<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:georss='http://www.georss.org/georss' version='2.0'><channel><atom:id>tag:blogger.com,1999:blog-9213359084597057319</atom:id><lastBuildDate>Sun, 22 Nov 2009 20:43:22 +0000</lastBuildDate><title>Special Ops Security</title><description></description><link>http://blog.specialopssecurity.com/</link><managingEditor>noreply@blogger.com (Steven Andrés)</managingEditor><generator>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-4971112958413054564</guid><pubDate>Mon, 14 Jan 2008 22:10:00 +0000</pubDate><atom:updated>2008-01-14T14:15:48.548-08:00</atom:updated><title>Military Channel: Top Sniper Debut</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_ZHJ7VBX4kA0/R4ve7prZq4I/AAAAAAAAADE/-_BEZHyaBqw/s1600-h/sniper-175.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/R4ve7prZq4I/AAAAAAAAADE/-_BEZHyaBqw/s200/sniper-175.jpg" alt="" id="BLOGGER_PHOTO_ID_5155459314837203842" border="0" /&gt;&lt;/a&gt;May be of some entertainment interest to our gov/mil subscribers: A friend of mine, Eric Katzenberg, produced and directed a documentary on an international sniper competition held at &lt;a href="https://www.infantry.army.mil/infantry/"&gt;Fort Benning&lt;/a&gt;. The &lt;span class="q"&gt;show, &lt;a href="http://military.discovery.com/tv/sniper/about/about.html"&gt;Top Sniper&lt;/a&gt;, premieres tonight at 7 pm (with an encore at 9pm) on the &lt;a href="http://military.discovery.com/tv-schedules/daily.html"&gt;Military&lt;/a&gt;&lt;/span&gt;&lt;a href="http://military.discovery.com/tv-schedules/daily.html"&gt; Channel&lt;/a&gt;. Sniper teams from all over the world are competing so it should be a really entertaining hour of television. If any blog readers do watch, please let us know what you thought about it.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-4971112958413054564?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2008/01/military-channel-top-sniper-debut.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_ZHJ7VBX4kA0/R4ve7prZq4I/AAAAAAAAADE/-_BEZHyaBqw/s72-c/sniper-175.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-5547367563647615821</guid><pubDate>Wed, 09 Jan 2008 08:01:00 +0000</pubDate><atom:updated>2008-01-08T20:07:47.069-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>comcast</category><category domain='http://www.blogger.com/atom/ns#'>FCC</category><title>Use Comcast? Collect $200 (thousand)</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_ZHJ7VBX4kA0/R4RIKprZq2I/AAAAAAAAAC0/LfVYuN-EB0w/s1600-h/comcast1.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/R4RIKprZq2I/AAAAAAAAAC0/LfVYuN-EB0w/s200/comcast1.jpg" alt="" id="BLOGGER_PHOTO_ID_5153323221442472802" border="0" /&gt;&lt;/a&gt;Do not pass GO, do not collect $200. Collect $195,000 instead! The FCC Chairman &lt;a href="http://apnews.myway.com/article/20080108/D8U1VE481.html"&gt;announced today&lt;/a&gt; that they will investigate claims that Comcast &lt;a href="http://blog.specialopssecurity.com/2007/11/comcast-class-action.html"&gt;actively interferes&lt;/a&gt; with the Internet traffic of their subscribers. A "coalition of consumer groups and legal scholars" -- whatever &lt;span style="font-style: italic;"&gt;that&lt;/span&gt; happens to be -- is recommending a fine of $195,000 for every affected subscriber. Not a bad rate of return for a $50/month cable modem, right?&lt;br /&gt;&lt;br /&gt;Comcast's David L. Cohen (&lt;a href="http://swz.salary.com/execcomp/layouthtmls/excl_execreport_103069.html"&gt;who pulls in just under $2 mill a year before stock options&lt;/a&gt;) contends that it does not block file sharing but rather just "delays" some of the traffic between computers that share files. From the Associated Press article &lt;a href="http://www.msnbc.msn.com/id/21376597"&gt;back in October&lt;/a&gt;, it appeared that unsolicited RST packets were being spoofed from both ends of the conversation. Correct me if I'm wrong, but beaming RST packets back and forth doesn't constitute a "delay" of traffic -- it's a reset!&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-5547367563647615821?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2008/01/use-comcast-collect-200-thousand.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/R4RIKprZq2I/AAAAAAAAAC0/LfVYuN-EB0w/s72-c/comcast1.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-4688895100580078214</guid><pubDate>Sat, 29 Dec 2007 20:31:00 +0000</pubDate><atom:updated>2007-12-29T09:53:53.416-08:00</atom:updated><title>R.I.P. Netscape Browser</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp3.blogger.com/_ZHJ7VBX4kA0/R3YISprZq0I/AAAAAAAAACk/gd5CngfdhCI/s1600-h/about_logo.png"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp3.blogger.com/_ZHJ7VBX4kA0/R3YISprZq0I/AAAAAAAAACk/gd5CngfdhCI/s200/about_logo.png" alt="" id="BLOGGER_PHOTO_ID_5149312340463299394" border="0" /&gt;&lt;/a&gt;For most of us, the Netscape web browser was the first* web browser we ever used. It was the grandaddy of them all, making its debut in October 1994 to a pristine Internet free of pop-up ads, banner ads, and drive-by XSS attacks.&lt;br /&gt;&lt;br /&gt;Sadly, the day has come for us to raise our mice in the air and bow our heads in silent appreciation for a friend that has passed away. &lt;a href="http://blog.netscape.com/2007/12/28/end-of-support-for-netscape-web-browsers/"&gt;AOL announced today&lt;/a&gt; that all development for Netscape will cease come February 1st, 2008.&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_ZHJ7VBX4kA0/R3YIY5rZq1I/AAAAAAAAACs/NrFhuUkGIDM/s1600-h/th-ncsa-current.gif"&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/R3YIY5rZq1I/AAAAAAAAACs/NrFhuUkGIDM/s200/th-ncsa-current.gif" alt="" id="BLOGGER_PHOTO_ID_5149312447837481810" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic;"&gt;* To be fair, NCSA Mosaic was the first browser I ever used, but it wasn't a particularly good experience.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-style: italic;"&gt; Once I got my hands on Netscape, it was the difference between DOS 4.2 command lines and Windows 3.1!&lt;/span&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-4688895100580078214?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/12/rip-netscape-browser.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp3.blogger.com/_ZHJ7VBX4kA0/R3YISprZq0I/AAAAAAAAACk/gd5CngfdhCI/s72-c/about_logo.png' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-4545739001563149252</guid><pubDate>Thu, 13 Dec 2007 04:22:00 +0000</pubDate><atom:updated>2008-01-08T20:37:41.859-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>wi-fi</category><category domain='http://www.blogger.com/atom/ns#'>in-flight</category><category domain='http://www.blogger.com/atom/ns#'>aerospace</category><title>Twitter at 36,000 feet</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_GxO6RWb0WPU/R4RPeuwtMUI/AAAAAAAAAA8/8U1RmYpbsfo/s1600-h/Image1.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_GxO6RWb0WPU/R4RPeuwtMUI/AAAAAAAAAA8/8U1RmYpbsfo/s200/Image1.jpg" alt="" id="BLOGGER_PHOTO_ID_5153331262985679170" border="0" /&gt;&lt;/a&gt;Am I the only one that &lt;a href="http://www.techcrunch.com/2007/12/07/how-do-you-build-an-airline-offer-free-wi-fi/"&gt;doesn't want WiFi on my coast-to-coast flight&lt;/a&gt;? Isn't it  enough that our co-workers, clients, and family can reach us via Blackberry at any time of the day or night? The sweet sanctuary of the airplane (even with its crying babies) was the only place I could be disconnected and  not feel guilty about dropping off the grid.&lt;br /&gt;&lt;br /&gt;Virgin America also provides an electrical outlet and Ethernet ports at every seat, so it definitely sounds like you're seatbealting yourself to your cubicle in the sky. Let's just hope Richard Branson springs for something better than a Linksys duct-taped to the drink cart.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-4545739001563149252?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/12/twitter-at-36000-feet.html</link><author>noreply@blogger.com (Jason Ritner)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_GxO6RWb0WPU/R4RPeuwtMUI/AAAAAAAAAA8/8U1RmYpbsfo/s72-c/Image1.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-8237096829002814679</guid><pubDate>Fri, 16 Nov 2007 20:36:00 +0000</pubDate><atom:updated>2007-11-16T12:45:45.005-08:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>net neutrality</category><title>Class Action for Internet Interference</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_GxO6RWb0WPU/Rz3_vsffvgI/AAAAAAAAAA0/20xgOu-i5uo/s1600-h/gavel.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp0.blogger.com/_GxO6RWb0WPU/Rz3_vsffvgI/AAAAAAAAAA0/20xgOu-i5uo/s200/gavel.jpg" alt="" id="BLOGGER_PHOTO_ID_5133540345134431746" border="0" /&gt;&lt;/a&gt;A San Francisco-based Comcast subscriber has &lt;a href="http://apnews.myway.com/article/20071115/D8SU2DI00.html"&gt;filed a lawsuit&lt;/a&gt; and is seeking class-action status against his Internet Service Provider for actively interfering with his ability to access the Internet. &lt;a href="http://blog.specialopssecurity.com/2007/10/net-neutrality-gets-kicked-in-butt-and.html"&gt;We all saw this coming&lt;/a&gt;, but I don't see how this can end well for Comcast.