<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2183902368072223546</id><updated>2024-12-18T19:25:47.165-08:00</updated><category term="cyber news"/><category term="internet"/><category term="computer"/><category term="google"/><category term="hacking"/><category term="Tips and Trik"/><category term="artikel"/><category term="facebook"/><category term="software"/><category term="download"/><category term="security"/><category term="twitter"/><category term="anonymous"/><category term="bloging"/><category term="chrome"/><category term="gadget"/><category term="wikileaks"/><category term="desain grafis"/><category term="linux"/><category term="firefox"/><category term="antivirus"/><category term="virus"/><category term="IE"/><category term="android"/><category term="opera"/><category term="windows"/><category term="LulzSec"/><category term="iPhone"/><category term="smartphones"/><category term="vulnerable"/><category term="apple"/><category term="tool"/><category term="china cyber"/><category term="wordpress"/><category term="youtube"/><category term="HTML5"/><category term="Mac OS"/><category term="tablet"/><category term="AntiSec"/><category term="Galaxy Nexus"/><category term="OS"/><category term="amazon"/><category term="browser"/><category term="chromebooks"/><category term="ebook"/><category term="free domain"/><category term="google reader"/><category term="google translate"/><category term="google+"/><category term="iOS 5"/><category term="ipv6"/><category term="microsoft"/><category term="template"/><category term="web design"/><category term="yahoo"/><title type='text'>Cyber News &amp;amp; Culture</title><subtitle type='html'>All About of Cyber News and Cyber Culture</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>707</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-7253037869959739519</id><published>2012-09-12T20:33:00.004-07:00</published><updated>2012-09-12T20:33:58.425-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><title type='text'>Awesome Photo of iPhone 5</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyGVK0PwnmM4MTBWUi6W4CTQ6ngNMzWWmwCrrwRJu4cpUp1SJLhvrc57eThO5c3Hqi6ishA9biFeTQ5fOJlsFw_DO_SzTfOC0lEKu-Skjb-6od5Lp_be88pkTghytzb1bQV6M0SZcy2HQ/s1600/apple-iphone-5-review-0579_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyGVK0PwnmM4MTBWUi6W4CTQ6ngNMzWWmwCrrwRJu4cpUp1SJLhvrc57eThO5c3Hqi6ishA9biFeTQ5fOJlsFw_DO_SzTfOC0lEKu-Skjb-6od5Lp_be88pkTghytzb1bQV6M0SZcy2HQ/s1600/apple-iphone-5-review-0579_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibW15WvV0af1fxqu2zO9mD1jFIeB7QOdk581z9FA5cajQ14GRcZ5r5Ep_UCjCD0YD2q4q-TRLjp3-NZWmzqSdd31MoxN71UekBkNQHGqooN3JozpsaTDUno6cyZUj8ndGeA4J5U3ikZWI/s1600/apple-iphone-5-review-0585_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibW15WvV0af1fxqu2zO9mD1jFIeB7QOdk581z9FA5cajQ14GRcZ5r5Ep_UCjCD0YD2q4q-TRLjp3-NZWmzqSdd31MoxN71UekBkNQHGqooN3JozpsaTDUno6cyZUj8ndGeA4J5U3ikZWI/s1600/apple-iphone-5-review-0585_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpYJvMSvZ533qDs_zwuzkFrTXRazoujCnbuE3ipExze947BYgzbrYmr3VfPdkuw-sBTdlTWohMCLjPpZthFz3bCFXcP-RGHM1FzusCPVTSMRbyNVoB2teIIw_EmNWWrfT-PTQ0GALHNQM/s1600/apple-iphone-5-review-0595_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpYJvMSvZ533qDs_zwuzkFrTXRazoujCnbuE3ipExze947BYgzbrYmr3VfPdkuw-sBTdlTWohMCLjPpZthFz3bCFXcP-RGHM1FzusCPVTSMRbyNVoB2teIIw_EmNWWrfT-PTQ0GALHNQM/s1600/apple-iphone-5-review-0595_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6q1rQo6NHIAwyLil9SHnHLFELJYG3GvNnA7vO0_gZyb_MHnW0KNx7KR11X84fCY_Eh-eHq5SbjjmqtcRmm-h8jPcnPf50J7UxS-LrJiglaHcr-2wkcGH2DVayWpuD94DwpE0OQFpYKGU/s1600/apple-iphone-5-review-0597_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6q1rQo6NHIAwyLil9SHnHLFELJYG3GvNnA7vO0_gZyb_MHnW0KNx7KR11X84fCY_Eh-eHq5SbjjmqtcRmm-h8jPcnPf50J7UxS-LrJiglaHcr-2wkcGH2DVayWpuD94DwpE0OQFpYKGU/s1600/apple-iphone-5-review-0597_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsdB-QYCmlk9J8WHaRweThiuPHw-1VSWuv-I6MgE1x5wfs8URnbnviQ-ojj5CRgDADmJgYs3cxZRYzyH82c3ID4E9yCV1MsvK6nH05dxYORJlIvRGUeO9IF1DDNfr9vJbK8Jh3fsTeDc8/s1600/apple-iphone-5-review-0608_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsdB-QYCmlk9J8WHaRweThiuPHw-1VSWuv-I6MgE1x5wfs8URnbnviQ-ojj5CRgDADmJgYs3cxZRYzyH82c3ID4E9yCV1MsvK6nH05dxYORJlIvRGUeO9IF1DDNfr9vJbK8Jh3fsTeDc8/s1600/apple-iphone-5-review-0608_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_fZdvng0Go0sZkXWF1F8rYndD5pXOxMBsJEgTUwCgZuiaagNTMTNtfRTFdXgNBhFtHZWQtAmZGthllVRe2UnxaMESf84FT5vTKizWwh-BHqywF2B55VuedMVY_1uTFjiKDyS3IgzRE8A/s1600/apple-iphone-5-review-0620_610x407.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_fZdvng0Go0sZkXWF1F8rYndD5pXOxMBsJEgTUwCgZuiaagNTMTNtfRTFdXgNBhFtHZWQtAmZGthllVRe2UnxaMESf84FT5vTKizWwh-BHqywF2B55VuedMVY_1uTFjiKDyS3IgzRE8A/s1600/apple-iphone-5-review-0620_610x407.jpg&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMI8RkoQTGIMoXegziUApdGCNQqON0PpWnQNabOLdG7yBtUMLBKEPBFSJkyhfshFM3nj6MfjeLpINH6EzXMCkVUX7As94JhaNKAkJ7BsAvIWjFPjjbUh3fkRh3XuLrh8vvv32rDpG1jvs/s1600/iPhone-5-Lightning-2012-09-12_610x350.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMI8RkoQTGIMoXegziUApdGCNQqON0PpWnQNabOLdG7yBtUMLBKEPBFSJkyhfshFM3nj6MfjeLpINH6EzXMCkVUX7As94JhaNKAkJ7BsAvIWjFPjjbUh3fkRh3XuLrh8vvv32rDpG1jvs/s1600/iPhone-5-Lightning-2012-09-12_610x350.jpg&quot; height=&quot;366&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnf7MBVSe2y_Ni-m004FVMQWroJmSp1MUnj-ZQ4pmhGPvcBDNJPPq_sBhoHIYRnkiN1JtBjePRa-LvM_zpN2KhOf6R_BltJptFYtreWkEyOR-WmtRtNb618z2nywlAlGfZMz_6TgzGcYw/s1600/iPhone5_Colors_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnf7MBVSe2y_Ni-m004FVMQWroJmSp1MUnj-ZQ4pmhGPvcBDNJPPq_sBhoHIYRnkiN1JtBjePRa-LvM_zpN2KhOf6R_BltJptFYtreWkEyOR-WmtRtNb618z2nywlAlGfZMz_6TgzGcYw/s1600/iPhone5_Colors_blog.png&quot; height=&quot;424&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2jJEHkgU3h09EYN_jKyneVejN-fyX1H0QJBLPSiQkEkv3rExvGhtk1x9ep-zjTZFnsb-DLq6eZZwpZfWAckC9Pp5reQdJXqpSJKuxVg643puGCjcFADlAncFhISoq6EYq3gSZ_CdJ4OQ/s1600/iPhone5_OpenTable_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2jJEHkgU3h09EYN_jKyneVejN-fyX1H0QJBLPSiQkEkv3rExvGhtk1x9ep-zjTZFnsb-DLq6eZZwpZfWAckC9Pp5reQdJXqpSJKuxVg643puGCjcFADlAncFhISoq6EYq3gSZ_CdJ4OQ/s1600/iPhone5_OpenTable_blog.png&quot; height=&quot;420&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeV3D1o5XEw41uqj_2ngesV6GYm8dfPeXT7yVERYOnmgG6t19RwaE81R3cBPhMhF803RH1ypyksyUMCaCZ6O7ySc8sNciUF_S1lffJ_uuWRLXeEo_Scq2XmQy392GwCSwkl4yjK-ymjGw/s1600/iPhone5_SideButtons_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeV3D1o5XEw41uqj_2ngesV6GYm8dfPeXT7yVERYOnmgG6t19RwaE81R3cBPhMhF803RH1ypyksyUMCaCZ6O7ySc8sNciUF_S1lffJ_uuWRLXeEo_Scq2XmQy392GwCSwkl4yjK-ymjGw/s1600/iPhone5_SideButtons_blog.png&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIeITEhy7wanHnuumw3c-XaeBYFNV8JR8FlIXEbH95sHZFSq2Vz4uKBQfjBi2gUmB81fi0vvASmmVsZESgyEcsEGJb9dAqk2_iC9mjvh6W4_QEsi5hPJ1Rc2-BawSu0bwx3Mq7pO40eig/s1600/iPhone5_Widescreen_liveblog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIeITEhy7wanHnuumw3c-XaeBYFNV8JR8FlIXEbH95sHZFSq2Vz4uKBQfjBi2gUmB81fi0vvASmmVsZESgyEcsEGJb9dAqk2_iC9mjvh6W4_QEsi5hPJ1Rc2-BawSu0bwx3Mq7pO40eig/s1600/iPhone5_Widescreen_liveblog.png&quot; height=&quot;426&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhB0DxOp0t8QQGEMLJmqO4y09VR-8E73qBNZF4EyLZBerGFWeVI4Nda-NMyhsSMzBIetxuCzon9ghQjSI6za48FL_3VhV1WsUlaW16dDif3Ouj28AM8mN434ctch8PVn8XEt08iZoR_Q/s1600/iPhone5_case_CNETAsia.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxhB0DxOp0t8QQGEMLJmqO4y09VR-8E73qBNZF4EyLZBerGFWeVI4Nda-NMyhsSMzBIetxuCzon9ghQjSI6za48FL_3VhV1WsUlaW16dDif3Ouj28AM8mN434ctch8PVn8XEt08iZoR_Q/s1600/iPhone5_case_CNETAsia.png&quot; height=&quot;478&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXUhvndAzfSVSsL-rTsakoQ-_cCLT5XddqrxEcySn8xjANqdCwParOK79XHpZuUkIyME8zJTaSOiwvKhCJX2hLPKgIwbvXOetI5-zNpqqXHkNFBSGFG0jNugICxB-JquoF1DNZ1sImEjM/s1600/iPhone5_liveblog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXUhvndAzfSVSsL-rTsakoQ-_cCLT5XddqrxEcySn8xjANqdCwParOK79XHpZuUkIyME8zJTaSOiwvKhCJX2hLPKgIwbvXOetI5-zNpqqXHkNFBSGFG0jNugICxB-JquoF1DNZ1sImEjM/s1600/iPhone5_liveblog.png&quot; height=&quot;424&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc5C7X60CZTqzNjR6yhIJpwXTTGrjohIc_fwhxtBUHtF74Qh_C49E8TqQMtIW_LHnmtLi7HPC_I88_L4-8LV4sJCqhlXze2YxC8Yoz7Feb4A91mbfaSFYi86V2wfq2wjSrRDQai0s0Leo/s1600/iPhone5_screensize_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhc5C7X60CZTqzNjR6yhIJpwXTTGrjohIc_fwhxtBUHtF74Qh_C49E8TqQMtIW_LHnmtLi7HPC_I88_L4-8LV4sJCqhlXze2YxC8Yoz7Feb4A91mbfaSFYi86V2wfq2wjSrRDQai0s0Leo/s1600/iPhone5_screensize_blog.png&quot; height=&quot;424&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiY8jlmBYdtX46mJXqCOHO2xQyS-U8NhR13KZNwZNjdiNxWeXsD1my-_CN5HRvH3YOwHfln4qC23vamhmBDNQdeCf5OREw2NotxPSabEo4vfR3dvbyK2kAsZEDoDIZFhCa7JA0r4dAGL8s/s1600/iPhone5_side-by-side_CNETAsia_1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiY8jlmBYdtX46mJXqCOHO2xQyS-U8NhR13KZNwZNjdiNxWeXsD1my-_CN5HRvH3YOwHfln4qC23vamhmBDNQdeCf5OREw2NotxPSabEo4vfR3dvbyK2kAsZEDoDIZFhCa7JA0r4dAGL8s/s1600/iPhone5_side-by-side_CNETAsia_1.png&quot; height=&quot;480&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuQsJ_RaVOuCHuXNgL00D2G9jivQGIWW1y8_2NyFFTCoPgscva2UTdXberZCEeVfhYCajqOlM5nKLpIAn4FkOF9OjtKCvFQIBvh-kN-J5DO-pztgpBBWv3Pr-hbwYpOisClhBwLYKv_vY/s1600/iPhone5_side_blog.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuQsJ_RaVOuCHuXNgL00D2G9jivQGIWW1y8_2NyFFTCoPgscva2UTdXberZCEeVfhYCajqOlM5nKLpIAn4FkOF9OjtKCvFQIBvh-kN-J5DO-pztgpBBWv3Pr-hbwYpOisClhBwLYKv_vY/s1600/iPhone5_side_blog.png&quot; height=&quot;428&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-CBL4Pow5q6rDqTba5JvwJ6WwVumcT3frAblt067A1R-PXTbb2vPKstDYNlABFP_CBM0qz2bPgc7TuMFfVREzFIEgpnbg6QxuEpznmP0oGPqp4GPSLfr3Z3X8UgM4LiyHGjcwsslc3Lk/s1600/iPhone5_vendor_2pix_620x573.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-CBL4Pow5q6rDqTba5JvwJ6WwVumcT3frAblt067A1R-PXTbb2vPKstDYNlABFP_CBM0qz2bPgc7TuMFfVREzFIEgpnbg6QxuEpznmP0oGPqp4GPSLfr3Z3X8UgM4LiyHGjcwsslc3Lk/s1600/iPhone5_vendor_2pix_620x573.png&quot; height=&quot;590&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYWKsf_bZhBgaNC4n1ObQynLDlnneUlZLYyTjaKfyVFJl-0ASpxzwKFgkfU9bUYnPPlYJqND3UXDBtgLa1_j5qcVRBFc5rSVO2O9OZqzIwB7e1GgynGC-bxdu8V5LDHrht2wuS3n81PYc/s1600/iPhone5_vendor_camera_620x415.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYWKsf_bZhBgaNC4n1ObQynLDlnneUlZLYyTjaKfyVFJl-0ASpxzwKFgkfU9bUYnPPlYJqND3UXDBtgLa1_j5qcVRBFc5rSVO2O9OZqzIwB7e1GgynGC-bxdu8V5LDHrht2wuS3n81PYc/s1600/iPhone5_vendor_camera_620x415.png&quot; height=&quot;428&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH1UIhARgB2oF3LKYyy2rsuaMshC-GkcOWKpnduLCz8S0VRehIdyPSDw5Km-e7b6RQdPUKLk1aARGcos-z0J__1gjn1s7MXT7vj7qDpPRGaUqGcJwt3Q0J2PF5_0Jwcw6QdByoxS7domI/s1600/iPhone5_vendor_connector.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiH1UIhARgB2oF3LKYyy2rsuaMshC-GkcOWKpnduLCz8S0VRehIdyPSDw5Km-e7b6RQdPUKLk1aARGcos-z0J__1gjn1s7MXT7vj7qDpPRGaUqGcJwt3Q0J2PF5_0Jwcw6QdByoxS7domI/s1600/iPhone5_vendor_connector.png&quot; height=&quot;528&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipvyQt0-0pu38wJtBRQke6FusLajI2hipYO6lfa7iQtp3VuV4XgcIRHEVqDwbEySs7JI_-7bG6fxpx_9l_Ic50Zs8oyZa_DtZXi0C6eBuSB2MxcT3umiPCVQVGUzX2avpf61xBztEMaG0/s1600/iPhone5_vendor_earbuds_1_620x581.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipvyQt0-0pu38wJtBRQke6FusLajI2hipYO6lfa7iQtp3VuV4XgcIRHEVqDwbEySs7JI_-7bG6fxpx_9l_Ic50Zs8oyZa_DtZXi0C6eBuSB2MxcT3umiPCVQVGUzX2avpf61xBztEMaG0/s1600/iPhone5_vendor_earbuds_1_620x581.png&quot; height=&quot;598&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz6XEKAGzXG0DbBHuwuI2hbzqoxKBX2W1UMR7jlYDCDDbAE-hjgFaNjEf87DWsG0Hp5L8lDzrMqq0e2cNuBFrKcq_XJTCTJyMOLql_H1RRnzpIc2jCIfDhykSMgwin5knxO6M1Zw1-Eqc/s1600/iPhone5_vendor_flat_620x163.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhz6XEKAGzXG0DbBHuwuI2hbzqoxKBX2W1UMR7jlYDCDDbAE-hjgFaNjEf87DWsG0Hp5L8lDzrMqq0e2cNuBFrKcq_XJTCTJyMOLql_H1RRnzpIc2jCIfDhykSMgwin5knxO6M1Zw1-Eqc/s1600/iPhone5_vendor_flat_620x163.png&quot; height=&quot;168&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtYZm-7C8KH7YXmScsSoOhpw_hQywC7aB973m4GqtBzPd8v-fsmozOTEJ6hufa6JK1D5fU2CSehiEgSBQbfCy5i1f1dSGBjwrv_Wm6QJIlCyR1C1VDHEmt_zzE30Wx4sbjbk6DZgpre4Y/s1600/iPhone5_vendor_videoedit_620x429.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtYZm-7C8KH7YXmScsSoOhpw_hQywC7aB973m4GqtBzPd8v-fsmozOTEJ6hufa6JK1D5fU2CSehiEgSBQbfCy5i1f1dSGBjwrv_Wm6QJIlCyR1C1VDHEmt_zzE30Wx4sbjbk6DZgpre4Y/s1600/iPhone5_vendor_videoedit_620x429.png&quot; height=&quot;442&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihKGf2lFy1I60a8vwp6KIKZAnmf8IfBUAF1w5WUdbE_ay9uy_CC3_6tWbcU8Rm46LPk2swZoAjAApIgsvdhDS0dA_DZuP-dIJc6N4oAohyphenhyphenyZJUi0ul4fareDmlYJqDzt4GQgrlGrJo5gM/s1600/iPhone5_vendor_white_620x500.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEihKGf2lFy1I60a8vwp6KIKZAnmf8IfBUAF1w5WUdbE_ay9uy_CC3_6tWbcU8Rm46LPk2swZoAjAApIgsvdhDS0dA_DZuP-dIJc6N4oAohyphenhyphenyZJUi0ul4fareDmlYJqDzt4GQgrlGrJo5gM/s1600/iPhone5_vendor_white_620x500.png&quot; height=&quot;516&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH9gQKEMJD5HhL3GbJoql_Mc88VvQ7Ab7hG1PLMRCIVD0APzJj5_anacnLI-LLT2ADlNcLdqM0GHRBlGRp30M7gSzcZi3PRlHsDqrsGHwRjCd_xpcv9WIjbUg4OiaoxyDgFnzW8lHDoUI/s1600/iphone5_vendor_staggered_620x535.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH9gQKEMJD5HhL3GbJoql_Mc88VvQ7Ab7hG1PLMRCIVD0APzJj5_anacnLI-LLT2ADlNcLdqM0GHRBlGRp30M7gSzcZi3PRlHsDqrsGHwRjCd_xpcv9WIjbUg4OiaoxyDgFnzW8lHDoUI/s1600/iphone5_vendor_staggered_620x535.png&quot; height=&quot;552&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/7253037869959739519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/7253037869959739519' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/7253037869959739519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/7253037869959739519'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/09/awesome-photo-of-iphone-5.html' title='Awesome Photo of iPhone 5'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyGVK0PwnmM4MTBWUi6W4CTQ6ngNMzWWmwCrrwRJu4cpUp1SJLhvrc57eThO5c3Hqi6ishA9biFeTQ5fOJlsFw_DO_SzTfOC0lEKu-Skjb-6od5Lp_be88pkTghytzb1bQV6M0SZcy2HQ/s72-c/apple-iphone-5-review-0579_610x407.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-791806244133508508</id><published>2012-09-10T03:51:00.002-07:00</published><updated>2012-09-10T03:51:48.871-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="artikel"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>Top 10 Infamous Student Hackers Ever</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwYge5D5MHoFy952Y5mt748YupdrtZEqDQy6DTF2nRm_LHAUZLyQZF1oxNjqRhPU0Jg9hhlvCeHe3ulLSDHnHFgH_U565ndLyLm_LwIfhmuEv2N42X73ph2MzdlUloJ8kv98mRoPMVFQc/s1600/10studenthackers1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Top 10 Infamous Student Hackers Ever&quot; border=&quot;0&quot; height=&quot;323&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwYge5D5MHoFy952Y5mt748YupdrtZEqDQy6DTF2nRm_LHAUZLyQZF1oxNjqRhPU0Jg9hhlvCeHe3ulLSDHnHFgH_U565ndLyLm_LwIfhmuEv2N42X73ph2MzdlUloJ8kv98mRoPMVFQc/s640/10studenthackers1.jpg&quot; title=&quot;Top 10 Infamous Student Hackers Ever&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;1.) Sven Jaschan:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In the words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of a $250,000 bounty courtesy of Microsoft, for which some of his classmates turned him in.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;2.) Jonathan James:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;3.) Michael Calce:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages, according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;4.) Kevin Mitnick:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to steal proprietary source code from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;5.) Tim Berners-Lee:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
“Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to make his own computer out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be revered as the father of the Internet.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;6.) Neal Patrick and the 414s:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on the cover of Newsweek. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;7.) Robert T. Morris:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;8.) George Hotz:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;9.) Donncha O’Cearbhaill:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;10.) Nicholas Allegra:&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program JailbreakMe in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side, accepting an internship with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://thehackernews.com/2012/09/the-10-most-infamous-student-hackers-of.html?fb_action_ids=426214774103462%2C426207580770848&amp;amp;fb_action_types=og.likes&amp;amp;fb_source=other_multiline&amp;amp;action_object_map=%7B%22426214774103462%22%3A10150107455162653%2C%22426207580770848%22%3A438478179524177%7D&amp;amp;action_type_map=%7B%22426214774103462%22%3A%22og.likes%22%2C%22426207580770848%22%3A%22og.likes%22%7D&amp;amp;action_ref_map=[]&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;thehackernews.com&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/791806244133508508/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/791806244133508508' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/791806244133508508'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/791806244133508508'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/09/top-10-infamous-student-hackers-ever.html' title='Top 10 Infamous Student Hackers Ever'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwYge5D5MHoFy952Y5mt748YupdrtZEqDQy6DTF2nRm_LHAUZLyQZF1oxNjqRhPU0Jg9hhlvCeHe3ulLSDHnHFgH_U565ndLyLm_LwIfhmuEv2N42X73ph2MzdlUloJ8kv98mRoPMVFQc/s72-c/10studenthackers1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-7761359625688037621</id><published>2012-03-17T05:48:00.000-07:00</published><updated>2012-03-17T05:48:54.433-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antivirus"/><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="tool"/><title type='text'>Download Bitdefender Safebox 1.0</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuslnvI0BBgr9P__Zr_tugSf_ndJVB8W0UhCnQv526h5VbscdMtN342wHGUpxWOuf672txbDrh4LrzZO5zlcxgIuBHgZBan-Xy7DNs1z3PudS70JsYjxaEhD_9NCPHkDxrceWX3wRge9U/s1600/Bitdefender+Safebox+1.0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuslnvI0BBgr9P__Zr_tugSf_ndJVB8W0UhCnQv526h5VbscdMtN342wHGUpxWOuf672txbDrh4LrzZO5zlcxgIuBHgZBan-Xy7DNs1z3PudS70JsYjxaEhD_9NCPHkDxrceWX3wRge9U/s400/Bitdefender+Safebox+1.0.jpg&quot; title=&quot;Download Bitdefender Safebox 1.0&quot; width=&quot;275&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Bitdefender Safebox 1.0&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;These days, people work across a variety of different platforms: computers, mobile phones and tablets. Ensuring the latest version of your data travels with you can be tricky if you rely on manually copying it between devices, which is why so many of today’s cloud-based backup tools also work by synchronising data between supported devices.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Online backup solutions are ten-a-penny these days, which is why Bitdefender’s Safebox feels like it’s a little late to the party. It works on Windows and Android, with iPad and iPhone support coming shortly, and offers 2GB free online storage space, with paid-for solutions offering up to 60GB of online storage a year.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It’s simple enough to use: install the free app, sign up for a free account, log in and then start selecting which files you want to back up. Once selected, initial copies are uploaded to your secure online account – encrypted of course – ready for synchronising to other computers and devices (just sign in with the same account details, then choose what to sync), accessing via a web browser (log in at &lt;a href=&quot;https://my.bitdefender.com/en_us/safebox&quot; target=&quot;_blank&quot;&gt;https://my.bitdefender.com/en_us/safebox&lt;/a&gt;), or sharing securely with selected others, such as family and friends.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;It’s all very efficient – changes to files are immediately uploaded to the server, and you can easily restore previous versions of files simply by right-clicking the file in Windows itself. The user interface is simple and uncluttered and it does what it says on the tin.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Unfortunately, so do so many other online backup services, and there’s nothing here to make Bitdefender Safebox stand out from the crowd. Most other services offer the same sync, share and backup tools, encrypt your data, work across multiple platforms (including Mac) and offer free accounts – in the case of AVG LiveKive and SugarSync, you get 5GB, while the forthcoming Windows 8 will have Windows Live SkyDrive built right into the interface, which currently offers up to 25GB free storage, admittedly most of which is currently only accessible through your web browser.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;What Safebox does have going for it is simplicity, but it’s not enough on its own to make it the must-have cloud backup product, particularly if you’re already signed up with someone else. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;http://www.downloadcrew.com/article/27241-bitdefender_safebox&quot; target=&quot;_blank&quot;&gt;downloadcrew&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://download.bitdefender.com/safebox/windows/installer/en/bitdefender_safebox.exe&quot; target=&quot;_blank&quot;&gt;Download Bitdefender Safebox 1.0 for Windows&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.bitdefender.safebox&quot; target=&quot;_blank&quot;&gt;Download&amp;nbsp;Bitdefender Safebox 1.0 for Android&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/7761359625688037621/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/7761359625688037621' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/7761359625688037621'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/7761359625688037621'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/03/download-bitdefender-safebox-10.html' title='Download Bitdefender Safebox 1.0'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuslnvI0BBgr9P__Zr_tugSf_ndJVB8W0UhCnQv526h5VbscdMtN342wHGUpxWOuf672txbDrh4LrzZO5zlcxgIuBHgZBan-Xy7DNs1z3PudS70JsYjxaEhD_9NCPHkDxrceWX3wRge9U/s72-c/Bitdefender+Safebox+1.0.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-4095291459772975475</id><published>2012-03-03T06:35:00.002-08:00</published><updated>2012-03-03T06:37:57.572-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Trik"/><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><title type='text'>How To Install Windows 8</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;300&quot; src=&quot;http://www.youtube.com/embed/jDYQmQ-phX8?feature=player_embedded&quot; width=&quot;550&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;b&gt;How To Install Windows 8&lt;/b&gt; - I spent almost the entire day playing around with Windows 8 and finally installed it on all the&amp;nbsp;&lt;a href=&quot;http://www.labnol.org/setup/&quot; target=&quot;_blank&quot;&gt;three machines&lt;/a&gt; that I have – two of them were previously running Windows 7 while the third one is an iMac running Mac OS X Lion. Everything just worked without any issues.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The first Windows machine is sort of test machine and I therefore installed Windows 8 as the primary OS on that machine overwriting Windows 7. All my previous files, Windows settings and programs were preserved and it was quite an effortless installation.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The second Windows machine is my primary computer, the one that I am using to write this story inside Windows Live Writer, and I therefore installed Windows 8 on another partition (dual-boot setup). Thus my existing Windows 7 installation is not modified in any way while I can switch to Windows 8 anytime with a simple restart.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In the case of iMac, I created a new NTFS partition and installed Windows 8 using Boot Camp. The metro tiles of Windows 8 on the 27” iMac look absolutely gorgeous and the Apple keyboard and Magic Mouse also work inside Windows 8.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Finally, I installed Windows 8 as a Virtual Machine inside Windows 8 itself just for the purpose of recording the &lt;a href=&quot;http://www.youtube.com/watch?v=lJf35OpHEuw&quot; target=&quot;_blank&quot;&gt;Windows 8 installation procedure&lt;/a&gt;.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Windows 8 Installation Guides&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If you haven’t tried Windows 8 yet, you should consider doing that now because Windows 8 looks fresh, beautiful and definitely brings that “wow” effect. It’s a beta version but after using it for about a day, I found it stable though the new UI might involve a bit of learning curve.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The best part is that setting up Windows 8 is extremely easy and the installation procedure won’t take more than 15-20 minutes. Should you be interested, I have written several detailed guides that will walk you through the installation steps in either of the above scenarios – pick one that best fits your workflow and get going.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.labnol.org/software/install-windows-8-as-virtual-machine/20919/&quot; target=&quot;_blank&quot;&gt;How to Install Windows 8 as a Virtual Machine&lt;/a&gt; (using Oracle’s VirtualBox)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.labnol.org/software/install-windows-8-as-virtual-machine/20919/&quot; target=&quot;_blank&quot;&gt;How to Install Windows 8 on a Mac&lt;/a&gt; (using Apple’s Boot Camp)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.labnol.org/software/install-windows-8-as-virtual-machine/20919/&quot; target=&quot;_blank&quot;&gt;How to Install Windows 8 alongside an older version of Windows&lt;/a&gt; (Dual boot)&lt;/li&gt;
