22
Utah’s Award Winning Computer Magazine! www.ucs.org This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725 This Month’s Presentation Check Out Review of Security Related Report #22 “HACKING” Starting on on page 4 TAKE A LOOK AT THE FOLLOWING URL: www.dailymail.co.uk/sciencetech/arti- cle-2017122/Space-Shuttle-Atlantis-makes-his- toric-final-landing-Nasas-30-yr-programme-ends. html#ixzz1SsdIbvOz WELL DONE AMERICA!

Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Utah’s Award Winning Computer Magazine!

www.ucs.orgThis Month’s Meeting:Wednesday 10th at 7 pm

Volume 29, No. 8 August 2011

ISSN 1061-5725

This Month’s Presentation

Check OutReview ofSecurity Related

Report #22“HACKING”

Starting onon page

4

TAKE A LOOK AT THE FOLLOWING

URL:www.dai lymai l .co .uk/sciencetech/art i -

cle-2017122/Space-Shuttle-Atlantis-makes-his-toric-final-landing-Nasas-30-yr-programme-ends.html#ixzz1SsdIbvOz

WELL DONE AMERICA!

Page 2: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 2 Blue Chips Magazine — August 2011

By Cliff Millward, [email protected]

Finè

ReflectionsDon Nendell pointed out to me that the space pro-

gram started the same year Blue Chips Started and now comes to a conclusion the same year as Blue Chips seem-ingly folds.

Therefore, I will use my column to highlight some interesting photos of the shuttle and some of the past years Blue Chips photos. DO YOU REMEMBER -----

I will show more photos of our glorious past in the next edition.

Page 3: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 3 Blue Chips Magazine — August 2011

Blue Chips Magazine

Magazine Staff

Editor — Cliff Millward 619-9633Review Program Liaison — James Alexander 250-2269Review Product Editor — Donna Nendell (702) 776-8677 Review Editor/Product Recruiter — Don Nendell (702) 776-8677 Photography — LeRoy JohnsonProof Reader — Larry Lamph, Doug Jackson

Advertising Rates

Ad costs 1 month 3 months 6 months 12 months2 Page Spread $150 $400 $700 $1200Full Page $100 $275 $500 $900Half Page $50 $130 $250 $450Quarter Page $25 $70 $130 $225Business Card $15 $30 $60 $120

Full page size is 7½ x 10 inches. All other page sizes are based on a 7 x 10 inch page in order to conform to editorial style. Half-page ads may be 7 x 5 inches or 3½ x 10 inches. Quarter-page ads are 3½ x 5 inches. Business card ads are 3½ x 2½ inches.

Classified Advertising Utah Blue Chips members may place personal classified ads at no charge. Maximum ad size is 7 lines, 35 characters per line.

Submissions Members are encouraged to submit text articles for publication in ASCII text only. Photos in .TIF or .JPG format only. Line graphics, tables, in almost any vector or .TIF format. Do not imbed graphics or tables in text files. All articles must be received by the 15th of the month preceding the month of publication. All articles become the property of the Utah Computer Society and by submitting an article, the author gives permission for the Blue Chips Magazine Staff to edit the submission. The author also gives permission for republication in other users groups’ communications.

Permission to Copy Permission is granted to other nonprofit PC user groups to reproduce any article published in this newsletter, provided credit is given Blue Chips Magazine and the author (s) of the reproduced materials. Reprinted articles are subject to the terms of their respective copyright holders.

“Utah’s Award Winning Publication”

Charter Member of theAssociation of PC User Groups

MONTHLY MEETING LOCATION2nd Wednesday of every month

University of Utah, Union Building, 7:00 p.m.

