<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-6781014655149989103</atom:id><lastBuildDate>Wed, 28 Aug 2024 06:53:47 +0000</lastBuildDate><category>cyberdouchery</category><category>security</category><category>#amazonfail</category><category>IT</category><category>Nigerian</category><category>WSJ</category><category>amazon</category><category>cloud</category><category>comcast</category><category>computer</category><category>fail</category><category>fundamentals</category><category>gmail</category><category>hacker</category><category>homophobia</category><category>introduction</category><category>password leak</category><category>scam</category><category>smart grid</category><category>spam</category><category>vulnerability</category><title>Matt Johansen</title><description></description><link>http://mattjjohansen.blogspot.com/</link><managingEditor>noreply@blogger.com (Matt Johansen)</managingEditor><generator>Blogger</generator><openSearch:totalResults>10</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-7044631177565996873</guid><pubDate>Mon, 28 Sep 2009 19:42:00 +0000</pubDate><atom:updated>2009-09-28T12:45:14.795-07:00</atom:updated><title>New Blog Location</title><description>&lt;a href=&quot;http://www.mattjaysecurity.com/&quot;&gt;My new blog location&lt;/a&gt; in case any of you are wondering where I went.</description><link>http://mattjjohansen.blogspot.com/2009/09/new-blog-location.html</link><author>noreply@blogger.com (Matt Johansen)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-3427828130252205997</guid><pubDate>Thu, 23 Apr 2009 23:09:00 +0000</pubDate><atom:updated>2009-04-23T16:17:56.941-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">fail</category><category domain="http://www.blogger.com/atom/ns#">gmail</category><category domain="http://www.blogger.com/atom/ns#">Nigerian</category><category domain="http://www.blogger.com/atom/ns#">scam</category><category domain="http://www.blogger.com/atom/ns#">spam</category><title>Gmail Spam Folder Fail</title><description>As far as I can remember this is the first email I&#39;ve had slip past Gmail&#39;s spam filters.  I got a good laugh out of this when I woke up this morning.  My first Nigerian cry for help with promise of fortune.&lt;br /&gt;&lt;br /&gt;Just thought I&#39;d throw it up for all to enjoy since I got a good laugh out of it.&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;from asiya bare &lt;asiya_069@msn.com&gt;&lt;br /&gt;reply-to asiya.bare@gmail.com&lt;br /&gt;to &lt;br /&gt;date Thu, Apr 23, 2009 at 10:46 AM&lt;br /&gt;subject Dearest,&lt;br /&gt; &lt;br /&gt; &lt;br /&gt;Dearest,&lt;br /&gt;My dear I am writing this mail with tears and sadness and pains. I  know it will come to you as a suprise since we haven&#39;t known or come across each other before, but kindly bear with me at this moment. I have a special reason why I decided to contact you. My situation at hand is miserable but I trust in God and hope you will be of my help. My name is Asiya Ibrahim Bare 25years old girl and I held from Republic of Niger the daughter of Late General Ibrahim Bare Ma?nassara the former President of the Republic of Niger who was ambushed and killed by dissident soldiers at the military airport in the capital, Niamey with his driver and a former Prefect. You can see more detail about my late father here http://news.bbc.co.uk/onthisday/hi/dates/stories/april/9/newsid_2463000/2463927.stm&lt;br /&gt; &lt;br /&gt;I am constrained to contact you because of the maltreatment which I am receiving from my step mother. She planned to take away all my late father&#39;s treasury and properties from me since the unexpected death of my beloved Father. Meanwhile I wanted to travel to Europe, but she hide away my international passport and other valuable documents. Luckily she did not discover where I kept my father&#39;s File which contained important documents. I am presently staying in the Mission camp in Burkina Faso.&lt;br /&gt; &lt;br /&gt;I am seeking for longterm relationship and investment assistance. My father of blessed memory deposited the sum of US$11.7 Million in one bank in Burkina Faso with my name as the next of kin. I had contacted the Bank to clear the deposit but the Branch Manager told me that being a refugee, my status according to the local law does not authorize me to carry out the operation. However, he advised me to provide a trustee who will stand on my behalf. I had wanted to inform my stepmother about this deposit but I am affraid that she will not offer me anything after the release of the money. Therefore, I decide to seek for your help in transferring the money into your bank account while I will relocate to your country and settle down with you. I have my fathers death certificate and the account number which I will give you as soon as you indicated your interest to help me.&lt;br /&gt; &lt;br /&gt;It is my intention to compensate you with 20% of the total money for your assitance and the balance shall be my investment in any profitable venture which you will recommend to me as have no any idea about foreign investment. Please all communications should be through this email address only for confidential purposes.&lt;br /&gt; &lt;br /&gt;Thanking you alot in anticipation of your quick response. I will send you my photos in my next email.&lt;br /&gt;Yours Sincerely&lt;br /&gt;Asiya Ibrahim Bare&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Poor Mr. Ma?nassara</description><link>http://mattjjohansen.blogspot.com/2009/04/gmail-spam-folder-fail.html</link><author>noreply@blogger.com (Matt Johansen)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-1864386324974327674</guid><pubDate>Wed, 22 Apr 2009 08:22:00 +0000</pubDate><atom:updated>2009-04-22T16:59:30.900-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyberdouchery</category><category domain="http://www.blogger.com/atom/ns#">WSJ</category><title>Cyber Cobra Command</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHq7Nw-NoKwyw5gCUrjPoAo9G6TkIEHrupB2_k2dntJTjLnmXbLtND2jPN2mTpQNIMdwtv1f1vH3czmhG4glT-_2Q_YJDbMYQijHd1jxmNhMcd3sk1bFmlwB4QoW56-_RCAyEHeWGcTn0/s1600-h/hackers.png&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 239px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHq7Nw-NoKwyw5gCUrjPoAo9G6TkIEHrupB2_k2dntJTjLnmXbLtND2jPN2mTpQNIMdwtv1f1vH3czmhG4glT-_2Q_YJDbMYQijHd1jxmNhMcd3sk1bFmlwB4QoW56-_RCAyEHeWGcTn0/s320/hackers.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5327428221159077394&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;Just really couldn&#39;t avoid doing a write-up on this story for LSD. This one goes out to anybody who got one of our glorious &lt;a href=&quot;http://www.liquidmatrix.org/blog/2009/04/13/liquidmatrix-shwag/&quot;&gt;shwag&lt;/a&gt; pieces illustrating our favorite word here at the digest, &lt;b&gt;CYBERDOUCHERY&lt;/b&gt;.&lt;br /&gt;&lt;br /&gt;I know what the reaction from my fellow liquidmatrix folk will be on this but I hope the rest of you can at least keeps your heads from exploding.