Wednesday, March 2, 2011

Beschreibung Pet Containment System Rf

No: ANSSI is not "French" Cyber Command!

PC Inpact week published an interview last interesting Pailloux Patrick, CEO of ANSSI. Interesting because it allows, in my view, to illustrate how one can perceive the role of cybersecurity in developed nations, particularly France and Europe but also in the U.S. who are iron lance. To illustrate but also to try to understand the workings visible, less visible or invisible, to come and connect to inform, transmit and sometimes debate.

Since its inception, this blog tries to put a modest issues that are dear to my heart as well as the right questions (you can always dream, right?). All this so surely imperfect, fragmented but enthusiastic (if not passionate). What makes me react strangely, without any fatigue (almost:), is noted in some media (institutions but also on the blogosphere) processing part (and sometimes biased) about the new responsibilities assigned to ANSSI ( the decree of February 11, 2011 ). In the light of a previous post , I could have called it " ANSSI: 1 - Media: 0 " but it is feared qu'ANSSI Stuxnet and can be replaced indefinitely. This is no longer the game but the systematism with a certain arrogance which I try to keep my ego (or disproportionate, or degraded).

That said in a playful tone, become again serious moments: some media proclaim and declaim in recent weeks that would become the ANSSI Cyber Command ( should be ambitious but not worth crossing that one is interested), a sort of agency to shock the French in the fight against cyber-threats.

Yet I think that it is (very) long way to go and Patrick Pailloux I do not say anything when he says:
- this decree allows above all provide a legal basis therefore saving time (2-3 hours) in terms of legal authority identified with respect to any "orders" of disconnection that ISP may receive from the French authorities in case of cyber attack majeure;
- ANSSI have a role in crisis management , neither more nor less, and I love the metaphor about the fire management was, at best it will coordinate the few available means and attempt to limit a possible attack;
- for the rest, we must not forget that the agency first an advisory role and support towards the government (or companies) and devotes a significant portion of its business through certification of products and security solutions .

must therefore right to keep and consider that the allocation state of cybersecurity to ANSSI could be a temporary solution until:
- Either the field of cyberspace becomes an axis Medium-term strategic (hence the policy underlying foresight and anticipation ... I have a dream ) and the agency could be allocated adequate resources accordingly, the role of "Nation's leading Cybersecurity "in the European Union could be one of the consequences - a reasonable and interesting
- Let it retains its "small" powers and participate in a complementary or integrated into a future Nato or European authority (ENISA? Faced with NATO, the "game" seems a foregone conclusion. ..);
- Finally, the third way: a new agency is created , dedicated to cybersecurity and integrating, why not, the CERT with strong interfaces to the military (the DRM thus has a role to play) but also to large enterprises.

In fact the latter course looks furiously to that taken by the United States, relatively speaking: a central authority with the means to monitor the threat in cyberspace (with its Common Operational Picture , I'll come back another time) in permanent contact with all state entities employed by the cyber security and all the security department of the largest companies.

Monday, February 28, 2011

Beef Heifers Cows For Sale

Cybersecurity in France and Europe: downgrading or opportunity (ies)?

While on the Old Continent we try as best they can position themselves in the fight against cyber-threats, the United States and more particularly the "DoD (Department of Defense / Department of Defense), communicate to another level but also advancing rapidly. I will return in a future post.

A first bracket: you can even think that the evolution of the "Holy Trinity" (doctrine / resources / capabilities) ahead of the communication also great communicators because they are, the technological advance and / or capability and confidentiality remain as one of their strengths.

A second bracket for accuracy, linked to one of my previous posts abruptly (but in fact, I maintain my position!) Entitled " Noddy and cyber threats . I laughed politely of the European Agency for Safety Network and Information ( ENISA) and his French counterpart, the ANSSI . These two entities, missions rather different but complementary suffer from major handicaps: for ENISA is to be a European integrated agency with what it leads in terms of strategy (s) and decision (s). Since its inception, the initial goal was quickly confronted with the reality: the legitimacy of national agencies and CERT , modest budgets, goals quickly revised downwards. Like other agencies in their time, it will in future find its place among the national systems, on pain of being a new "gadget .

