Oil giant Saudi Aramco back online after 30,000 workstations hit by malware Aramco, Saudi Arabia's national oil company, said on Sunday that the company was back in operation ten days after a massive malware outbreak hobbled 30,000 workstations at the company. In a statement on the company's Facebook page (content alert: Facebook page contains images of extremely phallic architecture), Aramco said that it had "restored all its main internal network services" that were affected by a malware outbreak on August 15. The attack was attributed to "external sources." It is just the latest against a national oil company, following reports of malware attacks on Iran's oil infrastructure linked to the "Flame" malware in May. Aramco said employees returned to work on August 25 and resumed "normal business," though the company is blocking remote access to company resources as a precaution. The malicious Trojan horse, which Sophos named Troj/MDrop-ELD, attempts to overwrite the master boot record on infected systems, which would make it impossible to boot the machine.
Chile cracks down on violent student protest - Americas Police have used water cannons to break up a protest in Chile's capital, Santiago, by thousands of students demanding free education, and hooded vandals set ablaze three city buses amid violence that left dozens arrested and injured. Chile's government said student leaders cannot be exempt from responsibility for the burning of the Transantiago mass transit system buses in Wednesday's protest, during which 75 people were arrested and 49 policemen were injured. "The leaders are opening the doors to vandalism and delinquency," presidential spokesman Andres Chadwick said. "How much more should we put up with these illegal marches that call on school takeovers and that threaten a violent August? What does that have to with education?" The crisis over education reform in Chile remains unresolved despite more than a year of demonstrations by students, teachers and families. Damages to public transport "It's unacceptable," said transportation minister Pedro Pablo Errazuriz.
How The American University was Killed, in Five Easy Steps | The Homeless Adjunct A few years back, Paul E. Lingenfelter began his report on the defunding of public education by saying, “In 1920 H.G. Wells wrote, ‘History is becoming more and more a race between education and catastrophe.’ I think he got it right. In the last few years, conversations have been growing like gathering storm clouds about the ways in which our universities are failing. To explain my perspective here, I need to go back in time. I suspect that, given the opportunity, those groups would have liked nothing more than to shut down the universities. So: here is the recipe for killing universities, and you tell ME if what I’m describing isn’t exactly what is at the root of all the problems of our country’s system of higher education. First, you defund public higher education. Again, from Victoria: “(The) ultimate objective, as outlined in the (Lewis Powell) memo, was to purge respectable institutions such as the media, arts, sciences, as well as college campus themselves of left-wing thoughts.
Security tip: Before being interviewed on TV, wipe passwords off whiteboard Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Hi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats. Already using Google+? Filed Under: Featured , Privacy The following screenshot is from a broadcast on TVP (Polish television). Spot anything interesting? No? Let's take a closer look.. If you haven't already guessed, Hasło is the Polish for "Password". As we have explained before , if a TV crew is visting your office it may be sensible to remove any passwords which could appear in the background. In fact, maybe it makes sense not to have these passwords on show of whether someone is pointing a video camera around the place or not. Just saying.. Follow @gcluley <a href=" Our Poll</a> Graham Cluley is senior technology consultant at Sophos.
Think Voter ID Laws Couldn't Cost You Your Vote? Think Again. A 93-year-old great-great grandmother who alleges she will be disenfranchised by Pennsylvania's recently enacted voter ID law heads to trial on Wednesday. In legal action backed by the ACLU and NAACP, Viviette Applewhite claims she no longer possesses any of the documents she needs to get a photo ID. Without it, she won't be able to cast a ballot this November in the Keystone State. It's the latest clash in an ongoing back-and-forth between voter ID advocates and opponents. Voter ID supporters argue that identification requirements for registered voters helps prevent voter fraud, ensuring the integrity of elections. Adversaries say the ID requirements stand as a solution in search of a problem. The U.S. While voter ID proponents maintain that new provisions requiring photo identification are sensible and not overburdensome, despite some evidence to the contrary, the situation isn't always so simple. Loading Slideshow PennsylvaniaYou're an average voter in Pennsylvania. Also on HuffPost:
Why aren't our teachers the best and the brightest? Why don't more of our smartest, most accomplished college graduates want to become teachers? People trying to improve education in this country have been talking a lot lately about boosting "teacher effectiveness." But nearly all such efforts focus on the teachers who are already in the classroom, instead of seeking to change the caliber of the people who enter teaching in the first place. Three of the top-performing school systems in the world -- those in Finland, Singapore and South Korea -- take a different approach, recruiting 100 percent of their teachers from the top third of their high school and college students. Simply put, they don't take middling students and make them teachers. Of course, academic achievement isn't the whole story in these countries. This shouldn't come as news. So why do top U.S. college students have so little interest in teaching careers compared with their counterparts in the world's best-performing nations? But it's not just pay that's a problem.
