<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:dc="http://purl.org/dc/elements/1.1/" >

<channel><title><![CDATA[Admiral Online - Blog]]></title><link><![CDATA[https://www.admiralonline.com/blog]]></link><description><![CDATA[Blog]]></description><pubDate>Tue, 15 Oct 2024 22:53:56 -0700</pubDate><generator>Weebly</generator><item><title><![CDATA[End of XP Support Will Increase Data Breach 6X]]></title><link><![CDATA[https://www.admiralonline.com/blog/end-of-xp-support-will-increase-data-breach-6x]]></link><comments><![CDATA[https://www.admiralonline.com/blog/end-of-xp-support-will-increase-data-breach-6x#comments]]></comments><pubDate>Sun, 23 Mar 2014 17:35:56 GMT</pubDate><category><![CDATA[security]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/end-of-xp-support-will-increase-data-breach-6x</guid><description><![CDATA[It is now a near certainty that that Microsoft will pull the plug on Windows XP in the next&nbsp;two weeks. Avast Software has issued a warning about XP's demise. Ondrej Vlcek, Avast's chief operations officer, is seeing data indicating that Windows XP users' systems will be "six times" more likely to come under attack by third parties than those running Windows 7 &ndash; which Microsoft will still be supporting in the near future, obviously.The Windows XP's end-of-life is poised to bring many s [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">It is now a near certainty that that Microsoft will pull the plug on Windows XP in the next&nbsp;two weeks. Avast Software has issued a warning about XP's demise. Ondrej Vlcek, Avast's chief operations officer, is seeing data indicating that Windows XP users' systems will be "six times" more likely to come under attack by third parties than those running Windows 7 &ndash; which Microsoft will still be supporting in the near future, obviously.The Windows XP's end-of-life is poised to bring many security concerns to the forefront of data breach prevention practices. "The abandonment by Microsoft will not only affect Windows XP users, but will create a big security problem for the whole ecosystem. Tens of millions of PCs running XP connected to the Internet, unpatched and without security updates, are just waiting to be exploited. The vulnerable OS will be an easy target for hackers and be seen as a gateway to infect other non-XP operating systems," Vlcek writes. <br /><span></span><br /><span></span>He also cites the oft-mentioned ATM example as an area where the loss of Windows XP critical updates, maintenance, and exploit patches, could be rather disastrous for a fairly critical industry.  There are a number of banks that are working at a presumably fast pace to get their systems kicked up to Windows 7 from Windows XP.  Others are contracting with Microsoft for additional Windows XP support &ndash; a pricey, but potential alternative - roughly $1,000 to $3,500 for each replacement machine, according to <a title="" href="http://money.cnn.com/2014/03/04/technology/security/atm-windows-xp/" target="_blank"><u><font color="#000080">CNNMoney</font></u></a>.&nbsp; ATMs aren't the only devices at risk. "Medical offices that store confidential patient information and stores that keep customer details, such as credit card numbers, on their computers running Windows XP could easily be attacked. The Target data breach last year was conducted through a trojan that attacked the shops' point of sales system. If businesses don't keep their systems safe, we will, unfortunately, see more of data breaches like this," Vlcek writes. <br /><span></span><br /><span></span>For more, check out <a title="" href="http://www.pcmag.com/article2/0,2817,2454844,00.asp"><u><font color="#000080">Killing Windows XP Wastes Billions</font></u></a>.<br /><span></span><br /><span></span><br /><span></span></div>]]></content:encoded></item><item><title><![CDATA[Issues to Consider When Selling Domain Names]]></title><link><![CDATA[https://www.admiralonline.com/blog/issues-to-consider-when-selling-domain-names]]></link><comments><![CDATA[https://www.admiralonline.com/blog/issues-to-consider-when-selling-domain-names#comments]]></comments><pubDate>Wed, 15 May 2013 16:09:13 GMT</pubDate><category><![CDATA[domains]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/issues-to-consider-when-selling-domain-names</guid><description><![CDATA[Some of the basic variations and considerations are as follows: 1. What is the value of the domain name?This is a key preliminary  question for a number of reasons. First of all, the amount of effort you put  into a lease agreement will often depend on the value of the domain name. A  relatively cheap domain name will not usually call for a lengthy agreement full  of complex protections for the domain name owner (the lessor) or the  lessee.Also, a lessee of an inexpensive domain name will often  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Some of the basic variations and considerations are as follows:<br /><br /> 1. What is the value of the domain name?This is a key preliminary  question for a number of reasons. First of all, the amount of effort you put  into a lease agreement will often depend on the value of the domain name. A  relatively cheap domain name will not usually call for a lengthy agreement full  of complex protections for the domain name owner (the lessor) or the  lessee.<br /><br />Also, a lessee of an inexpensive domain name will often be scared  off by a 10 page legal document. Accordingly, the starting point for determining  what kind of domain name lease agreement you need, is&nbsp;determining&nbsp;the value and  importance of the domain name to both the domain name owner and the  lessee.