For ANSSI is more complicated late DCSSI has a legitimacy on the national stage and beyond, recognized expertise, but the major drawback of not having a size critical. Budgets are certainly increasing and the number of open positions has increased significantly recent years but that does not spearhead that France, " fifth largest economy", is entitled wait. Especially in Europe, is an actor but also a target for threats ranging from terrorism to economic and industrial intelligence. And that networks and information systems are at the heart of these issues.

Has provided the die is cast? We can fear it, unfortunately. Especially when we know that NATO at its last summit , placed cybersecurity as one of the important areas that the Alliance will have to address.

So on one hand, we can let go and say that keeping a small agency at the national level, integrated in a system with NATO staff resources and greater resources, is common sense. Especially at a time when economies across announced.

On the other hand, some makers (and their advisers) have adequately measured the interest that France (and some of its European neighbors) Will (are) to engage in the process of the fight against cyber threats ? Behind what may seem abstruse, highly virtual, high-tech jobs and new tools (concepts, methodologies, technologies) are to integrate and create. And know-how could be partly exported (ie sold) thereafter.

To believe the adage that "security is a cost, not an investment "remain inscribed in stone a long time!

Thursday, February 24, 2011

Watch Family Guy In Iphone

USAF, social media and false identities

A surprising spin-off of the shock wave Wikileaks through one of the many emails illegally recovered ; by Anonymous in the security company HB Gary has learned that the U.S. Air Force launched in early summer 2010, a tender for a software create and manage false identities on social networks (Facebook, Twitter, MySpace). Among these emails, one of the leaders of HB Gary surprised that this solicitation be "open", ie public, especially since it seems that Federal HB Gary, entity that provides security services, which could be retained to provide the desired software.
The feature of the tool are as follows: 50 licenses to manage each 10 personae (virtual users) with functions of IP Spoofing to disguise the true origin persona of . The aim of the operation is twofold: to lure friends who connect to these profiles and obtain information on individuals targeted through these friends. That's what we learned article from Information Week .
Information still shows from more important social networks as a vector informational but also how the U.S. government entities are firing on all cylinders in the field of technology information.

A further illustration of the emergence of cyber security as a key area and critical (and possibly controllable!) as well as the four dimensions (land, sea, air and space) including the United States has control or superiority.

Wednesday, February 23, 2011

Can You Stack A Toaster On A Microwave?

1989 - 2011: domino effect or shock wave?

One swallow does not a ticket-based geopolitics. Current events occurring in the Maghreb to the Arabian Peninsula are in the order of the historical event: an amount of stories, tragic for them (Libya?), "Happy" for others (Tunisia, Egypt) entering into any field of study (current and future) history.

It is extremely difficult to know how this maelstrom but ultimately one feels instinctively that what is at stake is the order of fall of the Berlin Wall in 1989 and the collapse of the Soviet system (and its satellites) that ensued. However, it is more likely to attend the propagation of a shock wave rather than a domino effect. This is expressed last night on France 5 in the show " C in air," Pascal Boniface . Who also explained that sense the shock wave would spread to Asia and, why not China with known number of local households, rebellion or discontent for many many years. Put gasoline on the embers could soon become the fire was in a pine forest parched by the heat wave!


The disadvantage (danger?) Of such a scenario is that it is difficult to predict the intensity and duration of the shock wave. Moreover, and contrary to the domino effect, the effects can penetrate some countries without damage to bounce a little further. Finally, management remains uncertain and even the northern countries of the Mediterranean (Europe, ie us) could feel some effects.

To better stick to this topical and moving, I've listed below the sites I visit regularly. Informed reader, I will publish this list if you let me know your own sources.

