Jump to content

uk666

Retired Staff
  • Content Count

    7,143
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    293

Everything posted by uk666

  1. A small boy is sent to bed by his father. Five minutes later…. “Da-ad….” “What? “I’m thirsty. Can you bring drink of water?” “No. You had your chance. Lights out.” Five minutes later: “Da-aaaad…..” “WHAT?” “I’m THIRSTY. Can I have a drink of water??” “I told you NO!” If you ask again, I’ll have to spank you!!” Five minutes later…… “Daaaa-aaaad…..” “WHAT!” “When you come in to spank me, can you bring a drink of water?”
  2. uk666

    Undead & Wed

    Undead & Wed This picture by Andrew Dobell Photography has everything – zombie groomsmen, a gun-toting page boy, a burning venue and more!
  3. World’s Worst Spammers A hard-core group of around 100 known persistent spam gangs whose names, aliases and operations are documented in Spamhaus’ Register of Known Spam Operations (ROKSO) database generates up to 80% of spam targeted at internet users around the world. This top 10 chart of ROKSO-listed spammers is based on Spamhaus views of the highest threat, least repentant, most persistent, and generally the worst of the career spammers causing the most damage on the internet currently. The 10 Worst Spammers As of 13 February 2017 the world's worst spammers and spam gangs are: Canadian Pharmacy – Ukraine A long time running pharmacy spam operation. They send tens of millions of spams per day using botnet techniques. Probably based in Eastern Europe, Ukraine/Russia. Host spammed web sites on botnets and on bulletproof Chinese web hosting. Dante Jimenez / Aiming Invest - United States Spamwarez, lists, "bulletproof" hosting in the finest South Florida tradition. Working with worst cybercriminal botnet spammers. Now mostly involved in massive botnet spamming with hosting on hacked servers and Eastern European hosters. Yair Shalev / Kobeni Solutions - United States High volume snowshoe spammer from Florida, (former?) partner-in-spam of ROKSO spammer Darrin Wohl. Son-in-law of ROKSO-listed spammer Dan Abramovich. Sued for fraud by the US FTC in 2014. Michael Lindsay - United States Lindsay's iMedia Networks is a full-fledged spam-hosting operation serving bulletproof hosting at high premiums to well-known ROKSO-listed spammers. His customers spam via botnet zombies with spam payloads hosted offshore, tunnelled back to his servers. He and the gang have been hijacking (stealing) IP address space from companies for years to spam from. Illegal in the USA. Michael Boehm and Associates - United States Snowshoe spam organization that uses large numbers of inexpensive, automated VPS hosting IPs and domains in whatever TLD is currently cheapest to send high volumes of spam to extremely dirty, scraped lists. Operates under many business and individual names. Peter Severa / Peter Levashov - Russian Federation A spammer who writes and sells virus-spamming spamware and botnet access. Is probably involved in the writing and releasing of viruses & trojans. One of the longest operating criminal spam-lords on the internet. Works with many other Easter Euro and US based botnet spammers. Was a partner of American spammer Alan Ralsky. Yambo Financials - Ukraine Huge spamhaus tied into distribution and billing for child, animal, and incest-porn, pirated software, and pharmaceuticals. Run their own merchant services (credit-card "collection" sites) set up as a fake "bank." Michael Persaud - United States Long time snowshoe type spammer, raided by FBI then indicted in 2017 on federal wire fraud charges tied to his spamming operations. Alvin Slocombe / Cyber World Internet Services - United States Bulletproof spam host operating Cyber World Internet Services / e-Insites, and currently spamming using a variety of aliases such as Brand 4 Marketing, Ad Media Plus, Site Traffic Network, RCM Delivery, and eBox. Jagger Babuin / BHSI - Canada Romanian spammer now living in Vancouver BC. Also known as the "Dr Oz" spammer. The 10 Worst Spam Countries As of 13 February 2017 the world's worst Spam Haven countries for enabling spamming are: United States Number of Current Live Spam Issues: 3005 China Number of Current Live Spam Issues: 2047 Russian Federation Number of Current Live Spam Issues: 1103 Hong Kong Number of Current Live Spam Issues: 755 Ukraine Number of Current Live Spam Issues: 740 Japan Number of Current Live Spam Issues: 572 United Kingdom Number of Current Live Spam Issues: 424 Germany Number of Current Live Spam Issues: 409 Brazil Number of Current Live Spam Issues: 387 Turkey Number of Current Live Spam Issues: 386 About Spamhaus The Spamhaus Project is an international nonprofit organization that tracks spam and related cyber threats such as phishing, malware and botnets, provides realtime actionable and highly accurate threat intelligence to the Internet's major networks, corporations and security vendors, and works with law enforcement agencies to identify and pursue spam and malware sources worldwide. Founded in 1998, Spamhaus is based in Geneva, Switzerland and London, UK and is run by a dedicated staff of 38 investigators, forensics specialists and network engineers located in 10 nations. The Spamhaus Project is responsible for compiling several widely used anti-spam lists. Many internet service providers and email servers use the lists to reduce the amount of spam that reaches their users. In 2006, the Spamhaus services protected 650 million email users, including the European Parliament, US Army, the White House and Microsoft, from billions of spam emails a day. Spamhaus is also notorious for blacklisting IPs, Domains without much consultation or notices. A good example is when they blacklisted Google Docs IPs. They also blacklisted CyberBunker which is quite renowned for providing BulletProof Hosting and inadvertently blacklisted many legit clients causing the first of large scale DDoS attack in recent memory. [Wiki]