&lt;li&gt;&lt;a href=&quot;http://www.labnol.org/software/install-windows-8-as-virtual-machine/20919/&quot; style=&quot;text-align: left;&quot; target=&quot;_blank&quot;&gt;How to Upgrade your Computer to Windows 8&lt;/a&gt;&lt;span style=&quot;text-align: left;&quot;&gt; (Overwrite mode)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;ul&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSXPreGqjl46_p4B8VDlq8zSVdCevC1OFNWV95RPCPYooSGkbIoGAkTXBmbRRWkiKBb4wk4SVwv-wdIB0gegW5ZgAOBIsclBWwDCS_LJ_2oMAeuyNzmLYXoQX9Epes8idQiGOrXROcjVA/s1600/windows_8.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;78&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSXPreGqjl46_p4B8VDlq8zSVdCevC1OFNWV95RPCPYooSGkbIoGAkTXBmbRRWkiKBb4wk4SVwv-wdIB0gegW5ZgAOBIsclBWwDCS_LJ_2oMAeuyNzmLYXoQX9Epes8idQiGOrXROcjVA/s400/windows_8.png&quot; title=&quot;How To Install Windows 8&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;How To Install Windows 8&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;i&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Windows 8 Installation Guides&amp;nbsp;&lt;/span&gt;|&amp;nbsp;&lt;a href=&quot;http://www.labnol.org/software/windows-8-installation-guides/20940/&quot; target=&quot;_blank&quot;&gt;labnol&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/4095291459772975475/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/4095291459772975475' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4095291459772975475'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4095291459772975475'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/03/how-to-install-windows-8.html' title='How To Install Windows 8'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/jDYQmQ-phX8/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3253147490343526263</id><published>2012-02-17T04:31:00.000-08:00</published><updated>2012-02-17T04:31:09.836-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="tool"/><title type='text'>Nessus 5.0 Vulnerability Scanner Releases</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieiWUzgJR1b0W_O3brYxIHJ3EAG6vBD1Y32aBI2lTf6pAF9MJ5mY3Yd0kfnMR3BfHicsWfoqHvobq0gGCa4UuskeOyyZK2TbEAdsLqJ5GOtuzrOwSkt9ymIJsJ3oj1XdAPXpoTeY7-6_M/s1600/Nessus+5.0.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;262&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieiWUzgJR1b0W_O3brYxIHJ3EAG6vBD1Y32aBI2lTf6pAF9MJ5mY3Yd0kfnMR3BfHicsWfoqHvobq0gGCa4UuskeOyyZK2TbEAdsLqJ5GOtuzrOwSkt9ymIJsJ3oj1XdAPXpoTeY7-6_M/s400/Nessus+5.0.png&quot; title=&quot;Nessus 5.0 Vulnerability Scanner&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Nessus 5.0 Vulnerability Scanner&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Tenable Network Security&lt;/b&gt; announced Nessus 5.0 vulnerability and configuration assessment solution for enterprises and security professionals. Nessus version 5.0 introduces key features and improvements, separated into the four major phases of the vulnerability scanning process:&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Installation and management (for enhanced usability)&lt;/b&gt; - Nessus 5.0 simplifies the installation and configuration for non-technical users. Configuration and management: Nessus v5.0 configuration and management is now done 100% through the GUI&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Scan policy creation and design (for improved effectiveness)&lt;/b&gt; - Users now enjoy improved effectiveness when creating scan policies. Over two dozen new pre-built plugin filters make it easy for security and compliance professionals to simplify policy creation for laser-focused scans on the areas that matter most. Users can quickly select multiple filter criteria, such as, Vulnerability Publication Date, public vulnerability database ID (OSVDB, Bugtraq, CERT Advisory, and Secunia), Plugin type (local or remote), information assurance vulnerability alert (IAVA), and more, to quickly identify easily-exploitable vulnerabilities.Scan for all easily remotely-exploitable vulnerabilities for which there is an exploit published in your favorite exploit framework.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Scan execution (for improved efficiency) &lt;/b&gt;- Users can take advantage of real-time scan results, on-the-fly filtering and sorting, and streamlined results navigation. A new vulnerability summary and redesigned host summary make it easy to see risk level without even running a report. As the scan is being run, not only can you see the results as they are being gathered, but navigate and filter on them as well. This allows you to easily act upon the vulnerability data while the scan is happening.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Report customization and creation (for improved communication with all parts of the organization)&lt;/b&gt; - New reporting features allow for improved communication of vulnerability results with all parts of the organization:Results filtering and report creation: Results filtering and report creation is more flexible than ever before. Users can apply multiple result filtering criteria, and targeted reports can be generated against the filtered results. Reports can be generated in native Nessus formats, HTML, and now PDF formats, Multiple report templates can be combined into one report.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://static.tenable.com/documentation/nessus_5.0_installation_guide.pdf&quot; target=&quot;_blank&quot; title=&quot;Nessus 5.0 Installation Guide&quot;&gt;Nessus 5.0 Installation Guide&lt;/a&gt; and &lt;a href=&quot;http://www.nessus.org/products/nessus/nessus-download-agreement&quot; target=&quot;_blank&quot; title=&quot;Download Nessus 5.0&quot;&gt;Download Nessus 5.0&lt;/a&gt;&lt;/b&gt;&amp;nbsp;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;via |&amp;nbsp;&lt;a href=&quot;http://thehackernews.com/2012/02/tenable-release-nessus-50-vulnerability.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+thehackernews%2FVNvf+%28THN+%3A+The+Hacker+News%29&quot; target=&quot;_blank&quot;&gt;thehackernews&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3253147490343526263/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3253147490343526263' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3253147490343526263'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3253147490343526263'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/02/nessus-50-vulnerability-scanner.html' title='Nessus 5.0 Vulnerability Scanner Releases'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieiWUzgJR1b0W_O3brYxIHJ3EAG6vBD1Y32aBI2lTf6pAF9MJ5mY3Yd0kfnMR3BfHicsWfoqHvobq0gGCa4UuskeOyyZK2TbEAdsLqJ5GOtuzrOwSkt9ymIJsJ3oj1XdAPXpoTeY7-6_M/s72-c/Nessus+5.0.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-4115661838237488773</id><published>2012-02-17T04:23:00.002-08:00</published><updated>2012-02-17T04:23:24.501-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><category scheme="http://www.blogger.com/atom/ns#" term="tool"/><title type='text'>xSQL Scanner, Advanced SQL Audit Tool</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;xSQL Scanner&lt;/b&gt; is a advanced SQL audit tool that allows users to find weak passwords and vulnerabilities on MS-SQL and MySQL database servers.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The objective of xSQLScanner is to assist the Security Analyst or Penetration Tester in auditing the security of MS-SQL and MySQL database servers.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCdRxqRjIC-4gUpMszTXhlF9KK7WM7d6YVwxnMlY6Qciz2pMdG_wgzDRMsNcEeruSNcTmWFFrndmE6ojFPhjOn7m4CYRSIlfmkluX-2gGy3YMCpeMpxM8Ju5RTBXcV_GiC0FC7Lnr7hDE/s1600/xSQL+Scanner.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCdRxqRjIC-4gUpMszTXhlF9KK7WM7d6YVwxnMlY6Qciz2pMdG_wgzDRMsNcEeruSNcTmWFFrndmE6ojFPhjOn7m4CYRSIlfmkluX-2gGy3YMCpeMpxM8Ju5RTBXcV_GiC0FC7Lnr7hDE/s1600/xSQL+Scanner.jpg&quot; title=&quot;xSQL Scanner, Advanced SQL Audit Tool&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;xSQL Scanner, Advanced SQL Audit Tool&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Features :&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;ul&gt;
&lt;li&gt;Test for weak password fast;&lt;/li&gt;
&lt;li&gt;Test for wear/user passwords;&lt;/li&gt;
&lt;li&gt;Wordlist option;&lt;/li&gt;
&lt;li&gt;Userlist option;&lt;/li&gt;
&lt;li&gt;Portscanner&lt;/li&gt;
&lt;li&gt;Range IP Address audit and more.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Windows – &lt;a href=&quot;http://www.4shared.com/file/9evD9RTY/xsqlscanner-12.html&quot;&gt;xsqlscanner-1.2.zip&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Linux – &lt;a href=&quot;http://www.4shared.com/file/ykeEX3TV/xsqlscan-mono.html&quot;&gt;xsqlscan-mono.tgz&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;Or read more &lt;a href=&quot;http://atrixteam.blogspot.com/&quot;&gt;here&lt;/a&gt;. via |&amp;nbsp;&lt;a href=&quot;http://www.darknet.org.uk/2012/02/xsqlscanner-database-password-cracker-security-audit-tool-for-ms-sql-mysql/&quot; target=&quot;_blank&quot;&gt;darknet&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/4115661838237488773/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/4115661838237488773' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4115661838237488773'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4115661838237488773'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/02/xsql-scanner-advanced-sql-audit-tool.html' title='xSQL Scanner, Advanced SQL Audit Tool'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCdRxqRjIC-4gUpMszTXhlF9KK7WM7d6YVwxnMlY6Qciz2pMdG_wgzDRMsNcEeruSNcTmWFFrndmE6ojFPhjOn7m4CYRSIlfmkluX-2gGy3YMCpeMpxM8Ju5RTBXcV_GiC0FC7Lnr7hDE/s72-c/xSQL+Scanner.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-561121556556304319</id><published>2012-02-04T09:17:00.000-08:00</published><updated>2012-02-04T09:17:54.489-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="firefox"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>Download Firefox 11 Beta</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlO6lkEYyKFcNXQY7e-WJhP678kfzmtMQfIRhL37s0ACwZIsg8UdnsVfROR4rCPmxV3XwvyaxSdK4wcELC329SrF150qOVHbjU2FRDNUjIi6JnJ2NxgU_zuqjiPN-GX1kLvVDr8rFSaVs/s1600/firefox+11+beta.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;287&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlO6lkEYyKFcNXQY7e-WJhP678kfzmtMQfIRhL37s0ACwZIsg8UdnsVfROR4rCPmxV3XwvyaxSdK4wcELC329SrF150qOVHbjU2FRDNUjIi6JnJ2NxgU_zuqjiPN-GX1kLvVDr8rFSaVs/s400/firefox+11+beta.jpg&quot; width=&quot;400&quot; title=&quot;Firefox 11 Beta&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Firefox 11 Beta&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Firefox Beta is the build for those who like a little bit of jeopardy, but who don’t want to risk everything by trying out Firefox Aurora, the early alpha build of Firefox. Firefox Beta gives you a sneak peek at the next version of Firefox six weeks ahead of its final release, offering a relatively stable build that’s not quite ready for primetime, but still pretty solid.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Whereas Firefox Aurora installs as a completely separate application alongside your existing Firefox installation, Firebox Beta will replace the stable build. Should you subsequently wish to go back to the safer version, you’ll need to manually download the stable version and install it over the top of the beta build.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Confirm which build you have by selecting About Firefox from the Firefox menu or button (it’s inside the Help menu if using the Firefox button).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There’s not an awful lot to get excited about with Firefox 11 Beta. Firefox Sync now tentatively supports synchronising add-ons in addition to all your other settings – you’ll see Add-ons appear as an additional option when choosing exactly what to sync from the Firefox Sync Setup menu.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Support for importing data from Chrome has also been partially implemented in the form of cookies, history and bookmarks – you’ll see the option appear when you open the Bookmarks Library and choose Import and Backup &amp;gt; Import Data from another Browser.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Developers will also welcome the addition of two new tools in addition to the raft of extras first introduced in Firefox 9 – these are a Style Editor for tweaking CSS settings on the fly, and a new 3D view (Tilt) for Page Inspector. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;via&amp;nbsp;&lt;a href=&quot;http://www.downloadcrew.com/article/25727-firefox_beta&quot; target=&quot;_blank&quot;&gt;downloadcrew&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://pv-mirror02.mozilla.org/pub/mozilla.org/firefox/releases/11.0b1/win32/en-US/Firefox%20Setup%2011.0b1.exe&quot; target=&quot;_blank&quot; title=&quot;Download Firefox 11 Beta for Windows&quot; &gt;Download Firefox 11 Beta for Windows&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://pv-mirror02.mozilla.org/pub/mozilla.org/firefox/releases/11.0b1/linux-i686/en-US/firefox-11.0b1.tar.bz2&quot; target=&quot;_blank&quot; title=&quot;Download Firefox 11 Beta for Linux&quot; &gt;Download Firefox 11 Beta for Linux&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://pv-mirror01.mozilla.org/pub/mozilla.org/firefox/releases/11.0b1/mac/en-US/Firefox%2011.0b1.dmg&quot; target=&quot;_blank&quot; title=&quot;Download Firefox 11 Beta for Mac&quot; &gt;Download Firefox 11 Beta for Mac&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/561121556556304319/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/561121556556304319' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/561121556556304319'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/561121556556304319'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/02/download-firefox-11-beta.html' title='Download Firefox 11 Beta'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlO6lkEYyKFcNXQY7e-WJhP678kfzmtMQfIRhL37s0ACwZIsg8UdnsVfROR4rCPmxV3XwvyaxSdK4wcELC329SrF150qOVHbjU2FRDNUjIi6JnJ2NxgU_zuqjiPN-GX1kLvVDr8rFSaVs/s72-c/firefox+11+beta.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-5073767838858772232</id><published>2012-01-20T00:16:00.000-08:00</published><updated>2012-01-20T00:16:10.445-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerable"/><category scheme="http://www.blogger.com/atom/ns#" term="wordpress"/><title type='text'>Wordpress Plugin Easy Comment Uploads Vulnerability</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;&lt;a href=&quot;http://culturecyber.blogspot.com/search/label/wordpress&quot; target=&quot;_blank&quot;&gt;Wordpress&lt;/a&gt; &lt;/b&gt;as you might know is one of the most widely used &lt;a href=&quot;http://culturecyber.blogspot.com/search/label/bloging&quot; target=&quot;_blank&quot;&gt;blogging&lt;/a&gt; platforms, As a reason of which it has became the favorite target of hackers. Wordpress itself is quite secure, however the plugins make it unsecure resulting in hack attacks, data loss etc, when they are created the developers do not think of the security or do not know how to write the secure code, hence skipping lots of necessary checks making the plugins vulnerable to attacks like &lt;i&gt;SQLInjetion, Remote File inclusion etc&lt;/i&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