&lt;br /&gt;&lt;br /&gt;The all powerful and knowing Wall Street Journal announced today that the Obama administration is putting together a &quot;new military command to coordinate the defense of Pentagon computer networks and improve U.S. offensive capabilities in &lt;b&gt;cyber&lt;/b&gt;warfare.&quot;  Before I continue let me state that I am not trying to be a sarcastic punk and don&#39;t think it is a bad idea for the U.S. government to catch up on technology in a security sense. How I feel about the media is a different story.&lt;br /&gt;&lt;br /&gt;Anyway, the article goes on to state that this &quot;new military command&quot; is the result of the proverbial straw on the camel from earlier this week when the (again all powerful and knowing) Wall Street Journal published the &lt;a href=&quot;http://online.wsj.com/article/SB124027491029837401.html&quot;&gt;story&lt;/a&gt; amply titled &quot;Computer Spies Breach Figher-Jet Project&quot;. Which, in my opinion, &lt;b&gt;based on the title&lt;/b&gt; would warrant some government action. However, watch some awesome back peddling:&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;The move comes amid growing evidence that sophisticated &lt;b&gt;cyber&lt;/b&gt;spies are attacking the U.S. electric grid and key defense programs. A page-one story in The Wall Street Journal on Tuesday reported that hackers breached the Pentagon&#39;s biggest weapons program, the $300 billion Joint Strike Fighter, and stole data. Lawmakers on the House Oversight and Government Reform Committee wrote to the defense secretary Tuesday requesting a briefing on the matter.&lt;br /&gt;&lt;br /&gt;Lockheed Martin Corp., the project&#39;s lead contractor, said in a statement Tuesday that it believed the article &quot;was incorrect in its representation of successful &lt;b&gt;cyber&lt;/b&gt; attacks&quot; on the F-35 program. &quot;To our knowledge, there has never been any classified information breach,&quot; the statement said. The Journal story didn&#39;t say the stolen information was classified.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;Well that is just impressive work that demonstrates media experience beyond my years.&lt;br /&gt;&lt;br /&gt;But wait! I smell a new &lt;b&gt;cyber&lt;/b&gt; buzzword!&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;A draft of the White House review steps gingerly around the question of how to improve computer security in the private sector, especially key infrastructure such as telecommunications and the electricity grid. The document stresses the importance of working with the private sector and civil-liberties groups to craft a solution, but doesn&#39;t call for a specific government role, according to a person familiar with the draft.&lt;br /&gt;&lt;br /&gt;Defense Secretary Robert Gates plans to announce the creation of a new military &quot;&lt;b&gt;cyber command&lt;/b&gt;&quot; after the rollout of the White House review, according to military officials familiar with the plan.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://online.wsj.com/article/SB124035738674441033.html&quot;&gt;article&lt;/a&gt; goes on to use my new favorite buzzword &lt;b&gt;cyber command&lt;/b&gt; some more in detail. Read on if you dare.</description><link>http://mattjjohansen.blogspot.com/2009/04/just-really-couldnt-avoid-doing-write.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgHq7Nw-NoKwyw5gCUrjPoAo9G6TkIEHrupB2_k2dntJTjLnmXbLtND2jPN2mTpQNIMdwtv1f1vH3czmhG4glT-_2Q_YJDbMYQijHd1jxmNhMcd3sk1bFmlwB4QoW56-_RCAyEHeWGcTn0/s72-c/hackers.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-8807634398285732553</guid><pubDate>Mon, 13 Apr 2009 20:26:00 +0000</pubDate><atom:updated>2009-04-22T17:01:33.923-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">#amazonfail</category><category domain="http://www.blogger.com/atom/ns#">amazon</category><category domain="http://www.blogger.com/atom/ns#">cloud</category><category domain="http://www.blogger.com/atom/ns#">hacker</category><category domain="http://www.blogger.com/atom/ns#">homophobia</category><title>Amazonaphobia</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHW5x0kHn48dgt2-DZsQgTX2YuLWNVJu-A1CkcBNjTrERm219yQPxNIn_CsuAAD27rB5fE4YnZ4QD_C3euI4kmSrpEiDiLNAbpw24Z9wd33-oxRXg7kcY1isiKgu_K8xsB_tyim1VhNBU/s1600-h/20081105-homophobia.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 304px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHW5x0kHn48dgt2-DZsQgTX2YuLWNVJu-A1CkcBNjTrERm219yQPxNIn_CsuAAD27rB5fE4YnZ4QD_C3euI4kmSrpEiDiLNAbpw24Z9wd33-oxRXg7kcY1isiKgu_K8xsB_tyim1VhNBU/s320/20081105-homophobia.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5324275630018283810&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;It seems that &lt;a href=&quot;http://www.amazon.com/&quot;&gt;Amazon&lt;/a&gt; has had some interesting going ons recently, and by interesting I of course mean &lt;i&gt;interesting&lt;/i&gt;.&lt;br /&gt;&lt;br /&gt;I started to write this article last night but the Easter dinner/dessert food coma won the battle and I&#39;m glad it did.  As it turns out what was going to be an article solely about censorship in a major online community as transformed into a perfect security article overnight :).&lt;br /&gt;&lt;br /&gt;I suppose a brief recap is in order.  Long story short this past Friday some homosexual themed romance novels started disappearing from the site&#39;s sale&#39;s rankings.  Amazon first claimed that they were &quot;excluding adult material from appearing in some searches and best seller lists.&quot;  Well it just so turns out that these lists and searches are generated using user sale&#39;s ranks.&lt;br /&gt;&lt;br /&gt;Step two in this story is of course a Twitter explosion of hash-tag anger which is self explanatory #amazonfail.  Step three? You guessed it, an &lt;a href=&quot;http://latimesblogs.latimes.com/jacketcopy/2009/04/amazon-responds-to-adult-queries-blames-a-glitch.html&quot;&gt;announcement&lt;/a&gt; from Amazon PR that claimed a glitch in the system.  First I&#39;ve heard of a homophobic glitch but I entertained the idea as plausible.&lt;br /&gt;&lt;br /&gt;Well that&#39;s where the news stopped on my radar last night until a very interesting turn of events this morning.  A hacker known as Weev stepped forward claiming responsibility for the #amazonfail stating an exploitation of an Amazon product rating vulnerability.  Apparently after a product is flagged as inappropriate enough times it is stripped from the sales rankings lists auto-magically.  With some help from some Nigerian friends who registered Amazon accounts and flagged books for him, Weev systematically picked off whichever books he pleased.  (Whats with hackers stepping forward lately??)&lt;br /&gt;&lt;br /&gt;In case your interested here is the hacker&#39;s &quot;confession&quot; that he posted on his LiveJournal:&lt;br /&gt;&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;Hay dude. Amazon removed its customer-based reporting of adult books yesterday. I guess my game is up! Here&#39;s a nice piece I like to call &quot;how to cause moral outrage from the entire Internet in ten lines of code&quot;.