Officers and Trustees Eve. Phone E-mailPresident, Stuart Gygi 576-1891 [email protected]. Pres., Larry Lamph 571-2908 [email protected], Lowell Kenedy 278-3035 lkenedy@ucs,orgTreasurer, John Witzel 296-1390 witzelj@ucs,orgttDoug Jackson 322-2337 [email protected]

InformationPersons or companies may join or renew at the meeting, or by sending a check payable to the Utah Computer Society to:

Utah Computer Society Membership Secretary 5435 Riley Lane Murray, Utah 84107

Individual memberships are $25/year. Business Memberships are $35.00 a year.Corporate sponsorships are available at two levels. Corporate Sponsors enjoy all benefits of membership including multiple individual membership and prepaid advertising coverage. Contact a Board Member for more information.

Other important information:Meeting Information http://www.ucs.orgGroup Business (James Alexander) 250-2269Magazine (Cliff Millward) 955-9633Web Site http://www.ucs.orgWebMaster 262-6045Membership (evenings) (Bob) 262-6045

Monthly Meeting:Working with

Klu Touchscreen Internet Tablet

Page 4: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 4 Blue Chips Magazine — August 2011

for ever since I was shocked right out of my shoes 13 years ago this very month at Caesar’s Palace, the home of BHB’s. Then, only to be jolted completely out of my senses at DC immediately thereafter. And, this was after they were spouting, “We have a plan to beat the ‘Hackers!’ “ The following year, they meekly (My words) espoused, “Get insurance, the ‘Hackers’ have won!” 10

THAT WAS 12 YEARS AGO, AND IT CERTAINLY HASN’T IM-PROVED FOR THE “GOOD GUYS, EVER SINCE”! It’s an on-going battle 24/7/365 (and 366 in leap years).

This “stuff” in the hands of Terrorists is GOD awful “Scary!” Want Proof?

Pentagon hard pressed to counter cyber threats, says GAO by John P. Mello, Jr. GSN, 07/27/11. While the U.S. Defense Department is considered in many circles to be one of the best-prepared federal agencies to defend against cyber security threats, the growth of those threats is a daunt-

I’ve Some Good News & Some Bad NewsSecurity-Related Report #22 Security Report

By Don Nendell

Dear Reader,If you are reading this in a

non-PDF format, you are missing a large part of the whole Report/Review 1 & 2. You should, therefore, stop reading and immediately fol-low the steps outlined in the Foot-notes 1 & 2 below. Which BTW are:

1. “If you are reading this Report/Review 1 & 2 from directly off of an In-ternet search, you are seeing it in HTML (or text) format. Yuk! There’s No Graphics there! To see all the beauti-ful Graphics in this Report/Review 1

& 2 - the ones that we’ve worked so very hard to entertain you with - you will need to follow the procedures outlined in 2 below. Enjoy! Again, our web page is: (www.ucs.org).”

2. “See the actual Reports/Re-views 1 & 2 in the Blue Chips Maga-zine (BCM) Archives (i.e., begin search on left-hand side of web page) at: (www.ucs.org).

Note. Always choose the PDF format for its beauty.”

Prolog 3

This month, as per usual, it’s all about protecting one’s: self; comput-ers; privacy; personal information and freedoms; and especially, financial well-being, and then some. Not co-incidently then, i.e., the timing of this month’s security topic: “Hacking” (By all means, definitely do see below), by the time you actually read this I will have returned from my annual sojourn to the “Scariest two (2) places on earth for me” 10 - Black Hat Briefngs 2011 (BHB 2011) and Def Con 19 (DC 19) - both held here in Sin City the final week of July and the first week in August of each year.

Let me elucidate that “scary” state-ment for you, por favor. This is the month of the year that I perpetually live

ing prospect for the DOD. That’s one of the conclusions reached in a report released on July 25 by the U.S. Gov-ernment Accountability Office (GAO). “DOD networks and our country’s critical infrastructure can be disrupted, compromised or damaged by a rela-tively unsophisticated adversary and, as witnessed by the 2008 infections from removable media, this can potentially af-fect the conduct of military operations,” said the report, Defense Department Cyber Efforts: DOD Faces Challenges in Its Cyber Activities.