Guide to shooting better online video The Canon Vixia HV40. Tips on video equipment, interviewing people on camera & more Target audience: Nonprofits, social change organizations, videographers, educators, foundations, businesses, individuals. This is part of Creating Media, our ongoing series designed to help nonprofits and other organizations learn how to use and make media. Guest post by Diana DayOnline Journalism Review With the increasingly affordable equipment and editing tools available today, it’s possible to turn out professional-looking online video quicker than you’d expect. You can hire an outside video producer, but we think the tools have become simple enough to bring in-house. Equipment you’ll need Camcorders The prices of high-quality hi-definition video cameras have plummeted in the past two years. • The Flip cam has revolutionized the way people capture and share video. • There are an astonishing range of professional-quality video camera in the $450 to $800 range today. Microphone Tripod Elements of video stories
In der Branche gilt das Verhindern von kritischen Berichten als Königsdisziplin „Unsere Arbeit ist prinzipiell nicht öffentlichkeitsfähig“ – mit diesem Leitsatz fasste ein führender Altana-Lobbyist einmal das Arbeitsprinzip seiner Branche zusammen. Noch deutlicher kennzeichnete der Chef einer Berliner Lobby-Agentur, Peter Köppl, das Geschäftmodell der Interessenvertreter: „Lobbying ist vom Grundgedanken her ’non public’.“ Also nicht-öffentlich. Ähnlich geheimnisumwoben arbeitet auch der wichtigste Berliner Lobby-Kreis – das ‚Collegium’ mit etwa 30 Vertretern der führenden DAX-Unternehmen. So abgeschottet und schmallippig die Lobbyisten ihr Geschäft nach innen betreiben, so professionell agieren sie gegenüber Medien und Journalisten. Ein Lehrbuch für die Methoden der „schmutzigen PR“ hat ein Lobbyist in einer bislang nicht veröffentlichten Mappe zusammengestellt. Die ACS-Argumente finden sich bis hin zu Detail-Formulierungen in den Texten führender Wirtschaftsmedien wieder.
Quotes Security tip: When being interviewed on TV, make sure passwords aren’t written behind you Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Hi fellow Twitter user! Already using Google+? What's wrong with this picture? It's just a photo of a man being interviewed on ESPN about baseball. Let's take a closer look. Whoops. Okay, so I'm guessing that the interview was done in a press room, and that the passwords are on the wall for the convenience of journalists who wish to file copy and post updates online - but it still seems a little sloppy to have WiFi passwords so blatantly visible in the background during a TV interview! Follow @gcluley <a href=" Our Poll</a> Graham Cluley is senior technology consultant at Sophos.
ARTICLES OF IMPEACHMENT OF PRESIDENT GEORGE W. BUSH | Congressman Dennis J. Kucinich - Dennis J. Kucinich of Ohio In the United States House of Representatives Monday, June 9th, 2008 A Resolution Article I Creating a Secret Propaganda Campaign to Manufacture a False Case for War Against Iraq. Article II Falsely, Systematically, and with Criminal Intent Conflating the Attacks of September 11, 2001, With Misrepresentation of Iraq as a Security Threat as Part of Fraudulent Justification for a War of Aggression. Article III Misleading the American People and Members of Congress to Believe Iraq Possessed Weapons of Mass Destruction, to Manufacture a False Case for War. Article IV Misleading the American People and Members of Congress to Believe Iraq Posed an Imminent Threat to the United States. Article V Illegally Misspending Funds to Secretly Begin a War of Aggression. Article VI Invading Iraq in Violation of the Requirements of H. Article VII Invading Iraq Absent a Declaration of War. Article VIII Invading Iraq, A Sovereign Nation, in Violation of the UN Charter. Article IX Article X
High School Exit Exam Discrepant w/real measures. Security and Protection: Understand the Social in a Crime Network and How to Protect Yourself While the following is a bit off-topic, my head is spinning with all the layers and networks I’ve uncovered within this recent experience. A friend of mine called this a combination assembly line meets Wikipedia of crime social networks. It begins with my car being broken into and my purse stolen a few months ago, explores the social web of a crime network, and ends with some helpful tips and techniques for protecting yourself online and off. The Personal Experience On my way with one of my cats to the vet in Beaverton, Oregon, I stopped for a fast errand. I put the cat back in his carrier and dashed with the cat into the store to call the police, then my husband so he could begin to take action on the stolen items. I questioned him about the window being only barely enough for a finger to get through. My cat, Holiday, had been “fur-mowing,” excessive licking to certain areas of the animal’s body which results in hair loss. Most of the staff around the desk were giggling. Use Common Sense
Demokratie, oder: Die geraubte Braut - NZZ.ch, 11.07.2012 Von Adolf Muschg Es gehört kein böser Blick mehr dazu, demokratische Wahlen für schwerfällige Simulationen der Marktforschung zu halten. Ein Produkt wirbt um freie Wahl des Kunden, den es als König anspricht; als der Grösste (oder die Schönste) erscheint er im Spiegel der Reklame. Burckhardts drei «Potenzen» In Jacob Burckhardts «Weltgeschichtlichen Betrachtungen», 1905 postum publiziert, treten Wirtschaft und Demokratie nicht einmal als eigenständige Grössen auf. Nach Burckhardts Urteil, dass Macht per se böse sei, handelte die westliche Rechtskultur schon seit Beginn der Neuzeit. «Vaterland nennt sich der Staat immer dann, wenn er sich anschickt, auf Menschenmord auszugehen» (Dürrenmatt). Legitimer Egoismus Die folgenreichste Disposition des neuzeitlichen Rechtsstaates war die Ausscheidung einer Sphäre, die seiner Verfügung entzogen war und die er sogar gegen sich selbst zu schützen versprach. Die Minderheit ist die Seele Der Schriftsteller Adolf Muschg lebt in Männedorf.