Ninja Lounge

Facebook Twitter

Internet scan finds thousands of device flaws, system weaknesses. LOUISVILLE, Ky. --- A scan of the Internet over 20 days has yielded terabytes of data and also some alarming weaknesses including misconfigured routers, vulnerability riddled databases and more than 1,000 exposed passwords.

Internet scan finds thousands of device flaws, system weaknesses

The Internet has gone from this nebulous scary thing that's hard to map to … something that you can gain lot of interesting insight by analyzing information like this. HD Moore, Metasploit creator, CSO, Rapid7 It's a project that HD Moore calls his hobby. The Internet-wide survey looked for open TCP ports, SNMP system descriptions, MDNS responders, UPNP endpoints and NetBIOS name queries.

At the DerbyCon security conference here, Moore told a packed room of hundreds of attendees that the project has resulted in a treasure-trove of data that is continually being analyzed. "The Internet has gone from this nebulous scary thing that's hard to map to … something that you can gain lot of interesting insight by analyzing information like this," Moore said.

Datachurch. Dmaculate. Privsec. Emprendimeintos. TURBEAU. TURBEAU. Interouèbes. Searchengines. Interesting stuff. SQL. Free Web Hosting with PHP, MySQL and cPanel, No Ads. Converters. IP Act. Put the internet to work for you. Ifttt. Elliottbelardo. Fun. WebDev. Kickstarter. Paedraig. Technology. Drug Interactions. Drug interactions occurs when the effect of a particular drug is altered when it is taken with another drug, or with food.

Drug Interactions

The Drug Interaction Checker explains the mechanism of each drug interaction, the level of significance of the interaction (major, moderate or minor), and in certain cases, can provide the recommended course of action to manage the interaction. The Drug Interaction Checker will also display any interactions between your chosen drug(s) and food. In order to proceed to the Drug Interactions Checker, you must read and agree to the following terms: The Service is a service provided to you by Cerner Multum, Inc. ("Multum"). The Rise of Nimble Medicine. Editor’s note: This guest post was written by Dave Chase, the CEO of, a patient portal & relationship management company that was a TechCrunch Disrupt finalist.

The Rise of Nimble Medicine

Previously he was a management consultant for Accenture’s healthcare practice and founder of Microsoft’s Health platform business. You can follow him on Twitter @chasedave. Images are courtesy of Jason Hwang, M.D., M.B.A. Executive Director, Healthcare of the Innosight Institute and co-author of The Innovator’s Prescription. In the New Yorker, Dr. Traditionally, attempting a new care or payment model meant long planning and development cycles. In their book, The Innovator’s Prescription, Clayton Christensen and Dr. In contrast, disruptive innovators such as WhiteGlove Health and Qliance rethought the care delivery and payment models from the ground up.

ArriveMD has taken the lean practice model to an extreme by closing a bricks and mortar clinic and replacing it with a clinic on wheels. Related articles: Frameworks. OPERA experiment. TechCrunch. Downfall: Photos Of MegaUpload Founder’s Valuable Cars Getting Seized. The shit really hit the fan over at massively popular file hosting site MegaUpload.

Downfall: Photos Of MegaUpload Founder’s Valuable Cars Getting Seized

Yesterday, the United States Department of Justice seized and shut down the site and commenced criminal cases against its owners and others, sparking retaliatory actions from hacker collective Anonymous. Yesterday, following the DoJ indictment, the Organised and Financial Crime Agency of New Zealand arrested MegaUpload founder Kim Schmitz (aka Kim Dotcom), CMO Finn Batato, co-founder and CTO Mathias Ortmann and others. Their subsequent bail request was denied in New Zealand court as it was opposed by US authorities on the case. GigaOm has an excellent run-down of the indictment details if you’d like to learn more. In the meantime, we got pinged by Elliott Kember, who was in New Zealand when the crackdown was in full effect. For a list of items seized, check out CNET’s article on the matter. And check out that lovely pink Cadillac! TED+talks+forelesninger. Zettaset - Easy Big Data Deployment.

Is it really Zeus vs. Anonymous? The word from Symantec is that supporters of the world's most famous, if loosely organized, hacker group got hacked themselves.

Is it really Zeus vs. Anonymous?

The word from the alleged victim, Anonymous, is a ferocious denial that it ever happened. So, were Anonymous supporters really duped into installing the Zeus botnet that steals their confidential information, including email login information, banking user names and passwords? Yes, according to Symantec, which reported late last month that an unknown hacker modified a link to "Slowloris," a popular Distributed Denial of Service (DDoS) attack tool, which then directed users to a Zeus bot Trojan instead. The company said the hack against Anonymous took place Jan. 20, the day Megaupload co-founder Kim Dotcom and three others were arrested, and the day after Anonymous attacked websites operated by the U.S.

Department of Justice, the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA). Blacole's shell code. Let's assume you finished the analysis of Blacole's obfuscated Javascript (see my earlier diary today), and you are still left with a code block like this and you wonder what it does.

Blacole's shell code

The first step in Shell Code analysis is to "clean it up", in the case at hand here, we have to remove those spurious "script" tags because they would trip us up in any of the following steps. Once we're left with only the actual unicode (%uxxyy...) , we can turn this into printable characters: $ cat raw.js | perl -pe 's/%u(..)(..) 00000000 41 41 41 41 66 83 e4 fc fc eb 10 58 31 c9 66 81 |AAAAf.äüüë.X1Éf.| 00000010 e9 57 fe 80 30 28 40 e2 fa eb 05 e8 eb ff ff ff |éWþ.0(@âúë.èëÿÿÿ| 00000020 ad cc 5d 1c c1 77 1b e8 4c a3 68 18 a3 68 24 a3 |­Ì].Áw.èL£h.

This doesn't result in anything all that useful yet. Next step: Disassemble. The quickest way to do so from a Unix command line (that I'm aware of) is to wrap the shell code into a small C program, compile it, and then disassemble it: results in $ cat decoded.c A-Ha! .movo.


Internet. Security Software & Tools. Simon Carr. Engineering. Electronic Engineering. Electrons & electricity. Transducers. Skeptic/ScienceBlogs. DIY Electronics. Renewable Energy. Renewable Energy. SCIENCE. NASA Science. Is Time An Illusion? From The Buddha To Brian Greene : 13.7: Cosmos And Culture. Can time be stopped, captured or even known?

Is Time An Illusion? From The Buddha To Brian Greene : 13.7: Cosmos And Culture

Does it exist, or is it all just an illusion? Karim Sahib / AFP/Getty Images Is time real, or is change just a kind of optical illusion resting on a deeper unchanging reality? As finite creatures, with death hovering just out of our sight, the true nature of time haunts all our endeavors. Tomorrow, physicist Brian Greene tackles time's illusion in his Fabric of Reality PBS series. In the domains of spirituality, humans have also asked if there is more, or less, to time than ticking clocks or the march from birth to death. Buddhists, with their emphasis on meditation, have long seen the unspooling of time as an artifact of the mind. "You may say, 'I must do something this afternoon' but actually there is no 'this afternoon' ...

Christian writers such as Meister Eckhart have taken a similar stance: "There exists only the present instant ... Science however has its own take on time's illusion. One thing is, however, certain. TV. Leadership & entrepreurship. Success & motivation.

Innovation. Wolfram.