One of those popular vulnerable plugin is &lt;b&gt;Easy Comment Upload plugin&lt;/b&gt;, The version 0.61 and prior versions are affected with Arbitrary File Upload Vulnerability. The plugin fails to check the upload file type as a reason of which it can be exploited by uploading a Phtml file.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiAtqBUrWuMak58l4_-p-JvSVXA_lfWKR58GKvE4si_RomLGsfTKbSsFueS0cjgjVEjQC5jcN-cP-d8OmnNEhLEyYyJJmlvX-SVeKW9QyxoUdI5-QelZlxaN4KJnAvZGKmvX_ATBPkVt0/s1600/Easy+Comment+Upload+plugin.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; comment=&quot;&quot; height=&quot;305&quot; plugin&quot;=&quot;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiAtqBUrWuMak58l4_-p-JvSVXA_lfWKR58GKvE4si_RomLGsfTKbSsFueS0cjgjVEjQC5jcN-cP-d8OmnNEhLEyYyJJmlvX-SVeKW9QyxoUdI5-QelZlxaN4KJnAvZGKmvX_ATBPkVt0/s400/Easy+Comment+Upload+plugin.png&quot; title=&quot;Easy Comment Upload plugin&quot; upload=&quot;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Easy Comment Upload plugin&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZ4nfTB7frb6gza0CR4z3Stv7k0C88B88vjpriqSCBD94BOZA01lbfUjgJmF3jLBt1Jl4-j0rGIaEWWXLV1fYEB9Q2K49JyfOnc_2MkALzeOxXRLebKvffOX1GsB0XWn2bXeRAHdN_QQ/s1600/wordpress+easy+comments+plugin.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;245&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZ4nfTB7frb6gza0CR4z3Stv7k0C88B88vjpriqSCBD94BOZA01lbfUjgJmF3jLBt1Jl4-j0rGIaEWWXLV1fYEB9Q2K49JyfOnc_2MkALzeOxXRLebKvffOX1GsB0XWn2bXeRAHdN_QQ/s400/wordpress+easy+comments+plugin.png&quot; title=&quot;Wordpress Plugin Easy Comment Uploads Vulnerability&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Wordpress Plugin Easy Comment Uploads Vulnerability&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There are thousands of wordpress blogs still vulnerable to this attack. The vulnerability can be &lt;b&gt;fixed by updating the wordpress easy comments plugin to version 0.71.&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If you want to know more about Protecting your wordpress blog from hackers you can refer the following posts, If you still think your blog is vulnerable drop me an email and I will perform a security assessment on your blog. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;via |&amp;nbsp;&lt;a href=&quot;http://www.rafayhackingarticles.net/2012/01/wordpress-plugin-easy-comment-uploads.html&quot; target=&quot;_blank&quot;&gt;rafayhackingarticles&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/5073767838858772232/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/5073767838858772232' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5073767838858772232'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5073767838858772232'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/01/wordpress-plugin-easy-comment-uploads.html' title='Wordpress Plugin Easy Comment Uploads Vulnerability'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjiAtqBUrWuMak58l4_-p-JvSVXA_lfWKR58GKvE4si_RomLGsfTKbSsFueS0cjgjVEjQC5jcN-cP-d8OmnNEhLEyYyJJmlvX-SVeKW9QyxoUdI5-QelZlxaN4KJnAvZGKmvX_ATBPkVt0/s72-c/Easy+Comment+Upload+plugin.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3337076536412018311</id><published>2012-01-07T07:11:00.000-08:00</published><updated>2012-01-07T07:11:31.178-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><category scheme="http://www.blogger.com/atom/ns#" term="desain grafis"/><category scheme="http://www.blogger.com/atom/ns#" term="firefox"/><title type='text'>Mozilla Seeks Designers</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK8yqWfTG-Hn-jHYO8nqU1FAmYeo9ANfvWH5Fx19hK_p6g1MLg4iNoiRiE8YPME9IoC7RMqO5_cAqnSRTNLBb1T_FSMTIg-5M2POgR6fB3lUhhfMitLbOd6O6sM8sRRX1UInJTJjoEoP4/s1600/Open-Badges.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK8yqWfTG-Hn-jHYO8nqU1FAmYeo9ANfvWH5Fx19hK_p6g1MLg4iNoiRiE8YPME9IoC7RMqO5_cAqnSRTNLBb1T_FSMTIg-5M2POgR6fB3lUhhfMitLbOd6O6sM8sRRX1UInJTJjoEoP4/s400/Open-Badges.jpg&quot; title=&quot;Badges for Learning competition&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot;&gt;Badges for Learning&amp;nbsp;competition&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Design digital badges for NASA, Intel, Disney-Pixar, the U.S. Department of Education and other leading organizations in the “&lt;a href=&quot;http://www.dmlcompetition.net/Competition/4/badges-competition-cfp.php&quot;&gt;Badges for Learning&lt;/a&gt;” competition. Deadline for entries is January 17.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Help the world level up with NASA, the MacArthur Foundation and Mozilla.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Mozilla is seeking designers and developers to participate in the $2 million “&lt;a href=&quot;http://www.dmlcompetition.net/Competition/4/badges-competition-cfp.php&quot;&gt;Badges for Learning&lt;/a&gt;” competition. Participants will have the chance to design digital badges for more than &lt;a href=&quot;http://www.dmlcompetition.net/Competition/4/winning-projects.php?group=dmlc-4b&quot;&gt;60 different leading organizations&lt;/a&gt;, all aimed at providing recognition for learning that happens on the web or outside of school.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Winners will receive funding from the MacArthur Foundation to make their designs a reality, plus the opportunity to collaborate with Mozilla and other leading organizations in education, industry and government.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The goal: supercharge 21st century learning by building a free, open source badge system that helps people around the world use the Web to gain new skills and level up in their life and work.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Learn more or get involved &lt;a href=&quot;http://openmatt.wordpress.com/2012/01/05/badges-competition/&quot;&gt;here&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3337076536412018311/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3337076536412018311' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3337076536412018311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3337076536412018311'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2012/01/mozilla-seeks-designers.html' title='Mozilla Seeks Designers'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK8yqWfTG-Hn-jHYO8nqU1FAmYeo9ANfvWH5Fx19hK_p6g1MLg4iNoiRiE8YPME9IoC7RMqO5_cAqnSRTNLBb1T_FSMTIg-5M2POgR6fB3lUhhfMitLbOd6O6sM8sRRX1UInJTJjoEoP4/s72-c/Open-Badges.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3179280961989413537</id><published>2011-12-31T06:13:00.000-08:00</published><updated>2011-12-31T06:13:24.494-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><title type='text'>Predictions for Google 2012</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Fag-VTgeEd2kRPibrKb4MJsovDu2th6lt7sbOOgsiYEloC-sMofWQVNIN-54LBFnybN0wp79IJw0VEy-6WW4-XqN5HupvQbeiRgn5a3QEl3J34esUeNJp5SZF4rMocLRl2oyH4DRY_E/s1600/happy-new-year-2012-images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Fag-VTgeEd2kRPibrKb4MJsovDu2th6lt7sbOOgsiYEloC-sMofWQVNIN-54LBFnybN0wp79IJw0VEy-6WW4-XqN5HupvQbeiRgn5a3QEl3J34esUeNJp5SZF4rMocLRl2oyH4DRY_E/s400/happy-new-year-2012-images.jpg&quot; title=&quot;Predictions for Google 2012&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Predictions for Google 2012&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Last year&#39;s predictions weren&#39;t that great (the predictions for 2010 were better), but predicting the future is an addictive game, so I&#39;ll try again. Here are my predictions for 2012:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
1. Oflline Google stores that will sell Chromebooks, Android phones, Google TV boxes, Google-branded shirts and more.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
2. Google Music will become a subscription service.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
3. Google will focus on improving the quality of Android apps. It will offer better tools for creating consistent user interfaces, it will review some of the new apps and applications will be able to request additional permissions after they&#39;ve been installed.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
4. Google Games - a new service for multiplayer games that will combine the best games for Chrome, Android and Google+, while syncing your data, ranking users and allowing you to challenge your friends.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
5. A new music editing online service that will only work in Chrome (and probably other Chrome-only services).&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
6. ARM Chromebooks (notebooks and tablets) and ARM Google TV boxes will be cheaper and more successful.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
7. Google+ will have at least 300 million users at the end of 2012 and will incorporate many existing Google apps. Google will aggressively promote the service and will even integrate it with Chrome.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
8. Google Instant Answers - an improved OneBox that will offer some of the detailed answers that are available in Wolfram Alpha.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
9. A virtual assistant for Android that will be more powerful than Siri and it will also be available in the desktop Google interface as an upgrade for voice search. Google will get better at supporting natural language queries.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
10. Google&#39;s navigation menu will be customizable and the notification box will support new services.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
11. The first Google-branded Motorola phones and tablets.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
12. Google search results personalized based on information from your calendar, Google+ posts, the apps you install etc.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
13. Google Doodle Creator - a service that lets you create a doodle and share it with your friends.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
14. Image Search will be able to analyze images and recognize multiple objects and people.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
15. Chrome Web Store apps and extensions for Android.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
16. YouTube&#39;s HTML5 player will become the default player.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
17. YouTube&#39;s new TV-like channels will combine some of the best videos that are available.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
18. The largest fine in Google&#39;s history.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
19. Blog commenting service powered by Google+.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
20. Google+ Answers service replaces Aardvark.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
21. An online Chrome dashboard will let you access your data (bookmarks, passwords, apps) even when you don&#39;t use Chrome.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
22. Better Google Docs for tablets, Google Drive - a new name for the Google Docs list, apps for syncing files and more free storage.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;source :&amp;nbsp;&lt;a href=&quot;http://googlesystem.blogspot.com/2011/12/predictions-for-googles-2012.html&quot; target=&quot;_blank&quot;&gt;googlesystem&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3179280961989413537/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3179280961989413537' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3179280961989413537'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3179280961989413537'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/12/predictions-for-google-2012.html' title='Predictions for Google 2012'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0Fag-VTgeEd2kRPibrKb4MJsovDu2th6lt7sbOOgsiYEloC-sMofWQVNIN-54LBFnybN0wp79IJw0VEy-6WW4-XqN5HupvQbeiRgn5a3QEl3J34esUeNJp5SZF4rMocLRl2oyH4DRY_E/s72-c/happy-new-year-2012-images.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-2978934125677562669</id><published>2011-12-06T05:34:00.001-08:00</published><updated>2011-12-06T05:39:48.272-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><category scheme="http://www.blogger.com/atom/ns#" term="google"/><category scheme="http://www.blogger.com/atom/ns#" term="hacking"/><category scheme="http://www.blogger.com/atom/ns#" term="vulnerable"/><category scheme="http://www.blogger.com/atom/ns#" term="youtube"/><title type='text'>DNS Cache Poisoning Attack on Google, Yahoo, Apple</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrvVCpeVa6MwufS3pt-ZvW1dXFbWv8wDpqpLEPxztdmOZluTcZtYMQhtDAP8uOXzFzK8cxXDtUStRU_-bW4Fa-m9ajrMVjXgUfQJCL5sfAEHfif1E_WZEO6L9t_jW8nfgM-u8tKsPYAFY/s1600/DNS+cache+poisoning.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;321&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrvVCpeVa6MwufS3pt-ZvW1dXFbWv8wDpqpLEPxztdmOZluTcZtYMQhtDAP8uOXzFzK8cxXDtUStRU_-bW4Fa-m9ajrMVjXgUfQJCL5sfAEHfif1E_WZEO6L9t_jW8nfgM-u8tKsPYAFY/s400/DNS+cache+poisoning.jpg&quot; title=&quot;DNS Cache Poisoning Attack on Google, Yahoo, Apple&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;DNS Cache Poisoning Attack on Google, &amp;nbsp;Yahoo, Apple&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Hacker with nickname AlpHaNiX deface Google, Gmail, Youtube, Yahoo, Apple etc domains of Democratic Republic of Congo. Hacker use strategy so-called DNS cache poisoning.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
DNS cache poisoning is a security or data integrity compromise in the Domain Name System (DNS). The compromise occurs when data is introduced into a DNS name server&#39;s cache database that did not originate from authoritative DNS sources. It may be a deliberate attempt of a maliciously crafted attack on a name server.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_PtPVfnragm6eMAqSiuKyN0t8eckmJYz8WyCjRB8kZK8emVPSOuj81rM5yTtS4Ec9fk_WmVcts_zTBTsemqaaKHbNl0OQUbqFiRSXKoKH8H84wIHtCnZ3nkp2c1l1qMSTf91jH8KyKOo/s1600/DNS+cache+poisoning+attack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_PtPVfnragm6eMAqSiuKyN0t8eckmJYz8WyCjRB8kZK8emVPSOuj81rM5yTtS4Ec9fk_WmVcts_zTBTsemqaaKHbNl0OQUbqFiRSXKoKH8H84wIHtCnZ3nkp2c1l1qMSTf91jH8KyKOo/s400/DNS+cache+poisoning+attack.jpg&quot; title=&quot;DNS Cache Poisoning Attack&quot; width=&quot;238&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;DNS Cache Poisoning Attack
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Hacked websites are :&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;http://apple.cd/&lt;/li&gt;
&lt;li&gt;http://yahoo.cd/&lt;/li&gt;
&lt;li&gt;http://gmail.cd/&lt;/li&gt;