<br /><br /> 2. Will this be a "rental" or a "lease to own" arrangement?Just like  there are different kinds of car leases, such as a "walk away lease", a  "balloon&nbsp;payment lease", and a "lease to own" or "finance" arrangement, so to  are there different basic forms of a domain name lease agreement.<br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">The  most common kind of domain name lease agreement is where the lessee pays monthly  "rent" for the use of a domain name over a period of time, and at the end of  this term, either will own the domain name or have a right to "buy it out" with  a final payment. The reason that this type of "lease to own" arrangement is the  most common, is that leasing a domain name generally allows a lessee to obtain  the use of a domain name that it would otherwise be unable to afford.<br /><br /> 3. Will the domain name be held by the domain name owner, or be held in  escrow by a third party?When a lessee is considering making substantial  monthly lease payments for the use and potentially the ownership of a domain  name, the lessee will often want some security that the domain name will not be  rented, sold, or even lost, to someone else, while he or she is making the lease  payments to the domain name owner.<br /><br />The lessee may therefore request that  once the lease agreement is signed, and the first payment is made, that the  domain name be transferred to an escrow agent for the duration of the payment  term, so that once all payments are complete, the domain name may be transferred  to the lessee, who by then has become the owner of the domain name.  Alternatively, the lessee might be concerned that through negligence or  malfeasance, the domain name owner might terminate the lessee's use of the  domain name while it is being paid for by the lessee, and the lessee therefore  wants the security of knowing that it is in the hands of a neutral third  party.<br /><br />From the domain name owner's perspective, it is always preferable  of course to maintain the ownership and control of the domain name while a lease  agreement is pending. Accordingly, this important aspect is often a key part of  the domain name lease negotiation, and will often depend on the value and the  importance of the domain name to both parties.<br /><br /> 4. Are there any restrictions on the lessee's use of the domain  name?Once you sell a domain name, you won't really care what the new owner  does with it. But just like when you are renting an apartment to someone, you  will care what they use it for while they are renting it from you. For example,  you won't want the tenant to damage the property, try to sell it from under you,  have the police called to late night parties or for illegal activities, or use  it as a store when it is supposed to be a residential unit.<br /><br />The same kind  of considerations apply when leasing out a domain name. If you are the domain  name owner, you will want to have provisions included in your domain name lease  agreement that restrict the kinds of things that the lessee is permitted to use  the domain name for. Examples of these kind of restrictions might include not  using the domain name for any kind of unlawful purpose, such as spamming or  child pornography. Furthermore, a domain name owner may sometimes insist that  the lessee disclose exactly what kind of good or service will be provided in  association with the domain name, and have the lessee agree to not stray from  that agreed use at all.<br /><br /> 5. Are there any potential trademark issues?When negotiating and  entering into a domain name lease agreement, is is important to determine  whether the domain name is being leased "free of any potential trademark  issues", or whether it is up to the lessee to satisfy himself that the domain  name can be lawfully used without attracting allegations of infringement which  can greatly affect the domain name owner as well as the  lessee.<br /><br />Generally, a domain name owner will make it so that it is up to  the lessee to be responsible for ensuring that his use of the domain name during  the lease term, will not infringe any third party's trademark rights.  Nevertheless, the domain name owner will want to keep an eye on this as well,  since as long as the domain name is owned by the domain name owner, the domain  name owner will need to ensure for itself, that its valuable property is not  being risked through trademark infringing activity. Furthermore, if any claim  arises, the domain name owner, and the lessee for that matter, will both have an  important interest in being notified so as to deal with any such claim.  Accordingly, notice provisions and indemnification provisions are key components  of any domain name lease agreement.<br /><br /> 6. What happens if there is a breach?When negotiating a domain name  lease agreement, it is crucial to include provisions that deal with unintended  situations, such as when the lessee stops paying the rent, or if the lessee  misuses the domain name. Normally there will be a "curative period", where the  breaching party is able to cure its default, but sometimes the breach may be so  serious, such as when a domain name is being used for illegal activities which  threaten the domain name owner's ownership of the domain name, that there will  not be an opportunity to provide a curative period before the domain name owner  has to change the DNS settings so as to "lock out" the  lessee.<br /><br />Nevertheless, often it is possible to negotiate and arrange a way  for the lessee to buy out the domain name in such circumstances, even when there  is a serious breach, since the lessee may want to just take over the domain  name, and the domain name owner will be just as happy to sell it for an agreed  price at that point.