N o t e . T h e guy in Norway (July 2011) was supposedly a “GOOD Guy?” And he didn’t do it with “hack-i n g , ” e i t h e r ! WWIII actually began back in 1980 as Cyber Warfare, some-one wrote (See below). But, I’ve already gotten ahead of myself like I always do!

Page 5: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 5 Blue Chips Magazine — August 2011

(Back on track) It’s the hands-on “live demos” of the totally destruc-tive “Things” that are being done day in and day out, all over the world, that scare me the worst (See below). It’s “Real,” folks, IT’S REAL! And, we’re not talking about “Little Things,” like Wikileaks, either (For an example of such simple, easy-to-do “Hacking,” see Special Report: Could Wikileaks cause World War III or the end of the world? by David Gewirtz, ZDNet, November 28, 2010 (www.zdnet.com/blog/government/special-report-could-wikileaks-cause-world-war-iii-or-the-end-of-the-world/9696).

And for a quick warmer upper on our subject, dig out, and dust off your old copy of WarGames (or the DVD of the 25th anniversary edition starring Matthew Broderick and Ally Sheedy See below). My personal favorite is Enemy of State, plus there are tons more out there. The latest one I’ve found in my R & D is Marcus Ranum (www.ranum.com), and although it’s a bit off our subject here, start with his Hitler Learns about Cloud Computing (you’ll probably be shunted off to You Tube, See also page 19 herein). Ranum’s treatise: Episode 4: Cyberwar (www.rearguardsecurity.com) puts a different spin on “Things.” Then, please do come back for more, lots more...

(Back on topic) “They” (BHB and DC) are the “penultimate sources” of my angst over the naivety of the unknowing general public, to wit, “You!” “They” are a huge reason I keep on banging my head against the “Security” wall “Trying” 11 to educate the collective “You” on the dangers swirling all around in the field of computers, et al (See below). “They” are a “life blood” for me, and keep my in-satiable appetite for security knowledge yearning for more, ever more! So, yes indeed, “They” do scare 10 me to death each and every year I am priveledged to attend. Right now, I confess that I am in the fascination, awe, spellbound

and anxious mode in preparing for the next week at BHB 2011 and DC 19. You should be so lucky, too!

But FirstBut first, in keeping with a time-

worn tradition - we are always asked the question - “What do you want to hear first, the GOOD NEWS, or the BAD NEWS?” Ahem, to be fair and square here, we’ll do this scientifically?

According to a year-old Yahoo An-swers poll: Best Answer - Chosen by two (2) voters - “BAD NEWS first, lol.” (33%); Next Best Answer - Chosen by one (1) voter: “I wanna hear the BAD NEWS first so that when I hear the GOOD NEWS it can cheer me up a little!” (17%); Chosen by one (1) voter: “BAD NEWS. (17%); Chosen by one (1) voter: “Its your choice, I’m ready either way bring it on.” (17%); Chosen by one (1) voter: “GOOD NEWS, so I can ‘FULLY’ enjoy it.” (17%); and my vote is, “BAD NEWS first,” too. And, since this is my Report, we’ll go with that stirling choice, naturally. ;-}

We Continue With: BAD NEWS FIRST

Although compleely unrelated to our S-R hereinafter, as a pilot my-self, tears actually came to my eyes as the Space Shuttle Atlantis touched down

for the final time, bringing to a close an historic era in our lifetime.

CAPE CANAVERAL, Fla. (AP) - Atlantis and four astronauts returned from the International Space Station in triumph Thursday (July 21, 2011), bringing an end to NASA’s 30-year [with it’s 135-flights into space and more than 450+ millions space miles traveled] shuttle journey with one last, rousing touchdown that drew cheers and tears (See also our BCM Tribute to America graphics on pages 16 thru 19, our own Baton Blue Editorial on page 2 herein, plus, read more at: www.dailymail.co.uk/sciencetech/article-2017122/Space-Shuttle-Atlantis-makes-historic-final-landing-Nasas-30-yr-programme-ends.html#ixzz1SsdIbvOz).