&lt;li&gt;http://google.cd/&lt;/li&gt;
&lt;li&gt;http://youtube.cd/&lt;/li&gt;
&lt;li&gt;http://linux.cd/&lt;/li&gt;
&lt;li&gt;http://samsung.cd/&lt;/li&gt;
&lt;li&gt;http://hotmail.cd/&lt;/li&gt;
&lt;li&gt;http://microsoft.cd/&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://security.web-center.si/?p=161&quot;&gt;&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;Source&lt;/span&gt;&lt;/i&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/2978934125677562669/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/2978934125677562669' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/2978934125677562669'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/2978934125677562669'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/12/dns-cache-poisoning-attack-on-google.html' title='DNS Cache Poisoning Attack on Google, Yahoo, Apple'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrvVCpeVa6MwufS3pt-ZvW1dXFbWv8wDpqpLEPxztdmOZluTcZtYMQhtDAP8uOXzFzK8cxXDtUStRU_-bW4Fa-m9ajrMVjXgUfQJCL5sfAEHfif1E_WZEO6L9t_jW8nfgM-u8tKsPYAFY/s72-c/DNS+cache+poisoning.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-5860140175372241616</id><published>2011-12-05T05:20:00.000-08:00</published><updated>2011-12-05T05:20:16.453-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphones"/><category scheme="http://www.blogger.com/atom/ns#" term="software"/><title type='text'>Bitdefender Carrier IQ Detector</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The deeply integrated Carrier IQ software on mobile devices has made the rounds lately. Check out this &lt;a href=&quot;http://culturecyber.blogspot.com/2011/12/carrier-iq-your-android-might-record.html&quot; target=&quot;_blank&quot;&gt;introductory post&lt;/a&gt; for detailed information about Carrier IQ. The technology has recently been discovered on &lt;a href=&quot;http://www.ghacks.net/2011/12/04/bitdefender-carrier-iq-finder/#&quot;&gt;Android&lt;/a&gt; and Apple smartphones in a way that the discoverer called rootkit-like. Users have a hard time finding out if Carrier IQ is running on their phone, and virtually no possibility of finding out which data it collects or transfers. To top it all off, there is no native option to disable Carrier IQ from running on the phone.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;If you are like me, you’d probably want to know if a program that can virtually access all data on the phone is running on it and with which server and companies it communicates.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Bitdefender Carrier IQ Finder is a new program for Android mobile phones by Bitdefender that can be used to find out if the technology is running on a phone.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Android users need to download the application from Android Market where it is available for free. The app has been designed to detect Carrier IQ on Android phones. It cannot remove the technology nor detect or remove malicious software from the phone.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Android users can point their browsers to the Bitdefender carrier IQ Finder market place &lt;a href=&quot;https://market.android.com/details?id=com.bitdefender.ciqfinder&quot;&gt;listing&lt;/a&gt;&amp;nbsp;to install the program directly from there. It is necessary to be logged in a Google account to install the app.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;The app will search for traces of Carrier IQ on the phone on start up.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: justify;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixXrdxCQqYLhJl7jxEtf7GLIKjcAhI5YrmE8sgB6yeGn8V7xWZj9MBrCkzuxlcvEiolEOMDzMP4O4FixaUl6WdquacNhznQ3G5bOH-OZmJF3ji16gXd_NlVGx2b544nvtnyL1u7x3-ops/s1600/carrier-iq-detector.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixXrdxCQqYLhJl7jxEtf7GLIKjcAhI5YrmE8sgB6yeGn8V7xWZj9MBrCkzuxlcvEiolEOMDzMP4O4FixaUl6WdquacNhznQ3G5bOH-OZmJF3ji16gXd_NlVGx2b544nvtnyL1u7x3-ops/s1600/carrier-iq-detector.jpg&quot; title=&quot;Bitdefender Carrier IQ Detector&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Bitdefender Carrier IQ Detector&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;A red screen after the scan indicates that Carrier IQ has been found running on the system, a green screen that the technology has not been found on the smartphone.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;What can you do if Carrier IQ has been found on your phone? It may be virtually impossible to remove the technology completely from the phone. You could contact your carrier for additional information about the technology. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;(&lt;a href=&quot;http://techdows.com/2011/12/bitdefender-carrier-iq-finder-detects-carrier-iq-tracking-package-on-your-smartphone.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+Techdows+%28techdows%29&quot;&gt;via&lt;/a&gt;)&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/5860140175372241616/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/5860140175372241616' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5860140175372241616'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5860140175372241616'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/12/bitdefender-carrier-iq-detector.html' title='Bitdefender Carrier IQ Detector'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixXrdxCQqYLhJl7jxEtf7GLIKjcAhI5YrmE8sgB6yeGn8V7xWZj9MBrCkzuxlcvEiolEOMDzMP4O4FixaUl6WdquacNhznQ3G5bOH-OZmJF3ji16gXd_NlVGx2b544nvtnyL1u7x3-ops/s72-c/carrier-iq-detector.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-6927106707078324033</id><published>2011-12-05T05:15:00.000-08:00</published><updated>2011-12-05T05:15:05.066-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="android"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphones"/><title type='text'>Carrier IQ, Your Android Might Record Your Activities</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;If you have never heard about Carrier IQ before you can rest assured that you are not the only one. Security researcher Trevor Eckhart published a research paper on Carrier IQ, a software that he discovered running on his HTC Android device, in mid November. Lets start at the beginning, and with a simple question: What is Carrier IQ.&lt;br /&gt;
&lt;br /&gt;
Carrier IQ is a software that runs on more than 140 million mobile phones (according to information on the &lt;a href=&quot;http://www.carrieriq.com/&quot;&gt;Carrier IQ&lt;/a&gt; website). It is a monitoring software that can track user activities and data, including their personal information, locations, network communications, phone calls, messages and a lot more.&lt;br /&gt;
&lt;br /&gt;
A few aspects make the software especially suspicious from a consumer perspective. Carrier IQ is not listed as a running application on the phone. The software furthermore cannot be stopped or deactivated on standard phones.&lt;br /&gt;
&lt;br /&gt;
The Carrier IQ company stated that the Carrier IQ software “delivers Mobile Intelligence on the performance of mobile devices and networks to assist operators and device manufacturers in delivering high quality products and services to their customers”.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How can you find out if Carrier IQ is running on your phone?&lt;/b&gt;&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;&lt;br /&gt;
It’s almost impossible for users to find off switches, user interfaces, policies, or references to IQRD anywhere on the phone. Using standard functionality, the only place you can see that the application is installed on the phone is in Menu -&amp;gt; Settings -&amp;gt; Manage Applications -&amp;gt; All, then scroll down to IQRD. This application has a non-descript icon and offers no information about itself. Even on old devices, IQRD runs continuously because it’s set to start automatically at boot. The only option you have to stop the application is to select “force stop”—which does nothing. The application continues to run.&lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;The only option to remove Carrier IQ is to root the phone:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;The only choice we have to “opt out” of this data collection is to root our devices because every part of the multi-headed CIQ application is embedded into low-level, locked regions of the phones. Even if you unlock your device and remove the base application with a sophisticated removal method, neutered, leftover code called from other applications will likely throw an error each time an old action is triggered.&lt;/blockquote&gt;&lt;br /&gt;
It’s almost impossible to fully remove Carrier IQ. The browser is modified to send to Carrier IQ daemon, as is almost everything else. The application is so deeply embedded in our devices that a user must rebuild the whole device (system.img and boot.img) directly from source code to remove every part of CIQ.&lt;br /&gt;
&lt;br /&gt;
Eckhart only looked at Android devices, but it is likely that other phone manufacturers are also making use of Carrier IQ.&lt;br /&gt;
&lt;br /&gt;
I suggest you take a look at the YouTube video that is a live demonstration of the Carrier IQ software by the security researcher himself.&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;360&quot; src=&quot;http://www.youtube.com/embed/T17XQI_AYNo?feature=player_embedded&quot; width=&quot;640&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;I suggest you read the two detailed articles (&lt;a href=&quot;http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/&quot;&gt;What is Carrier IQ?&lt;/a&gt; and &lt;a href=&quot;http://androidsecuritytest.com/features/logs-and-services/loggers/carrieriq/carrieriq-part2/&quot;&gt;CarrierIQ Part 2&lt;/a&gt; for a deeper understanding of the situation.&lt;span style=&quot;font-size: xx-small;&quot;&gt; &lt;i&gt;&lt;a href=&quot;http://www.ghacks.net/2011/12/01/carrier-iq-your-phone-might-record-your-activities-silently/&quot; target=&quot;_blank&quot;&gt;(via)&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/6927106707078324033/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/6927106707078324033' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6927106707078324033'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6927106707078324033'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/12/carrier-iq-your-android-might-record.html' title='Carrier IQ, Your Android Might Record Your Activities'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/T17XQI_AYNo/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-1363780803328059057</id><published>2011-11-28T07:14:00.001-08:00</published><updated>2011-11-28T07:38:30.407-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>Anonymous: We Hacked Cybercops Email</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_g84JSzw3DNTKhLJFbOVdV1g3d2CEi5Qrnj0tAhbuTZPNOwuvABA_UpTjbgQU6zY6H96EXe_mjbSeBj4rBjkEFD-Fdbx8piut3BhROVEgbe_lnUx_iYmAXyL8fUihrMQs73hAWN7q_Ds/s1600/anonymousexpectus-420.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;306&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_g84JSzw3DNTKhLJFbOVdV1g3d2CEi5Qrnj0tAhbuTZPNOwuvABA_UpTjbgQU6zY6H96EXe_mjbSeBj4rBjkEFD-Fdbx8piut3BhROVEgbe_lnUx_iYmAXyL8fUihrMQs73hAWN7q_Ds/s400/anonymousexpectus-420.jpg&quot; title=&quot;Anonymous: We Hacked Cybercops Email&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Anonymous: We Hacked Cybercops Email&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The Anonymous hacking collective&#39;s AntiSec group has launched a fresh assault on law enforcement agencies with the release of what they claim are personal emails stolen from a Californian cybercrime investigator.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The cache of emails – which according to AntiSec are from the account of Fred Baclagan, a retired special agent supervisor of the Californian Department of Justice – includes 30,000 emails detailing various computer forensic techniques and cybercrime investigation protocols.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The hacktivists claim to have hacked into Baclagan&#39;s Gmail account and to have accessed his voicemails and SMS message logs using unspecified techniques as part of their ongoing campaign against law enforcement officials and their &quot;allies&quot; in the computer security industry.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The email dump, released as a torrent last Friday in part of what has become the group&#39;s regular FuckFBIFriday release, is also said to contain personal information including Baclagan&#39;s home address and phone number.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Possibly the most interesting content in his emails are the IACIS.com* internal email list archives (2005-2011), which detail the methods and tactics cybercrime units use to gather electronic evidence, conduct investigations and make arrests,&quot; a member of Anonymous said on a &lt;a href=&quot;http://pastebin.com/NwN8ehFW&quot;&gt;statement&lt;/a&gt; accompanying the release, adding that knowledge of these techniques will help hacktivists to develop better tradecraft and anti-forensic techniques.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;There are discussions about using EnCase forensic software, attempts to crack TrueCrypt encrypted drives, sniffing wireless traffic in mobile surveillance vehicles, how to best prepare search warrants and subpoenas, and a whole lot of clueless people asking questions on how to use basic software like FTP. In the end, we rickrolled the entire IACIS list, causing the administrators to panic and shut their list and websites down.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
But Baclagan told the &lt;a href=&quot;http://www.huffingtonpost.com/2011/11/18/hacker-group-attacks-the-_n_1102171.html&quot;&gt;Huffington Post&lt;/a&gt; that he was nobody special in the Justice Department ... which is what he would say, of course. He said that he had specialised in identity theft before he retired last year. &quot;I&#39;m really just a nobody,&quot; he told the Post, &quot;just a local investigator, not involved in anything dynamic or dramatic. ®&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;b&gt;Bootnote&lt;/b&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