<br /><br /> 7. Where do disputes get resolved?When there is a dispute over a term  or condition of a domain name lease agreement, a good domain name lease  agreement will include a "governing law" and "jurisdiction" clause. This kind of  provision will ensure that it is clear that the parties have agreed to have any  dispute decided by either a judge or an arbitrator, but will also often specify  where the dispute is supposed to be resolved, e.g. where either the domain name  owner or the lessee is located, and also deal with what language and what state  or country's law will apply.<br /><br />The degree of attention and concern that  gets paid to this particular aspect will generally depend on the value of the  domain name and the importance of the domain name to the parties. If it is a  very valuable domain name, then it will be very important for both the domain  name owner and the lessee to have the dispute decided close to home. But since  that is often impossible since the parties are located far apart, then a middle  ground can often be negotiated. On the other hand, sometimes a domain name owner  will choose to&nbsp;accommodate&nbsp;the lessee's choice for jurisdiction, particularly if  the domain name is being held throughout the term of the lease by the domain  name owner, and not in escrow.<br /></div>]]></content:encoded></item><item><title><![CDATA[Skype Usernames Expose User IP]]></title><link><![CDATA[https://www.admiralonline.com/blog/skype-usernames-expose-user-ip]]></link><comments><![CDATA[https://www.admiralonline.com/blog/skype-usernames-expose-user-ip#comments]]></comments><pubDate>Wed, 27 Mar 2013 14:42:35 GMT</pubDate><category><![CDATA[security]]></category><category><![CDATA[surveillance]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/skype-usernames-expose-user-ip</guid><description><![CDATA[Skype voice service exposes a users IP address to the world. There are tools, called Skype Resolvers, which can then decipher a Skype username to the IP address of the user. The hacker&nbsp;supplies the target user's Skype account name and instantly retrieved the users IP address. This tool is used&nbsp;for knocking users offline buy&nbsp;acquiring their IP address and then initiating denial-of-service (DDOS)&nbsp;attacks&nbsp;against the IP. Skype resolvers work regardless of privacy settings i [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Skype voice service exposes a users IP address to the world. There are tools, called Skype Resolvers, which can then decipher a Skype username to the IP address of the user. The hacker&nbsp;supplies the target user's Skype account name and instantly retrieved the users IP address. This tool is used&nbsp;for knocking users offline buy&nbsp;acquiring their IP address and then initiating denial-of-service (DDOS)&nbsp;attacks&nbsp;against the IP. Skype resolvers work regardless of privacy settings in the users Skype account.<br /><br />Skype resolvers can also be used to track users location as they travel between cities.<br /><br /><span></span>This type of privacy issue can be mitigated by&nbsp;relaying Skype signal&nbsp;traffic through proxies. Although, there&nbsp;remain other methods of eavesdropping on&nbsp;traffic. The problem - the maximum tolerable&nbsp;Round Trip Time (RTT) of VoIP users is 300 milliseconds (ms) whereas the propagation delay in a fiber optical cable is 200ms.&nbsp;Therefore, when a user in France calls another one in India, the&nbsp;proxy service must incur less than 100ms additional RTT.</div>]]></content:encoded></item><item><title><![CDATA[New Google Policy Raises Domain Values]]></title><link><![CDATA[https://www.admiralonline.com/blog/new-google-policy-raises-domain-values]]></link><comments><![CDATA[https://www.admiralonline.com/blog/new-google-policy-raises-domain-values#comments]]></comments><pubDate>Thu, 14 Mar 2013 13:09:56 GMT</pubDate><category><![CDATA[domains]]></category><category><![CDATA[seo]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/new-google-policy-raises-domain-values</guid><description><![CDATA[Google is trying to eliminate search results which contain anonymous junk webpages or plagiarized content written to trick the system. The new system, called&nbsp;Google Authorship,&nbsp;is designed to give a higher priority in the search results to trusted authors. The idea is simple -&nbsp;&ldquo;Within search results, information tied to verified online profiles will be ranked higher than content without such verification, which will result in most users naturally clicking on the top (verifie [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Google is trying to eliminate search results which contain anonymous junk webpages or plagiarized content written to trick the system. The new system, called&nbsp;Google Authorship,&nbsp;is designed to give a higher priority in the search results to trusted authors. The idea is simple -&nbsp;<strong><em>&ldquo;Within search results, information tied to verified online profiles will be ranked higher than content without such verification, which will result in most users naturally clicking on the top (verified) results. The true cost of remaining anonymous, then, might be irrelevance.&rdquo;&nbsp; - Eric Schmidt, Chairman Google.</em></strong><br /><br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">Google Authorship authors have linked their websites to their Google+ profiles. Meaning that all the content they write about will appear in Google results pages along with their photo showing their Authorship status. So if they write about your company on their website, it will show up with Google and link back to your site.