Friday, August 27, 2010

♩ ♪ ♫ ♬ Les Meilleurs Chansons de Mon Enfance ♩ ♪ ♫ ♬

Il etait un petit navire...



Une Souris Verte...



Une souris verte



Qui courait dans l'herbe.



Je l'attrape par la queue,



Je la montre à ces messieurs.



Ces messieurs me disent :



Trempez-la dans l'huile,



Trempez-la dans l'eau,



Ça fera un escargot



Tout chaud.



Je la mets dans un tiroir,



Elle me dit : Il fait trop noir.



Je la mets dans mon chapeau,



Elle me dit : Il fait trop chaud.



✰    ✰     ✰     ✰    


Le roi Dagobert...



Frères Jacques...

Thursday, August 26, 2010

Walk Off Every Bulge

Source: health.com/

Get ready, get fit

Who’s afraid of the big, bad three-way dressing-room mirror? Not you! Especially not after you shape your body from head to toe, back to front, and all the way around with this super-effective, 45-minute workout that alternates calorie-and-fat-torching interval walking with body-sculpting strength moves. How good is it? It comes straight from Los Angeles-based celebrity trainer Kathy Kaehler, who helps walk Julia Roberts into amazing shape.
Set your course

Before doing this workout for the first time, measure a three-mile loop (drive it or walk it while wearing a watch that measures distance, and note a landmark at each mile mark. Or simply head to your favorite track or hop on a treadmill.






Do the routine four or five times a week to lose up to eight inches all over your body in just four weeks. (Be sure to walk for a few minutes at an easy pace before and after the workout to warm up and cool down.) Ready? Time to show that mirror who’s boss.

Start your walk

Begin the workout by walking at a brisk pace until you hit the 1-mile mark. Your goal is to cover the distance in less than 15 minutes. Stand straight as you walk, with your abs pulled in and arms reaching forward as you pump them. To speed up, take faster steps, not longer ones.
Forward Lunges
(for quadriceps, hamstrings, butt, calves)






Step your right leg forward and lower into a lunge; don’t let front knee go past toes. Push into your right heel to return to starting position; repeat on opposite side. Continue to alternate for 1 minute.
Walking Burst


Alternate 1 minute of brisk walking with 1 minute of running until you hit the 2-mile mark. As your fitness improves, feel free to shorten the walking time and lengthen the running time, if desired.
Full Push-ups
(for triceps, chest, shoulders, core) 






Get into push-up position on your hands and toes, with arms straight (don’t lock your elbows) and hands right below your shoulders. Tighten abs as you bend your elbows to lower down toward ground, then push back up. Your body should stay in a straight line throughout the move. Do as many reps as you can in 1 minute. Can’t do a full push-up? Get into plank position (the “up” part of a push-up) and hold for 1 minute.
Toe-Touch Squats

(for butt, quadriceps, hamstrings)






While reaching both arms forward, squat down, keeping weight on heels. As you lower down, reach down to touch right hand to toes of left shoe; return to standing. Squat again, this time touching left hand to right toes. Be sure to keep your knees behind your toes each time you squat. Continuing to alternate, do as many reps as you can in 1 minute.
Elbow-Knee Touch

(for core, shoulders)






Get into push-up position with arms straight (don’t lock your elbows). Bring your right knee in toward your left elbow, then return to starting position. Repeat, bringing your left knee toward your right elbow. Continuing to alternate, do as many reps as you can in 1 minute.
Walk, Run, Skip


Do the following sequence until you hit the 3-mile mark: walk briskly for 1 minute, run for 1 minute, skip for 1 minute. As you skip, you can make the movements small or big; the higher you raise your knees and arms, the more calories you’ll burn.
Side-T Pose
(for core, shoulders, triceps)






Lie on your right side with your legs straight, feet stacked, right elbow bent, and palm on the ground. Tighten your abs and push into right hand, straightening arm (your hand should be directly under your shoulder). 






At the same time, lift hips so body forms a straight line from head to feet. Raise left hand straight up in the air. For less of a challenge, bend right leg so the bottom half is on the ground for support (keep left leg long). Either way, hold for 30 seconds, then switch sides and repeat.
Tabletop Dips

(for triceps)






Squat down and put your hands on the ground behind you (fingertips pointing forward). Walk your feet forward a little, lifting your hips until your body looks like a tabletop, with your torso in a straight line from shoulders to knees. Bend your elbows to lower down, then straighten them again (but don’t lock your elbows). Keeping good form, do as many reps as you can in 1 minute.

Monday, August 23, 2010

Software turns iPad into a beer keg control center

I guess Yelp has some kind of Googlesque 20% time thing, because engineers at the company found the time to create something called the KegMate.