&lt;br /&gt;&lt;br /&gt;Whenever I try to explain net neutrality issues to a non-techie, I always the analogy of the phone company. If you pay the phone company $50/month to connect you to the internet-work of telephones, you expect that you can call any telephone number and speak about any topic, right? They usually nod their head. Okay, now how about if you wanted to call someone else and talk about illegal activities, such as selling copies of copyrighted work--would the phone company allow that call to take place? Most certainly they would--they are a telephony service provider as much as Comast is an Internet service provider. The whole purpose of the utility (be it telephone, electric, or Internet) is reliable connection to said service. Once the utility company (service provider) begins filtering what you can and cannot do with the service, it becomes quite a different issue.&lt;br /&gt;&lt;br /&gt;What do you readers think of the phone company analogy? Why is it incorrect or is it right on the money?&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-8237096829002814679?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/11/comcast-class-action.html</link><author>noreply@blogger.com (Jason Ritner)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_GxO6RWb0WPU/Rz3_vsffvgI/AAAAAAAAAA0/20xgOu-i5uo/s72-c/gavel.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-9216885496659141393</guid><pubDate>Tue, 23 Oct 2007 18:03:00 +0000</pubDate><atom:updated>2007-10-23T13:05:41.457-07:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>poker security</category><category domain='http://www.blogger.com/atom/ns#'>security management</category><category domain='http://www.blogger.com/atom/ns#'>poker cheats</category><category domain='http://www.blogger.com/atom/ns#'>online poker</category><category domain='http://www.blogger.com/atom/ns#'>absolute poker</category><title>Poker World Surprised By Hack (Security World Slaps Forehead)</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp3.blogger.com/_D-jtTWsQ-xY/Rx5Tl26c8vI/AAAAAAAAAAU/icjwrJ2TSII/s1600-h/01.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp3.blogger.com/_D-jtTWsQ-xY/Rx5Tl26c8vI/AAAAAAAAAAU/icjwrJ2TSII/s320/01.jpg" alt="" id="BLOGGER_PHOTO_ID_5124625335855149810" border="0" /&gt;&lt;/a&gt;Yesterday morning &lt;a href="http://www.absolutepoker.com/"&gt;Absolute Poker&lt;/a&gt;, an online poker room, released a statement that a 'trusted consultant' had compromised the system and was unfairly playing poker on the site.  Essentially, the '&lt;span style="font-style: italic;"&gt;glitch&lt;/span&gt;' allowed this person--who has been linked to others within the Absolute Poker organization (can you say, conspiracy?)--to view the hole cards of other players (this means he was the only one who could see all the cards in the hand).  The poker community has been blogging and sharing opinions on this issue for weeks, with plenty of uproar.&lt;br /&gt;&lt;br /&gt;The only comment I have to these people is,  "DUH"! C'mon, how can you take online gambling seriously? Obviously there has been quite a bit of attention to the fact that it is still illegal in the U.S., so the companies involved aren't the most upstanding and scrupulous.  They are constantly dodging criminal prosecution and money laundering charges.  So &lt;span style="font-style: italic;"&gt;these&lt;/span&gt; are the people you think are hosting an honest game? &lt;br /&gt;&lt;br /&gt;I am nearly convinced that &lt;a href="http://www.blackberrybrickbreaker.com/index.php/Main_Page"&gt;BrickBreaker&lt;/a&gt; on my Blackberry cheats when I get too far in the game, so I think its only natural that humans would try and manipulate the system to make more money (obviously I was correct).&lt;br /&gt;&lt;br /&gt;I have plenty of friends that have almost made a living out of playing online; however, when I think of online gambling I am reminded of the scene in &lt;a href="http://www.imdb.com/title/tt0120434/"&gt;Vegas Vacation &lt;/a&gt;where Clark Griswold goes to the Native American Casino and plays pick a number with the dealer.  In my mind this is almost the same thing.  How can one honestly believe that the Blackjack application is completely random?  You cannot.  At least in a real casino there are safe-guards and visual indications that the house only has a statistical advantage, not a technological one.&lt;br /&gt;&lt;br /&gt;My only advice to the online poker players that are up in arms about this incident is to get a new hobby or drive your butt into a legal card room.  While technology has made it easier to play cards online, it certainly hasn't made it more ethical.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-9216885496659141393?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/10/poker-world-surprised-by-hack-security.html</link><author>noreply@blogger.com (BMK)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp3.blogger.com/_D-jtTWsQ-xY/Rx5Tl26c8vI/AAAAAAAAAAU/icjwrJ2TSII/s72-c/01.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-2738398302229966289</guid><pubDate>Mon, 22 Oct 2007 19:58:00 +0000</pubDate><atom:updated>2007-10-22T14:50:51.799-07:00</atom:updated><title>Net Neutrality Gets Kicked In The Butt (and some other places too)</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_nE0UG3LvFMw/Rx0XQGSmsvI/AAAAAAAAAAM/SDt0aVvEDpE/s1600-h/comcastic.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_nE0UG3LvFMw/Rx0XQGSmsvI/AAAAAAAAAAM/SDt0aVvEDpE/s320/comcastic.jpg" alt="" id="BLOGGER_PHOTO_ID_5124277516351484658" border="0" /&gt;&lt;/a&gt;Just a few weeks ago I &lt;a href="http://blog.specialopssecurity.com/2007/09/net-neutrality.html#comment-3378500670721549199"&gt;posted on this very same blog&lt;/a&gt; that I would gladly pay for premium services from my broadband ISP if that meant that there would be no degradation of the basic service level.  Now, I don't have false illusions that I am big industry mover and shaker, but really, did &lt;a href="http://www.comcast.com"&gt;Comcast&lt;/a&gt; ISP have to go and do the exact opposite?  According to an &lt;a href="http://www.msnbc.msn.com/id/21376597"&gt;Oct 19th story&lt;/a&gt; by the Associated Press, Comcast--the 2nd largest ISP in the nation--is blocking traffic to file-sharing and peer-to-peer networks.&lt;br /&gt;&lt;br /&gt;The article claims that 50-90% of Internet traffic is &lt;a href="http://en.wikipedia.org/wiki/Peer-to-peer"&gt;peer-to-peer applications&lt;/a&gt;. To me that sounds about 50-90% &lt;a href="http://en.wikipedia.org/wiki/Bullshit"&gt;full of crap&lt;/a&gt;.  While I do agree that ISPs have the right to &lt;a href="http://en.wikipedia.org/wiki/Traffic_shaping"&gt;shape their traffic&lt;/a&gt;, I find it hard to believe that access can be denied.  Even worse, Comcast seems to be devious in their methods of blocking access, essentially resetting connections for file uploading.  Shady tactics indeed! &lt;br /&gt;&lt;br /&gt;Of course I'm sure they claim they are winning one for copyrighted material, however I use &lt;a href="http://www.bittorrent.com/"&gt;BitTorrent&lt;/a&gt; to download legal content.  No seriously -- I do.  In fact, I am downloading a live recording of Dave Matthews on my Time Warner connection right now.  While I am probably in the minority of BitTorrent users it still doesn't change the fact that I want my live copies of Dave Matthews, or John Mayer, or OAR (I could go on for ages).  &lt;br /&gt;&lt;br /&gt;In all reality most Comcast subscribers won't be affected by this new policy, nor will they notice a difference (even with that 50-90% utilization freed up), but it sure would be interesting to see how many jump ship to DSL.  It will be even more interesting when Comcast stops blocking everyone's access to the Special Ops Security blog, because the views expressed are not acceptable (even though they are legal and not copyrighted).&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-2738398302229966289?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/10/net-neutrality-gets-kicked-in-butt-and.html</link><author>noreply@blogger.com (BMK)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_nE0UG3LvFMw/Rx0XQGSmsvI/AAAAAAAAAAM/SDt0aVvEDpE/s72-c/comcastic.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-4132166351895766414</guid><pubDate>Mon, 22 Oct 2007 18:05:00 +0000</pubDate><atom:updated>2007-10-22T17:35:56.331-07:00</atom:updated><title>World Series Servers Overwhelmed</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp2.blogger.com/_ZHJ7VBX4kA0/Rx1B4Hk7udI/AAAAAAAAACc/J6xpsWQAdUg/s1600-h/1.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp2.blogger.com/_ZHJ7VBX4kA0/Rx1B4Hk7udI/AAAAAAAAACc/J6xpsWQAdUg/s200/1.jpg" alt="" id="BLOGGER_PHOTO_ID_5124324383379929554" border="0" /&gt;&lt;/a&gt;From the "who &lt;span style="font-style: italic;"&gt;couldn't&lt;/span&gt; see this one coming" department...&lt;br /&gt;&lt;br /&gt;&lt;a href="http://sports.espn.go.com/mlb/playoffs2007/news/story?id=3074302"&gt;Ticket demand crashes Rockies' computers&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.paciolan.com/public_clients.htm"&gt;Paciolan&lt;/a&gt;--acquired by &lt;a href="http://www.paciolan.com/community/news/tm/TM_Press_Release.pdf"&gt;Ticketmaster&lt;/a&gt; this summer and located just minutes from Special Ops Security HQ in Irvine, California--provides venue ticketing services to the &lt;a href="http://colorado.rockies.mlb.com/"&gt;Colorado Rockies&lt;/a&gt; professional baseball team. A little more than an hour after online ticket sales started this morning, the crushing load of 8.5 million requests crashed the entire North American ticketing system (affecting all of Paciolan's customers). This, just days after they assured uneasy fans that because MLB.com hosts their website, they would be able to handle the demand. What they failed to mention is that MLB.com only hosts the links to evenue.net (Paciolan).