So now I have only IPv4 addresses. But I am also interested in the addresses that are supplied via DHCP. One way of obtaining this information is to look at the*PrefixOrigin*parameter. The revised command is shown here: Get-NetIPAddress -AddressFamily IPv4 -PrefixOrigin Dhcp As shown here, if I am interested in statically assigned information, I can switch from*DHCP*to*Manual: Get-NetIPAddress -AddressFamily IPv4 -PrefixOrigin Manual By using the various switches and parameters of the*Get-NetIpAddress*function, I can easily find a lot of information about my computer. And if I was inclined, I could also obtain information remotely by using the*CimSession*parameter. All I would need to do is to create one or more CIM sessions and then feed that to the function. Piece of cake. I invite you to follow me on*Twitter*and*Facebook. If you have any questions, send email to me at*scripter@microsoft.com, or post your questions on the*Official Scripting Guys Forum. See you tomorrow. Until then, peace. http://blogs.technet.com/b/heyscriptingguy/archive/2014/12/27/weekend-scripter-exploring-ip-address-functions.aspx
  18. For the past two years, we at*FedTech*have scoured the web to assemble our annual list of*50 Must-Read IT Blogs. This year’s list covers IT from all angles, including cybersecurity, cloud and Big Data. Some of our top picks were featured in the*2013 edition of the Must-Read IT Blogs, but most of the honorees below are new to the list. You’ll find blogs produced by trade publications, professionals who understand the nuances of federal IT and government agencies. You don’t have to be technical to appreciate the content featured in these blogs, because there is something for everyone: citizens, IT professionals, contractors and federal employees who want to know how they are affected by the government’s roughly $80 billion IT budget. We hope you enjoy the*2014 Must-Read Federal IT Blogs*below. If your blog made this year’s list,*grab a badge and share the news with your followers. For future reference, be sure to bookmark this page, share it with a friend and follow our top bloggers on social media. The Hill (Technology) The Hill, a five-day-a-week newspaper “for and about the U.S. Congress,” is a must-read for anyone who tracks politics and technology. If you’re looking for breaking news and analysis about hot topics in government — such as cybersecurity, net neutrality and privacy issues — you’ll want to follow its online edition as well. The site offers news stories, videos and updates on technology-related regulations and legislation. Follow:*@thehill*| Read the blog:*thehill.com/policy/technology *18F 18F is the gold standard when it comes to delivering digital services to citizens. The group comprises public and private sector innovators and serves as an in-house digital-delivery team for government. On the 18F blog, you’ll find tips for using application programming interfaces, agile development and other IT advice. Follow:*@18F*| Read the blog:*18f.gsa.gov *Office of Science and Technology Policy Blog The Office of Science and Technology Policy has played a key role in advancing the government’s Big Data investments, open-data efforts and the science, technology, engineering and math (STEM) workforce. The blog is an extension of that work and helps to inform the public about new science and tech policies and R&D coming from the White House and other executive agencies. Follow:*@whitehouseostp*| Read the blog:*whitehouse.gov/administration/eop/ostp/blog * FierceGovernmentIT The FierceMarkets family of publications covers a range of issues, including health IT, mobility and homeland security. FierceGovernmentIT gives you a sampling of these topics and offers the latest news affecting defense and civilian agencies. Its e-newsletter program reaches some 23,500 decision-makers and IT executives. Follow:*@FierceGov*| Read the blog:*fiercegovernmentit.com *Ask the CIO Want to hear directly from federal CIOs about their challenges, successes and implementation of IT directives? Tune in to Federal News Radio’s weekly segment Ask the CIO. You can listen to the full interviews online and register for free online chats with those executives. Executive editor Jason Miller conducts the interviews. Follow:*@FedNewsRadio*| Read the blog:*federalnewsradio.com/?nid=251/ *Federal Times IT Blog Federal Times has long been a reputable news source in the federal community. Over the past 18 months, it has expanded its coverage of government