&nbsp;Industry analysts estimate that adding content using authors who belong to Google Authorship can increase traffic to your site by as much as 500%.&nbsp;You may have noticed recently, when you do a Google search, it pulls up a search results page showing people&rsquo;s photos next to some of the listings. They link and then add the Google Authorship markup to one of the links. That&rsquo;s a &ldquo;Rich Snippet&rdquo; &ndash; a Google verified profile. It makes the listing really stand with more visibility. This is thanks to the Google Authorship program.&nbsp;By signing up on Google+ Authorship, content authors are able to link their content to Google results pages along with their photo, via their new G+ Authorship Profile. This gives higher search results in a much shorter timeframe.<br /><br />The Google Authorship program protects webmaster content. Google Authorship webmasters can link content they publish on their domain to their Google+ profile. Consequently, their content is tracked by Google. If another person&nbsp;&nbsp;plagiarizes content by&nbsp;copying content and pasting it into another website &ndash; Google will downgrade their page.<br /><ol style=""><li style="">Set up your Google+ Profile Page. Gmail users already have a Google+ account.</li><li style="">Add contributor links. Go to your Google+ profile page and click &lsquo;Edit Profile&rsquo; then the &lsquo;About&rsquo; tab, then scroll down until you find the profiles. Click &lsquo;Add Custom Link&rsquo;. Add links to wherever you post content or wherever on the web you connect with others, including social media accounts.</li><li style="">Post frequently to your Google+ page. This builds a history of fresh content. This is important for Google to track you as a topic authority, and it gets people to look at your page.</li><li style="">After you&rsquo;ve created a Google+ Authorship Profile, wait several days for Google to recognize changes. Then you will begin to see your Authorship photos appear in search results. You&rsquo;ll also want to provide your Google+ ID when guest-posting.</li></ol><br />More info at&nbsp;<a href="http://www.authorlinks.net/" title="" style="">AuthorLinks.net</a><br /></div>]]></content:encoded></item><item><title><![CDATA[Google $7 Million Settlement for Stealing WiFi Passwords]]></title><link><![CDATA[https://www.admiralonline.com/blog/google-7-million-settlement-for-stealing-wifi-passwords]]></link><comments><![CDATA[https://www.admiralonline.com/blog/google-7-million-settlement-for-stealing-wifi-passwords#comments]]></comments><pubDate>Sat, 09 Mar 2013 05:30:37 GMT</pubDate><category><![CDATA[surveillance]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/google-7-million-settlement-for-stealing-wifi-passwords</guid><description><![CDATA[Google has agreed to pay a mere&nbsp;$7 million to 30 U.S.  states over a 2010 incident in which its Street View mapping cars collected millions of passwords and other personal data from home wireless networks.&nbsp;The announcement of the settlement is expected to be made by the states early  next week, according to the person, though some of the final details of the deal  were still being hammered out on Friday. Google has said the incident was a  mistake, even though they engaged in this acti [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Google has agreed to pay a mere&nbsp;$7 million to 30 U.S.  states over a 2010 incident in which its Street View mapping cars collected millions of passwords and other personal data from home wireless networks.&nbsp;The announcement of the settlement is expected to be made by the states early  next week, according to the person, though some of the final details of the deal  were still being hammered out on Friday. Google has said the incident was a  mistake, even though they engaged in this activity in several countries and for a duration of 3 years.<span style=""></span><br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[Known AutoStart Methods in Windows OS]]></title><link><![CDATA[https://www.admiralonline.com/blog/known-autostart-methods-in-windows-os]]></link><comments><![CDATA[https://www.admiralonline.com/blog/known-autostart-methods-in-windows-os#comments]]></comments><pubDate>Thu, 07 Mar 2013 16:49:16 GMT</pubDate><category><![CDATA[security]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/known-autostart-methods-in-windows-os</guid><description><![CDATA[1. Autostart folderEverything in here will restart.C:\windows\start menu\programs\startup {english}C:\windows\Menu D&eacute;marrer\Programmes\D&eacute;marrage {french}This Autostart Directory is saved in&nbsp;&nbsp;&nbsp; HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\ShellFolders Startup="C:\windows\start menu\programs\startup" 'So it could be easily changed by any program.    2. Win.ini[windows]load=file.exerun=file.exe    3. System.ini [boot]Shell=Explorer.exe file.exe   [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">1. <strong>Autostart folder</strong><br />Everything in here will restart.<br />C:\windows\start menu\programs\startup {english}<br />C:\windows\Menu D&eacute;marrer\Programmes\D&eacute;marrage {french}<br />This Autostart Directory is saved in&nbsp;&nbsp;&nbsp; HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Shell<br />Folders Startup="C:\windows\start menu\programs\startup" <br />'So it could be easily changed by any program.