&lt;br /&gt;&lt;br /&gt;For the first time in the Colorado Rockies baseball team history, they make it to the World Series... and the network engineers didn't believe that there would be overwhelming demand??&lt;br /&gt;&lt;br /&gt;Furthermore, the system wasn't properly isolated such that a failure for one customer (the Rockies) would be isolated from other customers. Again we see that you don't always need fancy SQL injection skills to bring a system to its knees... sometimes you just need to open up your web browser (with a few million of your friends).&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-4132166351895766414?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/10/world-series-servers-overwhelmed.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp2.blogger.com/_ZHJ7VBX4kA0/Rx1B4Hk7udI/AAAAAAAAACc/J6xpsWQAdUg/s72-c/1.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-4906971596442572466</guid><pubDate>Thu, 20 Sep 2007 16:38:00 +0000</pubDate><atom:updated>2007-09-20T09:59:26.917-07:00</atom:updated><title>Who Needs Hackers?</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_ZHJ7VBX4kA0/RvKi_JzltsI/AAAAAAAAACU/3mZjfhVJpvc/s1600-h/12threat.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/RvKi_JzltsI/AAAAAAAAACU/3mZjfhVJpvc/s200/12threat.jpg" alt="" id="BLOGGER_PHOTO_ID_5112327732866692802" border="0" /&gt;&lt;/a&gt;Last week's &lt;span style="font-style: italic;"&gt;New York Times&lt;/span&gt; had an interesting article (&lt;a href="http://www.nytimes.com/2007/09/12/technology/techspecial/12threat.html?_r=2&amp;amp;adxnnl=1&amp;amp;adxnnlx=1190305578-oFYSfzEVv2OZRikpHgjZeA&amp;amp;pagewanted=all"&gt;Who Needs Hackers?&lt;/a&gt;) on the differences between a network architecture failure and the more sensationalized "Hollywood" hacker attacks.&lt;br /&gt;&lt;p style="font-style: italic; background-color: rgb(240, 240, 240);"&gt;"We don’t need hackers to break the systems because they’re falling apart by themselves," said Peter G. Neumann . . . Steven M. Bellovin, a professor of computer science at Columbia University, said: "Most of the problems we have day to day have nothing to do with malice. Things break. Complex systems break in complex ways."&lt;/p&gt;What sounds more interesting to you: hold a briefing that says "nasty hackers infiltrated the airline's reservation system and wreaked havoc" or the "DMZ was improperly isolated at layer 2 and rapid MAC address flooding from a bargain NIC caused the switches to fail?" In the former, the organization can blame the "evil-doers"; in the latter, the problem is a lack of proper planning.&lt;br /&gt;&lt;br /&gt;You may find it odd that as an information security company that performs penetration testing, we're pointing out an article that says "hey, hackers might not be your #1 issue." Yes, you may find it odd, until you realize that we offer--and have offered, since day one--network infrastructure design and audit services. Ah yes, I can hear the cash register "ding" from across the office.&lt;br /&gt;&lt;br /&gt;Friends (and potential customers), the truth is that without a solid review of your foundation, a penetration test alone will not provide you with the most accurate view of your organization's security posture. Let us pour through your massive stack of Visio diagrams and router ACL's and we'll provide effective and thoughtful optimization recommendations.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-4906971596442572466?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/09/infrastructure.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/RvKi_JzltsI/AAAAAAAAACU/3mZjfhVJpvc/s72-c/12threat.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-369767932749136696</guid><pubDate>Fri, 07 Sep 2007 15:13:00 +0000</pubDate><atom:updated>2007-09-07T11:32:05.307-07:00</atom:updated><title>CISSP, GSEC, or a little hands on</title><description>&lt;a style="font-family: arial;" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.newenglandpatriots.com/"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: right; cursor: pointer;" src="http://bp3.blogger.com/_sO4pYOazaxM/RuGSfO2EwnI/AAAAAAAAAAk/wxpDZHdh8rQ/s200/scoreboard_2.jpg" alt="" id="BLOGGER_PHOTO_ID_5107524517673353842" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:arial;"&gt;There is nothing like feeling like you are late to the game (4th quarter, up by &lt;/span&gt;&lt;span style="font-family:arial;"&gt;20&lt;/span&gt;&lt;span style="font-family:arial;"&gt; -- &lt;/span&gt;&lt;span style="font-family:arial;"&gt;p&lt;/span&gt;&lt;span style="font-family:arial;"&gt;ut in Shaw), but I had to chime in on the recent &lt;/span&gt;&lt;a style="font-family: arial;" href="http://andyitguy.blogspot.com/2007/09/being-cissp.html"&gt;blog cage fight&lt;/a&gt;&lt;span style="font-family:arial;"&gt; between CISSP'ers and GSEC'ers.  Having the painful distinction of passing the CIS&lt;/span&gt;&lt;span style="font-family:arial;"&gt;SP on two occasions (more on that later) and being the fourth person to complete the GSEC (#13, but they started counting at 10), I have a little history on which to build my soap box.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;The differences between the two certifications and the impacts they can, and likely will, have on a security professionals career are significant:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a style="font-family: arial;" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://www.giac.org/certifications/security/gsec.php"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp3.blogger.com/_sO4pYOazaxM/RuGQoO2EwlI/AAAAAAAAAAU/hdw_c3aMLvY/s200/gsec.gif" alt="" id="BLOGGER_PHOTO_ID_5107522473268920914" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:arial;"&gt;When I was doing IT contract work for the Navy in Charleston, I stumbled upon a relatively new organization: SANS.   At the time, I had little functional knowledge of security and their GSEC track seemed like a great introduction to "usable" information security.   The sub-sections included OS Security (Unix/Windows), encryption, and the use of specific tools (l0phtcrack).   The lessons were at times rough around the edges, but I felt like my interests were piqued, which was what I needed to make a career change.  I am embarrassed to reread my paper, but it is a good reminder of where I was in IT.  When my GSEC finally expired, I didn't realize it, nor did I worry about it.   The GSEC to me is more of a point in time achievement.  It was a tool that helped me learn and explore the field.  I approached the GCIH in much the same way.  &lt;/span&gt;&lt;b style="font-family: arial; color: rgb(255, 0, 0);"&gt;FINAL THOUGHT: If you are interested in information security, getting started in the field, or have a job related need to interface with infosec staff, the GSEC is a well-rounded certification that touches on numerous practical elements of information security.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;a style="font-family: arial;" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://www.isc2.org/cgi-bin/content.cgi?category=538"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 68px; height: 81px;" src="http://bp2.blogger.com/_sO4pYOazaxM/RuGQ6-2EwmI/AAAAAAAAAAc/y0obYprZO2o/s200/cissp-logo.gif" alt="" id="BLOGGER_PHOTO_ID_5107522795391468130" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:arial;"&gt;Fast forward 2+ years and I am now pulling shifts for a managed security provider.   I decided that while being hands on was something I enjoyed, my interest in management was equally as strong.   It was at this time that I decided to pursue the CISSP.   I knew that there would be very little that I would learn that would be applicable to my current job, but also knew that most hiring managers valued the certification.   I decided to skip the boot camps and simply use a study guide.  I opted for Shon Harris' &lt;/span&gt;&lt;a style="font-family: arial;" href="http://www.amazon.com/gp/product/0072257121/ref=pd_cp_d_0/103-0190046-7609418?pf_rd_m=ATVPDKIKX0DER&amp;pf_rd_s=center-41&amp;amp;pf_rd_r=03MYG2SE4PR5KSTVRX62&amp;pf_rd_t=201&amp;amp;amp;amp;amp;amp;pf_rd_p=252362301&amp;pf_rd_i=B0000WUQRA"&gt;CISSP All-in-One Exam Guide&lt;/a&gt;&lt;span style="font-family:arial;"&gt;.  A month later, I was certified.   I won't go into the specifics of the test, as that is an entirely different discussion.   What surprised me the most, was the difficulty I had (and continue to have) in obtaining the required number of CPE credits.  The perfect storm of time with the family, time in the office, and a severely limited training budget resulted in an insurmountable deficit of credits.   I realize that there are many ways in which to earn CPEs, but none of them seemed to fit my life's mold.  After three years, I ultimately found it easier to retake the exam.  I wouldn't wish that upon anyone, so I committed myself to keeping up with the required CPEs this time around.  Well I am happy to say that after the first year of my new three year cycle, I have &lt;/span&gt;&lt;b style="font-family: arial; color: rgb(255, 0, 0);"&gt;zero&lt;/b&gt;&lt;span style="font-family:arial;"&gt; credits.  Something has to change and I doubt it will be our company's training budget or the amount of free time I have.   Any suggestions? &lt;/span&gt;&lt;b style="font-family: arial; color: rgb(255, 0, 0);"&gt;FINAL THOUGHT: The CISSP is virtually a must have for information security managers and above.  The certification won't help you implement technical controls to improve your environments security, but it will likely extend the boundaries of your security thinking.