IT and now has an entire blog dedicated to the topic. Featured content comes from current and former government executives as well as industry experts who work alongside agencies. Follow:*@FederalTimes*| Read the blog:*federaltimes.com/section/blg01 **DHS Science and Technology Blog Research and development is key to advancing cybersecurity, border security and public safety. Tucked within the Department of Homeland Security is an organization charged with carrying out those tasks: the Science and Technology Directorate. The S&T blog offers a behind-the-scenes look at current projects and how they impact the community. For more in-depth stories, check out*S&T Snapshots, the directorate’s e-newsletter. Follow:*@dhsscitech*| Read the blog:*dhs.gov/science-and-technology/blog *USAID Impact Blog The recent Ebola outbreak shone a spotlight on the important work underway at the U.S. Agency for International Development. But the agency’s work doesn’t start or stop there. USAID is using technology and data to end global poverty and improve the quality of life for people around the world. USAID’s blog shares the successes, failures and adjustments made to achieve those goals. Follow:*@USAID*| Read the blog:*blog.usaid.gov/tag/technology/ *CIO Council Blog You don’t have to wonder what federal CIOs are working on because their stories are all in one place. The CIO Council Blog features posts from CIOs, IT executives and White House executives who influence the government’s IT agenda. You’ll find stories on cloud computing, shared services and much more. Follow:*@ciodotgov*| Read the blog:*cio.gov/cioc-blog/ *FCW Insider If you ask federal IT professionals what blogs they read, FCW Insider will likely be one of them. The blog provides shorter pieces that complement more in-depth coverage provided on the main FCW website. FCW Insider is a great source for keeping tabs on the comings and goings of CIOs and other IT executives. Follow:*@FCWnow*| Read the blog:*fcw.com/blogs/fcw-insider/list/blog-list.aspx *InformationWeek Government InformationWeek Government is a community of seasoned reporters and subject matter experts who understand the nuances of IT. Writers provide analysis on hot topics, such as cybersecurity, cloud computing and Big Data, that often spark reader comments and further discussion. Follow:*@InformationWeek*| Read the blog:*informationweek.com/government.asp *GovLoop Blog GovLoop is a vibrant online community where members share resources and best practices for making government work better. The site offers something for everyone: CIOs, program managers and anyone interested in federal management issues. Follow:*@GovLoop*| Read the blog:*govloop.com/community/blog/ FirstResponder.gov Blog FirstResponder.gov has a clear mission: to support first responders through science and technology. The Department of Homeland Security blog explores the use of social media, geospatial intelligence and communications to enhance emergency responses. Follow:*@dhsscitech*| Read the blog:*firstresponder.gov *It All Starts with Science If you prefer stories that mesh environmental issues and research, then this blog is for you. As the agency charged with protecting human health and the environment, the Environmental Protection Agency uses this blog to share the stories of scientists, engineers and EPA partners who carry out its mission. If you can’t make it to the blog daily, there’s a week’s worth of coverage provided in each “This Week in EPA Science” post. Follow:*@EPA*| Read the blog:*blog.epa.gov/science/ *EMC Public Sector Blog EMC has become an established name in the federal IT community, so it’s no surprise that EMC’s senior officials have plenty to say about the use of cloud, data storage and Big Data analytics in government and how EMC solutions can help agencies improve IT outcomes. Follow:*@EMCPublicSector*| Read the blog:*publicsectorblog.emc.com/ *HHS IDEA Lab Blog Some would argue that “innovation” is one of the most overused words in government and thus has lost its meaning. But at the Health and Human Services Department, innovation is alive and well. At HHS, there’s an entire organization with senior-level support to test, measure and potentially scale employee-generated ideas. Read how in the HHS IDEA Lab Blog. Follow:*@HHSIDEALab*| Read the blog:*hhs.gov/idealab/blog/ *Government Health IT Blog Government Health IT is the go-to source for all things related to government, technology and healthcare. You don’t have to