  4. BMX cyclist Senad Grosic performing a trick on a bridge in Gablenz, Germany
  5. WordPress hacking spree sees 1.5 million web pages defaced A security flaw in the WordPress blogging software has let hackers attack and deface tens of thousands of sites. One estimate suggests more than 1.5 million pages on blogs have been defaced. The security firm that found the vulnerability said some hackers were now trying to use it to take over sites rather than just spoil pages. Attacks on WordPress sites using a vulnerability in the REST API, patched in WordPress version 4.7.2, have intensified over the past two days, as attackers have now defaced over 1.5 million pages, spread across 39,000 unique domains. Initial attacks using the WordPress REST API flaw were reported on Monday by web security firm Sucuri, who said four group of attackers defaced over 67,000 pages. The number grew to over 100,000 pages the next day, but according to a report from fellow web security firm WordFence, these numbers have skyrocketed today to over 1.5 million pages, as there are now 20 hacking groups involved in a defacement turf war. Security firm WordFence said it had seen evidence that 20 hacker groups were trying to meddle with vulnerable sites. Patches Are Not Being Applied WordPress has an auto-update feature enabled by default, along with an easy 1-click manual update process. Despite this, not everyone is aware of this issue or able to update their site. This is leading to a large number of sites being compromised and defaced. Over the weekend, Google also warned WordPress website owners registered in the Google Search Console. Google attempted to send security alerts to all WordPress 4.7.0 and 4.7.1 website owners, but some emails reached WordPress 4.7.2 owners, some of which misinterpreted the email and panicked, fearing their site might lose search engine ranking. Webmasters who received Google Search Console alerts that their WordPress website needs to be updated to version 4.7.2 can ignore them if they are already running the latest version. Webmasters that have not, need to do so as soon as possible, as WordPress 4.7.2 fixed a serious vulnerability in the WordPress REST API, which affects versions 4.7.0 and 4.7.1, and allows attackers to edit any page's title and content. bleepingcomputer
  6. Plug-and-Play Robot Arm, For DIY Engineers What is your desktop setup like — dual monitors, maybe? A good sound system and some sort of ergonomic wrist rest. That sounds okay, but you know what would really kick things up a notch. A programmable robot arm that can pass you drinks and high-five you every morning. Really, who even needs friends. The arm in question is the uArm Swift from uFactory, and it is currently raising funds on Indiegogo, attracting more than $300,000 so far. It comes in two flavours, standard and pro, and is open source and programmable; perfect for DIY tinkerers. It can be controlled manually via mobile or desktop software, or can be programmed for a specific task. The uArm Swift Pro is currently available for $489 with an RRP of $842, and is precise enough to handle tasks like drawing and laser engraving. The standard uArm Swift, by comparison, has a less powerful motor and is less precise, with a repeatability of 5mm. It is available from $289, with an RRP of $489. Both models should be shipping out May this year. theverge
  7. Creative Commons Launches New Search Engine The search engine helps publishers find free and legal images easily. Non-profit group Creative Commons has released a search engine which makes it easy to search for free and legal images, music and text. CC Search is described by its developers as a “front door to the universe of openly licensed content,” allowing creators to share their work to a wider audience and letting publishers discover content more efficiently. “The new CC Search harnesses the power of open repositories, allowing users to search across a variety of open content through a single interface,” Creative Commons CEO Ryan Merkley said in a blogpost. “This is a significant moment for CC, as we’ve always wanted to be able to do more to help people find and use the commons and make connections with each other as they create new things.” Other search engines, such as Google, have previously allowed users to filter creative commons-licensed images, while Creative Commons has offered a limited search tool that currently has around 60,000 monthly users. The repository for the search engine compiles almost 10 million images from Flickr, the New York Public Library, the Metropolitan Museum of Art and Rijksmusem, the Dutch national museum. It will continue to be developed in order to add new repositories, media types and features. “CC estimates that there are 1.1 billion works in the Commons, inclusive of both CC-licensed material and the public domain,” said Liza Daly, a software developer that worked on CC Search. “There was much we wanted to do that we’ve deferred for now, or will revisit based on user feedback.”