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;So what does an infosec professional do to actually learn ways to improve the security of their infrastructure?  I recommend vendor specific training, LOTS of reading (books, blogs, documentation), and late nights in the office or home lab.  &lt;/span&gt;&lt;b style="font-weight: bold; color: rgb(255, 0, 0); font-family: arial;"&gt;A couple thousand dollars spent on hardware, software, and/or books can do what no certification will -- give you the skills to excel in your field.&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold; font-style: italic; color: rgb(51, 51, 255);font-family:arial;" &gt;Side Note:&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:arial;"&gt;I have talked with many colleagues who are insulted when asked if they have, or would obtain, the CISSP.  The feeling is that it is not an worthwhile reflection of their technical abilities.  My question to anyone who feels this way is: does any one element of your resume reflect all of your abilities?  Your college degree(s)?  Your clearance? The answer is obviously, no. So why not enhance your marketability?&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-369767932749136696?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/09/cissp-gsec-or-little-hands-on.html</link><author>noreply@blogger.com (SHA-1)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp3.blogger.com/_sO4pYOazaxM/RuGSfO2EwnI/AAAAAAAAAAk/wxpDZHdh8rQ/s72-c/scoreboard_2.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>2</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-187936341155703546</guid><pubDate>Fri, 07 Sep 2007 05:06:00 +0000</pubDate><atom:updated>2007-09-07T22:01:07.404-07:00</atom:updated><title>Net Neutrality Stuck In Reverse Gear</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlmYftkbI/AAAAAAAAACM/vV2Eoane2Bk/s1600-h/nn_270x179.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlmYftkbI/AAAAAAAAACM/vV2Eoane2Bk/s200/nn_270x179.jpg" alt="" id="BLOGGER_PHOTO_ID_5107334425011392946" border="0" /&gt;&lt;/a&gt;Today the U.S. Dept of Justice released a &lt;a href="http://www.usdoj.gov/opa/pr/2007/September/07_at_682.html"&gt;statement&lt;/a&gt; that states ISP's should be allowed to charge a fee for "priority" web traffic (see &lt;a href="http://apnews.myway.com/article/20070906/D8RG2J9O0.html"&gt;Associated Press&lt;/a&gt; story).&lt;br /&gt;&lt;br /&gt;So as not to spin off tangentially into an argument about why DoJ issued a statement that has more to do with telco lobbying than about justice, I'd like to just limit comments and discussions to the pro/con of Net Neutrality. To me, a die-hard network infrastructure junkie, I can see grains of truth in both sides of the argument.&lt;br /&gt;&lt;br /&gt;My heart tells me to support Neutrality--the Internet is based on the egalitarian concept of everyone (no matter how wealthy) having equal access to information. My brain tells me that certainly we should be prioritizing some traffic (VoIP) and slowing down other traffic (SPAM). This brings me to another part of my anatomy: my gut. Unfortunately, my gut is telling me that although my brain has a good point, the way this will be corrupted by evil telco's is that a new batch of fat-bandwidth DoubleClick.net video adverts ("business" premiere customer) will be prioritized and my email to grandma will be delayed (since I'm only a lowly "residential" customer).&lt;br /&gt;&lt;br /&gt;Anyone else having these conversations with parts of their body?&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-187936341155703546?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/09/net-neutrality.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlmYftkbI/AAAAAAAAACM/vV2Eoane2Bk/s72-c/nn_270x179.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>2</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-3902827677875106455</guid><pubDate>Wed, 05 Sep 2007 22:15:00 +0000</pubDate><atom:updated>2007-09-06T22:44:48.461-07:00</atom:updated><title>5 Million Reasons to Stop Using Email</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlSYftkaI/AAAAAAAAACE/n5j9KQ_6HII/s1600-h/email2.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlSYftkaI/AAAAAAAAACE/n5j9KQ_6HII/s200/email2.jpg" alt="" id="BLOGGER_PHOTO_ID_5107334081414009250" border="0" /&gt;&lt;/a&gt;Today the &lt;a href="http://www.gwu.edu/%7Ensarchiv/"&gt;National Security Archives&lt;/a&gt; at &lt;a href="http://www.gwu.edu/"&gt;George Washington University&lt;/a&gt; (not to be confused with my friends at the &lt;a href="http://www.nsa.gov/"&gt;NSA&lt;/a&gt;) announced that they have filed a &lt;a href="http://www.gwu.edu/%7Ensarchiv/news/20070905/complaint.pdf"&gt;lawsuit&lt;/a&gt; in U.S. District Court requiring the Executive Office of the President to recover and restore some &lt;b&gt;five million&lt;/b&gt; mysteriously missing e-mails from March 2003 to October 2005.&lt;br /&gt;&lt;br /&gt;Again, hoping to steer this blog and its readers' comments away from political commentary, I'd like to take this moment to ask what would YOU do if you were the I.T. administrator asked to recover these missing messages? Certainly there is a vacuum of information: as outsiders we don't know if the messages were caught on backup tapes and then later deleted or if they were never archived in the first place. But let's not let the lack of facts ruin a perfectly good round of "what if"!&lt;br /&gt;&lt;br /&gt;Removing it from the public sector, imagine you worked at MortgageCorp and that several thousand e-mail messages were deleted from the server under your control. Now that the sub-prime lending market is in a tailspin, consumers start to fling class action lawsuits at MortgageCorp. How do you deal with the recovery of messages that, if recovered, would certainly do considerable harm to your employer and that--precisely because of this--the person who performed the deletion was probably quite crafty in covering their tracks. Would you immediately call in forensics experts? or duck the issue and tell the boss "they vanished--I can't get them back. Now it's general counsel's problem."&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-3902827677875106455?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/09/white-house-email.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_ZHJ7VBX4kA0/RuDlSYftkaI/AAAAAAAAACE/n5j9KQ_6HII/s72-c/email2.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-8008240144647946594</guid><pubDate>Tue, 07 Aug 2007 06:09:00 +0000</pubDate><atom:updated>2007-09-06T22:42:23.340-07:00</atom:updated><title>Virtual Switches May Expose Old L2/L3 Attacks</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp2.blogger.com/_ZHJ7VBX4kA0/RuDkr4ftkZI/AAAAAAAAAB8/oB1LGMepzJg/s1600-h/fogie3_fig5.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp2.blogger.com/_ZHJ7VBX4kA0/RuDkr4ftkZI/AAAAAAAAAB8/oB1LGMepzJg/s200/fogie3_fig5.jpg" alt="" id="BLOGGER_PHOTO_ID_5107333419989045650" border="0" /&gt;&lt;/a&gt;Last week, I was lucky enough to assist &lt;a href="http://www.blogger.com/profile/13512184196416665417"&gt;Richard Bejtlich&lt;/a&gt; with his Black Hat 2007 training course, &lt;a href="http://taosecurity.blogspot.com/2007/08/black-hat-usa-2007-round-up-part-1.html"&gt;"TCP/IP Weapons School"&lt;/a&gt; (sold out both sessions!). While in class going through layer 2 and layer 3 attacks from long ago (and here I define "long" as pre-2003) I couldn't help but thinking how vulnerabilities have a sneaky way of going dormant and then creeping back up after everyone has forgotten about them.&lt;br /&gt;&lt;br /&gt;Today, &lt;a href="http://rationalsecurity.typepad.com/about.html"&gt;Hoff&lt;/a&gt; (whom I only met recently, in Richard's class) writes about &lt;a href="http://rationalsecurity.typepad.com/blog/2007/08/vmware-to-open-.html"&gt;VMware's Virtual Switches&lt;/a&gt; and the possibility of these "old" layer 2 and layer 3 attacks finding a new home betwixt virtual machines on the same physical host. Now that we've all gone to the trouble of using static MAC security settings on our shiny Cisco Catalyst switches, we have to worry about the not-so-shiny and very virtualized Vswitches??&lt;br /&gt;&lt;br /&gt;A five-year-old "macof" attack could suddenly be relevant again. I can't wait until we come full circle and start using 8" diskettes and punch cards; I've got a box of them in the garage.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-8008240144647946594?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/08/vswitch.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp2.blogger.com/_ZHJ7VBX4kA0/RuDkr4ftkZI/AAAAAAAAAB8/oB1LGMepzJg/s72-c/fogie3_fig5.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-239823710305333556</guid><pubDate>Mon, 02 Jul 2007 19:54:00 +0000</pubDate><atom:updated>2007-07-02T13:41:57.631-07:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>ITIL</category><category domain='http://www.blogger.com/atom/ns#'>certification</category><title>UK OGC's ITIL</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_ZHJ7VBX4kA0/RolZkDa-BRI/AAAAAAAAABc/PnAmAlM6vUo/s1600-h/ITIL_Foundation_Certificate_pin.