Monday, February 28, 2011

Beef Heifers Cows For Sale

Cybersecurity in France and Europe: downgrading or opportunity (ies)?

While on the Old Continent we try as best they can position themselves in the fight against cyber-threats, the United States and more particularly the "DoD (Department of Defense / Department of Defense), communicate to another level but also advancing rapidly. I will return in a future post.

A first bracket: you can even think that the evolution of the "Holy Trinity" (doctrine / resources / capabilities) ahead of the communication also great communicators because they are, the technological advance and / or capability and confidentiality remain as one of their strengths.

A second bracket for accuracy, linked to one of my previous posts abruptly (but in fact, I maintain my position!) Entitled " Noddy and cyber threats . I laughed politely of the European Agency for Safety Network and Information ( ENISA) and his French counterpart, the ANSSI . These two entities, missions rather different but complementary suffer from major handicaps: for ENISA is to be a European integrated agency with what it leads in terms of strategy (s) and decision (s). Since its inception, the initial goal was quickly confronted with the reality: the legitimacy of national agencies and CERT , modest budgets, goals quickly revised downwards. Like other agencies in their time, it will in future find its place among the national systems, on pain of being a new "gadget .

For ANSSI is more complicated late DCSSI has a legitimacy on the national stage and beyond, recognized expertise, but the major drawback of not having a size critical. Budgets are certainly increasing and the number of open positions has increased significantly recent years but that does not spearhead that France, " fifth largest economy", is entitled wait. Especially in Europe, is an actor but also a target for threats ranging from terrorism to economic and industrial intelligence. And that networks and information systems are at the heart of these issues.

Has provided the die is cast? We can fear it, unfortunately. Especially when we know that NATO at its last summit , placed cybersecurity as one of the important areas that the Alliance will have to address.

So on one hand, we can let go and say that keeping a small agency at the national level, integrated in a system with NATO staff resources and greater resources, is common sense. Especially at a time when economies across announced.

On the other hand, some makers (and their advisers) have adequately measured the interest that France (and some of its European neighbors) Will (are) to engage in the process of the fight against cyber threats ? Behind what may seem abstruse, highly virtual, high-tech jobs and new tools (concepts, methodologies, technologies) are to integrate and create. And know-how could be partly exported (ie sold) thereafter.

To believe the adage that "security is a cost, not an investment "remain inscribed in stone a long time!

Thursday, February 24, 2011

Watch Family Guy In Iphone

USAF, social media and false identities

A surprising spin-off of the shock wave Wikileaks through one of the many emails illegally recovered ; by Anonymous in the security company HB Gary has learned that the U.S. Air Force launched in early summer 2010, a tender for a software create and manage false identities on social networks (Facebook, Twitter, MySpace). Among these emails, one of the leaders of HB Gary surprised that this solicitation be "open", ie public, especially since it seems that Federal HB Gary, entity that provides security services, which could be retained to provide the desired software.
The feature of the tool are as follows: 50 licenses to manage each 10 personae (virtual users) with functions of IP Spoofing to disguise the true origin persona of . The aim of the operation is twofold: to lure friends who connect to these profiles and obtain information on individuals targeted through these friends. That's what we learned article from Information Week .
Information still shows from more important social networks as a vector informational but also how the U.S. government entities are firing on all cylinders in the field of technology information.

A further illustration of the emergence of cyber security as a key area and critical (and possibly controllable!) as well as the four dimensions (land, sea, air and space) including the United States has control or superiority.

Wednesday, February 23, 2011

Can You Stack A Toaster On A Microwave?

1989 - 2011: domino effect or shock wave?

One swallow does not a ticket-based geopolitics. Current events occurring in the Maghreb to the Arabian Peninsula are in the order of the historical event: an amount of stories, tragic for them (Libya?), "Happy" for others (Tunisia, Egypt) entering into any field of study (current and future) history.

It is extremely difficult to know how this maelstrom but ultimately one feels instinctively that what is at stake is the order of fall of the Berlin Wall in 1989 and the collapse of the Soviet system (and its satellites) that ensued. However, it is more likely to attend the propagation of a shock wave rather than a domino effect. This is expressed last night on France 5 in the show " C in air," Pascal Boniface . Who also explained that sense the shock wave would spread to Asia and, why not China with known number of local households, rebellion or discontent for many many years. Put gasoline on the embers could soon become the fire was in a pine forest parched by the heat wave!