<br /><span style=""></span><br /><span style=""></span>    2. <strong>Win.ini</strong><br />[windows]<br />load=file.exe<br />run=file.exe<br /><span style=""></span><br /><span style=""></span>    3. <strong>System.ini [boot]</strong><br />Shell=Explorer.exe file.exe<br /><span style=""></span><br /><span style=""></span>    4. <strong>c:\windows\winstart.bat</strong><br />'Note behaves like an usual BAT file. Used for copying deleting specific files. Autostarts&nbsp;everytime<br /><span style=""></span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">5. <strong>Registry</strong><br />[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServices]<br />[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunServicesOnce]<br />[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run]<br />[HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce]<br />[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run]<br />[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce]<br />[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunServices]<br /><span style=""></span><br />6. <strong>c:\windows\wininit.ini</strong><br />'Often Used by Setup-Programs when the file exists it is run ONCE and then is deleted by&nbsp;&nbsp;&nbsp;&nbsp; windows<br />Example: (content of wininit.ini)<br />[Rename]<br />NUL=c:\windows\picture.exe<br />'This example sends c:\windows\picture.exe to NUL, which means that it is deleted. This&nbsp;requires no interactivity with the user and runs totaly stealth.<br /><br /><span style=""></span>7. <strong>Autoexec.bat</strong><br />Starts everytime at Dos Level.<br /><span style=""></span><br /><span style=""></span>8. Registry Shell Spawning<br />[HKEY_CLASSES_ROOT\exefile\shell\open\command] @="\"%1\" %*"<br />[HKEY_CLASSES_ROOT\comfile\shell\open\command] @="\"%1\" %*"<br />[HKEY_CLASSES_ROOT\batfile\shell\open\command] @="\"%1\" %*"<br />[HKEY_CLASSES_ROOT\htafile\Shell\Open\Command] @="\"%1\" %*"<br />[HKEY_CLASSES_ROOT\piffile\shell\open\command] @="\"%1\" %*"<br />[HKEY_LOCAL_MACHINE\Software\CLASSES\batfile\shell\open\command] @="\"%1\" %*"<br />[HKEY_LOCAL_MACHINE\Software\CLASSES\comfile\shell\open\command] @="\"%1\" %*"<br />[HKEY_LOCAL_MACHINE\Software\CLASSES\exefile\shell\open\command] @="\"%1\" %*"<br />[HKEY_LOCAL_MACHINE\Software\CLASSES\htafile\Shell\Open\Command] @="\"%1\" %*"<br />[HKEY_LOCAL_MACHINE\Software\CLASSES\piffile\shell\open\command] @="\"%1\" %*"<br /><br /><span style=""></span>&nbsp;The key should have a value of Value "%1 %*", if this is changed to "server.exe %1 %*",&nbsp;the server.exe is executed EVERYTIME an exe/pif/com/bat/hta is executed.&nbsp;Known as Unkown Starting Method and is currently used by Subseven.<br /><br /><span style=""></span> 9. <strong>Icq Inet</strong><br />[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\test]<br />"Path"="test.exe"<br />"Startup"="c:\\test"<br />"Parameters"=""<br />"Enable"="Yes"<br /><br />[HKEY_CURRENT_USER\Software\Mirabilis\ICQ\Agent\Apps\<br />This key includes all the APPS which are executed IF ICQNET Detects an Internet Connection.<br /><span style=""></span><br />10. <strong>Misc Information</strong><br />[HKEY_LOCAL_MACHINE\Software\CLASSES\ShellScrap] <br />@="Scrap object" "NeverShowExt"=""<br /><span style=""></span><br /><span style=""></span>&nbsp;The NeverShowExt key has the function to HIDE the real extension of the file (here) SHS.&nbsp;This means if you rename a file as "Girl.jpg.shs" it displays as "Girl.jpg" in all programs&nbsp;including Explorer.&nbsp;Your registry should be full of NeverShowExt keys, simply delete the key to get the real&nbsp;extension to show up.<br /><span style=""></span></div>]]></content:encoded></item><item><title><![CDATA[Password Folder Locations of Popular Software]]></title><link><![CDATA[https://www.admiralonline.com/blog/password-folder-locations-of-popular-software]]></link><comments><![CDATA[https://www.admiralonline.com/blog/password-folder-locations-of-popular-software#comments]]></comments><pubDate>Thu, 07 Mar 2013 15:00:47 GMT</pubDate><category><![CDATA[Uncategorized]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/password-folder-locations-of-popular-software</guid><description><![CDATA[Google Chrome:Chrome Passwords are stored in a SQLite file the sites name and sites  username is in clear text but the password is seeded in a Triple DES  algorithm. The file is called Web Data and is stored in the following  location      XP &ndash; C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\DefaultVista &ndash; C:\Users\Username\Appdata\Local\Google\Chrome\User Data\DefaultTrillian:Note- The new version of trillian the passwords made be stored/en [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Google Chrome:<br />Chrome Passwords are stored in a SQLite file the sites name and sites  username is in clear text but the password is seeded in a Triple DES  algorithm. The file is called Web Data and is stored in the following  location<br /><span style=""></span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">XP &ndash; C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\Default<br />Vista &ndash; C:\Users\Username\Appdata\Local\Google\Chrome\User Data\Default<br /><br />Trillian:<br />Note- The new version of trillian the passwords made be stored/encrypted differently<br />Trillian Passwords are stored in .ini files the first character of the password is encrypted with XOR with the key 243 then the password is converted into hex. The file is based on what the password is for so if it was icq it would be icq.ini (for new versions I think they are all stored in a file called accounts.ini or something similar if you open it up with notepad you will see all the data + the encrypted password). The files are stored in the following location:<br /><br />XP (old version) &ndash; C:\Program Files\Trillian\users\<br />XP (new version) &ndash; C:\Documents and Settings\Username\Local