  8. Is 'Bixby' Samsung's Answer to Apple's Siri? Samsung may have accidentally revealed the identity of its answer to Apple’s Siri: a virtual assistant called ‘Bixby.’ The South Korean electronics manufacturer has been largely left behind in the battle of the bots, with Microsoft’s Cortana, Amazon’s Alexa and the Google Assistant all offering rivals to Siri. With the much-anticipated arrival of the Galaxy S8 smartphone, Samsung is expected to launch its own virtual assistant. In a recent beta version of the Samsung Pay app, three options were offered in the menu bar: Shopping, Mini and Bixby. The options, first spotted by unofficial Samsung blog SamMobile, have since been removed, but suggest the company is planning to integrate the digital assistant into its mobile payments platform. Samsung does not comment on rumours or speculation, but the news comes just three months after the firm announced the acquisition of artificial intelligence platform Viv. In a statement at the time, Samsung said: “The deal showcases Samsung’s commitment to virtual personal assistants and is part of the company’s broader vision to deliver an AI-based open ecosystem across all of its devices and services.” Samsung added that the virtual assistant would help simplify user interfaces on its devices and understand context in order to offer appropriate suggestions and recommendations. After the Galaxy S8, the “conversational interface” could be integrated into Samsung’s smart home appliances and wearables. The company has previously filed for a trademark in South Korea for the word “Bixby,” which is distinct enough from other words to be used as a voice-activated technology. The patent covers “computer software for personal information management,” and describes “computer software for enabling hands-free use of a mobile phone through voice recognition.” Former phone giant Nokia may also be jumping aboard the AI assistant bandwagon, having applied for a trademark on the word “Viki.” Neowin spotted a Samsung trademark application filed with the European Trade Mark and Design Network. It is for a “B” logo that may end up being the logo used for the Bixby AI. The filing explained that the logo is for “interactive computer software enabling exchange of information”, meaning an assistant. However, Neowin noted the logo appears similar to "8", which might mirror the Galaxy S8's branding.
  9. Blackberry Mercury: Fingerprint scanner and QWERTY keyboard for BB’s next flagship While the new device will carry the BlackBerry logo, it will be manufactured by TCL, which has taken over responsibility for designing and building devices under the BlackBerry brand. With its move away from building hardware, BlackBerry itself is now focusing more heavily on services and software, including a 'hardened', more secure version of Android for use on its branded devices. Mercury - which is expected to have a different name when it goes on sale - will launch with Android 7.0 Nougat on-board. In typical BlackBerry style, it will be of considerable use for security purposes - whether via apps or embedded within the operating system itself. That is a primary purpose to buy BlackBerry - and that will remain unchanged under TCT management. Software will undoubtedly include the DTEK app, which makes it easy to keep an eye on your phone's security status, and help you easily detect which apps are getting far too cosy with some of your phone's permissions. It will also come loaded with the Hub, a handy place for instant access to all of your notifications and messages, as well app widget shortcuts from home screen app icons. The build quality of the Mercury is formidable. It is a chunky phone by today's super-slim standards, but not to excess. Presumably, that will mean a big battery to keep the phone going all day, while the presence of a USB Type-C port (another new feature) suggests there will be fast charging too. pocket-lint.
