-
Posts
3206 -
Joined
-
Days Won
87
Posts posted by Fi8sVrs
-
-
pune si playlist
-
-
We get a little taste of cyber attacks all the time — look no further than this week's Twitter virus — but what about full-on cyber warfare? Recently the true destructive potential of a cyber attack became frighteningly clear: whole government, banking and military networks overloaded and shut down, vital data and money stolen, and even physical damage if the right components are targeted. The worst part? We usually only find out after the fact.
1. Titan Rain
Target: U.S. military intel
Attacker: China
Damages: In 2004, a Sandia National Laboratories employee, Shawn Carpenter (pictured above), discovered a series of large "cyber raids" carried out by what is believed were government-supported cells in China. "Titan Rain" is the name given to these attacks by the FBI, and it was found that several sensitive computer networks were infiltrated by the hackers, such as those at Lockheed Martin and Sandia (owned by Lockheed), but also at the likes of NASA. The danger here is not only can the attackers make off with military intel and classified data; they can also leave backdoors and "zombify" machines — as you'll read below — that make future cyber espionage easier. Titan Rain is considered one of the largest cyberattacks in history.
(It's worth mentioning that Carpenter lost his job for blowing the whistle. You can read about him here.)
________________________________________________________________________
2. Moonlight Maze
Target: Military maps and schematics, U.S. troop configurations
Attacker: Russia (Denies involvement)
Damages: Much like Titan Rain, Moonlight Maze represents an operation in which hackers penetrated American computer systems and could pretty much raid at will. It's also one of the earlier major cyber infiltrations that we know of, starting in 1998 and continuing on for two whole years as military data was plundered from the Pentagon, NASA, the Department of Energy and even from universities and research labs.
________________________________________________________________________
3. The Estonian Cyberwar
Target: Estonia
Attacker: The Nashi, a pro-Kremlin youth group in Transnistria
Damages: What happened to Estonia in 2007 is considered a model of how vulnerable a nation can be to cyberattacks during a conflict. In a very brief period of time, a variety of methods were used to take down key government websites, news sites and generally flooded the Estonian network to a point that it was useless. The attack is one of the largest after Titan Rain, and was so complex that it's thought that the attackers must have gotten support from the Russian government and large telecom companies. Pictured above is the Bronze Soldier of Tallinn, an important icon to the Russian people and the relocation of which played a part in triggering the attacks.
________________________________________________________________________
4. Presidential-level Espionage
Target: Obama, McCain presidential campaigns
Attacker: China or Russia (Suspected)
Damages: No one wants to get a message from the FBI saying, "You have a problem way bigger than what you understand," but that's exactly what happened to both Obama and McCain during their run for the 2008 presidency. What was first thought of as simple cyberattacks on the computers used by both campaigns was discovered to be a more concentrated effort from a "foreign source" that accessed emails and sensitive data. The FBI and secret service swooped in and confiscated all computers, phones and electronics from the campaigns and — with the kind of stuff that gets dug up on the campaign trail — there are probably plenty of folks hoping the FBI keeps them.
________________________________________________________________________
5. China's "750,000 American zombies"
Target: U.S. computer networks, all levels
Attacker: Chinese hackers (Government-supported, organized crime related, cyber gangs)
Damages: The worst fallout from a cyberattack can be what it leaves behind, such as malicious software that can be activated later. That, compounded with ongoing efforts by hackers to infect as many machines as possible using bogus email offers, harmful website code and what-have-you can leave a lot of "zombified" machines. Those machines can then be made into cyber weapons, which can overload a network, website or other machine with a deluge of data known as a DDoS, or distributed denial of service attack. Even back in '07, former senior U.S. information security official Paul Strassmann (pictured above) estimated that there were over 730,000 compromised computers "infested by Chinese zombies."