- Arabias, snapshots of the Arab world . Geopolitics, economics, societies. The blog of Morgan Marchand.
- thread Twitter Clarisse . A selection (not always updated continuously) tweets media, journalists, bloggers and control / relay to Libya, from Egypt, Turkey, Syria India, UAE, Pakistan, Europe, Africa ... - information not always confirmed or confirmable.
- Chronicles Persian . Iran: analysis of political, geopolitical and geostrategic by Vincent Eiffling.
- EGEA. The blog by Olivier Kempf well known that the tests are always full of lessons and information. Tickets related uprisings current attempt a prospective extremely relevant.
- Chinatown. Rue89's Chinatown.

Monday, February 21, 2011

What Scorpio Man Likes

Roman Empire and Intelligence Alliance (geostrategic)

I am honored to have modestly contributed to the theme of the month on the intelligence of the Geo Strategic Alliance (AGS). My article deals with intelligence in the Roman Empire and, unfortunately, only fly a complex and surprising size constraint requires publication.

For those who might be tempted to go further, I recommend the reference book that I mention in the article: Intelligence and Espionage in Ancient Rome Colonel Rose Mary Sheldon. Happy reading and please let me know your remarks and comments.

Thursday, February 17, 2011

Miranda Cosgrove In Hula

MISSION: Security (HELP)

This is a moment that I wish to devote time to time short notes to promote websites or blogs that inspire me.

I inaugurate the first of them with the blog " MISSION: Security " one of my former colleagues, Mister Jer001. Generally technical but excellent popularizer (with lots of images, which does not spoil anything), the subjects covered by the author are part of the audit (s) technique (s) and penetration tests, most recently, a series on 27K family of standards (ISO 27001, 27002 and others). Unfortunately the blog is improperly fed, but if the "Big J" hear me ... :)

Wednesday, February 16, 2011

Small Balloons Letters

Stuxnet, Anonymous, and China's Foreign Office: bigger is ...


Security News last hours being rich, here is a synthesis of two pieces of information that caught my attention.

First, the Anonymous remain on the podium because, according to Fox News, * a decrypted version of Stuxnet would be available. My analysis is that this information, which I already spoke before yesterday , acts as a decoy: Wikileaks and since her blond angel in the news, there is a cyber offensive to some misinformation provided media (probably in full agreement with their respective governments) that Anonymous whose landmark feat of arms was to attack ( successfully ) servers to the security company HB Gary Federal . In the end, Ira Anonymous do with a virus designed to specifically address the centrifuges at Natanz or turbines Bashehr ? Address other nuclear sites, U.S. those? Bigger is more things going on!

A cut above ("More is huge, the better it goes"), you learn a daring attack and state (!) Targeted the Foreign Office (British Ministry of Foreign Affairs) last month . It is the Minister himself who announced, without citing the source of the country. A source however has made it clear that China was behind the attack. A few lines later, we know a little about this "attack": three unfortunate emails to executives in high places, with an attachment trapped with malicious code. Fortunately, these malicious emails before they were detected can not be opened.

Morality: a State, a technical capability (and intrusive) proved, would it be stupid enough to launch an attack as trivial as not concealing its origin? Knowing full well that the detection devices are effective enough to identify this type of malicious code? I know we have entered the Chinese year of the rabbit but it was he escaped from Alice (in Wonderland)?

* Fox News is known for its professional objectivity and his "non-guidance" policies! ;)

Tuesday, February 15, 2011

Cake Boss Buttercream Recipe

Noddy and cyber threats

In September 2010, I mentioned the rise of the U.S. CYBERCOM , the unit responsible for U.S. arms unite its distributed counterparts in the Army ("Army Cyber Command "), Navy ("Cyber Command Fleet"), the Air Force ("Air Force Cyber Command " ) and finally the Marine Corps ("USMC Cyber Forces Command Cyberspace").

These entities are responsible for the military struggle against threats in cyberspace and are equipped with offensive weapons and non-kinetic. They are however not only because the DHS, FBI or the NSA also have their own strengths. We know of course that the U.S. has a military budget and homeland security unparalleled in the world but I would like to stress the desirability of maintaining a "healthy" competition among all agencies and entities: ultimately, they are fighting against the same threats themselves if they have different origins and motivations, while developing their own specificities. It is an incomparable wealth that illustrates the principle of "the sum of my entities / personalities is slightly higher than the amounts taken individually".