  10. A Human Chain Defied Sharks To Rescue 200 Whales Rescuers defied a shark threat to form a human chain in a New Zealand bay on Saturday in a bid to keep another 200 whales from becoming stranded a day after hundreds died in a mass beaching. About 150 people waded out up to their necks at Farewell Spit in the northwest of the South Island to form the human wall as they also guided some 100 survivors from Friday's beaching away from the shore. Environmental group Project Jonah, described the new arrivals as "a super pod" which "swam into the bay and within 20 metres of the human chain. "This pod joined up with the refloated whales of which almost 100 joined the larger pod," the organisation said in a statement. Andrew Lamason, regional operations manager for the Department of Conservation told AFP the focus was on preventing the whales from reaching a beach already littered with more than 300 dead whales. The pod was trying to access the area where 416 pilot whales were stranded overnight Thursday, with about 70 per cent already dead when they were found on Friday morning. Lamason said they needed to have the survivors far away from the shore before the evening low tide. "They are moving along the spit. They are still in shallow water and we have three boats out there trying to turn them," he said. "We have 100 who've gone out and they've been joined by another 200 so that's a total of 300 whales out there." Farewell Spit, about 150 kilometres (95 miles) west of the tourist town of Nelson, is notorious for whale strandings and has witnessed at least nine mass beachings in the past decade. Pilot whales grow up to six metres (20 feet) long and are the most common species of whale in New Zealand waters.
  11. Windows 10 Privacy: turn off keylogging How to disable the hidden keylogger in Windows 10 Windows 10 is a true digital Big Brother that keeps track of everything you do. Microsoft admits it has a keylogger in its Windows 10 speech, inking, typing, and privacy FAQ: “When you interact with your Windows device by speaking, writing (handwriting), or typing, Microsoft collects speech, inking, and typing information—including information about your Calendar and People (also known as contacts)…” Microsoft claims that it collects ‘your typed and handwritten words to improve character recognition and provide you with a personalised user dictionary and text completion suggestions.’ Thankfully, this feature is optional and it is very easy to turn it off. Here are the settings to turn it all off: Click Start > Settings > Privacy > General and make sure that Send Microsoft info about how I write to help us improve typing and writing in the future is set to Off. While within the Privacy page, you may also want disable everything, unless there are some things you really need.
  12. So long, 3DTV - we will miss you Both LG and Sony have now stopped making 3D-enabled televisions. The firms follow Samsung - the world’s biggest TV maker - who confirmed the move last year. It means there are currently no major manufacturers making 3DTVs. At this year’s CES trade show, there was barely a whimper of 3D TV, compared to just two years ago when it was being heralded as the next big thing. But you could argue that 3DTV was never about the home experience. Where it would come into its own was in huge cinemas with full surround and the kind of environment that would do the new(ish) medium justice. But here, too, things have ground to a miserable halt. Despite the moderately promising start made by Avatar, no single 3D production ever became a must-see. LG and Sony, the last two major TV makers to support the 3D feature in their TVs, will stop doing so in 2017. None of their sets, not even high-end models such as their new OLED TVs, will be able to show 3D movies and TV shows. Samsung dropped 3D support in 2016; Vizio has not offered it since 2013. Other smaller names, like Sharp, TCL and Hisense, also failed to announce any 3D-capable TVs at CES 2017. The 3D feature has been offered on select televisions since 2010, when the theatrical success of "Avatar" in 3D helped encourage renewed interest in the technology. In addition to a 3D-capable TV, it requires specialized glasses for each viewer and the 3D version of a TV show or movie -- although some TVs also offer a simulated 3D effect mode. Even James Cameron, who directed Avatar, is fed up of 3D. It has "become a studio-driven top down process to make money”, he said (as if Hollywood has ever been anything else). The cinema-going public was immediately sceptical - knowing that the more the movie industry told them it was the next big thing, the more it felt like a pathetic gimmick. To quote The Oatmeal, “saying that 3D movies are the future of cinema is like saying that Magic Eye books were the future of literature”. Despite enthusiasm at the box office and years of 3D TVs being available at affordable prices, the technology never really caught on at home. DirecTV cancelled its 24/7 3D channel in 2012 and ESPN followed suit a year later. There are plenty of 3D Blu-ray discs still being released, such as "Star Wars: The Force Awakens," but if you want to watch them at home you will need a TV from 2016 or earlier or a home theatre projector. Why 3D TV failed There were a number of reasons why 3D TV failed in the market, and some cautionary lessons for VR fans (including myself). First and foremost, 3D content was gated to expensive equipment purchases. It wasn’t enough to have a Blu-ray player; you had to have a Blu-ray player with 3D support and a TV that offered the same. Many 3D TVs required you to either have a pair of glasses for each person or, in the case of TVs that didn’t require glasses, had limited viewing angles and distances. A certain amount of living