Settings\Application Data\Trillian\user\global &ndash; I am not sure on exact but it is somewhere their<br />Vista (old version)- C:\Program Files\Trillian\users\<br />Vista (new version)- C:\Users\Username\Appdata\Roaming\Trillian\user\gl obal<br /><br />MSN /Windows Live Messenger:<br />MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\C reds\[Account Name]<br />Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with &ldquo;WindowsLive:name=&rdquo;. They a set of Win API functions (Credential API&rsquo;s) to store its&rsquo; security data (Credentials). These functions store user information, such as names and passwords for the accounts (Windows Live ID credentials). Windows Live ID Credential records are controlled by the operating system for each user and for each session. They are attached to the &ldquo;target name&rdquo; and &ldquo;type&rdquo;. If you are familiar with SQL you can think of target name and type as the primary key. Table below lists most frequently used fields in Windows Live ID Credential records.<br /><br />Paltalk:<br />Paltalk Passwords are using the same password encryption algorithm. Paltalk passwords are stored in the registry. To encrypt the new password Paltalk looks at the serial number of the disk C:\ and performs a mix with the Nickname. The resulting string is then mixed again with the password and some other constants. The final string is then encoded and written to the registry.<br />AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.<br />The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name]<br /><br />Google Talk:<br />Google Talk passwords are encoded/decoded using Crypto API. Encrypted Gmail passwords are stored by Google Talk in the registry under HKEY_CURRENT_USER\Software\Google\Google<br />Talk\Accounts\[Account Name]<br /><br />Firefox:<br />Click Me!!!!<br /><br />The passwords are stored in one of the following filenames: signons.txt, signons2.txt, and signons3.txt (depends on Firefox version)<br />These password files are located inside the profile folder of Firefox, in [Windows Profile]\Application Data\Mozilla\Firefox\Profiles\[Profile Name]<br />Also, key3.db, located in the same folder, is used for encryption/decription of the passwords.<br /><br />Yahoo Messenger 6.x:<br />The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager<br />(&rdquo;EOptions string&rdquo; value)<br /><br />Yahoo Messenger 7.5 or later:<br />The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager &ndash; &ldquo;ETS&rdquo; value.<br />The value stored in &ldquo;ETS&rdquo; value cannot be recovered back to the original password.<br /><br />AIM:<br />AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.<br />448-bit keyword is used to encrypt the password with Blowfish. The encrypted string is then encoded using base64. The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords<br /><br />No Ip (easy to make in vb.net):<br />Passwords encoded with Base64 you can find the account information in the following locations<br /><br />HKEY_LOCAL_MACHINESOFTWARE\Vitalwerks\DUC\&rdquo;, &ldquo;Password&rdquo;<br />HKEY_LOCAL_MACHINESOFTWARE\Vitalwerk\sDUC\&rdquo;, &ldquo;Checked&rdquo;<br />HKEY_LOCAL_MACHINESOFTWARE\Vitalwerks\DUC\&rdquo;, &ldquo;Username<br />KEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC\&rdquo;, &ldquo;ProxyUsername<br />HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC\&rdquo;, &ldquo;ProxyPassword&rdquo;<br />HKEY_LOCAL_MACHINE\SOFTWARE\Vitalwerks\DUC\&rdquo;, &ldquo;Hosts&rdquo;<br /><br />Filezilla:<br />Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this<br /><br />Internet Explorer 4.00 &ndash; 6.00:<br />The passwords are stored in a secret location in the Registry known as the &ldquo;Protected Storage&rdquo;.<br />The base key of the Protected Storage is located under the following key:<br />&ldquo;HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider&rdquo;.<br />You can browse the above key in the Registry Editor (RegEdit), but you won&rsquo;t be able to watch the passwords, because they are encrypted.<br />Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.<br /><br />Internet Explorer 7.00 &ndash; 8.00:<br />The new versions of Internet Explorer stores the passwords in 2 different locations.<br />AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.<br />HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords.<br /><br />Opera:<br />The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile<br /><br />Outlook Express (All Versions):<br />The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.<br /><br />Outlook 98/2000:<br />Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.<br /><br />Outlook 2002-2008:<br />All new versions of Outlook store the passwords in the same Registry key of the account settings.<br />The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[Profile Name]\9375CFF0413111d3B88A00104B2A6676\[Account Index]<br />If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.<br /><br />ThunderBird:<br />The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]<br />You should search a filename with .s extension.<br /><br />Digsby:<br />The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat<br />All other passwords are stored in Digsby servers.