I remain very respectful and even somewhat fascinated when one or other of its entities publishes its own employment doctrine . Even more fascinating, for example, when measuring the degree of difficulty for a European integrated agency (ENISA *) or even "local" ( ANSSI *) to publish such documents. By respect spite, I do not even speak of means that are (or should) be involved!

PS: It is true that I abuse it anyway. ENISA has published a guide management of cyber incidents last month, big step indeed! And ANSSI comes, not to inherit a decree "all hot" last Friday, a new feature " if major cyber attack against the Nation, [to] organize the response and decide on the first urgent measures to implement such by government and run by operators of electronic communications. Here we are reassured !

Monday, February 14, 2011

Gonorrhea Negative But Symptoms

complexity and beauty of Stuxnet

Wired has published Friday, February 11 an article well documented on the typology of introducing Stuxnet before it activates and causes damage, not easily quantified from within the Iranian nuclear program. The methodology is after all "logical" since can not use the internet, only remain vector physical type removable media (USB) to contaminate a local area networks (but isolated) nuclear program.

Five Six organizations / groups, which we know nothing yet but we can assume a direct or indirect link with the nuclear program, have been targeted and have been attacks successive time. The first two waves took place in June and July 2009 and there have been nine full months of inactivity before the other three waves have held (March, April and May 2010).

Symantec who conducted these tests , is able to say that is driving the attack in March 2010 that earned the success rate of the most important (69%). Two other interesting facts emerge from the report: it took only twelve hours from the successful introduction of Stuxnet and its load becomes active (in terms of software). Finally, Stuxnet seems to have been designed to be only "LAN-based" ("LAN") so as not to escape into the wild (the internet).

If these disclosures are to be confirmed, we can again emphasize the great complexity of this procedure code malicious high-tech. Finally, I note that some of Stuxnet decompiled code is available here . A project on Saturday evening in the evening to do his geek! :)

Moreover, speaking of geek , the web is abuzz these last hours of a persistent rumor: the Anonymous reportedly said to have come into possession of Stuxnet. One can easily imagine the vision of Apocalypse propagated by certain media. The right question to ask is: whose interest what? I think we attending the misinformation and even poisoning informational. This article , serious and substantiated, seems to confirm my feeling.

Thursday, February 10, 2011

Safe Oral Gel In Pregnant

Oil & Gas, Chinese recipe

http://www.topnews.in/files/oil-gas1.jpg
I hesitation, no time to talk about this just another case of hacking Chinese, supported in France by Le Figaro . Soon as I'm the gourmand could not pass up the opportunity to aim ads "Sensational" but suspicious of this story.

The origin of this case comes from a leading security products, McAfee, and more particularly its technical manager ( CTO - Chief Technical Officer ), George Kurtz. We learn on his blog that his company has looked closely at a "new" attack on the poetic name of "Night Dragon" (Dragon night). These attacks from China and to Western companies operating in energy (say, even Anglo-Saxon, we talk about Chevron, BP and ExxonMobil ).

So the oil and gas sector, highly strategic in the context of security of supply as far as Chinese American who is once again targeted. Once again since this is not the first nor the last time this sector has fallen prey to attacks. However, we can estimate that the Iranian nuclear Stuxnet who squatted the length charts attacks in recent months, a little breeze blowing from the steppes of Kazakhstan can only do good!

In reality, Apart from the attempt (probably successful) buzz this case, the only relevant information is learned that the type of attacks is an absolute classic * and rise and fall, the devices for detecting attacks (dearly ... sold by McAfee and others) were ineffective ...!

* recipe for an attack "sepia" but effective: a few cloves of social engineering, a great bunch of Windows vulnerabilities, using a DBA (Windows directory), and a sprinkling of the proper privilege escalation. Cook gently Administration Tools remote, cool and serve his guests!