IntroductionI a l w a y s h a v e

some trepidation on writing another Secu-rity-Related BCM Review/Report 1 & 2 (S-R), this being my 107th, particularly so soon after my S-R in June 2011 (#21 3). Trouble is, I see Security-Re-lated “Bad News” every day, and have for over 15 years now, and sad to say, and like I have repeatedly said these last four (4) months, “most of you out there in La-La land (in-cluding some members of our own government evidently?) are still eating your [All Bran] cereal 5 and don’t even have a clue as to what is swirling dangerously around you/them that ultimately could have grave repercussions [and/or] con-sequences for us all? I sometimes herein feel like I need to feed... ex-lax [to you], or the like, simply to get you to move [faster] on these dangerous security problems!”

I say this Security-Related Report after Security-Related Re-port, “Folks, please don’t take all this light- ly. It’s re-ally deadly s e r i o u s stuff !” I f you don’t believe me, then pray, dear read- e r , ( S e e above and) read on?

Page 6: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 6 Blue Chips Magazine — August 2011

L e t ’ s “ g e t the show on the road,” as the say-ing goes down here in Sin City.

In May I brought you up to date on “Surfing Anonymously” (See my May 2011 BCM Security-Related Report 1 & 2 in the Intro-duction of my GhostSurf Review beginning on page 4 therein). And, in June I introduced you to being directed to malicious web sites through “Phishing” (See my June 2011 BCM Security-Related Report 1 & 2 “They’re Phishing for You” beginning on page 4 there-in), which by anyone’s definition means, “they’re out to do you no good!” In July I introduced you to a new security (hard drive encryp-tion) product, LapLink’s PC Lock (See my July 2011 BCM Security-Related Report 1 & 2 beginning on page 4 therein). This month we cover “Hacking,” which strangely enough, is the “Good News” part of the S-R. Yes, you heard me right, so please stay tuned!

The GOOD NEWSOur subject this month is a

real duzzie, so to speak... and, this definitely isn’t “ex-Lax,” although it can “clean you out” just as eas-ily? It’s called “Hacking,” and it’s insidious, as well as, it’s incredibly dangerous to the “Hackee!”

“Sir Arthur Conan Doyle said, ‘There is nothing as deceptive as an obvious fact.’

In case you haven’t guessed it, you’ve all been exposed already, just think of those “Rupert Mur-doch - Re.The News of the World” events last month (July 2011) in England? (See below and see also graphics on pages 17 thru 19). Plus, the “Anonymous ‘16’ Bust” during the same time frame (See below).

This just in. A 19-year-old man

alleged to be “Topiary,” a sometimes quoted spokesperson for the Anony-mous and LulzSec hactvivst groups, was arrested on July 27 by officers from New Scotland Yard’s e-Crime Unit.

The arrested man is believed to be linked to an ongoing international investigation into network intrusions and distributed denial of service (DDoS) attacks on a number of international business and intelligence agencies by those hacktivist groups, London’s Metropolitan Police Service said in a statement.

The alleged perpetrator was nabbed at a residential address in the remote Shetland Islands of Scotland.

So, what’s t h e G O O D NEWS, you say? They all have b e e n c a u g h t and are being

brought to justice, as we speak, that’s what!

Tony Baretta says, “If you can’t do the time, don’t do the crime?” 6 Remember that one? It still ap-plies, and it’s definitely still in Spades!

We start off this month with some definitions of Hacking 7:

Hacking, as defined in Wikipedia, the free encyclopedia as referring to Computer hacking, including the fol-lowing types of activity: 1) Hacker (pro-grammer subculture), activity within the computer programmer subculture; 2) Hacker (hobbyist), to heavily modify the software or hardware of one’s own computer system; 3) Hacker (computer security), to access computer networks, legally or otherwise; 4) Computer crime; and, Hacktivism (computer mischief) (See References in Footnote 10 Hack-ing below and See also graphics on pages 20 thru 21).