&lt;br /&gt;&lt;br /&gt;I really hate reputation systems based on user input. This started a while back on Craigslist, when I was trying to score chicks to do heroin with. My listings like &quot;looking to get tarred and pleasured&quot; and &quot;Searching for a heroine to do the paronym of this sentence&#39;s lexical subject&quot; kept getting flagged. The audacity of the San Francisco gay community disgusted me. They would flag my ads down but searching craigslist for &quot;pnp&quot; or &quot;tina&quot; reveals tons of hairy dudes searching for other hairy dudes to do meth with. So I decided to get them back, and cause a few hundred thousand queers some outrage.&lt;br /&gt;&lt;br /&gt;I&#39;m logged into Amazon at the time and see it has a &quot;report as inappropriate&quot; feature at the bottom of a page. I do a quick test on a few sets of gay books. I see that I can get them removed from search rankings with an insignificant number of votes.&lt;br /&gt;&lt;br /&gt;I do this for a while, but never really get off my ass to scale it until recently.&lt;br /&gt;&lt;br /&gt;So I script some quick bash.&lt;br /&gt;#!/bin/bash&lt;br /&gt;let count = 1&lt;br /&gt;while true; do&lt;br /&gt;links -dump &#39;http://www.amazon.com/s/qid=0/?ie=ASCII&amp;amp;rs=1000&amp;amp;keywords=Gay_and_Lesbian&amp;amp;rh=n%3A!1000%2Ci%3Astripbooks%2Ck%3AHomosexuality&amp;amp;page=&#39;`echo $count`|grep \/dp\/ &gt;&gt; /tmp/amazon&lt;br /&gt;((count++))&lt;br /&gt;done&lt;br /&gt;&lt;br /&gt;There&#39;s some quick code to grab all the Gay and Lesbian metadata-tagged books on amazon. Then I pull out all the IDs of the given books from those URLs:&lt;br /&gt;&lt;br /&gt;cat /tmp/amazon |sed s/.*dp\\/// |sed s/\\/ref.*//&lt;br /&gt;&lt;br /&gt;and I have a neat little list of the internal product ID of every fag book on Amazon.&lt;br /&gt;&lt;br /&gt;Now from here it was a matter of getting a lot of people to vote for the books. The thing about the adult reporting function of Amazon was that it was vulnerable to something called &quot;Cross-site request forgery&#39;. This means if I referred someone to the URL of the successful complaint, it would register as a complaint if they were logged in. So now it is a numbers game.&lt;br /&gt;&lt;br /&gt;I know some people who run some extremely high traffic (Alexa top 1000) websites. I show them my idea, and we all agree that it is pretty funny. They put an invisible iframe in their websites to refer people to the complaint URLs which caused huge numbers of visitors to report gay and lesbian items as inappropriate without their knowledge.&lt;br /&gt;&lt;br /&gt;I also hired third worlders to register accounts for me en masse. If you ever need a service like that, you can find them in a post like this advertising in the comments:&lt;br /&gt;http://ha.ckers.org/blog/20070427/solving-captchas-for-cash/&lt;br /&gt;&lt;br /&gt;Then they would log into the accounts, save the cookies in a cookie file and send it to me.&lt;br /&gt;&lt;br /&gt;Then I used the cookie files like so to automated-report all the books:&lt;br /&gt;&lt;br /&gt;for i in `cat /tmp/amazon |sed s/.*dp\\/// |sed s/\\/ref.*//`; do lynx -cookie_file=/home/avex/cookie1 http://www.amazon.com/ri/product-listing/`echo $i`/;done&lt;br /&gt;&lt;br /&gt;The combination of these two actions resulted in a mass delisting of queer books being delisted from the rankings at Amazon.&lt;br /&gt;&lt;br /&gt;I guess my game is up, but 300+ hits on google news for amazon gay&lt;br /&gt;and outrage across the blogosphere&lt;br /&gt;ain&#39;t so bad.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;&lt;br /&gt;Not sure if this is actually true but it certainly is &lt;i&gt;interesting&lt;/i&gt;.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;UPDATE:&lt;/span&gt; Some conflicting responses.. Amazon has come up with some stats to back the before-mentioned glitch.&lt;br /&gt;Here&#39;s a statement from Amazon spokesman Drew Herdener:&lt;br /&gt;&lt;blockquote&gt;&lt;br /&gt;This is an embarrassing and ham-fisted cataloging error for a company that prides itself on offering complete selection.&lt;br /&gt; &lt;br /&gt;It has been misreported that the issue was limited to Gay &amp; Lesbian themed titles – in fact, it impacted 57,310 books in a number of broad categories such as Health, Mind &amp; Body, Reproductive &amp; Sexual Medicine, and Erotica. This problem impacted books not just in the United States but globally.  It affected not just sales rank but also had the effect of removing the books from Amazon’s main product search.  &lt;br /&gt; &lt;br /&gt;Many books have now been fixed and we’re in the process of fixing the remainder as quickly as possible, and we intend to implement new measures to make this kind of accident less likely to occur in the future.&lt;br /&gt;&lt;/blockquote&gt;</description><link>http://mattjjohansen.blogspot.com/2009/04/it-seems-that-amazon-has-had-some.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHW5x0kHn48dgt2-DZsQgTX2YuLWNVJu-A1CkcBNjTrERm219yQPxNIn_CsuAAD27rB5fE4YnZ4QD_C3euI4kmSrpEiDiLNAbpw24Z9wd33-oxRXg7kcY1isiKgu_K8xsB_tyim1VhNBU/s72-c/20081105-homophobia.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-156698315440943268</guid><pubDate>Mon, 23 Mar 2009 06:33:00 +0000</pubDate><atom:updated>2009-04-22T17:01:43.013-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">cyberdouchery</category><category domain="http://www.blogger.com/atom/ns#">smart grid</category><category domain="http://www.blogger.com/atom/ns#">vulnerability</category><title>How Smart is Your Grid?</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuCxCuRfptQSfyCHQ73i6wMj4b1I4ra0rVUpGGmeq3Ly9FcNiWHDFTfLZ5d3P1L3Qn7wpJ4STHdLu57aUvdpPJnWvKyvCWEArInH-vlhVWGtvXz9EjwSAKsMYTJCZwRJ2TsOPXC8k_5eg/s1600-h/blackout.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 320px; height: 282px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuCxCuRfptQSfyCHQ73i6wMj4b1I4ra0rVUpGGmeq3Ly9FcNiWHDFTfLZ5d3P1L3Qn7wpJ4STHdLu57aUvdpPJnWvKyvCWEArInH-vlhVWGtvXz9EjwSAKsMYTJCZwRJ2TsOPXC8k_5eg/s320/blackout.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5316267917207802802&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;So in an utter disregard for buzzwords, CNN Homeland Security Correspondent Jeanne Meserve has dwelled into &lt;a href=&quot;http://www.liquidmatrix.org/blog/about/&quot;&gt;James&#39;&lt;/a&gt; land of &lt;b&gt;cyberdouchery&lt;/b&gt;.  The &lt;a href=&quot;http://www.cnn.com/2009/TECH/03/20/smartgrid.vulnerability/&quot;&gt;article&lt;/a&gt; entitled &quot;Smart Grid may be vulnerable to hackers&quot; briefly discusses the United States and it&#39;s respective power companies anxiously deploying a high-tech power grid while simultaneously raping the words &quot;cyber&quot; and &quot;smart&quot;.&lt;br /&gt;&lt;br /&gt;Power companies are installing new automated meters at an astonishing rate which seems to be the first step in the roll out. The eventual goal is to improve electricity efficiency and reliability using sensors on your home meters that talk back to the power grid.  