Jump to content

woolie

Members
  • Content Count

    66
  • Donations

    $0.00 
  • Joined

  • Last visited

Everything posted by woolie

  1. woolie

    Things u Love..

    Quick Books
  2. GIRL FRIENDS JUST NEVER LISTEN Florida man mistakes girlfriend for hog, shoots her By Eric Pfeiffer | The Sideshow A Florida man mistook his girlfriend for a hog, shooting her (AP/Mike Groll) A Florida couple was on a weekend camping trip that ended in an airlift to the emergency room. 52-year-old Steven Egan was hunting with his girlfriend Lisa Simmons in the northern part of the state when he mistook her for a hog and shot her. "He saw a hog and thought he shot it and went to look for it," Maj. Steve Clair of the Flagler County Sheriff's Office told ABC News. "He heard her and thought it was a hog and just shot." The mistake was not actually related to her appearance. Rather, Egan had earlier shot at a hog that continued to evade him. He reportedly instructed Simmons to stay at their campsite while he pursued the evasive animal, according to the Flagler County Sheriff's Office However, Simmons ventured away from the campsite, apparently searching for oranges that had fallen from nearby trees. When Egan heard rustling in the woods, he fired in her direction without first making visual confirmation with his intended target. Instead, Simmons was struck in the legs by a .30-caliber bullet from Egan's gun. She was airlifted to the nearby Halifax Health Medical Center where she is listed as being in serious condition. Authorities say they aren't planning to charge Egan for the accidental shooting. "He was very sympathetic that he'd shot his girlfriend," Maj. Clair said. "It was an accident. I think it was just a violation of one of the cardinal rules of hunting which is you never shoot what you don't see."
  3. woolie