*&lt;a href=&quot;https://www.iacis.com/&quot;&gt;IACIS&lt;/a&gt; is the International Association of Computer investigative Specialists, an volunteer-led non-profit organisation made up of law enforcement pros and geared towards developing and etching best practice in computer forensics. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://packetstormsecurity.org/news/view/20228/Anonymous-We-Hacked-Cybercops-Email.html&quot; target=&quot;_blank&quot;&gt;(via)&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/1363780803328059057/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/1363780803328059057' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/1363780803328059057'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/1363780803328059057'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/anonymous-we-hacked-cybercops-email.html' title='Anonymous: We Hacked Cybercops Email'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_g84JSzw3DNTKhLJFbOVdV1g3d2CEi5Qrnj0tAhbuTZPNOwuvABA_UpTjbgQU6zY6H96EXe_mjbSeBj4rBjkEFD-Fdbx8piut3BhROVEgbe_lnUx_iYmAXyL8fUihrMQs73hAWN7q_Ds/s72-c/anonymousexpectus-420.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3455976797674986181</id><published>2011-11-28T06:58:00.001-08:00</published><updated>2011-11-28T06:58:28.434-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><category scheme="http://www.blogger.com/atom/ns#" term="Tips and Trik"/><title type='text'>Earthquake Alerts via Internet</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The U.S. Geological Survey agency monitors earthquake activity around the world. It reports the geographic location and intensity of an earthquake and anyone can subscribe to this data through &lt;a href=&quot;https://twitter.com/USGSted&quot;&gt;Twitter&lt;/a&gt;, &lt;a href=&quot;http://www.usgs.gov/socialmedia/#earthquakes&quot;&gt;RSS feeds&lt;/a&gt; and &lt;a href=&quot;http://earthquake.usgs.gov/learn/kml.php&quot;&gt;KML files&lt;/a&gt; for Google Earth.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Then there are desktop software like &lt;a href=&quot;http://quakealert.codeplex.com/&quot;&gt;Quake Alert&lt;/a&gt; that poll the USGS website and will pop-up an alert as soon as a new “big” earthquake is reported anywhere in the world.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Get Earthquake Alerts for your Surrounding Areas&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The Twitter and RSS feeds will report earthquake activity worldwide but if you are only interested in receiving email alerts for your own geographic region, you should use the&amp;nbsp;&lt;a href=&quot;https://sslearthquake.usgs.gov/ens/&quot;&gt;Earthquake Notification Service&lt;/a&gt;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Here you have a Google Map and all you have to do is draw a custom polygon over regions that you would like to monitor for earthquake activity. You can mark one or more regions on the map, set the notification magnitude threshold (like only send me alerts for earthquakes with magnitude of 5 and above) and save your profile.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Do4uOC_ththYpT2bSJBCZYOeOKbLazHIWzlkH1S_2iXdhwp2E1i1OMWZ61yM53Fu96AJj95rhG4oWQRPK9-XiNcO7UtxkZRaYtQQg8jMjzhyXiZyTmRpWAmyv1P49wZDbkK8wLVR_5U/s1600/earthquake_map.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Do4uOC_ththYpT2bSJBCZYOeOKbLazHIWzlkH1S_2iXdhwp2E1i1OMWZ61yM53Fu96AJj95rhG4oWQRPK9-XiNcO7UtxkZRaYtQQg8jMjzhyXiZyTmRpWAmyv1P49wZDbkK8wLVR_5U/s1600/earthquake_map.jpg&quot; title=&quot;Earthquake Alerts via Internet&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;Earthquake Alerts via Internet&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The USGS website says that information for U.S. earthquakes is generally available within 2-8 minutes but for earthquakes outside the U.S., it may take up to 20 minutes to report the activity. Twitter may thus be a faster medium to get earthquake news but as USGS says – “it cannot provide quantitative data such as location and magnitude.” &lt;i&gt;&lt;a href=&quot;http://www.labnol.org/internet/earthquake-email-alerts/20494/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;(via)&lt;/span&gt;&lt;/a&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3455976797674986181/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3455976797674986181' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3455976797674986181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3455976797674986181'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/earthquake-alerts-via-internet.html' title='Earthquake Alerts via Internet'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6Do4uOC_ththYpT2bSJBCZYOeOKbLazHIWzlkH1S_2iXdhwp2E1i1OMWZ61yM53Fu96AJj95rhG4oWQRPK9-XiNcO7UtxkZRaYtQQg8jMjzhyXiZyTmRpWAmyv1P49wZDbkK8wLVR_5U/s72-c/earthquake_map.jpg" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3912633249692133905</id><published>2011-11-25T05:45:00.001-08:00</published><updated>2011-11-25T05:48:23.805-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="china cyber"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>Largest DDOS Attack Hit Chinese</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwXJmmkkUK23yWA8eCGEbKqXAbZYx3ED7sqUt8zji5aIRl1sT1xtp-1AgiYdC37EzrJu-n-ROUs9tA1p3IkJb6NPlI4V59Lg8WUWpUlz1GpFf9z__g8-3IVHgz5EJ2uVpM3JgrSnPsOJA/s1600/DDOS+attack.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwXJmmkkUK23yWA8eCGEbKqXAbZYx3ED7sqUt8zji5aIRl1sT1xtp-1AgiYdC37EzrJu-n-ROUs9tA1p3IkJb6NPlI4V59Lg8WUWpUlz1GpFf9z__g8-3IVHgz5EJ2uVpM3JgrSnPsOJA/s400/DDOS+attack.png&quot; title=&quot;Largest DDOS Attack Hit Chinese&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Largest DDOS Attack Hit Chinese&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A week-long &lt;b&gt;DDoS attack&lt;/b&gt; that launched a flood of traffic at an Asian e-commerce company in early November was the biggest such incident so far this year, according to Prolexic, a company that defends websites against such attacks. The distributed denial-of-service attack consisted of four consecutive waves launched from multiple botnets between Nov. 5 and Nov. 12, 2011.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The attack on the unnamed organisation and its DNS provider happened between &lt;b&gt;5 and 12 November&lt;/b&gt; and reached &lt;b&gt;45Gbit/s at peak&lt;/b&gt;, equivalent to 69 million packets or 15,000 connections per second, way above the level that can be easily stemmed using standalone appliances, the company claimed. This attack was three times larger in packets per second volume than the biggest attack Prolexic has mitigated previously, which also occurred in 2011.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Prolexic technicians identified a randomised attack consisting of the largest volume of &lt;b&gt;GET, SYN, ICMP, UDP and DNS floods&lt;/b&gt; launched in a single attack campaign this year. They identified that the attack was coming from botnets in multiple worldwide locations.In addition, unlike typical DDoS attacks that are coordinated from one geographic source, this attack was coordinated globally. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://thehackernews.com/2011/11/largest-ddos-attack-hit-chinese-company.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+thehackernews%2FVNvf+%28THN+%3A+The+Hacker+News%29&quot; target=&quot;_blank&quot;&gt;via&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3912633249692133905/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3912633249692133905' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3912633249692133905'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3912633249692133905'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/largest-ddos-attack-hit-chinese.html' title='Largest DDOS Attack Hit Chinese'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwXJmmkkUK23yWA8eCGEbKqXAbZYx3ED7sqUt8zji5aIRl1sT1xtp-1AgiYdC37EzrJu-n-ROUs9tA1p3IkJb6NPlI4V59Lg8WUWpUlz1GpFf9z__g8-3IVHgz5EJ2uVpM3JgrSnPsOJA/s72-c/DDOS+attack.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-5686977443204240164</id><published>2011-11-25T04:59:00.001-08:00</published><updated>2011-11-25T05:02:56.423-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><title type='text'>KDE 4.8 Beta Released</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgly06YcDYvx_aMsKuaOX7ioIN3383SSkI5S5gcgZsLImi6nxEdn7f47sZOxbTotQZvNsK8B5Q6I8T7_-X6WXbROmh-Do3rxmAjZcPXCSsjTFKHbkWP1WpHrn21yh62gZ-B4wfESavmYHY/s1600/KDE+4.8.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgly06YcDYvx_aMsKuaOX7ioIN3383SSkI5S5gcgZsLImi6nxEdn7f47sZOxbTotQZvNsK8B5Q6I8T7_-X6WXbROmh-Do3rxmAjZcPXCSsjTFKHbkWP1WpHrn21yh62gZ-B4wfESavmYHY/s1600/KDE+4.8.jpeg&quot; title=&quot;KDE 4.8 Beta Released&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;&lt;i&gt;KDE 4.8 Beta&lt;/i&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The &lt;a href=&quot;http://kde.org/&quot;&gt;KDE&lt;/a&gt; Community has &lt;a href=&quot;http://dot.kde.org/2011/11/24/kde-makes-48-beta1-available-testing&quot;&gt;released&lt;/a&gt; a first beta of version 4.8 of the KDE Software Compilation (KDE SC). Aimed at testers, the development preview of the next major update to the open source K Desktop Environment brings changes to the Plasma Workspaces, applications and underlying platform, as well as various performance and stability improvements.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
KDE SC 4.8 Beta 1 includes support for Qt Quick in Plasma Workspaces. The device notifier widget, now written in pure QML, has been ported using the new Plasma Components – a standardised API implementation that has a &quot;native Plasma Look and Feel&quot;. To improve performance and scalability, while updating its appearance, the file view in Dolphin has also been rewritten. The developers note that, as the API, dependency and feature freezes are in effect, the team is now focusing &quot;on fixing bugs and further polishing new and old functionality&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Further details about the first beta can be found in the &lt;a href=&quot;http://www.kde.org/announcements/announce-4.8-beta1.php&quot;&gt;official release announcement&lt;/a&gt; and on the &lt;a href=&quot;http://www.kde.org/info/4.7.80.php&quot;&gt;KDE SC 4.7.80 Info Page&lt;/a&gt;. &lt;a href=&quot;http://download.kde.org/download.php?url=stable/4.7.80/src/&quot;&gt;Source code&lt;/a&gt; for self-compilation and &lt;a href=&quot;http://kde.org/info/4.7.80.php#binary&quot;&gt;binary packages&lt;/a&gt; for various Linux distributions are available to download from the project&#39;s web site. Users testing the release are encouraged to provide feedback and &lt;a href=&quot;http://bugs.kde.org/&quot;&gt;report&lt;/a&gt; any bugs that they find.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
KDE is &lt;a href=&quot;http://techbase.kde.org/Policies/Licensing_Policy&quot;&gt;licensed&lt;/a&gt; under a combination of the LGPLv2, BSD, MIT and X11 licences for core libraries and the GPLv2 or GPLv3 for applications. The current stable release is &lt;b&gt;KDE SC 4.7.3 &lt;/b&gt;from earlier this month. &lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;http://www.h-online.com/open/news/item/First-KDE-4-8-beta-released-for-testing-1384918.html&quot; target=&quot;_blank&quot;&gt;(via)&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/5686977443204240164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/5686977443204240164' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5686977443204240164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/5686977443204240164'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/kde-48-beta-released.html' title='KDE 4.8 Beta Released'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgly06YcDYvx_aMsKuaOX7ioIN3383SSkI5S5gcgZsLImi6nxEdn7f47sZOxbTotQZvNsK8B5Q6I8T7_-X6WXbROmh-Do3rxmAjZcPXCSsjTFKHbkWP1WpHrn21yh62gZ-B4wfESavmYHY/s72-c/KDE+4.8.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-4111234864708189274</id><published>2011-11-14T07:57:00.001-08:00</published><updated>2011-11-14T08:02:09.901-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="computer"/><category scheme="http://www.blogger.com/atom/ns#" term="download"/><category scheme="http://www.blogger.com/atom/ns#" term="linux"/><title type='text'>Download Linux Mint 12 (RC1)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELlv6KFYMrn2HwHMU1uKXvVK6gHks2Ax6v_A80u96GS9SfMocnzvxz8MIjKQ83IuXgMU9xK3BSiWZOch4O-mQOYEdTdlS-nkXISvY4wgm_azASi9-I1JZf1OtR0_UHNpshwXKMIrtdLw/s1600/Linux+Mint+12.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;251&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELlv6KFYMrn2HwHMU1uKXvVK6gHks2Ax6v_A80u96GS9SfMocnzvxz8MIjKQ83IuXgMU9xK3BSiWZOch4O-mQOYEdTdlS-nkXISvY4wgm_azASi9-I1JZf1OtR0_UHNpshwXKMIrtdLw/s400/Linux+Mint+12.png&quot; title=&quot;Download Linux Mint 12&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Download Linux Mint 12&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://www.linuxmint.com/&quot;&gt;Linux Mint&lt;/a&gt; founder and lead developer Clement Lefebvre has &lt;a href=&quot;http://blog.linuxmint.com/?p=1858&quot;&gt;announced the arrival&lt;/a&gt; of a release candidate for version 12 of his project&#39;s Ubuntu-based Linux distribution, code-named &quot;Lisa&quot;. The new edition has a GNOME 3 desktop with customisations that bring some of the look and feel of GNOME 2.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Last week, the Mint team announced that version 12 of the distribution will switch to GNOME 3 but continue to offer the familiar desktop environment to users. The developers do this via &quot;Mint Gnome Shell Extensions&quot; (MGSE), which add traditional desktop elements such as a start menu and window list at the bottom of the screen.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