room finagling is nothing new to TV watching, but this was a larger problem than just rearranging a few chairs. It was difficult and expensive to rig a living room for multi-person 3D viewing, and you had to have enough 3D glasses to fit your entire audience. Another major problem? Content. A handful of movies made for and shot in 3D, like Avatar, may have popularized the format, but few movies were filmed to take full advantage of it. Many limited themselves to using 3D in specific scenes and were filmed in 2D before being converted for 3D. It’s cheaper (or seems to be, based on how many people went this route) to convert films in post production than to film them in 3D from the beginning. It’s one thing to ask people to pay for The Next Big Thing, and something else entirely when they’re shucking out premium cash for a TV, a movie, and extra goggles, all while knowing that only 20-30 minutes of a film may be truly 3D in the first place. In addition, 3D is also prone to giving some people headaches and motion sickness, which again, can make it harder to watch a film or 3D content. The third time Grandpa runs for the bathroom or your kid decides to paint the 3D glasses black because it makes them look cool, you’ll wind up wishing you’d saved money and just bought the regular TV and Blu-ray instead. What does this mean for VR? The story of 3D’s rise and fall is a cautionary tale for the VR industry as well. Many love VR and would like to see it shape the future of gaming, but many of the issues that doomed 3D TV and 3D content could also kneecap VR adoption e.g.: Like 3D, it requires expensive, personal peripherals. Like 3D, games need to be designed explicitly for VR in order to showcase the technology to best effectiveness. Like 3D, VR can cause nausea and headaches. Like 3D, working in VR has an entirely new set of best practices, some of which aren’t intuitive to people who spent their careers working on conventional design. There are two major differences between VR and 3D. VR is a stronger, more immersive experience. If 3D was more immersive than 2D by virtue of having things leap “out” at you, VR is more immersive by virtue of making you feel like you’re actually there. VR is debuting as a gaming peripheral, and gaming is still much more of a solo activity than TV watching (and PSVR even tries to solve this issue by allowing output to a second screen). That alone may make the difference, provided the gaming industry can push content that takes advantage of virtual reality quickly enough for people to want to buy it. But either way, it’s worth remembering that many of the forces that killed 3D TV could wind up killing VR as well. If game developers want to avoid this problem, treat 3D as a cautionary tale of a new technology whose promise and potential never justified the cost and headache in the eyes of the general public.
  13. WhatsApp Launches The Two-Step Verification WhatsApp, the popular free cross-platform messaging app, is today launching a two-step verification security feature for all users of the service. The feature adds an additional layer of protection by requiring a passcode when resetting and verifying your account. This combats a recent hack where if your phone number was hijacked somehow, your WhatsApp account would be available meaning crooks could freely read your private messages and conversations. Two Step Verification requires setting up a six-digit passcode and an optional backup email address. Two Step Verification in WhatsApp prevents someone unscrupulous from stealing your SIM card (or otherwise taking over your phone number) and using that to take over your account and impersonate you. With two-step enabled, an account reset requires you to have access to the phone number and enter a six-digit passcode. To enable Two Step Verification in WhatsApp, launch the application on your iPhone and navigate to the integrated settings. Tap on ‘Account’ and select ‘Two-Step verification’. Then press the Enable button which will display the setup screen, as shown above. This screen asks you to pick a six-digit passcode which will you be required to enter anytime you register your phone number with the app, including when you upgrade phones. Therefore, it is important that the passcode is memorable. After choosing a code, WhatsApp will also let you pick a backup email address in case your forgot your code. If you are locked out of your account, WhatsApp will be able to send a recovery email to this chosen address. Although optional, adding an email is recommended as a fallback in case you cannot remember your passcode. Note: do not click on links in emails unless you specifically request it from WhatsApp. Now, when you setup a new device and install WhatsApp, it will ask for this six-digit passcode in order to validate your identity. WhatsApp will also periodically ask for this same passcode when you launch the app — this helps you remember your code. You cannot disable this reminder feature without disabling the entire two-step verification. As an additional safeguard, WhatsApp will not allow you to verify your phone number within seven days of using the service without the passcode. This means if you do not choose a recovery email, it will be impossible to verify your account without your code within seven days. After the seven day period has elapsed, you can access your WhatsApp account again (even without a code) but all messages will be deleted. If your number is verified on WhatsApp after 30 days of not using a passcode, the account will be deleted entirely. If this happens to you, you will have to setup a completely new account and start from scratch. Download WhatsApp free from the App Store. Two-step verification is rolling out to all users now. The Guardian.