Tuesday, February 8, 2011

Treiber Slimtype Combo Lsc24082k

Bars Superbowl


Want to see all pubs to $ 3 million on average the Superbowl?? Follow this link and enjoy.

For me my favorite is the Doritos "The Best Part". I like the humor a bit simplistic. J'avous me as I like to lick your fingers after a bag of Doritos:)

Favorite Mini Vader Volkswagen.

Source: www.youtube.com / adblitz

How To Repair Rechargable Emergency Light

Confession Wild - By Anne-Marie Losique



I bought Confessions Indians. This book showcases the wildest fantasies, the most daring and hottest Anne-Marie Losique.

My criticism? OUFFFF I was hot! I devoured the book from beginning to end. Acknowledge the work of Franca Perrotto behind the lens. It's very slick and glam, with lighting effects that sometimes create atmospheres conducive to abandonment. The texts
Pierre Thibeault nicely complement the action! To spice up your marriage, let him hang around the lounge, guaranteed fun!

Haaaa yes! At first glance I am a graphic designer and worked in publishing, I must say that the work is successful, I should clarify! :) Enjoy

Monday, February 7, 2011

Pokemon Soul Silver Blue Screen

Cryptology: ten codes inviolate

A very good article, friendly and playful, moreover, appeared on Slate which lists a dozen methods of encryption, some older. Despite enormous progress in terms of cryptanalysis and Computing Power associated these "codes" remain inviolate.

A near exception, however, may be made in respect Chaocipher since Moshe Rubin published in July 2010 an excellent article revealing the algorithm used. But without the gift of family background documentary by John Byrne, the inventor of Chaocipher, the National Cryptologic Museum Fort Meade (NSA headquarters), no one knows when this code would be dropped. The study by Moshe Rubin is here in English, for amateurs only! :)

Friday, February 4, 2011

Personalized Cards Like Jib Jab

Today is the Day (the Music) IPv4 Advanced Persistent Threats Died

One of my colleagues (who will recognize and to whom I extend a fraternal nod) sent me an email early in the morning * Marcus Sachs, Vice-President Security Policy Group Verizon. The latter, a lover of fine words but probably (good) music reminded us yesterday, we celebrated the 52nd anniversary of the tragic demise of rock legends Buddy Holly , Richie Valens and JP "The Big Bopper" Richardson.

The American press it is of course echoed this small but clever Marcus also wanted to make a historical parallel between this date and the commemoration event symbolically shaking Internet because, as recalled Cider judiciously, the last IPv4 (Internet Protocol version 4) are to be allocated to the five continents. Which is good since it had five blocks / 8 is about 16.8 million addresses per block. Come see what some time now even though it will be difficult to ignore the obstacle is that IPv6 will have to manage, what time is a little frightening global players on the web. I will return to time and in the meantime, I urge you to read this paper teaching of the NRO (in English).

* Today is the Day the Music Died. A fitting date for allocation of IPv4 The Last To Be Issued.

Wednesday, February 2, 2011

Real First Time Auditions

marketing ... !

http://taosecurity.blogspot.com/
I just read an excellent article by Ellen Messmer on CSO which, with some finesse and a little humor, seems to call into perspective in its place the concept of Advanced Persistent Threat which I had already echoed rather booked elsewhere.

Without being schematic, we can consider that the term of APT is primarily used by major security vendors and it probably has a military origin (U.S. Air Force, without certainty). The astute reader will agree that it then has two actors known for their cunning of Sioux and other allegorical representations of a cyber world filled with formidable barbarian Chinese hackers!

This is probably not what is meant by Marc Maiffret, CTO of eEye Digital Security, when he says do not be inclined to use the acronym TPA. "I try to say what I mean instead of using acronyms. APT is more famous meetings marketing departments. The new scary thing to decide is APT.