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/RolZkDa-BRI/AAAAAAAAABc/PnAmAlM6vUo/s200/ITIL_Foundation_Certificate_pin.jpg" alt="" id="BLOGGER_PHOTO_ID_5082692130392900882" border="0"&gt;&lt;/a&gt;&lt;br /&gt;Gotta love government (even the foreign ones) and their acronyms. The United Kingdom's &lt;a href="http://www.ogc.gov.uk/"&gt;Office of Government Commerce&lt;/a&gt; has developed a framework of best practices to deliver IT services called the &lt;a href="http://www.itil.co.uk/"&gt;Information Technology Infrastructure Library (ITIL)&lt;/a&gt;. On a recent engagement with a government client, we were asked if we were an ITIL-compliant practitioner. After admitting we were not, the client shared with us the wisdom of a formalized IT service delivery model that ITIL comprises in a series of eight books:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Service Delivery&lt;/li&gt;&lt;li&gt;Service Support&lt;/li&gt;&lt;li&gt;Infrastructure Management&lt;/li&gt;&lt;li&gt;Security Management&lt;/li&gt;&lt;li&gt;Business Perspective&lt;/li&gt;&lt;li&gt;Application Management&lt;/li&gt;&lt;li&gt;Software Asset Management&lt;/li&gt;&lt;li&gt;Planning to implement Service Management&lt;/li&gt;&lt;/ul&gt;This particular client's entire IT operations (from helpdesk to senior network engineers) had taken the certification as well as changed their business operations to fit into the framework. Now, I know that there are many readers in the "certifications are for the birds" camp, but stick with me: there are many IT shops that we walk into that lack even the most basic formalized procedures on &lt;font style="font-weight: bold;"&gt;how&lt;/font&gt; to do what it is they are asked to do. Formalized doesn't have to mean thick binders and triplicate carbon forms; just writing things down in a 1-2-3 list format would make a staggering difference in providing an organization with some insulation from employee turnover.&lt;br /&gt;How many of your own IT organizations are sent into a tailspin for a few weeks when a key IT employee leaves, taking pertinent procedural information with him/her?&lt;br /&gt;&lt;br /&gt;The client didn't require us to be certified but one of our D.C. office principals rose to the challenge and had a favorable experience with both the exam and (more importantly) learning the framework. I don't know if ITIL is something that will catch on in the private sector, but if you (or your customers) don't have a formalized service delivery system in place, you may want to suggest that at the next staff/consultant meeting.&lt;br /&gt;&lt;br /&gt;Oh, and one last thing: congrats, &lt;a href="http://sopsec.com/company/team/orlando/"&gt;Mark Orlando&lt;/a&gt;, for adding yet another set of letters behind your name for folks to ridicule you!  &lt;font style="font-style: italic; color: rgb(153, 153, 153);"&gt;(possible blog topic: why do online forum dwellers end up berating those that achieve certifications?)&lt;/font&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-239823710305333556?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/07/uk-ogcs-itil.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/RolZkDa-BRI/AAAAAAAAABc/PnAmAlM6vUo/s72-c/ITIL_Foundation_Certificate_pin.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-2023187884512272157</guid><pubDate>Wed, 13 Jun 2007 17:28:00 +0000</pubDate><atom:updated>2007-06-13T15:06:26.847-07:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>security management</category><title>The Lazy Way Out of Network Abuse</title><description>While catching up on my reading last night, I came across &lt;a href="http://members.authorsguild.net/dkushner/work1.htm"&gt;this&lt;/a&gt; story in Wired Magazine about a stalker case involving an employee of Sandia National Labs. It was a flashy case, since the subject of the stalking happens to be the lead singer of the band Linkin Park. However, I found the most intriguing aspect of the story was that the suspect did most of the "stalking" from her desk at Sandia. This is someone who held a fairly high-level security clearance, working at one of the most secured (publicly-known) facilities in the US Government. &lt;br /&gt;&lt;br /&gt;Oh, where to start. Forgetting all of the security principles (or lack thereof) that could be expounded upon here, this is what got to me: a statement from the National Nuclear Security Administration in response to this story read that "...the security of Sandia's network was never compromised." In my view, that statement could only be made by someone with near perfect situational awareness, a lack of which this incident demonstrated perfectly. This isn't a case of someone simply abusing the e-mail or phone system to send out a few private messages; this person, known to have access to highly confidential materials, was signing up for online Verizon and Apple accounts from work and sending numerous e-mails a day to and from non-official addresses, and the response is "The only completely effective way to prevent abuse of Internet access is to deny it entirely, and that is not a viable option for a research and development laboratory." &lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp2.blogger.com/_oaFNVAT1i_k/RnBNtCa83bI/AAAAAAAAAA0/T1JXMS-9AxI/s1600-h/securitymeasures+stairs.jpg"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;" src="http://bp2.blogger.com/_oaFNVAT1i_k/RnBNtCa83bI/AAAAAAAAAA0/T1JXMS-9AxI/s200/securitymeasures+stairs.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5075642216185912754" /&gt;&lt;/a&gt;To me, proving statements like this wrong is one of the best parts of being a security professional. Given a business or operational requirement, it's our job to implement security controls that can enable secure operations at the lowest possible cost to productivity or mission accomplishment. Shutting off network access to control or monitor your users? Come on, that's so ten years ago.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-2023187884512272157?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/06/easy-way-out-of-network-abuse.html</link><author>noreply@blogger.com (Mark Orlando)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp2.blogger.com/_oaFNVAT1i_k/RnBNtCa83bI/AAAAAAAAAA0/T1JXMS-9AxI/s72-c/securitymeasures+stairs.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-1931960698951952505</guid><pubDate>Mon, 11 Jun 2007 01:53:00 +0000</pubDate><atom:updated>2007-06-10T19:13:41.449-07:00</atom:updated><category domain='http://www.blogger.com/atom/ns#'>open source</category><category domain='http://www.blogger.com/atom/ns#'>tools</category><category domain='http://www.blogger.com/atom/ns#'>intrusion detection</category><title>Full-time Packet Captures with the Time Machine</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp2.blogger.com/_oaFNVAT1i_k/RmytHCa83YI/AAAAAAAAAAc/qPSy2fKf3EI/s1600-h/delorean.jpg"&gt;&lt;img style="float:left; margin:0 10px 10px 0;cursor:pointer; cursor:hand;" src="http://bp2.blogger.com/_oaFNVAT1i_k/RmytHCa83YI/AAAAAAAAAAc/qPSy2fKf3EI/s200/delorean.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5074621216560307586" /&gt;&lt;/a&gt;&lt;br /&gt;Researchers at Lawrence Berkeley National Laboratory, the Munich University of Technology, and the Berlin University of Technology have been working on a project that should be of great interest to IDS and security analysts everywhere. The project’s goal is to address one of the biggest shortcomings in intrusion detection and network-based incident response: how do we gather and analyze all data pertaining to an incident once an intrusion has occurred, knowing that most monitoring solutions only generate alerts and, if we’re lucky, minimal packet data? There are a few vendors that have tried to address this problem (Niksun and McAfee come to mind immediately) by throwing expensive hardware and lots of disk space into solutions designed to maintain full packet captures. Most IDS vendors include some sort of packet capture functionality in their products, but even those usually only provide such data when and if an alert is triggered.       &lt;br /&gt;    &lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;This new project has been dubbed The Time Machine. It is designed to provide a full-time packet capture capability in Gbps environments using commodity hardware. That may be a tall order, but definitely worth a closer look knowing it comes from the same people that brought us Bro IDS, not to mention security monitoring research since the earliest days of IDS technology. The basic premise is that the Time Machine uses a packet cutoff limit to buffer up to &lt;i&gt;N&lt;/i&gt; bytes of traffic for each connection, given what statistical analysis of network traffic has shown to be the most meaningful data for each traffic type, then indexing all captured packets for fast retrieval. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;The capability to keep full packet captures for all connections in the event of an intrusion or event of interest, using an open source utility and commodity hardware, is a welcome proposition and one we plan to research further. The Time Machine is still in early stages of development but can be downloaded from: &lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.net.t-labs.tu-berlin.de/research/tm/#download"&gt;http://www.net.t-labs.tu-berlin.de/research/tm/#download&lt;/a&gt;. &lt;br /&gt;&lt;br /&gt;We’re already working on taking it for a spin, so look for future write-ups on this cool new toy.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-1931960698951952505?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/06/full-time-packet-captures-with-time.html</link><author>noreply@blogger.com (Mark Orlando)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp2.blogger.com/_oaFNVAT1i_k/RmytHCa83YI/AAAAAAAAAAc/qPSy2fKf3EI/s72-c/delorean.