  14. uk666

    Switcheroo

    Switcheroo Canadian photographer Hana Pesut's Switcheroo photo series first captures couples in their normal clothes and then makes them swap outfits. Hey, it's more fun than walking a mile in each other's shoes ...
  15. uk666

    Saving

    A small tourist hotel was all abuzz about an afternoon wedding where the rich and famous groom was 95-years-old, and the bride was only 23. The groom looked pretty feeble, and the feeling was that the wedding night might kill him because his bride was a healthy, vivacious young woman. But lo and behold, the next morning, the bride came down the main staircase slowly, step by step, hanging onto the bannister for dear life. She finally managed to get to the counter of the little shop in the hotel. The clerk looked concerned, “Whatever happened to you, honey? You look like you’ve been wrestling an alligator!” The bride groaned, hung on to the counter and managed to speak, “OH my God! He told me he had been saving up for 75 years and I thought he meant his money!”
  16. when It's Time To Join E-mailers Anonymous 10. You wake up at 3 a.m. to go to the bathroom, and check your e-mail on the way back to bed. 9. Your firstborn is named dotcom. 8. You turn off your modem and are suddenly filled with a feeling of emptiness, as if you just pulled the plug on a loved one. 7. You spend half of a plane trip with your laptop in your lap and your child in the overhead compartment. 6. You decide to stay in college for an additional year or two, just for the free Internet access. 5. You find yourself typing "com" after every period. 4. You refer to going to the bathroom as downloading. 3. You move into a new home and decide to netscape before you landscape. 2. You start tilting your head sideways to smile. And the No. 1 sign it's time to join E-Mailers Anonymous is... 1. Immediately after reading this list, you e-mail the URL to someone!
  17. Calling all hunky men: There is a shortage of male strippers So sparse are good-looking, confident and muscle-bound lads that a male strippers company has launched an appeal to find some. There is a 'chronic shortage' of naked men. The situation is actually quite desperate, or it is in one pocket of the country, anyway. In North London, nude men are becoming increasingly hard to find. People need entertaining. Butlers with Bums, based in the Barnet area, is looking to recruit attractive lads aged between 23-40 to meet and mingle with guests and hen dos and parties. You have probably seen the attire required in movies. Or at your aunt's 50th birthday in a village hall. The men wear the 'signature' outfit, including an apron that allows the bum to be seen, a white collar, cuffs, and a little bow tie. Director of Butlers with Bums and former butler, Dan Harley, told the Barnet Times: "We have a lot of demand for our buff butlers across the UK for hen dos, birthday parties and corporate events, but the shortage has taken a toll on specific areas. "We can offer training for the right candidates to become butlers and life drawing models, you just have to have an ongoing personality and be well groomed." Dan needs men. Clearly. And it's a tad perplexing as to why he's so short of them. Most butlers have full-time jobs, but make up to £300 extra per week by stripping. mirror
  18. Apple is storing your 'deleted' Safari search history in iCloud Researchers find iCloud storing Safari history & Google search data for years, Apple now deletes data older than 2 weeks Security researchers at Elcomsoft, have discovered that Apple has been storing users’ Safari browsing histories in iCloud for extended periods of time, Forbes reports. Elcomsoft CEO Vladimir Katalov, who also discovered last November that Apple was storing iPhone call logs in iCloud, told Forbes that data stored in iCloud for syncing web browsing history and related data across iOS and macOS devices is actually retained in separate “tombstone” records even after browsing history entries have been “cleared” from Safari. Katalov indicated he came across the issue by accident when testing one of his company’s forensic tools to compare data extracted from an iPhone to the data from that iPhone has linked iCloud account. According to Katalov, these records “stay in the cloud probably forever.” Forbes was also able to verify these claims using Safari 10.0.2 and Elcomsoft’s “Phone Breaker” tool, discovering nearly 7,000 “deleted” records going back for over a year. Additional data such as the number of time a site had been visited as well as the date and time the item was deleted. The report acknowledges that while it is unclear why this data is being stored, the issue is likely a design issue having to do with the iCloud sync feature used to provide consistent Safari history data across all of a user’s iOS and macOS devices. It is normal for synchronization services to maintain deleted “tombstone” records to keep track of deleted data until those deletions have synchronized with all of the connected devices, however there doesn’t appear to be any obvious reason why data would need