The disadvantage (danger?) Of such a scenario is that it is difficult to predict the intensity and duration of the shock wave. Moreover, and contrary to the domino effect, the effects can penetrate some countries without damage to bounce a little further. Finally, management remains uncertain and even the northern countries of the Mediterranean (Europe, ie us) could feel some effects.

To better stick to this topical and moving, I've listed below the sites I visit regularly. Informed reader, I will publish this list if you let me know your own sources.

- Arabias, snapshots of the Arab world . Geopolitics, economics, societies. The blog of Morgan Marchand.
- thread Twitter Clarisse . A selection (not always updated continuously) tweets media, journalists, bloggers and control / relay to Libya, from Egypt, Turkey, Syria India, UAE, Pakistan, Europe, Africa ... - information not always confirmed or confirmable.
- Chronicles Persian . Iran: analysis of political, geopolitical and geostrategic by Vincent Eiffling.
- EGEA. The blog by Olivier Kempf well known that the tests are always full of lessons and information. Tickets related uprisings current attempt a prospective extremely relevant.
- Chinatown. Rue89's Chinatown.

Monday, February 21, 2011

What Scorpio Man Likes

Roman Empire and Intelligence Alliance (geostrategic)

I am honored to have modestly contributed to the theme of the month on the intelligence of the Geo Strategic Alliance (AGS). My article deals with intelligence in the Roman Empire and, unfortunately, only fly a complex and surprising size constraint requires publication.

For those who might be tempted to go further, I recommend the reference book that I mention in the article: Intelligence and Espionage in Ancient Rome Colonel Rose Mary Sheldon. Happy reading and please let me know your remarks and comments.

Thursday, February 17, 2011

Miranda Cosgrove In Hula

MISSION: Security (HELP)

This is a moment that I wish to devote time to time short notes to promote websites or blogs that inspire me.

I inaugurate the first of them with the blog " MISSION: Security " one of my former colleagues, Mister Jer001. Generally technical but excellent popularizer (with lots of images, which does not spoil anything), the subjects covered by the author are part of the audit (s) technique (s) and penetration tests, most recently, a series on 27K family of standards (ISO 27001, 27002 and others). Unfortunately the blog is improperly fed, but if the "Big J" hear me ... :)

Wednesday, February 16, 2011

Small Balloons Letters

Stuxnet, Anonymous, and China's Foreign Office: bigger is ...


Security News last hours being rich, here is a synthesis of two pieces of information that caught my attention.

First, the Anonymous remain on the podium because, according to Fox News, * a decrypted version of Stuxnet would be available. My analysis is that this information, which I already spoke before yesterday , acts as a decoy: Wikileaks and since her blond angel in the news, there is a cyber offensive to some misinformation provided media (probably in full agreement with their respective governments) that Anonymous whose landmark feat of arms was to attack ( successfully ) servers to the security company HB Gary Federal . In the end, Ira Anonymous do with a virus designed to specifically address the centrifuges at Natanz or turbines Bashehr ? Address other nuclear sites, U.S. those? Bigger is more things going on!

A cut above ("More is huge, the better it goes"), you learn a daring attack and state (!) Targeted the Foreign Office (British Ministry of Foreign Affairs) last month . It is the Minister himself who announced, without citing the source of the country. A source however has made it clear that China was behind the attack. A few lines later, we know a little about this "attack": three unfortunate emails to executives in high places, with an attachment trapped with malicious code. Fortunately, these malicious emails before they were detected can not be opened.

Morality: a State, a technical capability (and intrusive) proved, would it be stupid enough to launch an attack as trivial as not concealing its origin? Knowing full well that the detection devices are effective enough to identify this type of malicious code? I know we have entered the Chinese year of the rabbit but it was he escaped from Alice (in Wonderland)?

* Fox News is known for its professional objectivity and his "non-guidance" policies! ;)

Tuesday, February 15, 2011

Cake Boss Buttercream Recipe

Noddy and cyber threats

In September 2010, I mentioned the rise of the U.S. CYBERCOM , the unit responsible for U.S. arms unite its distributed counterparts in the Army ("Army Cyber Command "), Navy ("Cyber Command Fleet"), the Air Force ("Air Force Cyber Command " ) and finally the Marine Corps ("USMC Cyber Forces Command Cyberspace").

These entities are responsible for the military struggle against threats in cyberspace and are equipped with offensive weapons and non-kinetic. They are however not only because the DHS, FBI or the NSA also have their own strengths. We know of course that the U.S. has a military budget and homeland security unparalleled in the world but I would like to stress the desirability of maintaining a "healthy" competition among all agencies and entities: ultimately, they are fighting against the same threats themselves if they have different origins and motivations, while developing their own specificities. It is an incomparable wealth that illustrates the principle of "the sum of my entities / personalities is slightly higher than the amounts taken individually".