be a health IT wonk to appreciate the rich content shared by editors and health IT experts. Whether it’s telehealth or interoperability, this blog has engaging stories for patients and healthcare providers alike. Follow:*@GovHIT*| Read the blog:*govhealthit.com/blog *The Big Data and Analytics Hub How can agencies use Big Data? What's keeping data science from playing a more central role in public policy? These are the kinds of questions IBM executives ask and answer on the tech giant’s Big Data blog. IBM’s Big Data and computing work extend far beyond government and have even debuted on Jeopardy, in the form of its cognitive computing system,*Watson. Follow:*@IBMbigdata*| Read the blog:*ibmbigdatahub.com/tag/451 *Tech@FTC Did you know that the Federal Trade Commission has a*new chief technologist? Ashkan Soltani returned to the agency in November, following a stint as an FTC staff technologist between 2010 and 2011. Shortly after coming on board, Soltani outlined his priorities, which include data security for consumers and attracting more tech talent to the FTC. Read this blog to hear more from him in the future. Follow:*@TechFTC*| Read the blog:*ftc.gov/news-events/blogs/techftc *Security Is Sexy It depends on whom you ask, but freelance writer Darlene Storm’s tell-it-like-it-is blogging style may have you agreeing with her. Storm injects a blend of government and consumer security news into her Computerworld blog. According to her, “Most security news is about insecurity, hacking, cybersecurity and even privacy threats, bordering on scary. But when security is done right, it's a beautiful thing ... sexy even. Security is sexy.” Follow:*@SecurityIsSexy*| Read the blog:*computerworld.com/blog/security-is-sexy *GovernmentCIOMagazine.com Every month, employees at consulting firm GovernmentCIO delve into issues that matter most to those in the C-suite: project management, IT infrastructure and human capital, among others. The site includes features from current and former federal IT executives as well as interviews with big-name feds such as Dan Tangherlini, administrator of the General Services Administration. Follow:*@GovernmentCIO*| Read the blog:*governmentciomagazine.com/ *CIO Insight Federal and private-sector executives alike are grappling with similar challenges related to cloud computing, supporting a mobile workforce and IT management. CIO Insight prides itself on being the voice for that community of professionals and a trusted source for CIOs and aspiring executives. Follow:*@CIOInsight*| Read the blog:*cioinsight.com/ *Anil John These days, everyone could use a digital security coach, someone who can explain the nuances of information security and identity assurance. That’s what Anil John does best. John manages the*government’s identity framework*for enabling secure online service delivery and writes related stories on this topic weekly. “If you are a technical leader or entrepreneur tackling this tough but very interesting challenge, this blog is for you,” John says. Follow:*@aniltj*| Read the blog:*cblog.aniljohn.com *Government Matters Technology, security and management are the pillars of Government Matters, which airs as a weekly TV newscast worldwide on the American Forces Network. Episodes are available online and feature one-on-one interviews with the biggest names in government, including federal CIOs. Follow:*@GovMattersTV*| Read the blog:*wjla.com/news/government-matters/ *FedBiz Contracting is a huge part of federal business, with agencies spending more than $500 billion on goods and services annually. Of that, about $80 billion is spent on information technology. This blog, published by the Washington Business Journal, blog tracks federal business, with an emphasis on the contracting community. Follow:*@WBJonline*| Read the blog:*bizjournals.com/washington/blog/fedbiz_daily/ *On I.T. This Washington Post blog showcases IT news from the walls of government agencies to private companies and startups. While you won’t find breaking news here, stories highlight initiatives at the intersection of business and technology. Follow:*@washingtonpost*| Read the blog:*washingtonpost.com/business/on-it/ *Politico Morning Cybersecurit Your morning isn’t complete unless you’ve skimmed through Politico’s Morning Cybersecurity report. The daily rundown is full of the latest and most relevant news on cybersecurity and politics. These short and informative briefs often include links to longer, more in-depth stories. If