The software enables an iPad, attached to a keg of beer, to keep track of who's drinking and how much (using RFID scans no less!). It displays the temperature of the beer. Users can rate beer quality, and see who else has been drinking. 

Tuesday, August 10, 2010

KeyLogging

Keyloggers are applications or devices that monitor the physical keystrokes of a computer user.

They then either aggregate the information locally for later retrieval or send it off to a spyware server on the Internet.

Some businesses use keyloggers, such as with the Spector Pro system, to monitor employee activity, but the vast majority are applications installed without the user's knowledge as part of a software download or system intrusion.

The true danger posed by keyloggers is their ability to bypass encryption controls and gather sensitive data directly from the user. All the encryption in the world will not secure your data if a hacker watches you type your encryption key. He can then simply use that plaintext key to decrypt all of your "protected" communications from that point forward!

Here are five steps you can take to detect existing spyware and prevent future infections on your network:

(1). Install spyware filters at the host level. There are plenty of spyware scanners available on the market. If you're looking for an inexpensive solution, you might consider Microsoft's beta tool, Windows Antispyware, Spybot or AdAware. Many commercial antivirus vendors, such as McAfee, also have spyware filters available that snap in to your enterprise antivirus solution. 

(2). Install an application gateway with spyware content filtering. We're just starting to see the emergence of spyware appliance solutions that operate at the network level. One such system is the Blue Coat Spyware Interceptor. If your budget can bear it, you might consider this type of solution.




(3). Place egress filters on your network. It never hurts to have a good set of egress filters on your network. They might assist in blocking spyware attempting to "phone home." 



(4). Monitor your intrusion-detection system (IDS) and keep the signatures current. If you're not able to block spyware from phoning home, you might at least be able to detect it with your IDS and use the reports to identify infected systems. 


(5). Prevent users from installing downloaded software. Most spyware installations are the result of users installing unauthorized software downloaded from the Internet. If your organization's security policy permits, you should implement technical controls to prevent this type of activity.
Spyware, and the associated crime of identity theft, is one of the most important battles currently facing information security professionals. It's time to ensure that your organization is safe. Following these steps will help bring you closer to that goal.

Friday, August 6, 2010

Malware


Malware, short for malicious software, is software designed to infiltrate a computer system without the owner's informed consent. The expression is a general term used by computer professionals to mean a variety of forms of hostile, intrusive, or annoying software or program code. The term "computer virus" is sometimes used as a catch-all phrase to include all types of malware, including true viruses.

Software is considered to be malware based on the perceived intent of the creator rather than any particular features.


Malware includes computer viruses, worms, Trojan, spyware, dishonest adware, crimeware, most rootkits, and other malicious and unwanted software.

Malware is not the same as defective software, that is, software that has a legitimate purpose but contains harmful bugs.

Viruses, worms, Trojan, spyware, adware, crimeware & rootkits!

A computer virus is a computer program that can copy itself and infect a computer. The term "virus" is also commonly but erroneously used to refer to other types of malware, including but not limited to adware and spyware programs that do not have the reproductive ability.
A true virus can spread from one computer to another (in some form of executable code) when its host is taken to the target computer; for instance because a user sent it over a network or the Internet, or carried it on a removable medium such as a CD, DVD, or USB drive.
Viruses can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer. Some viruses do nothing beyond reproducing themselves.
Viruses are sometimes confused with worms and Trojan horses, which are technically different.
A worm can exploit security vulnerabilities to spread itself automatically to other computers through networks, while a Trojan horse is a program that appears harmless but hides malicious functions. Worms and Trojan horses, like viruses, may harm a computer system's data or performance. Some viruses and other malware have symptoms noticeable to the computer user, but many are surreptitious or simply do nothing to call attention to themselves.

Spyware is any technology that aids in gathering information about a person or organization without their knowledge.

On the Internet (where it is sometimes called a spybot or tracking software), spyware is programming that is put in someone's computer to secretly gather information about the user and relay it to advertisers or other interested parties. Spyware can get in a computer as a software virus or as the result of installing a new program.

Data collecting programs that are installed with the user's knowledge are not, properly speaking, spyware, if the user fully understands what data is being collected and with whom it is being shared. However, spyware is often installed without the user's consent, as a drive-by download, or as the result of clicking some option in a deceptive pop-up window.


The cookie is a well-known mechanism for storing information about an Internet user on their own computer. If a Web site stores information about you in a cookie that you don't know about, the cookie can be considered a form of spyware. Spyware is part of an overall public concern about privacy on the Internet.