    Marriage Secrets

    ... sounds like someone I know...
  4. woolie

    Recent Cartoons

    It's only me What? Me Worry ?
  5. Trillions and Trillions of Stars... I can't count that high... http://www.youtube.com/watch?v=oAVjF_7ensg&feature=player_embedded http://www.youtube.com/watch?v=oAVjF_7ensg&rel=0&hl=en_US&feature=player_embedded&version=3 Or, FULL screen http://www.flixxy.com/hubble-ultra-deep-field-3d.htm More here: http://www.deepastronomy.com/
  6. 93 Awesome Google Street View Photos http://www.buzzfeed.com/fjelstud/93-awesome-google-street-view-photos-1hv6
  7. FBI could take down Internet for millions on March 8 By Andrew Couts | Digital Trends – The Federal Bureau of Investigation may soon be forced to shut down a number of key Domain Name System (DNS) servers, which would cut Internet access for millions of Web users around the world, reports BetaBeat. http://www.betabeat.com/2012/02/15/fbi-could-pull-the-plug-on-millions-of-internet-u sers-march-8/ The DNS servers were installed by the FBI last year, in an effort to stop the spread of a piece of malware known as DNSCharger Trojan. But the court order that allowed the set up of the replacement servers expires on March 8. In November of last year, authorities arrested six men in Estonia for the creation and spread of DNSCharger, which reconfigures infected computers’ Internet settings, and re-routes users to websites that contain malware, or other illegal sites. DNSCharger also blocks access to websites that might offer solutions for how to rid the computer of its worm, and often comes bundled with other types of malicious software. By the time the FBI stepped in, DNSCharger had taken over computers in more than 100 countries, including half-a-million computers in the US alone. To help eradicate the widespread malware, the FBI replaced infected servers with new, clean servers, which gave companies and individuals with infected computers time to clean DNSCharger off their machines. Unfortunately, DNSCharger is still running on computers “at half of the Fortune 500 companies,” and at “27 out of 55 major government entities,” reports cybersecurity journalist Brian Krebs. http://krebsonsecurity.com/2012/02/half-of-fortune-500s-us-govt-still-infected-with-dn schanger-trojan/ These computers rely on the FBI-installed DNS servers to access the Web. But if the court order is not extended, the FBI will be legally required to remove the clean servers, which would cut off the Internet for users still infected with DNSCharger. Companies or other agencies that are unsure whether their systems are infected with DNSCharger can get free assistance here. http://dcwg.org/cleanup.html And private users can find out if they are infected using instructions provided here. http://dcwg.org/checkup.html
  8. GM Heritage Car Museum Slideshow This is long [15 MIN ] but interesting. Nice to watch if you are rained or snowed in. Below is footage taken at the GM Heritage Museum located in Warren, MI close to the GM Tech Center. It's pretty good. If you've never visited the museum this is a pretty good idea of what it's like although the vehicles are swapped occasionally due to the enormous number of vintage vehicles still owned by GM. http://www.youtube.com/watch?v=HKj8BF4LemI&feature=player_embedded And, Cars we used to drive. Someone did an awesome job putting this together and with sound to boot. At the very end of the video you'll hear the song ' Thunder Road ' sung by the star of the movie for which it was the theme! Not uncommon except this is the one and only song ever recorded, for publication, sung by Robert Mitchum! Cars we drove in the 50's and 60's. http://cruzintheavenue.com/CarsWeDrove.htm
  9. The Seven Most Important Men In A Woman's Life! 1. The Doctor - who tells her to "take off all her clothes." 2. The Dentist - who tells her to "open wide." 3. The Milkman - who asks her "do you want it in the front or the back?" 4. The Hairdresser - who asks her "do you want it teased or blown?" 5. The Interior Designer - who assures her "once it's inside, you'll LOVE it!" 6. The Banker - who insists to her "if you take it out too soon, you'll lose interest!" 7. The Primal Hunter - who always goes deep into the bush, always shoots twice, always eats what he shoots, but keeps telling her "Keep quiet and lie still!" credits mg & jenk
  10. Catholic Marketing Two beggars sit at the gate of the Vatican each day. The first beggar has a very large crucifix in front of him, and the second a star of David. The beggar with the crucifix has a bowl that is always full of money. The beggar with the star of David always has an empty bowl. One day a cardinal stops in front of the beggar with the star of David and tells him: “This is the most Catholic spot in a Catholic city in a Catholic country. If you display a Jewish symbol, next to a beggar displaying the holy cross, people will not give you money. In fact they will give the other beggar money just to spite you.” The beggar with the star of David thanks the cardinal, politely. The cardinal then leaves. The beggar with the crucifix turns to the beggar with the star of David and says: “Imagine that goy giving marketing advice to the Livine brothers.”
  11. Grandmas Don't Know Everything Little Tony had been playing outside with the other kids for a while. When he came into the house and asked her, 'Grandma, what's that thing called when two people sleep in the same room and one is on top of the other?' She was a little taken aback, but she decided to just tell him the truth. 'It's called sexual intercourse, darling'. Little Tony just said, 'Oh, OK,' and went back outside to play with the other kids. A few minutes later he came back in and said angrily, 'Grandma, it isn't called sexual intercourse. It's called Bunk Beds. And Jimmy's mom wants to talk to you!
  12. Subject: Technibble - The Social Engineering Threat to IT Security Technibble http://www.technibble.com The Social Engineering Threat to IT Security 2011-11-01 11:15:05-04 Computer technicians know all too well of the security threats in the cyber world. Virus and malware removal is usually on the most in-demand services for computer repair businesses, especially companies that service residential PC’s. Technicians who service small businesses know the importance of securing networks, configuring firewalls, spam filters, frequent software patches, and virus definition updates in order to keep the vulnerabilities of the computing environment at a minimum. There are a number of hardware and software tools that are designed to create a “secure fortress” of protection, with their main goals to keep the bad guys from infiltrating a system and malicious software from taking over. While these tools are necessary, there is one element that they still can’t protect – the human element. A solid fortress of hardware protection, updated anti-virus, and long cryptic passwords won’t do any good if you simply give the bad guys (or girls) the information they are looking for. Social engineering is one the biggest threats (if not the biggest threat) to computer security, whether in residential or business environments. If computer technicians are to properly secure a computer system or network, they must know about social engineering and how to mitigate the attacks. What is Social Engineering? Social engineering is the process of gaining information through human, interpersonal, behavioral, and psychological means. There are two cl-assifications of social engineering: technology based and human based. Technology based social engineering is when a user is deceived via a computer or device, usually through software, into believing something is real when it is not. Human based social engineering is when people are deceived or coerced by human interaction. Human based attackers normally impersonate a legitimate role to gain access to information; for example by impersonating an IT support technician, an attacker may easily be able to get past the front desk of an office and even gain access to the server room. Whether technology based or human based, social engineering takes advantage of the human condition. Attackers manipulate