President Obama is on board dishing out $4.5 billion towards all this.&lt;br /&gt;&lt;br /&gt;So where does the problem lie?&lt;br /&gt;&lt;br /&gt;Well some interesting quotes throughout the article define the issue very clearly. One of our friends at &lt;a href=&quot;http://www.inguardians.com/&quot;&gt;InGuardians&lt;/a&gt;, &lt;a href=&quot;http://www.inguardians.com/info/#Skoudis&quot;&gt;Ed Skoudis&lt;/a&gt; chimed in stating, &lt;blockquote&gt; &quot;I think we are putting the cart before the horse here to get this stuff rolled out very fast.&quot; &lt;/blockquote&gt; Also, Matt Spaur, a product marketing analyst added my favorite tidbit, &lt;blockquote&gt; &quot;Any network can be hacked.&quot; &lt;/blockquote&gt;All in all, this is obviously a huge security issue and if you even remotely (no pun intended) glanced at &lt;a href=&quot;http://www.imdb.com/title/tt0337978/&quot;&gt;Live Free or Die Hard&lt;/a&gt; you&#39;d get the picture. Electric grids are all ready &quot;hackable&quot; you just have to not be afraid of heights and be a huge fan of rubber. The automation wouldn&#39;t necessarily create many new vulnerabilities, it would most definitely increase the risk by increasing the likelihood and severity of exploitation.&lt;br /&gt;&lt;br /&gt;With this system in place there really is no room for &quot;roll it out and patch it later.&quot; We can all hope that the money makers take their time on this one and do it right.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.cnn.com/2009/TECH/03/20/smartgrid.vulnerability/&quot;&gt;Article Link&lt;/a&gt;</description><link>http://mattjjohansen.blogspot.com/2009/03/so-in-utter-disregard-for-buzzwords-cnn.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuCxCuRfptQSfyCHQ73i6wMj4b1I4ra0rVUpGGmeq3Ly9FcNiWHDFTfLZ5d3P1L3Qn7wpJ4STHdLu57aUvdpPJnWvKyvCWEArInH-vlhVWGtvXz9EjwSAKsMYTJCZwRJ2TsOPXC8k_5eg/s72-c/blackout.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-5871153617093590400</guid><pubDate>Wed, 18 Mar 2009 21:54:00 +0000</pubDate><atom:updated>2009-04-22T17:01:52.959-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">comcast</category><category domain="http://www.blogger.com/atom/ns#">password leak</category><title>Comcast</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDytu5HqK_2GnEWGNNgKMB1cOxPRt4WUchd0Ev5GhHth2v3I5lFR-j72LxD2pea4fBtALQKqnDJfwa9bgNhxXQPuPp4rtT6QIi0FRGgO1kNPJjnR8WuBkuEHBr4EFGhc_sX9WNWsmKD0Y/s1600-h/laptop+padlock.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 300px; height: 236px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDytu5HqK_2GnEWGNNgKMB1cOxPRt4WUchd0Ev5GhHth2v3I5lFR-j72LxD2pea4fBtALQKqnDJfwa9bgNhxXQPuPp4rtT6QIi0FRGgO1kNPJjnR8WuBkuEHBr4EFGhc_sX9WNWsmKD0Y/s320/laptop+padlock.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5314649745525244146&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;Earlier this week it was reported that a list of &lt;a href=&quot;http://www.comcast.com/&quot;&gt;Comcast&lt;/a&gt; customers usernames and passwords, 8,000 entries long, was exposed on a public website for at least two months. A man by the name of Kevin Andreyo who works as a professor at Wilkes University came across the list while performing a search for his own personal e-mail address.  The search dug up a website called &lt;a href=&quot;http://scribd.com/&quot;&gt;Scribd&lt;/a&gt; which is a document sharing site that housed the list of 8,000 user names and passwords including Mr. Andreyo&#39;s.&lt;br /&gt;&lt;br /&gt;Reportedly the list had been viewed &quot;over 345 times and downloaded 27 times.&quot; This in it of itself is a relatively small number but means that the list is still out there and can be shared again or even added to.&lt;br /&gt;&lt;br /&gt;A spokesperson for Comcast commented stating that the list contained only 700 active accounts and that the rest were either dead or not Comcast customers. She also stated she does not believe the breach came from within the company because the manner in which the list was created was sloppy.&lt;br /&gt;&lt;br /&gt;Comcast can downplay this as much as they&#39;d like but it sounds to me like, at least, 345 people got their hands on a seriously dangerous resource.  At the safest end of the spectrum of what could happen with this, people can add to their lists of known usernames and more importantly list of known passwords. I&#39;ve seen what a wordlist compiled of actual passwords can do and 8,000 attempts would fly by in less than 3 or 4 seconds.&lt;br /&gt;&lt;br /&gt;Also if only a fraction of items on the list were Comcast customers, what were the other items customers of? Chase? Bank of America? AIG executives?&lt;br /&gt;&lt;br /&gt;I guess it’s just a good thing that it was only up for two months, as far as we know, even though that is two months too long.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://bits.blogs.nytimes.com/2009/03/16/passwords-of-8000-comcast-customers-exposed/&quot;&gt;Artcile Link&lt;/a&gt;</description><link>http://mattjjohansen.blogspot.com/2009/03/comcast.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDytu5HqK_2GnEWGNNgKMB1cOxPRt4WUchd0Ev5GhHth2v3I5lFR-j72LxD2pea4fBtALQKqnDJfwa9bgNhxXQPuPp4rtT6QIi0FRGgO1kNPJjnR8WuBkuEHBr4EFGhc_sX9WNWsmKD0Y/s72-c/laptop+padlock.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-1049756479544346878</guid><pubDate>Mon, 16 Mar 2009 04:43:00 +0000</pubDate><atom:updated>2009-04-22T17:06:44.940-07:00</atom:updated><title>Google Rains on Cloud Users..</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBk7lP9dz6IRryBRdlXNM0U_DKMOmKAhaj_UCNj6g_npxUofeAhZFUvbf6jTPrNKVsOYeGwHugHJXQHjMZhJtjYv8aIqnFW9tDrB_quvvz6eg37AT2vSjSim0xBWcEa_Vv6VqrCkClOg8/s1600-h/question-cloud_4.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 202px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBk7lP9dz6IRryBRdlXNM0U_DKMOmKAhaj_UCNj6g_npxUofeAhZFUvbf6jTPrNKVsOYeGwHugHJXQHjMZhJtjYv8aIqnFW9tDrB_quvvz6eg37AT2vSjSim0xBWcEa_Vv6VqrCkClOg8/s320/question-cloud_4.