More details about the release candidate can be found on the &lt;a href=&quot;http://www.linuxmint.com/rel_lisa_whatsnew.php&quot;&gt;New features in Linux Mint 12&lt;/a&gt; page. Although the &lt;a href=&quot;http://community.linuxmint.com/&quot;&gt;project&#39;s community site&lt;/a&gt; is still down for maintenance, ISO images of the release candidate can be &lt;b&gt;downloaded &lt;/b&gt;from several&lt;b&gt; &lt;a href=&quot;http://ftp.heanet.ie/pub/linuxmint.com/testing/&quot;&gt;mirror servers&lt;/a&gt;&lt;/b&gt;.&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt; (via | &lt;a href=&quot;http://www.h-online.com/open/news/item/Linux-Mint-12-release-candidate-now-available-1378283.html&quot; target=&quot;_blank&quot;&gt;h-online&lt;/a&gt;)&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/4111234864708189274/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/4111234864708189274' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4111234864708189274'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4111234864708189274'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/download-linux-mint-12-rc1.html' title='Download Linux Mint 12 (RC1)'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiELlv6KFYMrn2HwHMU1uKXvVK6gHks2Ax6v_A80u96GS9SfMocnzvxz8MIjKQ83IuXgMU9xK3BSiWZOch4O-mQOYEdTdlS-nkXISvY4wgm_azASi9-I1JZf1OtR0_UHNpshwXKMIrtdLw/s72-c/Linux+Mint+12.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-6594015001717429191</id><published>2011-11-14T07:14:00.001-08:00</published><updated>2011-11-14T07:22:14.117-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="amazon"/><category scheme="http://www.blogger.com/atom/ns#" term="tablet"/><title type='text'>Amazon&#39;s Kindle Fire Available Today</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiSAnLy3tKJsO8V6enXtxoNkplRbwaUM0Bs-xVn4VWtOKNv45G3_H4rWrhXsvmA6Av3v-KIwh_TLlsJrwaBXFB5BsoUWare3WNwcbspGYhKlnOUQbFR7_DQQ-F2t6_pnP1EfbiSqaSXk/s1600/amazon+kindle+fire.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiSAnLy3tKJsO8V6enXtxoNkplRbwaUM0Bs-xVn4VWtOKNv45G3_H4rWrhXsvmA6Av3v-KIwh_TLlsJrwaBXFB5BsoUWare3WNwcbspGYhKlnOUQbFR7_DQQ-F2t6_pnP1EfbiSqaSXk/s320/amazon+kindle+fire.jpg&quot; title=&quot;Amazon&#39;s Kindle Fire&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Amazon&#39;s Kindle Fire&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now here’s a way to make a splash – Amazon’s much-hyped Kindle Fire tablet is available today, 24 hours earlier than the official release date. Meanwhile, the Kindle Touch and Kindle Touch 3G will be available six days early, shipping tomorrow.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In an &lt;a href=&quot;http://phx.corporate-ir.net/phoenix.zhtml?c=176060&amp;amp;p=irol-newsArticle&amp;amp;ID=1629911&amp;amp;highlight=&quot;&gt;announcement&lt;/a&gt;, Amazon says:&lt;/div&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
“We’re thrilled to be able to ship Kindle Fire to our customers earlier than we expected. Kindle Fire quickly became the bestselling item across all of Amazon.com, and based on customer response we’re building millions more than we’d planned,” said Dave Limp, Vice President, Amazon Kindle. “Customers are excited about Kindle Fire because it is a premium product at the non-premium price of only $199.”&lt;/div&gt;
&lt;/blockquote&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The US-only release sees the cloud-centric 7-inch tablet available to purchase &lt;a href=&quot;http://www.amazon.com/gp/product/B0051VVOB2&quot;&gt;here&lt;/a&gt;. At the time of writing, shipping time is displayed as ’3-5 days’. It’s unclear whether this is due to first-day stock being entirely allocated or if the estimate will be updated to reflect the announcement. The Fire will face competition from Barnes &amp;amp; Nobles Nook Tablet.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In a separate press release, Amazon &lt;a href=&quot;http://phx.corporate-ir.net/phoenix.zhtml?c=176060&amp;amp;p=irol-newsArticle&amp;amp;ID=1629910&amp;amp;highlight=&quot;&gt;said&lt;/a&gt; it will be shipping its touchscreen versions of the classic Kindle in the US tomorrow – the WiFi-only version costing $99, the 3G alternative priced at $149. (&lt;a href=&quot;http://thenextweb.com/gadgets/2011/11/14/amazons-kindle-fire-is-available-today-one-day-early/?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+TheNextWeb+%28The+Next+Web+All+Stories%29&quot;&gt;via&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/6594015001717429191/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/6594015001717429191' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6594015001717429191'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6594015001717429191'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/amazons-kindle-fire-available-today.html' title='Amazon&#39;s Kindle Fire Available Today'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjiSAnLy3tKJsO8V6enXtxoNkplRbwaUM0Bs-xVn4VWtOKNv45G3_H4rWrhXsvmA6Av3v-KIwh_TLlsJrwaBXFB5BsoUWare3WNwcbspGYhKlnOUQbFR7_DQQ-F2t6_pnP1EfbiSqaSXk/s72-c/amazon+kindle+fire.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-4638754179304228202</id><published>2011-11-13T04:20:00.001-08:00</published><updated>2011-11-13T04:20:48.977-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="AntiSec"/><category scheme="http://www.blogger.com/atom/ns#" term="LulzSec"/><title type='text'>#AntiSec - We are still here</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;object style=&quot;height: 390px; width: 640px;&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/NOaPCZ7XVT0?version=3&amp;feature=player_embedded&quot;&gt;
&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;
&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;
&lt;embed src=&quot;http://www.youtube.com/v/NOaPCZ7XVT0?version=3&amp;feature=player_embedded&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;360&quot;&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/4638754179304228202/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/4638754179304228202' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4638754179304228202'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4638754179304228202'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/antisec-we-are-still-here.html' title='#AntiSec - We are still here'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-2283224110942851295</id><published>2011-11-11T04:41:00.001-08:00</published><updated>2011-11-11T04:47:32.365-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="apple"/><category scheme="http://www.blogger.com/atom/ns#" term="gadget"/><category scheme="http://www.blogger.com/atom/ns#" term="iOS 5"/><category scheme="http://www.blogger.com/atom/ns#" term="iPhone"/><category scheme="http://www.blogger.com/atom/ns#" term="smartphones"/><category scheme="http://www.blogger.com/atom/ns#" term="tablet"/><title type='text'>iOS 5.0.1 Update Now Available to Install</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsgTFMrd1Nn0OUqqZ8FYkosplZq6-OiiRqBiaZI0Tt8tY8vHAMsFiN_7dLCt2JLU7PZTn8gXymKuZYAJ3iMQ30wdEAmBm8IOZCn5seZLONqLI3m0W6Hg_z2-bVQG5lq6IsfMNwcho39E8/s1600/IOS+5.0.1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsgTFMrd1Nn0OUqqZ8FYkosplZq6-OiiRqBiaZI0Tt8tY8vHAMsFiN_7dLCt2JLU7PZTn8gXymKuZYAJ3iMQ30wdEAmBm8IOZCn5seZLONqLI3m0W6Hg_z2-bVQG5lq6IsfMNwcho39E8/s320/IOS+5.0.1.jpg&quot; title=&quot;iOS 5.0.1 Update Now Available to Install&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;iOS 5.0.1 Available to Install&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Today Apple released their first update to &lt;b&gt;iOS 5&lt;/b&gt; ahead of expectations. Among the usual bug fixes, this update brings aid to the dwindling battery life experienced by many owners of the iPhone 4S. Users of the beta have reported that the improvements have been ideal and they can make it through the day no problem. If you weren&#39;t lucky enough to test it out early, go run Software Update on your iPhone (Settings &amp;gt; General &amp;gt; Software Update) and get it right now. It took a few minutes for our phones to realize an update was available so be patient and don&#39;t worry—it&#39;s there. iPad 1 users will also be glad to know that the update brings back multitasking gestures—something that previously required a little hacking to enable.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Note: Jailbreakers &lt;a href=&quot;https://twitter.com/#!/MuscleNerd/status/134699512135553024&quot;&gt;should not upgrade until there&#39;s an iOS 5.0 downgrade option&lt;/a&gt;. Keep an eye on the iPhone Dev Team&#39;s &lt;a href=&quot;http://blog.iphone-dev.org/&quot;&gt;blog&lt;/a&gt; and &lt;a href=&quot;https://twitter.com/#!/iphone_dev&quot;&gt;Twitter feed&lt;/a&gt; for progress updates.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;iOS 5.0.1 Update Now Available to Install&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;via &lt;a href=&quot;http://gizmodo.com/5858347/ios-501-is-here-to-fix-your-battery-issues&quot;&gt;Gizmodo&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/2283224110942851295/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/2283224110942851295' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/2283224110942851295'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/2283224110942851295'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/ios-501-update-now-available-to-install.html' title='iOS 5.0.1 Update Now Available to Install'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsgTFMrd1Nn0OUqqZ8FYkosplZq6-OiiRqBiaZI0Tt8tY8vHAMsFiN_7dLCt2JLU7PZTn8gXymKuZYAJ3iMQ30wdEAmBm8IOZCn5seZLONqLI3m0W6Hg_z2-bVQG5lq6IsfMNwcho39E8/s72-c/IOS+5.0.1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-4552087072434937522</id><published>2011-11-10T07:19:00.001-08:00</published><updated>2011-11-10T07:23:27.844-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>Anonymous talks about Anonymous</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuYqI0w5TiT_yXMt02Fa2hvbGPDJAnhcCE6w5UFX9CC7LyUHyn3X5HafDDEzG2iac_CkmSbCNUnfyk5GIvXyl52VcDBey-DoXpFfvF6DMY6cyeog-HdjYZSRe0kNNkhm2EtJwuewJcNA/s1600/Anonymous+talks+about+Anonymous.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img about=&quot;&quot; anonymous&quot;=&quot;&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuYqI0w5TiT_yXMt02Fa2hvbGPDJAnhcCE6w5UFX9CC7LyUHyn3X5HafDDEzG2iac_CkmSbCNUnfyk5GIvXyl52VcDBey-DoXpFfvF6DMY6cyeog-HdjYZSRe0kNNkhm2EtJwuewJcNA/s320/Anonymous+talks+about+Anonymous.jpg&quot; talks=&quot;&quot; title=&quot;Anonymous&quot; width=&quot;256&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Anonymous talks about Anonymous&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
HACKTIVIST GROUP Anonymous, or at least one part of it, has visited Reddit to discuss who it is, where it is and where it&#39;s going.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The section of the group that &lt;a href=&quot;https://twitter.com/#!/AnonymousIRC/status/134097056011784193&quot;&gt;runs the AnonymousIRC Twitter account&lt;/a&gt; started the &lt;a href=&quot;http://www.reddit.com/r/IAmA/comments/m5lim/we_are_anonymousirc_on_twitter_monitoring/&quot;&gt;Reddit conversation&lt;/a&gt; earlier today, and it discussed things like: its leader - there isn&#39;t one; its motives - they are varied; and its members - which are legion.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
There might be some disinformation sprinkled around in the conversation, such as the late mention that 9,000 people operate the Twitter account, but otherwise the Reddit session seemed frank and forthcoming. For example, discussing the real numbers behind the account, the group explained that it was managed by &quot;More than one person,&quot; adding, &quot;It&#39;s impossible to shut down the twitter by arresting a single person.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
These is no money behind the group and there are no obvious monetary agendas. Fortunately for the group its methods are cheap, and effective. &quot;We run on a very low budget,&quot; said on poster, &quot;but 20 bucks is enough to take on the filthy leaders, fortunately :)&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
These cheap and effective methods could lend themselves to attacks on any kind of organisation, like the Opcartel plans to take on a Mexican drugs cartel. This controversial move was backed by some camps and opposed by others. AnonymousIRC said that these Anons were &quot;bold&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;We support them with all our heart, And oops, we may have some data on them which would be preferred to be undisclosed, according to them,&quot; it said. &quot;It&#39;ll all get out, tho. Why? We do not need to fear Govt&#39;s OR Cartels. We&#39;re Anonymous and we&#39;re mad as hell.&quot; It added later, &quot;&lt;a href=&quot;http://www.theinquirer.net/inquirer/news/2121146/anonymous-threatens-mexican-drug-cartel&quot;&gt;OpCartel are some ballsy guys&lt;/a&gt;. We love them &amp;lt;3&quot;.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The disparate nature of the group - and this is just one out of many social media accounts associated with Anonymous, remember - should suggest that there are many disagreements, but it seems that while different sectors may carry out their own initiatives or random attacks, this is fine within the greater Anonymous consciousness.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;We cannot control or limit what some individual anon may do or not do. Neither it is our interest. An example: If some cop finds it funny to mace innocent girls, Internet crowd will hate him. Which will include his family, if that information is public. Like it or not, it&#39;s just what happens,&quot; one poster said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;There is no individual Anon. We might agree or not, it does not matter much, though. Anonymous strives because its base is covered every where: Pacifists as well as Anarchists. And while they despise each others methods they still can work together. Isn&#39;t it beautiful?&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