I remain very respectful and even somewhat fascinated when one or other of its entities publishes its own employment doctrine . Even more fascinating, for example, when measuring the degree of difficulty for a European integrated agency (ENISA *) or even "local" ( ANSSI *) to publish such documents. By respect spite, I do not even speak of means that are (or should) be involved!

PS: It is true that I abuse it anyway. ENISA has published a guide management of cyber incidents last month, big step indeed! And ANSSI comes, not to inherit a decree "all hot" last Friday, a new feature " if major cyber attack against the Nation, [to] organize the response and decide on the first urgent measures to implement such by government and run by operators of electronic communications. Here we are reassured !

Monday, February 14, 2011

Gonorrhea Negative But Symptoms

complexity and beauty of Stuxnet

Wired has published Friday, February 11 an article well documented on the typology of introducing Stuxnet before it activates and causes damage, not easily quantified from within the Iranian nuclear program. The methodology is after all "logical" since can not use the internet, only remain vector physical type removable media (USB) to contaminate a local area networks (but isolated) nuclear program.

Five Six organizations / groups, which we know nothing yet but we can assume a direct or indirect link with the nuclear program, have been targeted and have been attacks successive time. The first two waves took place in June and July 2009 and there have been nine full months of inactivity before the other three waves have held (March, April and May 2010).

Symantec who conducted these tests , is able to say that is driving the attack in March 2010 that earned the success rate of the most important (69%). Two other interesting facts emerge from the report: it took only twelve hours from the successful introduction of Stuxnet and its load becomes active (in terms of software). Finally, Stuxnet seems to have been designed to be only "LAN-based" ("LAN") so as not to escape into the wild (the internet).

If these disclosures are to be confirmed, we can again emphasize the great complexity of this procedure code malicious high-tech. Finally, I note that some of Stuxnet decompiled code is available here . A project on Saturday evening in the evening to do his geek! :)

Moreover, speaking of geek , the web is abuzz these last hours of a persistent rumor: the Anonymous reportedly said to have come into possession of Stuxnet. One can easily imagine the vision of Apocalypse propagated by certain media. The right question to ask is: whose interest what? I think we attending the misinformation and even poisoning informational. This article , serious and substantiated, seems to confirm my feeling.

Thursday, February 10, 2011

Safe Oral Gel In Pregnant

Oil & Gas, Chinese recipe

http://www.topnews.in/files/oil-gas1.jpg
I hesitation, no time to talk about this just another case of hacking Chinese, supported in France by Le Figaro . Soon as I'm the gourmand could not pass up the opportunity to aim ads "Sensational" but suspicious of this story.

The origin of this case comes from a leading security products, McAfee, and more particularly its technical manager ( CTO - Chief Technical Officer ), George Kurtz. We learn on his blog that his company has looked closely at a "new" attack on the poetic name of "Night Dragon" (Dragon night). These attacks from China and to Western companies operating in energy (say, even Anglo-Saxon, we talk about Chevron, BP and ExxonMobil ).

So the oil and gas sector, highly strategic in the context of security of supply as far as Chinese American who is once again targeted. Once again since this is not the first nor the last time this sector has fallen prey to attacks. However, we can estimate that the Iranian nuclear Stuxnet who squatted the length charts attacks in recent months, a little breeze blowing from the steppes of Kazakhstan can only do good!

In reality, Apart from the attempt (probably successful) buzz this case, the only relevant information is learned that the type of attacks is an absolute classic * and rise and fall, the devices for detecting attacks (dearly ... sold by McAfee and others) were ineffective ...!

* recipe for an attack "sepia" but effective: a few cloves of social engineering, a great bunch of Windows vulnerabilities, using a DBA (Windows directory), and a sprinkling of the proper privilege escalation. Cook gently Administration Tools remote, cool and serve his guests!

Tuesday, February 8, 2011

Treiber Slimtype Combo Lsc24082k

Bars Superbowl


Want to see all pubs to $ 3 million on average the Superbowl?? Follow this link and enjoy.

For me my favorite is the Doritos "The Best Part". I like the humor a bit simplistic. J'avous me as I like to lick your fingers after a bag of Doritos:)

Favorite Mini Vader Volkswagen.

Source: www.youtube.com / adblitz

How To Repair Rechargable Emergency Light

Confession Wild - By Anne-Marie Losique



I bought Confessions Indians. This book showcases the wildest fantasies, the most daring and hottest Anne-Marie Losique.