you haven’t already, subscribe now. Follow:*@politico*| Read the blog:*politico.com/morningcybersecurity/ *White House Open Government Blog The calls for open and transparent governing are getting louder, and federal agencies are listening. This White House blog tracks agencies’ open-government initiatives and the administration’s efforts to involve the public in those plans. Open-government enthusiasts should keep an eye on this blog and join the online conversation. Follow:*@OpenGov*| Read the blog:*whitehouse.gov/open/blog *Decoding the Insider Threat The 2010 WikiLeaks breach ushered in new standards and policies for agencies as they defend against insider threats. As the threats evolve, so must the government’s approach to thwarting them. Oliver Brdiczka’s Computerworld blog brings an interesting perspective to the conversation. Brdiczka is a data scientist focused on building machine learning models to mitigate insider threats. Follow:*@oliverbrdiczka*| Read the blog:*computerworld.com/blog/decoding-the-insider-threat *USDA Blog (Technology and Broadband) The Agriculture Department administers a number of programs, including programs to assist rural communities and boost food and nutrition. Technology plays a huge role in those efforts, and there is an entire blog dedicated to telling those stories. Whether it’s funding for*rural broadband*or managing logistics for massive food operations, the USDA tech blog covers it all. Follow:*@USDA*| Read the blog:*blogs.usda.gov/category/technology *The Public Eye Cybersecurity has gone mainstream, and so has the public’s concern about privacy in the digital world. The Public Eye is all about tracking government efforts to protect citizens’ privacy through investments in cybersecurity and legislative actions to boost security. Eric Chabrow, executive editor of GovInfoSecurity, writes the blog. Follow:*@govinfosecurity*| Read the blog:*govinfosecurity.com/blogs/public-eye-b-13 *Armed with Science Forget what you think you know about science blogs. This Defense Department blog chronicles cutting-edge projects led by DOD and its partner organizations. From stories about*wearable tech suits*to*virus-zapping robots, there’s plenty to keep readers engaged and coming back for more. Follow:*@ArmedwScience*| Read the blog:*science.dodlive.mil *Center for a New American Security (Technology and National Security) The Center for a New American Security was co-founded by Michèle Flournoy, former undersecretary of defense for policy, and Kurt Campbell, former assistant secretary of state for East Asian and Pacific affairs. Coverage of technology and national security — one of the nonprofit’s top research areas — includes in-house reports and analysis on pressing issues that affect defense technology. CNAS reports are a must-read for defense IT enthusiasts. Follow:*@CNASdc*| Read the blog:*cnas.org/research/technology-and-national-security *FedScoop FedScoop is the epitome of a well-oiled, multimedia platform. In addition to the latest federal IT news, FedScoop offers audio interviews via FedScoop Radio and on-camera interviews with CIOs, chief technology officers and other executives. Subscribe to the DailyScoop and get stories delivered to your inbox. Follow:*@FedScoop*| Read the blog:*fedscoop.com/*The SIGNAL Blog The SIGNAL staff boasts a rich background of technology coverage in the defense and government space that spans nearly a century. The editorial team includes former war correspondents and award-winning writers. The print publication, SIGNAL magazine, is the official publication of AFCEA, the international nonprofit Armed Forces Communications and Electronics Association. Follow:*@?signalmag?*| Read the blog:*afcea.org/content/?q=blog *What’s Brewin’ Defense IT coverage is Bob Brewin’s bread and butter. His Nextgov blog sheds light on DOD contracts, policies and cross-agency work with the Veterans Affairs Department on electronic health records. Brewin brings more than 20 years of experience to the beat. Follow:*@Nextgov*| Read the blog:*nextgov.com/defense/whats-brewin/ *Around the Corner The General Services Administration often serves as a test bed for IT innovation. CIO Sonny Hashmi took over the blog from his predecessor Casey Coleman and uses it to explain GSA’s IT initiatives and outreach to other agencies. GSA is the government’s procurement arm, so expect a healthy dose of IT acquisition stories. Follow:*@usgsa*| Read the blog:*gsablogs.gsa.gov/innovation/ *Government Sales