(We pause for station identifica-tion) For an inter-esting look back at

Page 7: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 7 Blue Chips Magazine — August 2011

the history of “Hacking,” check out the 50 minute (avi) Video shown on Dis-covery Channel: The History of Hacking (http://video.google.com/videoplay?docid=5464925144369700635&q=hacking+documentary#).

Those crazy Irish! They like their

Hacks blackcurrant-flavored! (Pun intended)

Hey, before you go off half-cocked and say, “Been there, done that,” and proceed to go off to something you think is more important because it can’t pos-sibly happen to you because you don’t buy into all that “Crap?” GET REAL DUMMY, BECAUSE IT IS REAL! 5

Just remember this: ‘you’ve been had, ‘um... sorry ‘bout that, ‘... [duly] warned!’”

“ ‘Cyber crime preys on the enter-prise with a vengeance. Criminals work 24 hours a day, every day, and are get-ting more sophisticated despite our best enterprise defenses.’ - Eric Friedberg, Co-President, Stroz Friedberg, The

State of Cybercrime presentation at the CSO Executive Seminar Series on Cyber Security, March 16, 2011.

And now, appropriately enough, you can add to that, Phone Hacking! (See also Rupert Murdoch, News of the World above and See below and graphics on pages 17 thru 19).

Newspaper hacks hacking? Not exactly by David Harley, ESET Senior Research Fellow, July 11, 2011 (www.scmagazineus.com/cybercrime-corner/section/1511). I’m not sure how much attention it is getting on the west side of the Atlantic, but here in the UK the allegations of “illegal hacking” of phones and other dubious journalistic practices by the soon-to-be-closed-down News of the World have had far-reaching con-sequences, not only on the victims and their families, but on the press in general and even the government. The discovery that some of the snooping was aimed not just at politicians and celebrities (perhaps politicians are better described as notorieties than celebrities?), but at victims of murder and terrorism, ex-panding the range of potential snooping targets somewhat dramatically, may be the reason that people who aren’t likely to be invited to any garden parties by the Queen or Rupert Murdoch are wonder-ing how their phones can be hacked and what they can do to prevent it.

Media Mogul Charged with First Degree Murdoch by Ann Coulter. “So it’s strange to see these defenders of the press’s right to publish absolutely anything get on their high horses about British tabloid reporters, operating under a different culture and legal system, hacking into cell phones. Not only that, but they are demanding that the CEO of the vast, multinational corporation that owned the tabloids be

severely punished. This is because the CEO is Rupert Murdoch and Murdoch owns Fox News....”

“If only Mur-doch’s minions had hacked into the phones of G e o r g e B u s h , Dick Cheney or Donald Rums-f e l d , l i b e r a l s would be sub-mitting his name to the pope for sainthood. But now the rest of us have to watch while the mainstream media pursue their personal grudge against Rupert Murdoch for allowing Fox News to exist. They demand his head for own-ing a British tabloid where some report-ers used illegally obtained information, something The New York Times does defiantly on a regular basis.” (See also graphic on page 19, Some Outtakes...)

Jokes of the week, or is it “weak?”

It’s been so hot this week, everyone is sweating like Rupert Murdoch trying to explain his phone bill. - Jay Leno

While testifying in parliament, Ru-pert Murdoch was attacked by a man who threw a pie and yelled insulting names. Murdoch immediately gave the man a show on Fox News. - Conan

You Hack Us, We’ll Nuke You: The Chicago Way 11 Mon-do, DBKP, 06/08/2011 (http://deathby1000papercuts.com/head-lines/2011/06/you-hack-us-well-nuke-you-the-chicago-way-war/). The definition the U.S. uses for “war” is expanding to include computer hack attacks... (See also graphic on page 19, Some Outtakes...)