________________________________________________________________________
6. The Original Logic Bomb
Target: Siberian gas pipeline in Soviet Russia
Attacker: U.S. Central Intelligence Agency
Damages: One of the scariest implications of cyberwarfare is that the damage isn't always limited to networks and systems. It can get physical, too. In 1982, the CIA showed just how dangerous a "logic bomb" — a piece of code that changes the workings of a system and can cause it to go haywire — can be. The agency caused a Soviet gas pipeline in Siberia to explode in what was described by an air force secretary as "the most monumental non-nuclear explosion and fire ever seen from space," without using a missile or bomb, but a string of computer code. Today, with the proliferation of computer control, the possible targets are virtually endless. Pictured above and right is William J. Casey, director of the CIA in 1982.
________________________________________________________________________
7. "The Most Serious Breach"
Target: U.S. military computer network
Attacker: "Foreign intelligence agency" (unspecified)
Damages: A cyber attack can come in any shape or size — digitally or physically — and one of the worst on an American network happened in 2008. Did it involve thousands of zombie machines and the muscle of a national telecom giant? Nope, you could have held it in the palm of your own hand: a corrupt flash drive. Inserted into a military laptop in the Middle East, the malicious code on the drive created a — according to Deputy Secretary of Defense William Lynn (pictured above) — "digital beachhead, from which data could be transferred to servers under foreign control." The attack acted as another reality check in security, and prompted the Pentagon to form a special cyber military command.
-
-
da, intradevar prinde mai repede, e mai usor de înv??at
-
On Monday, The city of Chattanooga, Tennessee has unveiled Fastest Internet connection, with 1 Gigabit speeds being made available for both businesses and residents in the U.S. The United States is not famous for world’s speediest broadband connections, but Chattanooga, Tennessee is distinguishing itself by declaring plans to present the fastest Internet service of any city in America.
For providing fastest internet services, Chattanooga’s municipally-owned fiber-to-the-premises network has partnered with Alcatel-Lucent. It is available to purchase starting from 13th September, 2010. It will be the fastest household internet connection available in America. It will connect just a handful of consumer 1 Gbps providing worldwide, including the fastest connections in the city of Hong Kong. According to analysts, the service is almost 200 times faster than the average U.S. broadband speed. In the recent time, only few cities around the world offer fastest internet service. Over half of the top 100 cities with the fastest Internet connections are located in Asia.
According to City’s mayor, Ron Littlefield, “This makes Chattanooga — a midsized city in the South — one of the leading cities in the world in its digital capabilities.” Once every housing home and business unit inside the EPB’s 600 square-mile area, with nine counties, increase access to the new network, this business enterprise will eventually be the most extensive service within its industry across the United States.
Currently, most Americans access the web at speeds ranging from 3 megabits to 20 megabits per second, but a 1-gigabit-per-second speed could allow users to download HD movies in a matter of minutes.
EPB is offering fastest internet service to its 1, 70,000 customers though the $350-per-month rate may be expensive to most individuals and some small businesses. Harold DePriest, chief executive of EPB told the New York Times, “We don’t know how to price a gig. We are experimenting. We’ll learn.” Previous this year, Google released plans to make a new fiber-optic network that would deliver internet speeds of 1 gigabit per second to up to 500,000 Americans.
Users who want to get full 1 gbps speed to their residence will have to shell out some cash, $350 to be exact. On a per-megabyte scale, though, the rate is a bargain. EPB offers tiers of Internet service: 30 Mbps up and down for $57.99; 50 Mbps per second for $69.99; 100 Mbps per month for $139.99; and 1 gigabit for $350 per month. This plan would put 100-megabit-per-second connections in 100 million American homes by 2020.
Recently, the Federal Communications Commission again defined broadband internet service as 4 Mbits per second downstream and 1 Mbits per second upstream; Chattanooga’s 1 Gbps service is 10 times faster.
sursa: today24news.com
-
crypteaza pass, e vreunu nedetectabil?
-
e duminica 22:04:07, nu idicã bine
-
eu, ai PM cu mail
edit: thannks Orlandino
-
-
Salut Drago?, bine ai venit,
r?mâi cu bine aici, Succes!
-
edit: Report
OK The application failed to initialize properly (0xc0000135). Click on OK to terminate the application.