Insider Analysts at immixGroup do a thorough job of explaining the what and why of federal IT policies and priorities. The site is a helpful resource for contractors and those who follow the government’s technology investments. Follow:*@immixGroup_Inc*| Read the blog:*blog.immixgroup.com *IDC Smart Government You don’t have to look far for news stories with stats from IDC Government Insights or input from its analysts. Experts from the marketing research firm delve into issues that matter most to the federal IT community. Research director Shawn McCarthy does an especially good job of going beyond the news and explaining the implications. Follow:*@IDCInsights*| Read the blog:*idc-community.com/government/smart_government *E Pluribus Unum Alexander Howard is a true advocate for open government and has a knack for explaining the intricate details of legislation and policies. Howard not only exposes important stories sometimes overlooked by mainstream media, but he also uses social media to hold lawmakers and public officials accountable. Readers can count on him to see a story through until the end and regularly update his posts. Follow:*@EPluribusUnum*| Read the blog:*e-pluribusunum.com *Adobe & Public Sector Calling all government communicators: Adobe’s pubic-sector blog is all about the topics that matter most to you. What’s next in digital communications for government? What keeps government communicators up at night? Find answers to these questions and more from Adobe’s bloggers. Follow:*@Adobe*| Read the blog:*blogs.adobe.com/adobeingovernment *Microsoft on Government Blog Microsoft is one of the few companies with proven cloud solutions that meet the government’s rigorous security standards. Some posts on its blog focus on the company’s expanding cloud offerings, as well as Microsoft’s role in using technology to improve government operations worldwide. Follow:*@Microsoft_Gov*| Read the blog:*microsoft.com/en-us/government/blogs/default *Energy.gov CIO Blog What makes this blog special is the fact that there aren’t many like it in government. Executives from the Office of the CIO write stories pertinent to government IT at the Energy Department. Topics include app development, cybersecurity and IT modernization. Follow:*@ENERGY*| Read the blog:*energy.gov/cio/blog-and-news-highlights *Anton Chuvakin (Gartner Blog Network) Everything is being delivered as a service nowadays, and managed security service is a topic Anton Chuvakin knows well. His Gartner blog is full of tips for initiating relationships with managed security service providers, working effectively with them and establishing service-level agreements. Follow:*@anton_chuvakin*| Read the blog:*blogs.gartner.com/anton-chuvakin/ *FCC Blog The net neutrality debate is heating up, and all eyes are on the Federal Communications Commission. Follow this blog to keep tabs on FCC decision-making and to hear from the commissioner directly. Follow:*@FCC*| Read the blog:*fcc.gov/blog *Federal Technology Insider Doing more with less is the mantra for many agencies as they work to provide more services with less funding. You’ll find these stories and much more on immixGroup’s Federal Technology Insider. The blog’s federal news roundup is a great resource for staying current on federal IT news across the web. Follow:*@FedTechInsider*| Read the blog:*federaltechnologyinsider.com *Realize the Value (and Advance the Mission) Some talk about being agile. Others are doing agile development and succeeding. The Agilex blog offers a fresh perspective on the benefits of incremental development and other top-of-mind issues for federal technologists. Follow:*@AgilexTech*| Read the blog:*agilex.com/realize-the-value *The Business of Government Blog For the second year in a row, we’ve featured the Business of Government Blog on our must-read list. Stories cover major management issues at all levels of government, including technology, social media and human capital. On the blog, the IBM Center for The Business of Government also highlights timeless reports on management best practices for innovation, budget planning and much more. Follow:*@BusOfGovernment*| Read the blog:*businessofgovernment.org/blogs/the-business-of-government *Data Center Knowledge No one covers the data center industry like the reporters and editors at Data Center Knowledge. With the 2010 launch of the Federal Data Center Consolidation initiative, efficient computing continues to be a hot topic in the federal government