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>3</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-2589515713958066928</guid><pubDate>Tue, 22 May 2007 18:42:00 +0000</pubDate><atom:updated>2007-05-22T12:18:33.101-07:00</atom:updated><title>MISSION: Block sites with OpenDNS</title><description>&lt;p style="background-color: rgb(245, 237, 227);"&gt;&lt;span style="font-style: italic;"&gt;MISSION&lt;/span&gt;: Block troublesome websites with &lt;span style="font-weight: bold;"&gt;minimal &lt;/span&gt;effort&lt;br /&gt;&lt;span style="font-style: italic;"&gt;EXECUTION TIME&lt;/span&gt;: 90 seconds&lt;br /&gt;&lt;span style="font-style: italic;"&gt;TOOLS&lt;/span&gt;: Requires use of OpenDNS.com name servers&lt;/p&gt;&lt;br /&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp3.blogger.com/_GxO6RWb0WPU/RlM-2R8Ny4I/AAAAAAAAAAc/zK8L9qIIThc/s200/rrgate.jpg" alt="" id="BLOGGER_PHOTO_ID_5067463107971763074" border="0" width="200" /&gt;This is Jason, the new guy at Special Ops Security, and I'll be posting blog items that are more of your "basic training" type than the other guys. In light of the recent &lt;a href="http://blog.specialopssecurity.com/2007/05/need-to-lower-morale-block-myspace.html"&gt;DoD blocking prominent websites&lt;/a&gt;, I wanted to post a very quick and easy way to block sites on your corporate network. Now, this is definitely not a 100% solution; for that, you need to blacklist the URL in your firewall, router, &lt;a href="http://www.websense.com/"&gt;WebSense&lt;/a&gt; device, or other content filtering technology.&lt;br /&gt;&lt;br /&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;" src="http://bp0.blogger.com/_GxO6RWb0WPU/RlNAWh8Ny5I/AAAAAAAAAAk/qy17BC6Nu4g/s200/80_20_rule.gif" alt="" id="BLOGGER_PHOTO_ID_5067464761534172050" border="0" width="100" /&gt;Even then, your users can use proxy server to get around the blocking. Think of this as an 80% solution that takes seconds versus opening up your firewall and needing more skilled engineers to change rulesets.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.opendns.com/"&gt;OpenDNS&lt;/a&gt; provides these really fast DNS resolvers that have &lt;a href="http://www.opendns.com/start/features/#faster"&gt;really large caches&lt;/a&gt;. These guys are great and you should definitely use them for your corporate network's DNS resolver instead of your ISP's. I &lt;span style="font-style: italic;"&gt;guarantee &lt;/span&gt;they are faster. More on that in another posting.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.opendns.com/share/"&gt;&lt;img src="http://images.opendns.com/buttons/use_opendns_155x52.gif" style="border: 0pt none ;" align="left" height="52" width="155" /&gt;&lt;/a&gt;If you're a current OpenDNS user, the graphic above should confirm that by saying "Sweet!" If the graphic above says "Get Started" then your network does not use OpenDNS yet and that is a pre-requisite for this great feature to work.&lt;br /&gt;&lt;br /&gt;Once you've signed up with OpenDNS (it's free and takes just a couple of minutes), you can login to your account and add sites to the "blocked" list. If you block &lt;a href="http://craigslist.org/"&gt;craigslist.org&lt;/a&gt; then you’ll also be blocking &lt;a href="http://la.craigslist.org/"&gt;la.craigslist.org&lt;/a&gt; (Craigslist Los Angeles) and &lt;a href="http://sfbay.craigslist.org/"&gt;sfbay.craigslist.org&lt;/a&gt; (Craigslist San Francisco), etc.  If, instead, you just blocked &lt;a href="http://newyork.craigslist.org/"&gt;newyork.craigslist.org&lt;/a&gt; then the rest of the Craigslist properties would load just fine.&lt;br /&gt;&lt;br /&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp0.blogger.com/_GxO6RWb0WPU/RlM8_h8Ny3I/AAAAAAAAAAU/1lIKnh4Ukvg/s1600-h/myspace_blocked.gif"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp0.blogger.com/_GxO6RWb0WPU/RlM8_h8Ny3I/AAAAAAAAAAU/1lIKnh4Ukvg/s320/myspace_blocked.gif" alt="" id="BLOGGER_PHOTO_ID_5067461067862297458" border="0" /&gt;&lt;/a&gt;When you try to visit a domain that is blocked you’ll see a page that looks like the one to the left. The nice part about this is that it lets the user know the site is blocked and gives them the feedback that they shouldn't be accessing it. You can even replace the OpenDNS logo with your company's own. This feedback page is much better than a browser error ("web server not responding") that would result from firewall or router blocking.&lt;br /&gt;&lt;br /&gt;This feature can be used to steer employees away from social networking sites at work or to preemptively block malicious malware sites. Hopefully I haven't alienated all of the really technical subscribers to our blog--just want to have content for the experts as well as the beginners.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-2589515713958066928?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/05/mission-block-sites-with-opendns.html</link><author>noreply@blogger.com (Jason Ritner)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp3.blogger.com/_GxO6RWb0WPU/RlM-2R8Ny4I/AAAAAAAAAAc/zK8L9qIIThc/s72-c/rrgate.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-6554470182629879171</guid><pubDate>Tue, 15 May 2007 21:30:00 +0000</pubDate><atom:updated>2007-05-22T12:29:22.919-07:00</atom:updated><title>Need to lower morale? Block MySpace!</title><description>Just yesterday, &lt;a href="http://www.usfk.mil/usfk/bell-sends/5_11_07_27%20-%2007%20Restricted%20Access%20to%20Internet%20Entertainment%20Sites%20Across%20DoD%20Networks.pdf"&gt;U.S. Army General Bell announced&lt;/a&gt; that eleven popular websites were being blocked across the entire DoD NIPRNET by May 14th:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Social Networking Sites&lt;/li&gt;&lt;br /&gt;&lt;img height="150" style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/RlND5ESAn7I/AAAAAAAAABU/34ba4hps66o/s320/Image1.gif" alt="" id="BLOGGER_PHOTO_ID_5067468653402824626" border="0" /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.myspace.com/"&gt;myspace.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.hi5.com/"&gt;hi5.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.blackplanet.com/"&gt;blackplanet.com&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;li&gt;Video/Photo Sharing&lt;/li&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.photobucket.com/"&gt;photobucket.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.youtube.com/"&gt;youtube.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.ifilm.com/"&gt;ifilm.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.stupidvideos.com/"&gt;stupidvideos.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.filecabi.com/"&gt;filecabi.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;li&gt;Streaming Music&lt;/li&gt;&lt;br /&gt;&lt;img style="margin: 0pt 0pt 10px 10px; float: right; cursor: pointer;" src="http://bp3.blogger.com/_ZHJ7VBX4kA0/RlNC_kSAn6I/AAAAAAAAABM/sscsXxR9L3Y/s320/Image1.gif" alt="" id="BLOGGER_PHOTO_ID_5067467665560346530" border="0" /&gt;&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href="http://1.fm/"&gt;1.fm&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.pandora.com/"&gt;pandora.com&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.live365.com/"&gt;live365.com&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="http://www.mtv.com/"&gt;mtv.com&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;/ul&gt;No sooner did the announcement come out was there &lt;a href="http://apnews.myway.com/article/20070514/D8P41TM00.html"&gt;reaction in the press&lt;/a&gt; that this was an attempt to squelch unfavorable portrayals of the current war from the soldier's point of view. In light of the fact that the U.S. Army has itself produced promotional videos and posted them on YouTube to encourage recruitment, this seems rather odd.&lt;br /&gt;&lt;br /&gt;Now, our intention is not to turn this into a political ideology blog--there are plenty available if that is what you desire. Instead, we want to tackle the assertion from General Bell that these sites are taking away valuable bandwidth from military networks for recreational use. We see this argument used a lot in large corporations that install website blocking systems. We believe this is wholeheartedly a knee-jerk reaction and extremely poorly executed.&lt;br /&gt;&lt;br /&gt;If the intentions are genuine and are merely intended to conserve bandwidth, the correct way to address this from an IT perspective is to &lt;a href="http://compnetworking.about.com/od/networkdesign/g/bldef_qos.htm"&gt;QoS&lt;/a&gt; the network and place these "recreational websites" in a priority class such that it does not take up more than... 25% or 10% of the available pipe.&lt;br /&gt;&lt;br /&gt;By blocking the sites, morale suffers. As the Associated Press article points out, many soldiers use these social network services and photo sharing sites to keep in touch with their families and friends stateside. Cutting off that important link is a poorly executed plan to reduce bandwidth consumption.&lt;br /&gt;&lt;br /&gt;By deliberately blocking the sites, it's a bit of using a chain saw to perform a root canal. The result is achieved, but with high levels of discomfort to the patient (or the soldier, or the corporate network employee). When the performance of these recreational sites becomes less than stellar, employees (or soldiers) will naturally make their own decision to either have more patience for the site to load, learn how to use an anonymous proxy server, or simply find another form of recreation. The important part is that the decision will be left up to the soldier or the employee, therefore empowering the workforce.