-
Wild Flowers
Happy Holidays
Albert Einstein
Ronaldinho
American Gothic
Mona Lisa
Mad Hatter’s Tea Party
Longhorns
Mount Rushmore
-
a venit sa dea la ea dal de:
Ion ?iriac
Dinu Patriciu
Camelia ?i Corina Voiculescu
Sorin Ovidiu Vîntu
Familia Adamescu
Ioan Niculae
Familia P?unescu
Marius ?i Emil Cristescu
Gabriel Valentin Com?nescu
Fra?ii Micula
George Becali
Ovidiu Tender
Frank Timi?
Zoltan Teszari
Nicolae Dumitru
Gruia Stoica si Vasile Didila
Ioan Neculaie
Robert ?i Ionu? Negoi??
Fathi Taher
Iulian Dasc?lu
?tefan Vuza
Enrico Perini
Paulina ?i Costel C??uneanu
Cristian Burci
Familia Umbr?rescu
...etc...
-
How to Code a Grunge Web Design from Scratch
In this step-by-step web development tutorial, you will learn how to convert a beautiful and eye-grabbing grunge theme web layout–created from Photoshop in a previous tutorial–into a working HTML and CSS template.
Converting a Design From PSD to HTML
Author will take you through the process step by step – even through the tedious parts.
Portfolio Layout #10: Learn To Code It
In this tutorial author will explain the steps to take in slicing and coding the layout.
Design and Code a Slick Website From Scratch – Part II
We will code our design into a standards-compliant, cross-browser xHTML, CSS, and JavaScript/jQuery layout. Fire up Coda, or your editor of choice… it’s coding time!
Portfolio Layout 4: The Code
In this tutorial author will show you the code behind my portfolio layout #4.
Code a Corporate Website from a Photoshop Design: PSD to HTML Tutorial
In this tutorial we will walk through the process of coding that design in HTML and CSS.
From PSD to HTML, Building a Set of Website Designs Step by Step
Author is going to take you through my entire process of getting from Photoshop to completed HTML.
Coding a Clean & Illustrative Web Design from Scratch
In this comprehensive and step-by-step web development tutorial, you will learn how to convert a Photoshop mockup of a professional web layout design that features an illustrative landscape header into a standards-compliant XHTML/CSS template.
How to Create a Dark and Sleek Web Design from Photoshop
In this web development tutorial, you will learn, step-by-step, how to create a beautiful dark and sleek web layout using standards-based HTML and CSS. Along the way, you will witness how to use CSS Sprites and CSS Text Image Replacement.
Create a Killer Band Site with Drupal: A 6-part Tutorial Series
In this tutorial series they sliced up graphics. Now author is going to take those graphics and move on to coding the XHTML and Cascading Style Sheets.
Tutorial: Coding a Layout
This tutorial should help you learn how to analyze either a new template, or even your current layout to find the best way to code it.
How to Code up a Web Design from PSD to HTML
Take the design to the next step and code up a complete mockup in HTML and CSS, ensuring our code is semantic and standards compliant.
Converting a Photoshop Mockup: Part Two, Episode One
Start the conversion process of an Adobe Photoshop mockup of a website, into a real live CSS based website.
How To Create a Horizontally Scrolling Site
Learn how to code/create a Horizontally scrolling website design instead of normal Vertical scrolling web site design.
Building a Website (2 of 3): HTML/CSS Conversion
Much of the work isn’t actually “slicing” the Photoshop file, but looking closely at it and trying to mimic what is done there with correct markup and CSS techniques.
How to Convert a PSD to XHTML
Screencast that shows you exactly how to convert a PSD into perfect XHTML/CSS.
PSD To HTML
We’ll be converting our PSD into a one page working CSS template.
-
-
guvernul României ar trebui sã le retragã cet??eniile de români rromilor
-
-
sau Start ---> Run ---> iexpress
-
-
-
-
off: cum ii faci?
-
Cum sa extragi mailuri din facebook
in Tutoriale in romana
Posted · Edited by Fi8sVrs
pe host .