<br /></div>]]></content:encoded></item><item><title><![CDATA[Deep Packet Inspection - Illegal in Russia - Legal In US]]></title><link><![CDATA[https://www.admiralonline.com/blog/deep-packet-inspection-illegal-in-russia-legal-in-us]]></link><comments><![CDATA[https://www.admiralonline.com/blog/deep-packet-inspection-illegal-in-russia-legal-in-us#comments]]></comments><pubDate>Wed, 06 Mar 2013 14:00:24 GMT</pubDate><category><![CDATA[surveillance]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/deep-packet-inspection-illegal-in-russia-legal-in-us</guid><description><![CDATA[Deep Packet Inspection&nbsp;(DPI) is a form of&nbsp;computer network&nbsp;packet filtering&nbsp;that examines the&nbsp;data&nbsp;part (and possibly also the&nbsp;header) of a&nbsp;packet&nbsp;as it passes an inspection point, searching for protocol non-compliance,&nbsp;viruses,&nbsp;spam, intrusions, or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination, or, for the purpose of collecting statistical information.Deep Packet inspection is  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;"><strong style=""><a href="https://en.wikipedia.org/wiki/Deep_packet_inspection#DPI_at_network.2FInternet_service_providers" title="">Deep Packet Inspection</a></strong>&nbsp;(<strong style="">DPI</strong>) is a form of&nbsp;computer network&nbsp;packet filtering&nbsp;that examines the&nbsp;data&nbsp;part (and possibly also the&nbsp;header) of a&nbsp;packet&nbsp;as it passes an inspection point, searching for protocol non-compliance,&nbsp;viruses,&nbsp;spam, intrusions, or defined criteria to decide whether the packet may pass or if it needs to be routed to a different destination, or, for the purpose of collecting statistical information.<br /><br />Deep Packet inspection is contrary to Article 23 of the&nbsp;<a href="https://en.wikipedia.org/wiki/Constitution_of_the_Russian_Federation" title="" style="">Constitution of the Russian Federation</a>.&nbsp;However&nbsp;<a href="https://en.wikipedia.org/wiki/Federal_law_of_Russian_Federation_no._139-FZ_of_2012-07-28" title="" style="">Federal Law &#8470;139</a>&nbsp;enforces blocking websites on the&nbsp;Russian Internet blacklist&nbsp;using IP-filtering.<br /><br />In the United States the&nbsp;<strong style="">FCC has adopted Internet CALEA requirements.</strong>&nbsp;The FCC, pursuant to its mandate from the U.S. Congress, has required that all telecommunication providers, including Internet services, be capable of supporting the execution of a court order to provide real-time communication forensics of specified users. In 2006, the FCC adopted new Title 47, Subpart Z, rules requiring Internet Access Providers meet these requirements. DPI was one of the platforms essential to meeting this requirement and has been deployed for this purpose throughout the U.S.&nbsp;President&nbsp;George W. Bush&nbsp;and Attorney General&nbsp;Alberto R. Gonzales&nbsp;have asserted that they believe the president has the authority to order secret intercepts of telephone and e-mail exchanges between people inside the United States and their contacts abroad without obtaining a&nbsp;<a href="https://en.wikipedia.org/wiki/Foreign_Intelligence_Surveillance_Act" title="">FISA</a>&nbsp;warrant.<a href="https://en.wikipedia.org/wiki/Deep_packet_inspection#cite_note-22" title="">*</a>&nbsp;The&nbsp;<a href="https://en.wikipedia.org/wiki/Defense_Information_Systems_Agency" title="" style="">Defense Information Systems Agency</a>&nbsp;has developed a sensor platform that uses Deep Packet Inspection.<a href="https://en.wikipedia.org/wiki/Deep_packet_inspection#cite_note-23" style="" title="">**</a><br /></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;"><br />*&nbsp;Carol D. Leonnig (2007-01-07).&nbsp;<a href="http://www.washingtonpost.com/wp-dyn/content/article/2006/01/06/AR2006010601772.html" title="" style="">"Report Rebuts Bush on Spying - Domestic Action's Legality Challenged"</a>. The Washington Post. Retrieved 2008-03-03<br /><br /><strong style="">**</strong>&nbsp;Cheryl Gerber (2008-09-18).&nbsp;"Deep Security: DISA Beefs Up Security with Deep Packet Inpection of IP Transmissions". Retrieved 2008-10-30.<br /></div>]]></content:encoded></item><item><title><![CDATA[Evernote Cloud Service Hacked]]></title><link><![CDATA[https://www.admiralonline.com/blog/evernote-cloud-service-hacked]]></link><comments><![CDATA[https://www.admiralonline.com/blog/evernote-cloud-service-hacked#comments]]></comments><pubDate>Tue, 05 Mar 2013 13:35:00 GMT</pubDate><category><![CDATA[security]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/evernote-cloud-service-hacked</guid><description><![CDATA[Unknown attackers gained access to user data and encrypted password files, prompting the online storage service to alert its subscribers of the breach.&nbsp;Online storage service Evernote warned 50 million users on March 2 that unknown attackers had compromised its system and gained access to the information on more than 50 million users, including encrypted password files.&nbsp;Evernote reportedly uses MD-5, a cryptographic hash function&nbsp;that has been known for years&nbsp;to be vulnerable [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">Unknown attackers gained access to user data and encrypted password files, prompting the online storage service to alert its subscribers of the breach.&nbsp;Online storage service Evernote warned 50 million users on March 2 that unknown attackers had compromised its system and gained access to the information on more than 50 million users, including encrypted password files.&nbsp;Evernote reportedly uses MD-5, a cryptographic hash function&nbsp;that has been known for years&nbsp;to be vulnerable.<br /><span style=""></span><br /><span style=""></span></div>  <div>  <!--BLOG_SUMMARY_END--></div>  <div class="paragraph" style="text-align:left;">Evernote moved to assure customers that their&nbsp;data&nbsp;and payment information remained safe, but conducted a password reset for all 50 million users across its services. The breach, which apparently happened in late February, allowed the attackers to access user names and email addresses of Evernote users, the company stated. The criminals also accessed the encrypted password file, the company said in a post on its Website.