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5313641802156894178&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:worddocument&gt;   &lt;w:view&gt;Normal&lt;/w:View&gt;   &lt;w:zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:trackmoves/&gt;   &lt;w:trackformatting/&gt;   &lt;w:punctuationkerning/&gt;   &lt;w:validateagainstschemas/&gt;   &lt;w:saveifxmlinvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:ignoremixedcontent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:alwaysshowplaceholdertext&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:donotpromoteqf/&gt;   &lt;w:lidthemeother&gt;EN-US&lt;/w:LidThemeOther&gt;   &lt;w:lidthemeasian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:lidthemecomplexscript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:compatibility&gt;    &lt;w:breakwrappedtables/&gt;    &lt;w:snaptogridincell/&gt;    &lt;w:wraptextwithpunct/&gt;    &lt;w:useasianbreakrules/&gt;    &lt;w:dontgrowautofit/&gt;    &lt;w:splitpgbreakandparamark/&gt;    &lt;w:dontvertaligncellwithsp/&gt;    &lt;w:dontbreakconstrainedforcedtables/&gt;    &lt;w:dontvertalignintxbx/&gt;    &lt;w:word11kerningpairs/&gt;    &lt;w:cachedcolbalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:browserlevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathpr&gt;    &lt;m:mathfont val=&quot;Cambria Math&quot;&gt;    &lt;m:brkbin val=&quot;before&quot;&gt;    &lt;m:brkbinsub val=&quot;&amp;#45;-&quot;&gt;    &lt;m:smallfrac val=&quot;off&quot;&gt;    &lt;m:dispdef/&gt;    &lt;m:lmargin val=&quot;0&quot;&gt;    &lt;m:rmargin val=&quot;0&quot;&gt;    &lt;m:defjc val=&quot;centerGroup&quot;&gt;    &lt;m:wrapindent val=&quot;1440&quot;&gt;    &lt;m:intlim val=&quot;subSup&quot;&gt;    &lt;m:narylim val=&quot;undOvr&quot;&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:latentstyles deflockedstate=&quot;false&quot; defunhidewhenused=&quot;true&quot; defsemihidden=&quot;true&quot; defqformat=&quot;false&quot; defpriority=&quot;99&quot; latentstylecount=&quot;267&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Normal&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;heading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;9&quot; qformat=&quot;true&quot; name=&quot;heading 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 7&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 8&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; name=&quot;toc 9&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;35&quot; qformat=&quot;true&quot; name=&quot;caption&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;10&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; name=&quot;Default Paragraph Font&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; name=&quot;Body Text&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;11&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtitle&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;0&quot; name=&quot;Hyperlink&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;22&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Strong&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;20&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;59&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Table Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Placeholder Text&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;1&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;No Spacing&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Revision&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;34&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;List Paragraph&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;29&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;30&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Quote&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 1&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 2&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 3&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 4&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 5&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;60&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;61&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;62&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Light Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;63&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;64&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Shading 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;65&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;66&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium List 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;67&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 1 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;68&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 2 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;69&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Medium Grid 3 Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;70&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Dark List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;71&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Shading Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;72&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful List Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;73&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; name=&quot;Colorful Grid Accent 6&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;19&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;21&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Emphasis&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;31&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Subtle Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;32&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Intense Reference&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;33&quot; semihidden=&quot;false&quot; unhidewhenused=&quot;false&quot; qformat=&quot;true&quot; name=&quot;Book Title&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;37&quot; name=&quot;Bibliography&quot;&gt;   &lt;w:lsdexception locked=&quot;false&quot; priority=&quot;39&quot; qformat=&quot;true&quot; name=&quot;TOC Heading&quot;&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;style&gt; &lt;!--  /* Font Definitions */  @font-face  {font-family:&quot;Cambria Math&quot;;  panose-1:2 4 5 3 5 4 6 3 2 4;  mso-font-charset:0;  mso-generic-font-family:roman;  mso-font-pitch:variable;  mso-font-signature:-1610611985 1107304683 0 0 159 0;} @font-face  {font-family:Verdana;  panose-1:2 11 6 4 3 5 4 4 2 4;  mso-font-charset:0;  mso-generic-font-family:swiss;  mso-font-pitch:variable;  mso-font-signature:-1593833729 1073750107 16 0 415 0;}  /* Style Definitions */  p.MsoNormal, li.MsoNormal, div.MsoNormal  {mso-style-unhide:no;  mso-style-qformat:yes;  mso-style-parent:&quot;&quot;;  margin:4.3pt;  mso-pagination:none;  mso-hyphenate:none;  font-size:10.0pt;  font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;  mso-fareast-font-family:Verdana;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-fareast-language:#00FF;} p.MsoBodyText, li.MsoBodyText, div.MsoBodyText  {mso-style-noshow:yes;  mso-style-unhide:no;  mso-style-link:&quot;Body Text Char&quot;;  margin:0in;  margin-bottom:.0001pt;  mso-pagination:none;  mso-hyphenate:none;  font-size:10.0pt;  font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;  mso-fareast-font-family:Verdana;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-fareast-language:#00FF;} a:link, span.MsoHyperlink  {mso-style-noshow:yes;  mso-style-unhide:no;  mso-style-parent:&quot;&quot;;  color:navy;  text-decoration:underline;  text-underline:single;} a:visited, span.MsoHyperlinkFollowed  {mso-style-noshow:yes;  mso-style-priority:99;  color:purple;  mso-themecolor:followedhyperlink;  text-decoration:underline;  text-underline:single;} span.BodyTextChar  {mso-style-name:&quot;Body Text Char&quot;;  mso-style-noshow:yes;  mso-style-unhide:no;  mso-style-locked:yes;  mso-style-link:&quot;Body Text&quot;;  font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;  mso-ascii-font-family:Verdana;  mso-fareast-font-family:Verdana;  mso-hansi-font-family:Verdana;  mso-fareast-language:#00FF;} p.Quotations, li.Quotations, div.Quotations  {mso-style-name:Quotations;  mso-style-unhide:no;  margin-top:4.3pt;  margin-right:28.35pt;  margin-bottom:14.15pt;  margin-left:28.35pt;  mso-pagination:none;  mso-hyphenate:none;  font-size:10.0pt;  font-family:&quot;Verdana&quot;,&quot;sans-serif&quot;;  mso-fareast-font-family:Verdana;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-fareast-language:#00FF;} .MsoChpDefault  {mso-style-type:export-only;  mso-default-props:yes;  font-size:10.0pt;  mso-ansi-font-size:10.0pt;  mso-bidi-font-size:10.0pt;} @page Section1  {size:8.5in 11.0in;  margin:28.35pt 28.35pt 28.35pt 56.7pt;  mso-header-margin:28.35pt;  mso-footer-margin:28.35pt;  mso-paper-source:0;} div.Section1  {page:Section1;  mso-footnote-position:beneath-text;  mso-footnote-numbering-restart:each-page;  mso-endnote-numbering-style:arabic;} @page Section2  {size:8.5in 11.0in;  margin:28.35pt 28.35pt 28.35pt 56.7pt;  mso-header-margin:28.35pt;  mso-footer-margin:28.35pt;  mso-paper-source:0;} div.Section2  {page:Section2;  mso-footnote-position:beneath-text;  mso-footnote-numbering-restart:each-page;  mso-endnote-numbering-style:arabic;} --&gt; &lt;/style&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;  /* Style Definitions */  table.MsoNormalTable  {mso-style-name:&quot;Table Normal&quot;;  mso-tstyle-rowband-size:0;  mso-tstyle-colband-size:0;  mso-style-noshow:yes;  mso-style-priority:99;  mso-style-qformat:yes;  mso-style-parent:&quot;&quot;;  mso-padding-alt:0in 5.4pt 0in 5.4pt;  mso-para-margin:0in;  mso-para-margin-bottom:.0001pt;  mso-pagination:widow-orphan;  font-size:11.0pt;  font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;  mso-ascii-font-family:Calibri;  mso-ascii-theme-font:minor-latin;  mso-fareast-font-family:&quot;Times New Roman&quot;;  mso-fareast-theme-font:minor-fareast;  mso-hansi-font-family:Calibri;  mso-hansi-theme-font:minor-latin;  mso-bidi-font-family:&quot;Times New Roman&quot;;  mso-bidi-theme-font:minor-bidi;} &lt;/style&gt; &lt;![endif]--&gt;&lt;p class=&quot;MsoBodyText&quot; style=&quot;margin-bottom: 14.15pt;&quot;&gt;&lt;br /&gt;&lt;span style=&quot;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoBodyText&quot; style=&quot;margin-bottom: 14.15pt;&quot;&gt;&lt;span style=&quot;&quot;&gt; &lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;I came across some interesting stories about the all mighty Google cloud features in the past couple of days.  The first was about Gdrive, a specific example of a broader idea of online storage space.  This idea is growing ever more popular now that the &quot;cloud&quot; is becoming a buzz word in the community and Google is taking another step towards being the all mighty one.  This is an old idea done a new way with most likely lots of Google flare such as booting from an online hard drive and automated backups.&lt;br /&gt;&lt;br /&gt;Very interesting ideas that of course people are very excited about but leave it to the security people to kill the hype.&lt;br /&gt;&lt;br /&gt;If done right this would be a great service just as network share drives with group or personal permission folders are great on closed networks.  But an interesting point was discussed on a recent episode of &lt;/span&gt;&lt;a name=&quot;cup1&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://revision3.com/diggnation/&quot;&gt;Diggnation&lt;/a&gt;&lt;span style=&quot;&quot;&gt; when Kevin Rose spoke of a certain targeting problem.  In general the everyday user of this service would most likely be left alone but what about people more under a public spotlight.  Kevin referred specifically to him or his co-host Alex putting up personal photos that some hacker savvy fan would &lt;i style=&quot;&quot;&gt;love&lt;/i&gt; to get their hands on.  Even without the ability to gain access to the drive a MITM attack would be very feasible as demonstrated on Gmail with &lt;/span&gt;&lt;a name=&quot;r:us&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.inguardians.com/tools/&quot;&gt;The Middler&lt;/a&gt;&lt;span style=&quot;&quot;&gt; at &lt;/span&gt;&lt;a name=&quot;dm6d&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.shmoocon.org/&quot;&gt;Shmoocon&lt;/a&gt;&lt;span style=&quot;&quot;&gt; .&lt;br /&gt;&lt;br /&gt;As for the confidence in Google and its ability to protect your privacy, I stumbled across another article about a &lt;/span&gt;&lt;a name=&quot;khgj&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.google.com/google-d-s/tour1.html&quot;&gt;Google Docs&lt;/a&gt;&lt;span style=&quot;&quot;&gt; sharing bug.  Google has sent a letter to users who have been effected by this bug explaining that some of their documents were shared with previous collaborators without you knowing it.&lt;br /&gt;&lt;br /&gt;Alice:  &quot;Honey, who is this Eve woman and why are we working on a list of gifts for her?&quot;&lt;br /&gt;&lt;br /&gt;Bob:    &quot;...&quot;&lt;br /&gt;&lt;br /&gt;Actual letter sent by Google:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;Dear Google Docs user, &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;We wanted to let you know about a recent issue with your Google Docs account. We’ve identified and fixed a bug which may have caused you to share some of your documents without your knowledge. This inadvertent sharing was limited to people with whom you, or a collaborator with sharing rights, had previously shared a document. The issue only occurred if you, or a collaborator with sharing rights, selected multiple documents and presentations from the documents list and changed the sharing permissions. This issue affected documents and presentations, but not spreadsheets. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;To help remedy this issue, we have used an automated process to remove collaborators and viewers from the documents that we identified as being affected. Since the impacted documents are now accessible only to you, you will need to re-share the documents manually. For your reference, we’ve listed below the documents identified as being affected. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;We apologize for the inconvenience that this issue may have caused. We want to assure you that we are treating this issue with the highest priority. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;&lt;o:p&gt; &lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;Quotations&quot;&gt;&lt;span style=&quot;&quot;&gt;The Google Docs Team &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;  &lt;p class=&quot;MsoBodyText&quot;&gt;&lt;br /&gt;It has been reported to have effected around .05% of Google Doc users which could still be a pretty large number but isn&#39;t a major leak.  