to be retained beyond this time frame. While Apple declined to comment on Elcomsoft’s findings, a source with knowledge of the matter told Forbes that Apple has been making it harder in recent Safari and iOS versions to track browsing history by turning URLs into hashes, although this step obviously was not enough to prevent Elcomsoft’s tool from accessing this information in a clear form. Update We have informed media about this issue in advance, and they reached Apple for comments. As far as we know, Apple has not responded, but started purging older history records. For what we know, they could be just moving them to other servers, making deleted records inaccessible from the outside; but we never know for sure. Either way, as of right now, for most iCloud accounts we can see history records for the last two weeks only (deleted records for those two weeks are still there though). blog.elcomsoft iCloud: Change iCloud feature settings You can change which iCloud features you are using on any of your devices by turning features on or off. You can also turn off iCloud completely. https://support.apple.com/kb/ph2613?locale=en_US
  19. uk666

    Marriage Quotes

    Marriage Quotes When a man steals your wife, there is no better revenge than to let him keep her. – Lee Majors After marriage, husband and wife become two sides of a coin; they just can’t face each other, but still they stay together. – Al Gore By all means marry. If you get a good wife, you’ll be happy. If you get a bad one, you’ll become a philosopher. – Socrates Woman inspires us to great things, and prevents us from achieving them. – Mike Tyson The great question… which I have not been able to answer… is, “What does a woman want? – George Clooney I had some words with my wife, and she had some paragraphs with me. – Bill Clinton “Some people ask the secret of our long marriage. We take time to go to a restaurant two times a week. A little candlelight, dinner, soft music and dancing. She goes Tuesdays, I go Fridays.” – George W. Bush “I don’t worry about terrorism. I was married for two years.” – Rudy Giuliani “There’s a way of transferring funds that is even faster than electronic banking. It’s called marriage.” – Michael Jordan “I’ve had bad luck with all my wives. The first one left me and the second one didn’t.” The third gave me more children! – Donald Trump Two secrets to keep your marriage brimming 1. Whenever you’re wrong, admit it, 2. Whenever you’re right, shut up. – Shaquille O’Neal The most effective way to remember your wife’s birthday is to forget it once… – Kobe Bryant You know what I did before I married? Anything I wanted to. – David Hasselhoff My wife and I were happy for twenty years. Then we met. – Alec Baldwin A good wife always forgives her husband when she’s wrong. – Barack Obama Marriage is the only war where one sleeps with the enemy. – Tommy Lee A man inserted an ‘ad’ in the classifieds: “Wife wanted”. Next day he received a hundred letters. They all said the same thing: “You can have mine.” – Brad Pitt First Guy (proudly): “My wife’s an angel!” Second Guy: “You’re lucky, mine’s still alive.” – Jimmy Kimmel “Honey, what happened to ‘ladies first’?” Husband replies, “That’s the reason why the world’s a mess today, because a lady went first!” – David Letterman “First there’s the promise ring, then the engagement ring, then the wedding ring…soon after….comes Suffer…ing! – Jay Leno
  20. Botnets Could Meet Their Match in Mayhem Software called Mayhem that won a $2 million Pentagon hacking prize is being prepared to go to work fixing up the Internet. Last summer the Pentagon staged a contest in Las Vegas in which high-powered computers spent 12 hours trying to hack one another in pursuit of a $2 million purse. Now Mayhem, the software that won, is beginning to put its hacking skills to work in the real world. Mayhem was created by security startup ForAllSecure, cofounded by Carnegie Mellon professor David Brumley and two of his PhD students. Brumley says the company has started adapting Mayhem to be able to automatically find and patch flaws in certain kinds of commercial software, including that of Internet devices such as routers. Members of the ForAllSecure team are the presumptive winners of the Cyber Grand Challenge with their computer program called Mayhem. Tests are underway with undisclosed partners, including an Internet device manufacturer, to see if Mayhem can help companies identify and fix vulnerabilities in their products more quickly and comprehensively. The focus is on addressing the challenge of companies needing to devote considerable resources to supporting years of past products with security updates. Late last year, hackers used a massive botnet of compromised Internet devices such as cameras to take down sites including Reddit and Twitter. “Now when a machine is compromised it takes days or weeks for someone to notice and then days or weeks—or never—until a patch is put out,” says Brumley. “Imagine a world where the first time a hacker exploits a vulnerability he can only exploit one machine and then it's patched.” Last year, Brumley published results from feeding almost 2,000 router firmware images through some of the techniques that powered Mayhem. Over 40 percent, representing 89 different products had at least one vulnerability. The software found 14 previously undiscovered vulnerabilities affecting 69 different software builds. ForAllSecure is also working with the Department of Defense on ideas for how to put Mayhem to real world use finding and fixing vulnerabilities. computerworld