&lt;br /&gt;&lt;br /&gt;Some of our blog subscribers have .mil email addresses -- we'd love to hear your thoughts on this issue. If you are unable or uncomfortable posting to the blog from that address (and do not have a personal email account), please &lt;a href="http://sopsec.com/contact"&gt;contact us&lt;/a&gt; and we will post your response anonymously.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-6554470182629879171?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/05/need-to-lower-morale-block-myspace.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/RlND5ESAn7I/AAAAAAAAABU/34ba4hps66o/s72-c/Image1.gif' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>2</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-3159830780021123572</guid><pubDate>Sun, 06 May 2007 17:24:00 +0000</pubDate><atom:updated>2007-05-07T09:51:37.433-07:00</atom:updated><title>MISSION: Gather Intel</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp2.blogger.com/_D-jtTWsQ-xY/Rj9Y81zC9MI/AAAAAAAAAAM/tSZYj8JA6DM/s1600-h/sincgars.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp2.blogger.com/_D-jtTWsQ-xY/Rj9Y81zC9MI/AAAAAAAAAAM/tSZYj8JA6DM/s320/sincgars.jpg" alt="" id="BLOGGER_PHOTO_ID_5061862308444304578" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;MISSION: Gather global security intelligence&lt;br /&gt;EXECUTION TIME: 15 minutes&lt;br /&gt;TOOLS: RSS feed aggregator of choice or customizable home page&lt;br /&gt;&lt;br /&gt;Situational awareness is a key element of deploying and maintaining effective security measures. Part of that recurring effort should be intelligence gathering. Putting together a comprehensive list of security-related RSS feeds can be a great alternative to hitting numerous sites each day or trying to sift through busy “dashboard” pages. There are many great security related sites out there that support RSS; the key is not to add as many as you can, but rather to identify dependable sources of information that focus on issues pertinent to your mission. Here are some of our favorites:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Special Ops&lt;/span&gt;, of course! (Security how-to’s and news items)&lt;br /&gt;URL: &lt;a href="http://feeds.feedburner.com/SpecialOpsSecurity"&gt;http://feeds.feedburner.com/SpecialOpsSecurity&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;SecuriTeam &lt;/span&gt;(Various security advisories and vulnerabilities)&lt;br /&gt;URL: &lt;a href="http://www.securiteam.com/securiteam.rss"&gt;http://www.securiteam.com/securiteam.rss&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;TaoSecurity &lt;/span&gt;(Network Security Monitoring-centric postings by Richard Bejtlich)&lt;br /&gt;URL: &lt;a href="http://taosecurity.blogspot.com/feeds/posts/default"&gt;http://taosecurity.blogspot.com/feeds/posts/default&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;SANS Internet Storm Center&lt;/span&gt; (ISC Handlers diary, security items of note)&lt;br /&gt;URL: &lt;a href="http://isc.sans.org/rssfeed.xml"&gt;http://isc.sans.org/rssfeed.xml&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;GeeKool &lt;/span&gt;(Another NSM-centric blog with an emphasis on technical information and how-to’s)&lt;br /&gt;URL: &lt;a href="http://geek00l.blogspot.com/feeds/posts/default"&gt;http://geek00l.blogspot.com/feeds/posts/default&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Zone-H&lt;/span&gt; (Emerging threats, defacements, items of note - Global)&lt;br /&gt;URL: &lt;a href="http://www.zone-h.org/index2.php?option=com_rss&amp;no_html=1"&gt;http://www.zone-h.org/index2.php?option=com_rss&amp;amp;no_html=1&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Security Fix&lt;/span&gt; (Security news)&lt;br /&gt;URL: &lt;a href="http://blog.washingtonpost.com/securityfix/index.xml"&gt;http://blog.washingtonpost.com/securityfix/index.xml&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Of course, there are many, many more, including several vendor blogs that actually have some pretty good info. Please add a comment with your favorites!&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-3159830780021123572?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/05/mission-gather-intel.html</link><author>noreply@blogger.com (Mark Orlando)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp2.blogger.com/_D-jtTWsQ-xY/Rj9Y81zC9MI/AAAAAAAAAAM/tSZYj8JA6DM/s72-c/sincgars.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-3593786367980219022</guid><pubDate>Tue, 17 Apr 2007 00:54:00 +0000</pubDate><atom:updated>2007-04-16T18:27:30.987-07:00</atom:updated><title>Do U know about U3?</title><description>&lt;a href="http://bp0.blogger.com/_ZHJ7VBX4kA0/RiQh6eMlUbI/AAAAAAAAAA8/mpL-xeV7Di4/s1600-h/p256041b.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5054201970238509490" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/RiQh6eMlUbI/AAAAAAAAAA8/mpL-xeV7Di4/s200/p256041b.jpg" border="0" /&gt;&lt;/a&gt; &lt;a href="http://www.u3.com/"&gt;U3&lt;/a&gt; is an open-standard allowing for application portability. Sounds great doesn't it? Don't just take your data from computer to computer. Now take the whole application itself. No need to sit through a long install process on a shared PC. No more tweaking application settings in multiple places. What could possibly go wrong?&lt;br /&gt;&lt;br /&gt;Enter our old friend, the Windows auto-run feature. By manipulating USB sticks using the U3 technology, some intelligent folks were able to bypass previous roadblocks to &lt;a href="http://www.hak5.org/forums/viewtopic.php?p=31505"&gt;USB attacks based on auto-run&lt;/a&gt;. The solution? Turn it off.&lt;br /&gt;&lt;br /&gt;- &lt;a href="http://support.microsoft.com/kb/q155217"&gt;Enable or Disable Automatically Running CD-ROMs&lt;/a&gt; &lt;a href="http://support.microsoft.com/kb/q155217" target="_blank"&gt;&lt;/a&gt;&lt;br /&gt;- &lt;a href="http://www.winguides.com/registry/display.php/1142/"&gt;Select the Drive Types to Start Automatically&lt;/a&gt;&lt;a href="http://www.winguides.com/registry/display.php/1142/" target="_blank"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;It is always safer to disable auto-run for as many devices as possible. For all devices, do the following in Windows 2000/XP/2003:&lt;br /&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;br /&gt;&lt;span style="font-family:courier new;"&gt;&lt;strong&gt;HKEY_LOCAL_MACHINE\Software&lt;wbr&gt;\Microsoft\Windows\CurrentVersi&lt;wbr&gt;on\Policies\Explorer\{DWORD&lt;wbr&gt;}NoDriveTypeAutoRun = 255 (decimal)&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;Configuring this registry key will not prevent all U3 attacks. Some basic social engineering could easily result in a user executing malicious code on a USB stick planted in a variety of locations. If you are waiting for the registry key to prevent this, I wouldn't hold your breath. Educating your users is the best defense.&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;small&gt;[&lt;a href="http://www.urbanoutfitters.com/shopping/product/detailmain.jsp?itemID=24254&amp;itemType=PRODUCT&amp;amp;iProductID=24254"&gt;USB Stewie&lt;/a&gt; from Urban Outfitters.com]&lt;/small&gt;&lt;/em&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-3593786367980219022?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/04/do-u-know-about-u3.html</link><author>noreply@blogger.com (SHA-1)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_ZHJ7VBX4kA0/RiQh6eMlUbI/AAAAAAAAAA8/mpL-xeV7Di4/s72-c/p256041b.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>2</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-953206520892634294</guid><pubDate>Tue, 10 Apr 2007 00:33:00 +0000</pubDate><atom:updated>2007-04-10T21:35:57.076-07:00</atom:updated><title>Death of a Newsletter</title><description>&lt;a href="http://bp0.blogger.com/_ZHJ7VBX4kA0/RhxjpeMlUaI/AAAAAAAAAA0/HKWfdTDCwds/s1600-h/wea_tombstone_hat_lg.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5052022446134481314" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; WIDTH: 109px; CURSOR: hand; HEIGHT: 152px" height="169" alt="" src="http://bp0.blogger.com/_ZHJ7VBX4kA0/RhxjpeMlUaI/AAAAAAAAAA0/HKWfdTDCwds/s200/wea_tombstone_hat_lg.jpg" width="119" border="0" /&gt;&lt;/a&gt;With the recent news that our email distribution service is going belly-up, we've decided that our little blogging experiment here will become the full-time replacement for our monthly newsletter. More and more companies are transitioning to what many are calling &lt;strong&gt;&lt;a href="http://en.wikipedia.org/wiki/Corporate_blog"&gt;Corporate Blogging&lt;/a&gt;&lt;/strong&gt;, with rich content provided by many including &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_0"&gt;CEOs&lt;/span&gt;. Everyone seems to be getting into the act, even the slow-to-change Fortune 500 (see &lt;a href="http://www.socialtext.net/bizblogs/"&gt;www.socialtext.net/bizblogs/&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;For our part, we've signed up with &lt;a href="http://www.feedburner.com/"&gt;&lt;span class="blsp-spelling-error" id="SPELLING_ERROR_1"&gt;FeedBurner&lt;/span&gt;&lt;/a&gt; to distribute our blog via email. If you were already one of the lucky thousands&lt;span style="color:#ff0000;"&gt;*&lt;/span&gt; to be on our original newsletter mailing list, we will be manually importing your subscription into &lt;span class="blsp-spelling-error" id="SPELLING_ERROR_2"&gt;FeedBurner&lt;/span&gt;. This means that you will receive an email from &lt;b&gt;confirmations@emailenfuego.net&lt;/b&gt; asking you to confirm your intent to subscribe to our blog (part of the whole double-opt-in good citizenship that we practice here at Special Ops).