 Adware

 1) Generically, adware  is any software application in which advertising banners are displayed while the program is running. The authors of these applications include additional code that delivers the ads, which can be viewed through pop-up windows or through a bar that appears on a computer screen. The justification for adware is that it helps recover programming development cost and helps to hold down the cost for the user.

Adware has been criticized because it usually includes code that tracks a user's personal information and passes it on to third parties, without the user's authorization or knowledge.

2) AdWare is also a registered trademark that belongs to AdWare Systems, Inc. AdWare Systems builds accounting and media buying systems for the advertising industry and has no connection to pop-up advertising, spyware, or other invasive forms of online advertising.

Crimeware is any computer program or set of programs designed expressly to facilitate illegal activity online. Many spyware programs, browser hijackers, and keyloggers can be considered crimeware, although only those used illicitly.

One common type of crimeware is the phishing kit, a collection of tools assembled to make it easier for people with little technical skill to launch a phishing exploit. A phishing kit typically includes Web site development software, complete with graphics, coding, and content that can be used to create convincing imitations of legitimate sites, and spamming software to automate the mass mailing process. Phishing kits and other types of crimeware are readily available on the Internet.


In a phishing exploit, the perpetrator sends spam purporting to be from a valid Web site, such as PayPal or eBay, asking the recipient to visit the site and update personal information. The e-mail may bear exciting or disturbing text in the subject line, maximizing the likelihood that the victim will open the message. When the victim clicks on a link in the message, they are taken to a fraudulent site that, typically, appears quite legitimate. There, the user is asked to provide sensitive information, such as credit card and bank account numbers and passwords, that can then be misused.

Other types of crimeware gather information illegally by surreptitiously installing a keylogger in your computer that will then record everything that is entered at the keyboard, including passwords and other privileged information. Periodically an associated Trojan horse program installed on your computer without your knowledge will send this privileged information to the crimeware originator.

The more sophisticated crimeware programs evade detection by most spyware scanning programs and will not be detected by most firewalls. Once stolen, the information can be accessed and exploited from anywhere in the world.

A rootkit is a collection of tools (programs) that enable administrator-level access to a computer or computer network. Typically, a cracker installs a rootkit on a computer after first obtaining user-level access, either by exploiting a known vulnerability or cracking a password. Once the rootkit is installed, it allows the attacker to mask intrusion and gain root or privileged access to the computer and, possibly, other machines on the network.

A rootkit may consist of spyware and other programs that: monitor traffic and keystrokes; create a "backdoor" into the system for the hacker's use; alter log files; attack other machines on the network; and alter existing system tools to escape detection.

A number of vendors, including Microsoft, F-Secure, and Sysinternals, offer applications that can detect the presence of rootkits. If a rootkit is detected, however, the only sure way to get rid of it is to completely erase the computer's hard drive and reinstall the operating system.

Hacking: Script Kiddie



Script kiddie, skiddie, script bunny, script kitty or script-running juvenile (SRJ)!


Script kiddy is a derogative term, originated by the more sophisticated crackers of computer security systems, for the more immature, but unfortunately often just as dangerous exploiter of security lapses on the Internet.

The typical script kiddy uses existing and frequently well-known and easy-to-find techniques and programs or scripts to search for and exploit weaknesses in other computers on the Internet - often randomly and with little regard or perhaps even understanding of the potentially harmful consequences.
 Hackers view script kiddies with alarm and contempt since they do nothing to advance the "art" of hacking but sometimes unleashing the wrath of authority on the entire hacker community.

While a hacker will take pride in the quality of an attack - leaving no trace of an intrusion, for example - a script kiddy may aim at quantity, seeing the number of attacks that can be mounted as a way to obtain attention and notoriety.

Script kiddies are sometimes portrayed in media as bored, lonely teenagers seeking recognition from their peers.
Script kiddies are often able to exploit vulnerable systems and strike with moderate success. 
Some of the most infamous examples include:
  • In 1999, NetBus was used to discredit a law student named Magnus Eriksson studying at the Lund University in Sweden. Child pornography was uploaded onto his computer from an unidentified location. He was later acquitted of charges in 2004 when it was discovered that NetBus had been used to control his computer.
  • Jeffrey Lee Parson, a.k.a. T33kid, was an 18-year-old high school student from Minnesota who was responsible for spreading a variant of the infamous Blaster computer worm. Parson only modified the original Blaster worm, already prevalent, using a hex editor to add his screen name to the existing executable, and then attached another existing backdoor, Lithium, and posted it on his website. By making this subtle modification, the new executable was considered a variant, and authorities were able to trace the name back to him. The program was part of a DoS attack against computers using the Microsoft Windows operating system. The attack took the form of a SYN flood which caused only minimal damage. He was sentenced to 18 months in prison in 2005.