and for DCK readers. Data Center Knowledge is a one-stop shop for news on federal and commercial data centers. Follow:*@datacenter*| Read the blog:*datacenterknowledge.com *Health IT Buzz The transition from paper to electronic records has huge implications for the nation’s healthcare system. That’s why the Health and Human Services’ Office of the National Coordinator for Health Information Technology wants to set the record straight where health IT is concerned. The blog was created to serve as a forum where readers can engage with ONC officials and get their questions answered. Follow:*@ONC_HealthIT*| Read the blog:*healthit.gov/buzz-blog/ http://www.fedtechmagazine.com/article/2014/12/50-must-read-federal-it-blogs-2014
      • 1
      • Upvote
  19. It was only going to be a matter of time before someone figured out a way past Snapchat’s new CAPTCHA verification method. Just one day after the photo sharing application announced its latest security measure, one researcher claimed Wednesday that he was able to hack it with as few as 100 lines of C++ code. Steven Hickson, a computer engineering grad from Clemson University wrote*on his personal blog*this week that it only took him about 30 minutes to come up with a way around the company’s new people verification system and that it works “with 100 percent accuracy.” The system is based on identifying a series of nine illustrations, right – some have a white ghost, the app’s mascots, some don’t. To make sure a new user is human, Snapchat has the user click on however many of the boxes contain a ghost. “This is an incredibly bad way to verify someone is a person because it is such an easy problem for a computer to solve,” Hickson wrote on his*Computer Vision Blog*Wednesday. Hickson used open source code initially developed by Intel,*OpenCV*(Open Source Computer Vision Library) and a segmentation method known as simple*thresholding*to get his computer on the right track. OpenCV assists in “real-time computer vision” and thresholding helps the computer differentiate whichever pixels you’re interested in from the rest of them. Hickson also used algorithms like*SURF, an interest point detector and descriptor, and*FLANN, a library for performing fast approximate nearest neighbor searches to perform a “uniqueness test to determine that multiple keypoints in the training image weren’t being singularly matched in the testing image.” Basically Hickson gave his computer an idea of what the Snapchat ghost looks like and it went to work, searching for corresponding points in Snapchat’s puzzle and matching ghosts to ghosts. “With very little effort, my code was able to ‘find the ghost’ in the above example with 100% accuracy,” Hickson said, calling what he did “one of the easier tasks in computer vision. Hickson, who posted the code he used on Github, mentions there are several different ways he could have gone about his experiment. Histogram of Oriented Gradients, or*HOG, is another form of code used for object detection that lets computers see the world, so to speak. It’s another security misstep by the much-buzzed about Snapchat. Late last year researchers divulged the details regarding two privacy bugs in the application’s ‘Find Friends’ functionality that hackers quickly used to leak 4.6 million of the service’s usernames and partial phone numbers. The hackers started a site, SnapchatDB.info, to host the information but that site has since been taken down. The new verification system was the latest move by the company to shore up the app’s security. Just a few weeks ago the company apologized for their error and pushed out a new update of the app that requires users to verify their phone number before using the ‘Find Friends’ feature and gave users the ability to opt-out from linking their phone numbers with their usernames. - See more at: Snapchat’s CAPTCHA Hacked in 30 Minutes, 100 Line of Code | Threatpost | The first stop for security news