  21. Apple Removes Tool to Check if an iPhone or iPad is Activation Locked Apple has removed its Activation Lock status checker on iCloud.com at some point in the past few days. The tool enabled users to enter the serial number or IMEI of an iPhone, iPad, or iPod touch and find out if the device is secured with Activation Lock, helping buyers avoid purchasing a device locked to another user. An individual purchasing a used iPhone on eBay or another website, for example, was able to request the device's serial number and use Apple's tool to verify that Activation Lock had been turned off. If the device was still locked, or if the seller refused to provide the serial number, then it was likely lost or stolen. When you visit icloud.com/activationlock you’ll find Apple’s 404 “Not Found” page, instead of the tool that has become the de facto authentication step for person-to-person iPhone and iPad sales. theverge
  22. BMX cyclists perform tricks in the - The Nutcracker Suite BMX rider Louis Morris’s latest escapade is actually quite graceful. Morris was recruited along with fellow rider to ‘dance’ along with professional ballerina Amber Doyle to Christmas ballet favourite - the Nutcracker Suite. Armed with bikes, ridiculous outfits, and GoPro cameras, the pair do a spinning, leaping dance, which has the same sort of grace and poise as actual ballet. metro
  23. Looking for love A lonely 50-year-old widow decided that it was time to marry again. She put a post on Facebook that read: “Husband wanted! Must be in my age group, must not beat me, must not run around on me and must still be good in bed. All applicants, please apply in person.” The following day, she heard the doorbell. Much to her dismay, she opened the door to see a gray-haired gentleman sitting in a wheelchair. He had no arms or legs. “You can’t really think I’ll consider you?” the widow asked: “Just look at you! You have no legs!” The old gent smile, “Therefore, I will never run around on you.” “You don’t have any arms either!” she snorted. Again, the old man smiled, “Therefore, I will never raise a hand to you.” She raised an eyebrow and asked intently: “Are you still good in bed?” The old man leant back, beamed a big smile and said: “I rang the doorbell, didn’t I?”
  24. 25 Ways To Accidentally Ruin Your Life By 25 Take a job that does not fulfil or inspire you in order to pay the bills and then forget to leave. Date someone who does not challenge you and stay with them, because it is easier than taking a chance on being single. Get the education that your parents wanted you to get and ignore the education (be it institutional or experiential) that you always wanted to get. Stay in one place when you really want to go and explore. Go and explore when you really want to stay in one place. Become so attached to any part of your identity that you forget you are allowed to experiment, grow, and change. Become so obsessed with saving money that you forget to invest in the life that is quickly passing you by. Continuously tell yourself that you will try for the things you want once you are richer, fitter, or more educated. Base the majority of your decisions on the fear of rejection rather than the potential for growth. Only love the people that it makes sense for you to love. Get your heart shattered and wait for someone else to come put it back together, instead of putting it back together yourself. Spend so much time missing the past that you forget to build a present or future. Fall in love with someone who makes you fall out of love with yourself. Obsess over what you think you deserve instead of actually going out and fighting for it. Expect life to be fair at any time. Allow your feelings to steer your life instead of letting them ride in the passenger’s seat. Numb your feelings to the point where you rob yourself of the chance to make real connections with people. Let the fear of ridicule triumph over the power of authenticity. Focus on seeking short-term happiness instead of long-term fulfilment. Become so goal-oriented that your entire life passes you by in the pursuit of whatever is up next. Decide that your relationships with other people can make up for the relationship you lack with yourself. Decide that the relationship you have with yourself can make up for the relationships you lack with other people. Refuse to make the first move in any situation unless you are sure you will succeed. Protect yourself from failure and the plethora of lessons it could teach you. Forget to stop and consider all the ways in which you, at any point in time, may be sabotaging your own life.
×