What might not be so beautiful is the use of the Guy Fawkes or V for Vendettamask that has become the face of the organisation, and one respondent seemed to want to distance the group from its use, or at least its connotations.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;The Guy Fawkes mask became a traditional symbol of Anonymous. We find that troubling for a number of reasons,&quot; he or she wrote.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;It&#39;s all down to Hollywood. Nobody of us would know of him if it wasn&#39;t for the movie. Possibly there was an evil plan. Let&#39;s calculate with that - not only to &lt;a href=&quot;http://www.theinquirer.net/inquirer/feature/2122797/mask-anonymous&quot;&gt;push Time Warners&#39; profits&lt;/a&gt;. Most of us don&#39;t want to burn down the Parliament. And most of us don&#39;t want to throw money into TW&#39;s throat. So let us meet halfway.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Other symbols of leadership, such as Topiary who was arrested in the UK, are also dimissed as leaders, but not as personalities. &quot;It does not matter whether Anonymous has a spokesperson or not, even less who that might me. Once you understand you realize it does not matter,&quot; adds the poster.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Barrett Brown is not a spokesperson. Neither is Topiary btw. Or me. Or Sabu. Or whoever. We just keep on pounding the establishment until there is no more.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Majority approval is not necessary for a movement to succeed, but there is a tipping point for action that depends on the mood of the group. This may explain why an &lt;a href=&quot;http://www.theinquirer.net/inquirer/news/2122745/anonymous-rejects-5th-november-attack-facebook&quot;&gt;operation like that against Facebook&lt;/a&gt; was ignored, for technical reasons, but an assault on the Zetas drug cartel was not.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Nobody within Anonymous can approve or reject any idea. Nobody has that authority. What happens is: Someone suggests a plan. Or an idea. Or an operation. If it is sound, other Anons will support it. If it isn&#39;t, it will be ignored. It&#39;s a bit like democracy except that it can be taken literally and it is actually working,&quot; they said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;[Facebook] is hosted and backed by Akamai and Amazon, the largest backbone providers you have. It still is possible to screw them but it would take skill and determination. However, those involved in [it] said [the] Op lacked both. You cannot kill [Facebook] with LOIC obviously. Needs different stuff...&quot; &lt;a href=&quot;http://www.theinquirer.net/inquirer/news/2123813/anonymous-talks-anonymous/page/2?WT.rss_a=anonymous+talks+about+anonymous&amp;amp;WT.rss_f=home&quot;&gt;µ&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/4552087072434937522/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/4552087072434937522' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4552087072434937522'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/4552087072434937522'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/anonymous-talks-about-anonymous.html' title='Anonymous talks about Anonymous'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpuYqI0w5TiT_yXMt02Fa2hvbGPDJAnhcCE6w5UFX9CC7LyUHyn3X5HafDDEzG2iac_CkmSbCNUnfyk5GIvXyl52VcDBey-DoXpFfvF6DMY6cyeog-HdjYZSRe0kNNkhm2EtJwuewJcNA/s72-c/Anonymous+talks+about+Anonymous.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-3767471881414362356</id><published>2011-11-08T03:47:00.000-08:00</published><updated>2011-11-08T03:47:12.558-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><category scheme="http://www.blogger.com/atom/ns#" term="internet"/><title type='text'>Adidas Websites Hacked</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;float: right; margin-left: 1em; text-align: right;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwJbnxbQ0L8DfjNHpiMkm0nC1pCnnMRgZDClHcK2vobg0NzEOwZ5rvA3Vlk2It3T8Gqgav48vhco3YN9p6ZXDLz-oJWmFfAO76im1_c4WCbqdh0jbUxA7E_KG9zcIRDpWAkbvdd9tRXUQ/s1600/Adidas.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwJbnxbQ0L8DfjNHpiMkm0nC1pCnnMRgZDClHcK2vobg0NzEOwZ5rvA3Vlk2It3T8Gqgav48vhco3YN9p6ZXDLz-oJWmFfAO76im1_c4WCbqdh0jbUxA7E_KG9zcIRDpWAkbvdd9tRXUQ/s200/Adidas.jpg&quot; titl=&quot;Adidas Websites Hacked&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;Adidas Websites Hacked&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Adidas has been forced to take some of its main websites offline after a &quot;sophisticated, criminal cyber-attack&quot; that took place last week, the company said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Adidas.com, reebok.com, miCoach.com and adidas-group.com all were taken offline, along with various local e-commerce sites, the company said in a statement Sunday.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
At least two of the sites, adidas.com and miCoach.com, appeared to still be offline Monday evening. &quot;Due to technical difficulties our website is currently not available,&quot; said a message at adidas.com.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The sportswear vendor first learned of the attack last Thursday, it said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Our preliminary investigation has found no evidence that any consumer data is impacted. But, while we continue our thorough forensic review, we have taken down affected sites ... in order to protect visitors to our sites,&quot; it said.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
It didn&#39;t provide further details of the attacks or say who was responsible. A note on the miCoach website said Adidas hoped to have the site running again by the end of the day Tuesday. &lt;i&gt;&lt;a href=&quot;http://www.pcworld.com/businesscenter/article/243368/adidascom_shut_down_after_criminal_attack.html&quot;&gt;via&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/3767471881414362356/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/3767471881414362356' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3767471881414362356'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/3767471881414362356'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/adidas-websites-hacked.html' title='Adidas Websites Hacked'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwJbnxbQ0L8DfjNHpiMkm0nC1pCnnMRgZDClHcK2vobg0NzEOwZ5rvA3Vlk2It3T8Gqgav48vhco3YN9p6ZXDLz-oJWmFfAO76im1_c4WCbqdh0jbUxA7E_KG9zcIRDpWAkbvdd9tRXUQ/s72-c/Adidas.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-6037742410639085727</id><published>2011-11-07T06:52:00.002-08:00</published><updated>2011-11-07T06:52:22.982-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>We Are Legion: The Story of the Hacktivists</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;object style=&quot;height: 390px; width: 640px;&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/ny1vT9A9RBc?version=3&amp;feature=player_embedded&quot;&gt;
&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;
&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;
&lt;embed src=&quot;http://www.youtube.com/v/ny1vT9A9RBc?version=3&amp;feature=player_embedded&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;360&quot;&gt;&lt;/object&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;i&gt;We Are Legion: The Story of the Hacktivists&lt;/i&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/6037742410639085727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/6037742410639085727' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6037742410639085727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/6037742410639085727'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/we-are-legion-story-of-hacktivists.html' title='We Are Legion: The Story of the Hacktivists'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2183902368072223546.post-8137043373770360241</id><published>2011-11-05T06:33:00.001-07:00</published><updated>2011-11-05T06:34:00.313-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anonymous"/><category scheme="http://www.blogger.com/atom/ns#" term="cyber news"/><title type='text'>#OccupyLondon : The Night of Thousand Masks</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;table align=&quot;center&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; class=&quot;tr-caption-container&quot; style=&quot;margin-left: auto; margin-right: auto; text-align: center;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHjKDkMEKqfzmlvgz7jlxUT1TTSdwQDLFfMQZT39-5H2J56Bt1XzW4xD5_jcGLFgLH_6val7RG2_0p2v7w50bJlkuCD9MA5117ce9yIOu-uLjfz8tjZSSmTJ0ecXTtsZqjdEJjhOxjgs/s1600/anonymous-mask-uk-occupy-london.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: auto; margin-right: auto;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHjKDkMEKqfzmlvgz7jlxUT1TTSdwQDLFfMQZT39-5H2J56Bt1XzW4xD5_jcGLFgLH_6val7RG2_0p2v7w50bJlkuCD9MA5117ce9yIOu-uLjfz8tjZSSmTJ0ecXTtsZqjdEJjhOxjgs/s400/anonymous-mask-uk-occupy-london.jpeg&quot; title=&quot;#OccupyLondon : The Night of Thousand Masks&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;tr-caption&quot; style=&quot;text-align: center;&quot;&gt;#OccupyLondon : The Night of Thousand Masks&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent;&quot;&gt;&lt;a href=&quot;http://thehackernews.com/2011/11/occupylondon-night-of-thousand-masks-on.html?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Daily+Cyber+News+Updates%29&quot; style=&quot;background-color: transparent;&quot;&gt;thehackernews.com&lt;/a&gt;&amp;nbsp;:&amp;nbsp;Anonymous Mask = &quot;A symbol that unites them behind one universal message&quot; . Activists plan to protest on 5th November ,2011 at Saint Pauls Cathedral London 9:00pm - 11:00pm. This going to be &quot;The Night of Thousand Masks&quot;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: transparent;&quot;&gt;&lt;b&gt;Message By Anonymous :&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;blockquote class=&quot;tr_bq&quot;&gt;
&lt;br /&gt;&lt;span style=&quot;background-color: transparent;&quot;&gt;Good evening, London. Allow me first to apologize for this interruption. I do, like many of you, appreciate the comforts of every day routine- the security of the familiar, the tranquility of repetition. I enjoy them as much as any bloke. But in the spirit of commemoration, thereby those important events of the past usually associated with someone&#39;s death or the end of some awful bloody struggle, a celebration of a nice holiday, I thought we could mark this November the 5th, a day that is sadly no longer remembered, by taking some time out of our daily lives to sit down and have a little chat. There are of course those who do not want us to speak. I suspect even now, orders are being shouted into telephones, and men with guns will soon be on their way. Why? Because while the truncheon may be used in lieu of conversation, words will always retain their power. Words offer the means to meaning, and for those who will listen, the enunciation of truth. And the truth is, there is something terribly wrong with this country, isn&#39;t there? Cruelty and injustice, intolerance and oppression. And where once you had the freedom to object, to think and speak as you saw fit, you now have censors and systems of surveillance coercing your conformity and soliciting your submission. How did this happen? Who&#39;s to blame? Well certainly there are those more responsible than others, and they will be held accountable, but again truth be told, if you&#39;re looking for the guilty, you need only look into a mirror. I know why you did it. I know you were afraid. Who wouldn&#39;t be? War, terror, disease. There were a myriad of problems which conspired to corrupt your reason and rob you of your common sense. Fear got the best of you, and in your panic you turned to the now high chancellor, Adam Sutler. He promised you order, he promised you peace, and all he demanded in return was your silent, obedient consent. Last night I sought to end that silence. Last night I destroyed the Old Bailey, to remind this country of what it has forgotten. More than four hundred years ago a great citizen wished to embed the fifth of November forever in our memory. His hope was to remind the world that fairness, justice, and freedom are more than words, they are perspectives. So if you&#39;ve seen nothing, if the crimes of this government remain unknown to you then I would suggest you allow the fifth of November to pass unmarked. But if you see what I see, if you feel as I feel, and if you would seek as I seek, then I ask you to stand beside me one year from tonight, outside the gates of Parliament, and together we shall give them a fifth of November that shall never, ever be forgot. V for Vendetta.&lt;/span&gt;&lt;/blockquote&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;visit culturecyber.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://culturecyber.blogspot.com/feeds/8137043373770360241/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/2183902368072223546/8137043373770360241' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/8137043373770360241'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2183902368072223546/posts/default/8137043373770360241'/><link rel='alternate' type='text/html' href='http://culturecyber.blogspot.com/2011/11/occupylondon-night-of-thousand-masks.html' title='#OccupyLondon : The Night of Thousand Masks'/><author><name>takecy</name><uri>http://www.blogger.com/profile/11402044346503963046</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgHjKDkMEKqfzmlvgz7jlxUT1TTSdwQDLFfMQZT39-5H2J56Bt1XzW4xD5_jcGLFgLH_6val7RG2_0p2v7w50bJlkuCD9MA5117ce9yIOu-uLjfz8tjZSSmTJ0ecXTtsZqjdEJjhOxjgs/s72-c/anonymous-mask-uk-occupy-london.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>