&nbsp;"Even though this information was accessed, the passwords stored by Evernote are protected by one-way encryption. (In technical terms, they are hashed and&nbsp;<a href="http://en.wikipedia.org/wiki/Salt_(cryptography)" title="" style="">salted</a>.)" the company stated on the site. "While our password encryption measures are robust, we are taking additional steps to ensure that your personal data remains secure."&nbsp;To store secure passwords, the data is typically hashed, or scrambled using a one-way encryption function. Strong hashing uses "salt," which is a random number that prevents attackers from easily using a variety of attacks.<br /><br />Cloud service companies, which collect information on a massive number of users, have become targets for&nbsp;hackers&nbsp;and cyber-criminals. In June 2012, business networking service LinkedIn acknowledged that the hashed, but not salted, passwords for nearly 6.5 million users&nbsp;had been stolen. The company became&nbsp;the target of a class-action lawsuit&nbsp;later that month.&nbsp;So far, neither the Evernote password file nor decrypted passwords appear to have been posted online, said Steve Thomas, co-founder of PwnedList, which tracks accounts information that has publicly been posted.Evernote claims that it had used a unique seed, or salt, for the password hashing, to make recovering the passwords much more difficult for the attackers, assuming that they did not get access to the salts along with the passwords, Thomas said.&nbsp;"The concern is where the salt was kept, and if the hackers got access to the salt," he said. "If the salt was also stolen, or there was a unique salt for each password, but the salt was also in the database, then we would expect with a little bit of effort, a large number of the hashes can be reversed."<br /><br />If some fraction of the password file can be decrypted, it still represents a danger for users, even after they have changed their passwords on Evernote's system, because a large percentage of individuals&mdash;between 50 percent and 80 percent, according to&nbsp;studies of previous breaches&mdash;reuse their passwords.&nbsp;"Individuals should also be concerned about any other services where they used the same password as the one that was stolen," Thomas said. "Individuals should always assume that a password is vulnerable, regardless of if it was hashed and salted, as soon as it is in the hands of a&nbsp;hacker."<br /><br />Evernote represents a treasure trove of user information. In June, Evernote announced it had 34 million users. That number expanded to 45 million in December and 50 million as of February.<br /></div>]]></content:encoded></item><item><title><![CDATA[New Expired Domain Rules Effective August 2013]]></title><link><![CDATA[https://www.admiralonline.com/blog/new-expired-domain-rules-effective-august-2013]]></link><comments><![CDATA[https://www.admiralonline.com/blog/new-expired-domain-rules-effective-august-2013#comments]]></comments><pubDate>Mon, 04 Mar 2013 20:07:28 GMT</pubDate><category><![CDATA[domains]]></category><guid isPermaLink="false">https://www.admiralonline.com/blog/new-expired-domain-rules-effective-august-2013</guid><description><![CDATA[The new &ldquo;Expired Registration Recovery Policy&rdquo; (ERRP) goes into effect August  31. This policy sets guidelines for how registrars treat expired domain  names and how they must notify customers that their domains are expiring. The rules will require expiration notices be sent at particular  intervals and mandate that DNS resolution be interrupted after expiration. Domain registrars will be required to send an expiration notice about one  month before expiration and another one a week  [...] ]]></description><content:encoded><![CDATA[<div class="paragraph" style="text-align:left;">The new &ldquo;Expired Registration Recovery Policy&rdquo; (ERRP) goes into effect August  31.<br /><span style=""></span><br /><span style=""></span> This <a href="https://www.icann.org/en/resources/registrars/consensus-policies/errp" style="">policy</a> sets guidelines for how registrars treat expired domain  names and how they must notify customers that their domains are expiring. The rules will require expiration notices be sent at particular  intervals and mandate that <strong>DNS resolution be interrupted after expiration</strong>.<br /><span style=""></span><br /><span style=""></span> Domain registrars will be required to send an expiration notice about one  month before expiration and another one a week before expiration. A notice is  also generally required five days after expiration.<br /><span style=""></span><br /><span style=""></span> Registrars must also interrupt the DNS of an expired domain for a specific  timeframe. This is common practice today &mdash; a registrar will change the  nameservers to point to a parked page with a notice about how to renew the  domain. This disruption quickly  gets the attention of the registrant if they didn&rsquo;t know their domain was  expiring.<br /><span style=""></span><br /><span style=""></span> ERRP also requires a 30 day redemption grace period on non-sponsored gTLDs  and requires registrars to publish pricing and information about recovering a  domain during this period. The new rules include some suggest best practices. One is that registrars  keep a customer email address on file that is not connected to the registered  URL so that email can still be received when the DNS is disrupted.<br /><span style=""></span></div>]]></content:encoded></item></channel></rss>