Or how marketing, once again, gives the illusion of novelty, so that the techniques of attack, the vulnerabilities exploited and harm nothing new unfortunately. The only subtlety being, perhaps, that we implement everything in cyberspace (where it gets hot!) and that most of the time, the attacks are conducted by States. All in all, Marc Maiffret just made a disciple! :)

Tuesday, February 1, 2011

To My Best Friend On His Engagement

Vegetarians have better sex




"
Why not choose a vegetable and show us how you the like . "
In fact, it the first line of this clip of 90 seconds of PETA for the 'occas i one of superbow the . With this s the ogan " Vegetarians better sex . "you believe my untenable?
Source: adweek.blogs

Apothem Length Hexagonal Prism

Little Primer on QR Codes ...



feast for the eyes, learn how to use QR codes! Download the application which will scan the code, either by example "mobiletag" or "ScanLife" and scan the everything! Enjoys gang! :) To see all follow this link http://www.qrgirls.com/

Graduated Or Inverted Bob

MAC and Wonder Woman



We see everywhere these days, superheroes are amongst us! ! My last post on Diesel clearly shows. The American cosmetics brand MAC succumbs to turn that trend this year by offering a collection of polish, blush, eyeshadow, lipstick ... the portrait of the incomparable Wonder Woman. This is totally my type: D
Source: thetrendygirl

Monday, January 31, 2011

Pierced Model Toronto

New image for 7UP



PepsiCo International has reviewed the image of 7up with a desing more sophisticated and minimalist. Tracylocke is the creator of this transformation. This packaging will be available internationally as Canada, Germany and Spain.
source: Dieline

Friday, January 28, 2011

Baby Whiteheads On Labia

Waiting for the bus ...


Here is the new advertising campaign for "Hot 'n Wholesome" menu breakfast Caribou Coffee. The agency Colle + McVoy has created this giant furnace for the city of Minneapolis. It does not look like just a giant oven, the heating element on top of your head you warm in the bus attentdant! Cheers customers with budget.

Drinking Perrier Pregnancy

Beat Box!


EKLIPS performs for 4 minutes "history of HIP HOP for Urban Trace" and the all in one take!
Source: Facebook

Zte Tu-25 Usb Mac Driver

Chilly Gonzales - You Can Dance


Canadian artist Chilly Gonzales in collaboration with the label Boize Noise on the track "You Can Dance." Produced by Jonathan Barré and produced by Schmooze. We love ass! : D

Leica Televid 77 Camera T Mount

BE STUPID super hero Diesel


" BE STUPID "Is the slogan of Diesel . Here are some superheroes completely crazy, like Miss Dismiss, Visible Woman, Superman, or IronBoy LalaLady. With much humor and color burst, the Italian label presents its new advertising campaign for Diesel Underwear collections for men and women spring / summer 2011. The inspiration? The American comics of course.
Source: trendsnow

Egyptian Vs Turkish Cotton






Viagra in conjunction with the agency M & C Saatchi (Auckland, New Zealand) we took out an advertisement simple enough, but oh so effective. Had to think, the "bed" is present in everything on the car, on the ground and the kitchen counter, but gentlemen, watch your knee, it érrafle turf!
Source: www.trendsnow.net

Wednesday, January 26, 2011

Comments On Property In Khargar

Tests GPS DoD: U.S. Air caution

The FAA , the administration of U.S. Civil Aviation, has published a recommendation of caution regarding a series of tests planned on the GPS system by the Department of Defense (DoD ). A first series of tests began January 20 and ends February 11 and a second series of tests will be held from February 15 to 22. The GPS could be disrupted could be on the U.S. southeast quarter, the wide geographical area being : Florida, North Carolina and South Georgia, Alabama and parts of Virginia and Tennessee.

Some forums have not failed to question loudly on such requirements, combining GPS and therefore necessarily DoD conspiracy theories. However, no mystery behind it all: no one knows precisely what are these tests but it is probably prudent to update, ensuring limited number of significant deficiencies that have already occurred in January 2010 during the previous update.

As recalled that good article, the DoD has developed the concept of GPS in the early 60s and is from an executive order of President Reagan in 1983 authorizing civilian use, also responsible for software updates and maintenance of satellites.