This still raises a few questions especially when it comes to your confidence in upcoming services such as Gdrive and other people&#39;s ability to access your data.&lt;br /&gt;&lt;br /&gt;Just some food for thought!&lt;br /&gt;&lt;br /&gt;-Matt Johansen&lt;br /&gt;&lt;br /&gt;&lt;a name=&quot;vb:v&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://www.techcrunch.com/2009/03/07/huge-google-privacy-blunder-shares-your-docs-without-permission/&quot;&gt;Google Docs Article&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a name=&quot;qwxt&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://blogs.zdnet.com/Google/?p=121&quot;&gt;Gdrive Article&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;!--[if !supportLineBreakNewLine]--&gt;  &lt;!--[endif]--&gt;&lt;/p&gt;</description><link>http://mattjjohansen.blogspot.com/2009/03/google-rains-on-cloud-users.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBk7lP9dz6IRryBRdlXNM0U_DKMOmKAhaj_UCNj6g_npxUofeAhZFUvbf6jTPrNKVsOYeGwHugHJXQHjMZhJtjYv8aIqnFW9tDrB_quvvz6eg37AT2vSjSim0xBWcEa_Vv6VqrCkClOg8/s72-c/question-cloud_4.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-3812413808464813401</guid><pubDate>Mon, 16 Mar 2009 04:40:00 +0000</pubDate><atom:updated>2009-04-22T17:06:54.811-07:00</atom:updated><title>Tuesday Bloody Tuesday</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4siiR3xTmdvnrr7CvEGqhQzC6MpKeoF_gIWuommiSYILxbMpGUodOYN2opQYeUe9lQ2oG0QtJw2vbO7rV3Nay_ON-Ho4nW9iHC9iBsaWcMi0JLMdorGoaHa_M05MP_aLjYf4nmsazWo/s1600-h/tuesday5.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 314px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4siiR3xTmdvnrr7CvEGqhQzC6MpKeoF_gIWuommiSYILxbMpGUodOYN2opQYeUe9lQ2oG0QtJw2vbO7rV3Nay_ON-Ho4nW9iHC9iBsaWcMi0JLMdorGoaHa_M05MP_aLjYf4nmsazWo/s320/tuesday5.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5313641423083355058&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;My latest post over at &lt;a href=&quot;http://www.liquidmatrix.org/blog&quot;&gt;Liquidmatrix Security Digest&lt;/a&gt;:&lt;br /&gt;&lt;br /&gt;Tuesday March 10th and it&#39;s once again Patch Tuesday for all you Microsoft users. Yesterday&#39;s release was a very straightforward and light load of fixes but spanned all supported versions of Windows. Some specific updates pushed out are &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/MS09-006.mspx&quot;&gt;MS09-006&lt;/a&gt;, &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/MS09-007.mspx&quot;&gt;MS09-007&lt;/a&gt;, and &lt;a href=&quot;http://www.microsoft.com/technet/security/bulletin/MS09-008.mspx&quot;&gt;MS09-008&lt;/a&gt;. MS09-006 is a update for the Windows kernel vulnerability that is labeled critical for Windows 2000 SP4 all the way up to Vista SP1. The other two updates fix vulnerabilities in SChannel and DNS/WINS Server respectively and is important for Windows 2000 SP4 up to XP SP3 and Server 2003. Other than that the only things to look out for are the ordinary Malicious Software Removal Tool and Windows Mail spam filter. &lt;a href=&quot;http://support.microsoft.com/?kbid=894199&amp;amp;SD=tech&quot;&gt;Full write up.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Possibly more interesting than that is the fact that Symantec and Adobe released updates on the same day under unusual circumstances.  George Hulme has a good &lt;a href=&quot;http://www.informationweek.com/blog/main/archives/2009/03/crazy_patch_tue.html&quot;&gt;write up&lt;/a&gt; of the situation the he posted this afternoon. To sum it up Adobe has been working on a fix for their recent &lt;a href=&quot;http://news.cnet.com/8301-1009_3-10168266-83.html&quot;&gt;zero-day&lt;/a&gt; and announced it would be released March 11th. They decided to release it yesterday, March 10th, which happened to be Patch Tuesday which can be commended for getting it out early but for most working in the trenches that are operations probably wasn&#39;t appreciated.&lt;br /&gt;&lt;br /&gt;On top of that Symantec released a patch with the filename PIFTS.exe, which looks up the Symantec product and version on a system and reports it back. Well this report back happened to not be signed because of human error and sent up some firewall flares for most users. This must have been a Help Desk nightmare along with the Adobe issue on Patch Tuesday. Not only a Help Desk problem, if the users decided to search what PIFTS.exe was on their own it is reported that malicious sites recognized this and made their sites appear at the top of those searches. Good write up on the PIFTS.exe and malicious site issue on SC Magazine found &lt;a href=&quot;http://www.scmagazineus.com/Mystery-Symantec-PIFTSexe-message-exploited/article/128634/&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;This onslaught of patches and patch mishaps must have really affected a lot of companies big and small as they had their time allotted for the Microsoft patches to be pushed. Anybody who works in operations and is part of the team responsible for patch management knows the trials of Patch Tuesday when that is the only issue to deal with. The fact that Adobe pushed their release up and Symantec had an inexcusable mistake all on the same day can really bring things down. Not only can this cause a headache for the people on the team responsible for pushing these patches but if the team required more than one patch in the same day at 3 separate times you are going to have some angry users who aren&#39;t going to restart their machines for you. Heat will be felt all along the food chain and $DIETY forbid if somebody clicked on a site taking advantage of the PIFTS.exe curiosity. Productivity won&#39;t be the only issue that companies will have to deal with this Patch Tuesday or for the rest of the week for that matter.&lt;br /&gt;&lt;br /&gt;[tags]microsoft, security, patch tuesday, ms09-006, ms09-007, ms09-008, symantec, adobe, pifts.exe, patch hell[/tags]</description><link>http://mattjjohansen.blogspot.com/2009/03/tuesday-bloody-tuesday.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii4siiR3xTmdvnrr7CvEGqhQzC6MpKeoF_gIWuommiSYILxbMpGUodOYN2opQYeUe9lQ2oG0QtJw2vbO7rV3Nay_ON-Ho4nW9iHC9iBsaWcMi0JLMdorGoaHa_M05MP_aLjYf4nmsazWo/s72-c/tuesday5.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-9217759233853341484</guid><pubDate>Fri, 02 Jan 2009 00:22:00 +0000</pubDate><atom:updated>2009-01-01T17:05:23.202-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">computer</category><category domain="http://www.blogger.com/atom/ns#">fundamentals</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Computer Security Week 1</title><description>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieRy0VtTLjcjdbUS8MWI4To1MS77anFTntVHA0dfjj7NqWQVLEOQSdqk6ePd8K3bilGKpDsPB6qIQDajW1fA6niJ-fPgW9_Y-FJjm6iSIuCYbF3CNl7vYM8xXT-il7D1lpGHdnTsUOdBY/s1600-h/CIA+triad.png&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 247px; height: 320px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieRy0VtTLjcjdbUS8MWI4To1MS77anFTntVHA0dfjj7NqWQVLEOQSdqk6ePd8K3bilGKpDsPB6qIQDajW1fA6niJ-fPgW9_Y-FJjm6iSIuCYbF3CNl7vYM8xXT-il7D1lpGHdnTsUOdBY/s320/CIA+triad.