  20. It was the sad Christmas day for gamers all around the world!!*A lot of people get new PlayStations and Xboxes on Christmas, but this Christmas they bought the game, popped it into the console for online gaming, and what they found?*Oh Crap! I can't log on. It was the notorious hacker group "Lizard Squad" who claimed the responsibility for taking down PlayStation Network, saying it has made unavailable both networks with apparent Distributed Denial of Service*(DDoS) attacks*— intentionally overloading servers by sending a flood of bogus web traffic, which made logging into thePlayStation Network*and*Xbox Live*difficult for most users. Now Anonymous has declared war against Lizard Group, warning that "now you are all going down." Recently, in response to Lizard Squad launching DDoS attacks on the*Tor network, the international activist group Anonymous has leaked the personal details of one of the group's alleged members, warning the hacker collective "Lizard Squad" to "stand down" and stop attacking Tor. Earlier after the big outage for both Xbox Live and Playstation Network services, both Sony and Microsoft acknowledged the problem, saying that their security teams were working to resolve the issue and get the networks back online. Giving pause to the attacks on PSN and Xbox live, Lizard Squad said in a*tweet*that "All your onions are belong to us," referring to Tor's onion logo, and later*tweeted*that the Tor network is only used by "hackers, miscreants and pedophiles."The*Tor Project released a statement*about the attacks, saying "we don't expect any anonymity or performance effects based on what we've seen so far." It said the attackers attempted a "Sybil attack" where "the attackers have signed up many new relays in hopes of becoming a large fraction of the network." However, the*details revealed*by the group are yet not confirmed to be legitimate, Anonymous tweeted a link which appears to contain the personal details, including full name, address, phone numbers and passwords, of one of the supposed members behind Lizard Squad. The group posted a screenshot that appears to be a text conversation between one of its members and one of the members behind Lizard Squad, in which the Lizard Squad member ask the Anonymous?' member to stop the attacks against them and for their family to be left alone, but Anonymous? said in a tweet that they'll not stop. Whereas,*a member of Lizard Squad has*claimed*that the conversation between Anonymous? member and Lizard Squad member is fake. The group also posted a couple of videos to YouTube in which it -- in its typical dramatic style -- attacked Lizard Squad. http://thehackernews.com/2014/12/Lizard-Squad-Xbox-playstation.html
  21. Hackers claiming affiliation with the hacktivist group*"Anonymous" have allegedly leaked more than 13,000 username and password*combinations for some of the worlds most popular websites, including*Amazon, Xbox Live and Playstation Network. The stolen personal information was released in a massive text document posted to the Internet file-sharing website*Ghostbin*(now deleted), on Friday. The document contains a huge number of usernames and passwords, along with credit card numbers and expiration dates. The news came just a day after the hacker group*Lizard Squad*compromised Sony’s Playstation and Microsoft’s Xbox Live gaming networks on Christmas day, which is estimated to have affected Xbox's 48 million subscribers and PlayStation's 110 million users, making it a total of more than 150 million users worldwide. However, data breach of 13,000 users is not the biggest data breach we've ever seen. When millions of passwords are used for sites around the globe, chances are very minor that our’s among those compromised. But still it’s important to note as these accounts come from a variety of online sources and among those, some are really very popular. The Daily Dot's Aaron Sankin has*compiled*a comprehensive list of sites associated with the username and password leaks, and discovered that the leaks came from the sites run the gamut from pornography to gaming to online shopping. The list of the compromised websites is as follows: AmazonWalmartPlayStation NetworkXbox LiveTwitch.tvDellBrazzersDigitalPlaygroundand see*complete list.Just to be on a safer side,*users are recommended to change their passwords*if they have accounts on these compromised websites, and also*pay attention to your credit card transactions*and if any suspicious activity found, immediately communicate with related banks and financial institutions. Also, don't use the same passwords for banking and online shopping sites, and always keep an eye out for unusual activities or unauthorized purchases with your accounts. http://thehackernews.com/2014/12/password-hacking-data-breach.html
  22. Scrie acolo clar ca ia doar Steam Username, nu inteleg de ce va asteptati sa extraga si parola atat timp cat nu este stocata undeva. Da, ETS-ul de la yahoo este un hash, dar fiindca este un hash nu inseamna ca nu poate fi folosit.
×
×
  • Create New...