My criticism? OUFFFF I was hot! I devoured the book from beginning to end. Acknowledge the work of Franca Perrotto behind the lens. It's very slick and glam, with lighting effects that sometimes create atmospheres conducive to abandonment. The texts
Pierre Thibeault nicely complement the action! To spice up your marriage, let him hang around the lounge, guaranteed fun!

Haaaa yes! At first glance I am a graphic designer and worked in publishing, I must say that the work is successful, I should clarify! :) Enjoy

Monday, February 7, 2011

Pokemon Soul Silver Blue Screen

Cryptology: ten codes inviolate

A very good article, friendly and playful, moreover, appeared on Slate which lists a dozen methods of encryption, some older. Despite enormous progress in terms of cryptanalysis and Computing Power associated these "codes" remain inviolate.

A near exception, however, may be made in respect Chaocipher since Moshe Rubin published in July 2010 an excellent article revealing the algorithm used. But without the gift of family background documentary by John Byrne, the inventor of Chaocipher, the National Cryptologic Museum Fort Meade (NSA headquarters), no one knows when this code would be dropped. The study by Moshe Rubin is here in English, for amateurs only! :)

Friday, February 4, 2011

Personalized Cards Like Jib Jab

Today is the Day (the Music) IPv4 Advanced Persistent Threats Died

One of my colleagues (who will recognize and to whom I extend a fraternal nod) sent me an email early in the morning * Marcus Sachs, Vice-President Security Policy Group Verizon. The latter, a lover of fine words but probably (good) music reminded us yesterday, we celebrated the 52nd anniversary of the tragic demise of rock legends Buddy Holly , Richie Valens and JP "The Big Bopper" Richardson.

The American press it is of course echoed this small but clever Marcus also wanted to make a historical parallel between this date and the commemoration event symbolically shaking Internet because, as recalled Cider judiciously, the last IPv4 (Internet Protocol version 4) are to be allocated to the five continents. Which is good since it had five blocks / 8 is about 16.8 million addresses per block. Come see what some time now even though it will be difficult to ignore the obstacle is that IPv6 will have to manage, what time is a little frightening global players on the web. I will return to time and in the meantime, I urge you to read this paper teaching of the NRO (in English).

* Today is the Day the Music Died. A fitting date for allocation of IPv4 The Last To Be Issued.

Wednesday, February 2, 2011

Real First Time Auditions

marketing ... !

http://taosecurity.blogspot.com/
I just read an excellent article by Ellen Messmer on CSO which, with some finesse and a little humor, seems to call into perspective in its place the concept of Advanced Persistent Threat which I had already echoed rather booked elsewhere.

Without being schematic, we can consider that the term of APT is primarily used by major security vendors and it probably has a military origin (U.S. Air Force, without certainty). The astute reader will agree that it then has two actors known for their cunning of Sioux and other allegorical representations of a cyber world filled with formidable barbarian Chinese hackers!

This is probably not what is meant by Marc Maiffret, CTO of eEye Digital Security, when he says do not be inclined to use the acronym TPA. "I try to say what I mean instead of using acronyms. APT is more famous meetings marketing departments. The new scary thing to decide is APT.

Or how marketing, once again, gives the illusion of novelty, so that the techniques of attack, the vulnerabilities exploited and harm nothing new unfortunately. The only subtlety being, perhaps, that we implement everything in cyberspace (where it gets hot!) and that most of the time, the attacks are conducted by States. All in all, Marc Maiffret just made a disciple! :)

Tuesday, February 1, 2011

To My Best Friend On His Engagement

Vegetarians have better sex




"
Why not choose a vegetable and show us how you the like . "
In fact, it the first line of this clip of 90 seconds of PETA for the 'occas i one of superbow the . With this s the ogan " Vegetarians better sex . "you believe my untenable?
Source: adweek.blogs

Apothem Length Hexagonal Prism

Little Primer on QR Codes ...



feast for the eyes, learn how to use QR codes! Download the application which will scan the code, either by example "mobiletag" or "ScanLife" and scan the everything! Enjoys gang! :) To see all follow this link http://www.qrgirls.com/

Graduated Or Inverted Bob

MAC and Wonder Woman



We see everywhere these days, superheroes are amongst us! ! My last post on Diesel clearly shows. The American cosmetics brand MAC succumbs to turn that trend this year by offering a collection of polish, blush, eyeshadow, lipstick ... the portrait of the incomparable Wonder Woman. This is totally my type: D
Source: thetrendygirl