background preloader

Ninja Lounge

Facebook Twitter

Internet scan finds thousands of device flaws, system weaknesses. LOUISVILLE, Ky. --- A scan of the Internet over 20 days has yielded terabytes of data and also some alarming weaknesses including misconfigured routers, vulnerability riddled databases and more than 1,000 exposed passwords. The Internet has gone from this nebulous scary thing that's hard to map to … something that you can gain lot of interesting insight by analyzing information like this. HD Moore, Metasploit creator, CSO, Rapid7 It's a project that HD Moore calls his hobby. The Internet-wide survey looked for open TCP ports, SNMP system descriptions, MDNS responders, UPNP endpoints and NetBIOS name queries.

"The Internet has gone from this nebulous scary thing that's hard to map to … something that you can gain lot of interesting insight by analyzing information like this," Moore said. Moore described some of the results of the project in a blog post in June which highlighted a number of those video conferencing weaknesses. "Scanning the Internet annoys people," Moore said. Datachurch. Dmaculate. Privsec. Emprendimeintos.

TURBEAU

TURBEAU. Searchengines. SQL. Converters. IP Act. Ifttt. Elliottbelardo. Fun. WebDev. Paedraig. Technology. Drug Interactions. Start typing a drug name and select the best match from the list of suggestions. Repeat the process to add multiple drugs. Once your list is complete, you can check for interactions immediately or save your list for future reference. To view your previously saved lists, please sign in. What are drug interactions? Anytime you take more than one medication, or even mix it with certain foods, beverages, or over-the-counter medicines, you are at risk of a drug interaction.

Drug-drug interactions - These are the most common type of drug interaction. How Do Drug Interactions Occur? Drug interactions can occur in several different ways: A pharmacodynamic interaction occurs when two drugs given together act at the same or similar receptor site and lead to a greater (additive or synergistic) effect or a decreased (antagonist) effect. Why it's important to check for interactions Drug interactions are important to check for because they can: Not all drug interactions are bad. The Rise of Nimble Medicine.

Editor’s note: This guest post was written by Dave Chase, the CEO of Avado.com, a patient portal & relationship management company that was a TechCrunch Disrupt finalist. Previously he was a management consultant for Accenture’s healthcare practice and founder of Microsoft’s Health platform business. You can follow him on Twitter @chasedave. Images are courtesy of Jason Hwang, M.D., M.B.A. Executive Director, Healthcare of the Innosight Institute and co-author of The Innovator’s Prescription. In the New Yorker, Dr. Traditionally, attempting a new care or payment model meant long planning and development cycles. In their book, The Innovator’s Prescription, Clayton Christensen and Dr. In contrast, disruptive innovators such as WhiteGlove Health and Qliance rethought the care delivery and payment models from the ground up. ArriveMD has taken the lean practice model to an extreme by closing a bricks and mortar clinic and replacing it with a clinic on wheels.

Related articles: OPERA experiment. TechCrunch. Downfall: Photos Of MegaUpload Founder’s Valuable Cars Getting Seized. The shit really hit the fan over at massively popular file hosting site MegaUpload. Yesterday, the United States Department of Justice seized and shut down the site and commenced criminal cases against its owners and others, sparking retaliatory actions from hacker collective Anonymous. Yesterday, following the DoJ indictment, the Organised and Financial Crime Agency of New Zealand arrested MegaUpload founder Kim Schmitz (aka Kim Dotcom), CMO Finn Batato, co-founder and CTO Mathias Ortmann and others. Their subsequent bail request was denied in New Zealand court as it was opposed by US authorities on the case.

GigaOm has an excellent run-down of the indictment details if you’d like to learn more. In the meantime, we got pinged by Elliott Kember, who was in New Zealand when the crackdown was in full effect. For a list of items seized, check out CNET’s article on the matter. And check out that lovely pink Cadillac! TED+talks+forelesninger. Zettaset - Easy Big Data Deployment. Is it really Zeus vs. Anonymous? The word from Symantec is that supporters of the world's most famous, if loosely organized, hacker group got hacked themselves. The word from the alleged victim, Anonymous, is a ferocious denial that it ever happened. So, were Anonymous supporters really duped into installing the Zeus botnet that steals their confidential information, including email login information, banking user names and passwords?

Yes, according to Symantec, which reported late last month that an unknown hacker modified a link to "Slowloris," a popular Distributed Denial of Service (DDoS) attack tool, which then directed users to a Zeus bot Trojan instead. The company said the hack against Anonymous took place Jan. 20, the day Megaupload co-founder Kim Dotcom and three others were arrested, and the day after Anonymous attacked websites operated by the U.S. Department of Justice, the Recording Industry Association of America (RIAA), the Motion Picture Association of America (MPAA). Blacole's shell code. Let's assume you finished the analysis of Blacole's obfuscated Javascript (see my earlier diary today), and you are still left with a code block like this and you wonder what it does. The first step in Shell Code analysis is to "clean it up", in the case at hand here, we have to remove those spurious "script" tags because they would trip us up in any of the following steps.

Once we're left with only the actual unicode (%uxxyy...) , we can turn this into printable characters: $ cat raw.js | perl -pe 's/%u(..)(..) /chr(hex($2)).chr(hex($1))/ge' > decoded.bin $ cat decoded.bin | hexdump -C 00000000 41 41 41 41 66 83 e4 fc fc eb 10 58 31 c9 66 81 |AAAAf.äüüë.X1Éf.| 00000010 e9 57 fe 80 30 28 40 e2 fa eb 05 e8 eb ff ff ff |éWþ.0(@âúë.èëÿÿÿ| 00000020 ad cc 5d 1c c1 77 1b e8 4c a3 68 18 a3 68 24 a3 |­Ì].Áw.èL£h.

This doesn't result in anything all that useful yet. Next step: Disassemble. $ cat decoded.bin | perl -ne 's/(.) results in which is the correct format to turn it into $ cat decoded.c A-Ha! .movo.

DIGITAL WIZARDRY

Internet. Security Software & Tools. Simon Carr. Engineering. Electronic Engineering. Electrons & electricity. Transducers. Skeptic/ScienceBlogs. DIY Electronics. Renewable Energy. Renewable Energy. SCIENCE. NASA Science. Is Time An Illusion? From The Buddha To Brian Greene : 13.7: Cosmos And Culture.

Can time be stopped, captured or even known? Does it exist, or is it all just an illusion? Karim Sahib / AFP/Getty Images Is time real, or is change just a kind of optical illusion resting on a deeper unchanging reality? As finite creatures, with death hovering just out of our sight, the true nature of time haunts all our endeavors. In the domains of spirituality, humans have also asked if there is more, or less, to time than ticking clocks or the march from birth to death. Buddhists, with their emphasis on meditation, have long seen the unspooling of time as an artifact of the mind. "You may say, 'I must do something this afternoon' but actually there is no 'this afternoon' ... Christian writers such as Meister Eckhart have taken a similar stance: "There exists only the present instant ...

Science however has its own take on time's illusion. For decades physics inverted the problem, holding the now to be something less than real. One thing is, however, certain. TV. Innovation. Wolfram|Alpha.