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5286485780633714226&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;                  In the the very first week of my Computer Security class we were presented with a broad overview of the upcoming semester.  We touched everything from the CIA triad (Confidentiality, Integrity, and Availability) to discussing the more public view of security (i.e. the cyber section of the FBI and Secret Service, identity theft, etc.).&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We were also presented with the following video of Richard Clarke who is the Chairman of Good Harbor Consulting, senior White House Advisor to the last three presidents and an expert in security including cyber security and counterterrorism.  If you would like to watch it you can skip the first 7:30 minutes which is just PR stuff and an introduction.&lt;br /&gt;&lt;br /&gt;&lt;embed src=&quot;http://blip.tv/play/Aa+zFYreFg&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;320&quot; height=&quot;270&quot;&gt;&lt;/embed&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&quot;Richard A. Clarke is an internationally recognized expert on security, including homeland security, national security, cyber security, and counterterrorism. He is currently Chairman of Good Harbor Consulting and an on-air consultant for ABC News. Clarke served the last three Presidents as a senior White House Advisor. Over the course of an unprecedented 11 consecutive years of White House service, he held the titles of Special Assistant to the President for Global Affairs, National Coordinator for Security and Counterterrorism, and Special Advisor to the President for Cyber Security. His published works include the New York Times #1 bestseller Against All Enemies, Scorpion&#39;s Gate, and Breakpoint. Mr. Clarke will be discussing the current state of the war on terrorism and what it means for homeland security and technology.&quot;&lt;br /&gt;&lt;br /&gt;The class was presented with the following.&lt;br /&gt;&lt;br /&gt;&quot;Week 1&lt;br /&gt;&lt;br /&gt;The objectives for this week are to outline what expectations the students may have from the teacher, and what expectation the teacher has from the students. A brief preview for the semester will be provided. At the end of the week, the following topics will have been covered.&lt;br /&gt;&lt;/span&gt;       &lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Fundamental concepts of information security&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Common forms of malware&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;Information Security Life Cycle&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt; &lt;span style=&quot;font-size:100%;&quot;&gt;&lt;br /&gt;Assignment 1&lt;br /&gt;Watch this movie and comment on it in your course blog. You can skip over the first 7:30 minutes, as they are just public relations.&lt;br /&gt;&lt;br /&gt;Can you relate to this clip? Do you see any effects of computer security controls in your daily life? What kind of controls do you see? How do they affect you?&quot;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;If you&#39;d like, I&#39;d be interested to see a few responses from other people who wish to leave comments.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;In the next few weeks of our meetings we covered respectively Laws and Ethics, Authentication, and Access Control.  My next post or two will cover these topics and then we move on to the Defender and Attacker life cycle and break down each step along the way of each.&lt;br /&gt;&lt;/span&gt;</description><link>http://mattjjohansen.blogspot.com/2009/01/computer-security-week-1.html</link><author>noreply@blogger.com (Matt Johansen)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEieRy0VtTLjcjdbUS8MWI4To1MS77anFTntVHA0dfjj7NqWQVLEOQSdqk6ePd8K3bilGKpDsPB6qIQDajW1fA6niJ-fPgW9_Y-FJjm6iSIuCYbF3CNl7vYM8xXT-il7D1lpGHdnTsUOdBY/s72-c/CIA+triad.png" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-6781014655149989103.post-1078899817929311046</guid><pubDate>Sat, 27 Dec 2008 02:05:00 +0000</pubDate><atom:updated>2008-12-27T08:15:45.045-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">introduction</category><category domain="http://www.blogger.com/atom/ns#">IT</category><category domain="http://www.blogger.com/atom/ns#">security</category><title>Embarking on my Blog</title><description>I struggled a bit in deciding how I wanted to approach my first attempt at blogging before finally pulling the trigger.  Considering I wanted to make this a security oriented blog I hit a somewhat important obstacle, experience.  After I mulled it over for a while I decided that was more of a mental obstacle than anything and decided to contribute in whatever way I can and map out the beginning of my journey into a young and exciting new field.&lt;br /&gt;&lt;br /&gt;This being said I should probably introduce myself.  My name is Matt Johansen and I&#39;m 21 years old and just graduated from Adelphi University in Garden City New York with a BS in Computer Science and a minor in Mathematics.  I am an only child born and raised on Long Island who has as much IT experience as a 21 year old can have as my first job was the sole student tech for my high school&#39;s school district.  From there I worked at Adelphi University, also as a student tech, and soon was promoted to one of four head student techs and received a ton of customer service experience as I was the guy everybody that lived on campus recognized as the &quot;computer guy&quot; who helped them in their dorms.  This past summer I worked at Arrow Electronics as a Data Security Analyst on a team of 5 managing an Active Directory environment of over 12,000 employees internationally.  During that summer internship I proved myself enough for them to ask me to come on part time while finishing my final semester at school and hopefully brought on full time when I graduated.  Unfortunately, the economy hit home and Arrow Electronics was forced to lay off over 70 IT employees in a very short period of time, a group I was included in.&lt;br /&gt;&lt;br /&gt;Okay that is my brief synopsis of my brief career.  To start off on my blogging adventure I decided to discuss part of the reason my interest in entering this field was reinvigorated, a semester long special topics senior seminar with &lt;a href=&quot;http://www.leune.org/&quot;&gt;Kees Leune&lt;/a&gt; on Computer Security.  Over the next few weeks I will be summing up my experiences in this class which were very exciting and while some of the information might not be new to all of you hopefully I will make it an interesting read in how the class was organized and what topics we covered.  Stay tuned!</description><link>http://mattjjohansen.blogspot.com/2008/12/embarking-on-my-blog.html</link><author>noreply@blogger.com (Matt Johansen)</author><thr:total>1</thr:total></item></channel></rss>