&lt;br /&gt;&lt;br /&gt;If you &lt;strong&gt;do not&lt;/strong&gt; want to continue receiving updated company information, security advice, and free assessment tool information, simply delete the email and your invitation will expire. If you &lt;strong&gt;do&lt;/strong&gt; wish to remain the envy of your info sec comrades and stay on top of Special Ops happenings, please click on the link provided in the email right away.&lt;br /&gt;&lt;br /&gt;&lt;span style="color:#ff0000;"&gt;*&lt;/span&gt;&lt;em&gt;&lt;span style="font-size:78%;"&gt;Okay, so perhaps "thousands" is an overstatement, but at 973 subscribers I couldn't help myself!&lt;/span&gt;&lt;/em&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-953206520892634294?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/04/death-of-newsletter.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp0.blogger.com/_ZHJ7VBX4kA0/RhxjpeMlUaI/AAAAAAAAAA0/HKWfdTDCwds/s72-c/wea_tombstone_hat_lg.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-8429616946560073777</guid><pubDate>Tue, 03 Apr 2007 15:00:00 +0000</pubDate><atom:updated>2007-04-10T21:11:24.822-07:00</atom:updated><title>ListBuilder Stops Building</title><description>&lt;a href="http://bp1.blogger.com/_ZHJ7VBX4kA0/RhxXsuMlUYI/AAAAAAAAAAk/AMrmdX4okT0/s1600-h/BCentralLogo.gif"&gt;&lt;img id="BLOGGER_PHOTO_ID_5052009307829522818" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/RhxXsuMlUYI/AAAAAAAAAAk/AMrmdX4okT0/s200/BCentralLogo.gif" border="0" /&gt;&lt;/a&gt; There are many companies out there that provide email distribution services for small businesses like ours. Shortly after we subscribed to ListBuilder.com, they were acquired by Microsoft and quickly renamed "bCentral" (presumably the little "b" is for Small Business). We use this service to send out our monthly email newsletters to keep our customers and supporters in the loop on Special Ops happenings.&lt;br /&gt;&lt;br /&gt;After last month's newsletter, one of our smart readers from across the pond--Callum Millard--pointed out that simply tossing an apostrophe into the "unsubscribe" link included in the emails generated a pretty nasty ASP.NET error. Tsk tsk tsk--how many times do we have to have to play the apostrophe game to prove to web developers that they must sanitize web input??&lt;br /&gt;&lt;br /&gt;We escalated the embarrassing web application vulnerability to our contacts at bCentral. We expected some resolution, but never this:&lt;br /&gt;&lt;blockquote&gt;&lt;strong&gt;Microsoft retiring List Builder Service&lt;/strong&gt;&lt;br&gt;&lt;br /&gt;Effective 12:00 noon PDT on June 1st 2007 Microsoft will retire its List Builder service. ... To continue serving your subscribers with newsletters and other customer communications, we invite you to learn how you can sign up for e-mail marketing services with &lt;a onclick="return top.js.OpenExtLink(window,event,this)" href="http://go.microsoft.com/?linkid=6553153" target="_blank"&gt;Constant Contact&lt;/a&gt;.&lt;br /&gt;&lt;/blockquote&gt;&lt;br /&gt;While we would have liked to see them correct the problem, apparently shutting down the entire subdivision was their response!&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-8429616946560073777?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/04/listbuilder-stops-building.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/RhxXsuMlUYI/AAAAAAAAAAk/AMrmdX4okT0/s72-c/BCentralLogo.gif' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-2073729067701563871</guid><pubDate>Sun, 01 Apr 2007 16:00:00 +0000</pubDate><atom:updated>2007-04-10T21:21:39.207-07:00</atom:updated><title>Optimus Prime, Holding on Line 3</title><description>&lt;a href="http://bp3.blogger.com/_ZHJ7VBX4kA0/RhxhIOMlUZI/AAAAAAAAAAs/h0ykkd3x_04/s1600-h/optimus-prime-helmet.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5052019675880575378" style="FLOAT: left; MARGIN: 0px 10px 10px 0px; CURSOR: hand" alt="" src="http://bp3.blogger.com/_ZHJ7VBX4kA0/RhxhIOMlUZI/AAAAAAAAAAs/h0ykkd3x_04/s200/optimus-prime-helmet.jpg" border="0" /&gt;&lt;/a&gt; To assist with our Accounts Receivables, our receptionist has volunteered to don the &lt;a href="http://www.ubergizmo.com/15/archives/2007/03/optimus_prime_speaketh.html"&gt;Optimus Prime Voice Changer&lt;/a&gt; helmet scheduled to be released later this summer along with the new &lt;a href="http://www.transformersmovie.com/"&gt;Transformers&lt;/a&gt; movie. While we don't know if this will help with our billing, we are certain that she will prevail over the decepticons.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;em&gt;&lt;span style="font-size:78%;"&gt;p.s. Happy April Fool's Day!&lt;/span&gt;&lt;/em&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-2073729067701563871?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/04/optimus-prime-holding-on-line-3.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp3.blogger.com/_ZHJ7VBX4kA0/RhxhIOMlUZI/AAAAAAAAAAs/h0ykkd3x_04/s72-c/optimus-prime-helmet.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-5724693635002997823</guid><pubDate>Tue, 27 Mar 2007 15:30:00 +0000</pubDate><atom:updated>2007-04-10T21:09:18.104-07:00</atom:updated><title>ShmooCon After Action Report</title><description>&lt;p style="MARGIN-BOTTOM: 0in"&gt;Greetings from Special Ops East, fresh from the District and another ShmooCon. If you want to read a good recap, check out Richard Bejtlich's posting(s) on the &lt;a href="http://taosecurity.blogspot.com/"&gt;TaoSecurity blog&lt;/a&gt; or just go to the &lt;a href="http://www.shmoocon.org/"&gt;ShmooCon site&lt;/a&gt;. &lt;/p&gt;&lt;p style="MARGIN-BOTTOM: 0in"&gt;Our take is that, unfortunately, a great deal of the material presented this weekend sounded eerily familiar, and it isn't necessarily because we were at Black Hat and RSA. We like Shmoo, but the real advantage for us is meeting and interacting with other people in the industry. We recently had a client ask us what sorts of things we do to stay current in the field of security and attending events like ShmooCon is high on that list. You want to check out what other people are working on, what you need to be worried about, or what you haven't even considered! That's what gets you through the coming year, not the exploit or tool du jour. &lt;/p&gt;&lt;p style="MARGIN-BOTTOM: 0in"&gt;The best conference stories always start out, “So I had drinks/lunch/dinner/a soda with so-and-so and we discussed&lt;insert&gt; &lt;insert&gt;(insert utility/research/project/methodology here).” We'd like to see more of the big shows incorporate social and collaborative elements to facilitate more of this kind of interaction between attendees. Shmoo definitely seems to have the right idea with the ShmooCon labs and “Hack or Halo” events. There are also plenty of regional discussion groups like &lt;a href="http://novasec.blogspot.com/"&gt;Nova Sec&lt;/a&gt; (here in the DC area) whose sole purpose is this kind of collaboration. &lt;/p&gt;&lt;p style="MARGIN-BOTTOM: 0in"&gt;If we have one piece of advice for you coming out of ShmooCon, this is it- find one of these groups in your area and start going to meetings! And at the next con, find Steve and introduce yourself; the drinks are on him.&lt;/insert&gt;&lt;/insert&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-5724693635002997823?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/03/shmoocon.html</link><author>noreply@blogger.com (Mark)</author><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>1</thr:total></item><item><guid isPermaLink='false'>tag:blogger.com,1999:blog-9213359084597057319.post-5628902864838119897</guid><pubDate>Thu, 15 Mar 2007 00:10:00 +0000</pubDate><atom:updated>2007-04-05T17:11:52.594-07:00</atom:updated><title>Remote Wrangler</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://bp1.blogger.com/_ZHJ7VBX4kA0/RhWQN3ofYeI/AAAAAAAAAAc/gPW1xl4DmfA/s1600-h/remotewrangler.jpg"&gt;&lt;img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer;" src="http://bp1.blogger.com/_ZHJ7VBX4kA0/RhWQN3ofYeI/AAAAAAAAAAc/gPW1xl4DmfA/s200/remotewrangler.jpg" alt="" id="BLOGGER_PHOTO_ID_5050101125112357346" border="0" /&gt;&lt;/a&gt;Don't you just hate having your Plasma TV remote, the DVD remote, the entertainment     system remote, the DirecTV remote, and your Mac Mini remote all strewn about on the      coffee table? What's worse is when the remotes (on their own power) march from the     table to hide in between the cushions of the sofa. Wouldn't it be great to have the     remotes easily accessible and centimeters away from you at all times while you     enjoy the latest round of American Idol? Well thankfully someone (some very lonely     and insane person) has invented the &lt;a href="http://www.americaninventorspot.com/lost_remotes"&gt;Multimedia     Remote Control Wrangler&lt;/a&gt;. Finally -- a way to combine your love for wrestling     (or athletic supporters) with Velcro and remote controls. I love the 21st century.&lt;div class="blogger-post-footer"&gt;&lt;img width='1' height='1' src='https://blogger.googleusercontent.com/tracker/9213359084597057319-5628902864838119897?l=blog.specialopssecurity.com' alt='' /&gt;&lt;/div&gt;</description><link>http://blog.specialopssecurity.com/2007/03/remote-wrangler.html</link><author>noreply@blogger.com (Steven Andrés)</author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://bp1.blogger.com/_ZHJ7VBX4kA0/RhWQN3ofYeI/AAAAAAAAAAc/gPW1xl4DmfA/s72-c/remotewrangler.jpg' height='72' width='72'/><thr:total xmlns:thr='http://purl.org/syndication/thread/1.0'>0</thr:total></item></channel></rss>