people into providing sensitive and personal information by gaining their trust, deception, and playing off of human psychological and emotional factors. They use curiosity, fear, accomplishment, economic duress, economic gain, the desire the help people, and friendship, to name just a few, in order to easily extract information from the victim. Many times the victim will be totally unaware that they are being attacked or have been attacked. Social Engineering is akin to conning people. A con-artist and a social engineer have very similar traits, although social engineering can be used for good purposes also, such as ethical hacking, penetration testing, security audits; and in non-technical environments, such as doctors trying to get information for a correct diagnosis, law enforcement asking certain questions in search for the truth (or a confession), and parents trying to connect with their children through discipline or teaching. Social engineering is not always a bad thing, and can be applied to all those situations and more. We, as security conscious computer technicians, however, need to make sure we are aware with the dark side of social engineering. The Social Engineering Framework The social engineering framework website provides a wealth of information regarding the art of social engineering. They provide resources and information regarding what they call the social engineering framework, which in summary contains the following: INFORMATION GATHERING: Doing your homework! Researching as much about the mark as possible in order to become as believable as possible. ELICITATION: The process of extracting information or data from people. PRETEXTING: The act of creating an invented scenario to persuade a targeted victim to release information or perform some action. (Source) PSYCHOLOGICAL PRINCIPLES: Using human nature, psychology, and emotions to your advantage. INFLUENCING OTHERS: Persuasion tactics. SOCIAL ENGINEERING TOOLS: The website has a social engineering toolkit that includes a software program based on Metasploit with pre-defined templates used for security audits. Also explains the use of other technical tools of the social engineer. Typical Attacks Pretexting: Mentioned above. Phishing: Many times in the form of pop-up windows and fake websites Voice/IP/CallerID Spoofing: Using a well known or familiar voice or caller ID in order to gain instant trust. Baiting: Leaving a flash drive containing malicious code in a public place, such as a hallway, bathroom, office floor, etc. Human nature is curious and many people will insert the flash drive to see what’s on it. especially if it has a label such as “financials,” or “contracts.” Computer Viruses/Malware: Normally in the form of rouge software, such as fake-anti virus programs that look real and tell the victim to pay money for the program in order to delete the many viruses on their pc. Other social engineering viruses are distributed vial emails and intriguing attachments, especially if they are sent from hacked friend’s account. Dumpster Diving: Careless people will through away sensitive material in the garbage. There has been a lot of important and private information gathered form simply digging through the garbage. Shoulder Surfing: Secure passwords, PIN numbers, and personal information can easily be found by people looking over your shoulder. Many people are not aware that others are watching them or simply don’t secure their environments enough to prevent it from happening. Payloads:The attacks can be technology based or human based, and so can the payloads. The malicious scripts placed on computers as a result of a successful social engineering attack can take the form of: Rootkits, Backdoors, Keyloggers, Worms, and other Viruses that pass information from the victim to the attacker, many of them even giving the attacker direct access and admin rights of the victim’s computer. Human type payloads can be access to private or locked down environments, direct information gathering form the target, and simply the trust of victim, which can lead to the attacker getting quite a bit of information. How to Mitigate Social Engineering Attacks Education is the number one tool for fighting social engineering attacks. People need to be aware of the threats if they are using the technology or are in a position where they need to protect private information (this doesn’t mean they are a security guard, it could even be a receptionist, or a regular home user). Many times storytelling and/or showing videos of social engineering tactics in action, both human-based and technology-based, are very effective. Password Management: Guidelines such as the number and type of characters that each password must include, password changing frequency, and a strict policy that employees should not disclose passwords to anyone, not even IT. Two-Factor Authentication: When applicable, using more than one factor for authentication, such as a password and a key fob. Anti-Virus/Anti-Phishing Defenses: Multiple layers of anti-virus defenses, such as at mail gateways and desktops, can minimize the threat of phishing. Change Management: A documented change-management process is more secure than an ad-hoc process. Document Handling and Destruction: Sensitive documents and media must be securely disposed of and sanitized. Physical Security: The organization/client should have physical security controls such as visitor logs, mantraps (to prevent piggybacking), monitor placement, privacy screens, etc. Stats Here are some interesting security stats that relate to social engineering. This article found on massachusettsnoncompetelaw.com states that a staggering 60% of employees interviewed admitted to stealing data of one sort or another when leaving a job. Some of the other statistics mentioned are: “Most common (61%) is old-fashioned theft of paper documents or hard files, followed by downloading information onto a disc (53%), onto a USB memory stick (42%), and sending documents as attachments to personal emails (38%). Interestingly, comparatively few employees ]were taking information by stealing BlackBerrys and laptops. Another quite alarming finding is that approximately 25% of the employees indicated that they were able to access data on a company’s network even after they had departed.” Another statistic from employeetheftsolutions.com states that 75% of employees steal from their companies and lists the top 10 most important things to employees, showing what they may be disgruntled about. (Source) The U.S. Chamber of Commerce estimates that 75 percent of all employees steal at least once, and that half of these steal repeatedly. The Chamber also reports that one of every three business failures is the direct result of employee theft. According to the U.S. Department of Commerce, employee dishonesty costs American business in excess of $50 billion annually. In an IT security survey, 90% of office workers gave away their password in exchange for a cheap pen. People are usually the weakest link in the security chain. Social engineering is still the most effective method used to get around security obstacles. A skilled social engineer will often try to exploit this weakness before spending time and effort on other methods to crack passwords. An analysis for SANS estimated that nearly 10 million U.S. households own a computer that is infected with some type of keystroke logging program. Although not every PC user whose keystrokes are being logged has experienced financial losses the analysis estimates that organized-crime groups have access to roughly $24 billion in bank assets from accounts associated with the owners of infected machines. A study by Google researchers analyzing fake AV distribution found that up to 90% of all domains involved in distributing fake antivirus software used social engineering techniques: (Source) (Source) © Technibble - A Resource for Computer Technicians to start or improve their Computer Business To get started with your own computer business, check out our Computer Business Kit. The Social Engineering Threat to IT Security
  13. Many thanks... I am not alone... :big grin:
×