Page 8: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 8 Blue Chips Magazine — August 2011

Cellular phone calls: Do you know who is listening? by Kathleen Peters, General Manager, Cellcrypt, SC Magazine, October 13, 2010. The processing power in cell phones has increased to the point where today’s smartphones would outpace high-end computers of just a few years ago. As a result, they have become an essential tool in the way we communicate and conduct business while on the move. Yet, while the role of IT security has focused largely on protecting data, computers and the perimeter of an organization’s IT infrastructure, the security of voice calls is being under-resourced, overlooked or assumed safe - which has been shown to no longer be the case.... However, the massive growth in everyday computing capability in the last 25 years means that networks are open to a degree of brute force attack that was never envisaged by the founding fathers. This coupled with recent information coming from the hacker community and the ability of the Internet to distribute ways of at-tacking phones globally has massively reduced the barrier to intercepting cell phone calls. This change was demon-strated dramatically in February, when, at a conference in Washington, a hacker published what he claimed to be a vi-able cell phone hack using open-source software and $1,400 of equipment (See also Rupert Murdoch, News of the World above).

CELL PHONE ESPIONAGE: An Eye Spy Magazine Special Report (Issue #74, their Tenth Anniver-

sary Issue) Eye Spy Magazine reports, “New research reveals it is now possible to intercept cell phone calls without government-type technologies... and a warrant. It’s becoming quite a rarity on the streets of our major towns and cities - the good old fashioned public telephone or call box. Yet in respect of eavesdropping and security, it is far superior to that must have item - the all powerful cell phone. In a world increas-ingly besotted with gadgets, games, pho-tos, twitter and instant communication, you very rarely hear that once polite enquiry - ‘could you direct me to the nearest public telephone box please?’ Now - just before you learn about a new ultra-low-cost piece of eavesdropping technology, you might just want to keep the phrase ‘on tap,’ especially for that most important telephone call.”

Eye Spy Magazine’s latest edition examines the history and development of cell phone intercepts, the various types of spy soft and hardware avail-able, and perhaps more worrying than all these elements put together, a new research programme spun together with very low cost equipment, that has allowed hackers to intercept your calls mid-stream and via the airways.

They go on to say, “We spend bil-lions of pounds every year on security; from house alarms, vehicle immobilis-ers, CCTV, computer virus blockers and removers to general insurance, yet very rarely do we consider the implications of what’s held on these tiny devices, or how important a conversation is. Eye Spy reveals the secrets of the world’s greatest hackers, and the fragility of the cell phone that providers of such gadgets and the airwaves that they use would rather you not know.” (See also Rupert Murdoch, News of the World above). (Source: Eye Spy Magazine No.74, June-July, 2011)

More on the Hacking front16 arrested for alleged roles

in cyber attacks by Sue Chang, Wall Street Journal Market Pulse, 07/19/11. SAN FRANCISCO (Market-Watch) - Fourteen people were arrested for alleged involvement in a cyber at-tack on eBay’s PayPal website as part of Anonymous, an online vigilante group, the Department of Justice said late Tuesday. Two other individuals were also arrested on cyber-related charges. As part of the investigation, FBI agents executed more than 35 search warrants throughout the country. The defendants are charged with several counts of conspiracy and intentional damage to a protected computer, the Justice De-partment said. The FBI coordinated its operations with the Metropolitan Police Service in the United Kingdom and the Dutch National Police Agency.

F B I a r -rests 16 in Anonymous-busting raids: Related ar-rests made in the UK, Hol-l a n d , D O J says by Paul Hale, 20 July, 2011. The U.S. Depart-ment of Justice last night said the FBI had arrested 16 individuals in the United States in connection with cyber attacks claimed by headless hacking outfit Anonymous and its loosely affiliated offshoot LulzSec [Think Sony Play Sta-tion Hack, et al.] (See my May 2011 BCM Security-Related Report 1 & 2 in the Introduction of my Ghost-Surf Review beginning on page 4 therein entitled: Sony admits mas-sive data breach, gamers’ accounts ransacked by John P. Mello, Jr. GSN Magazine, April 27, 2011).

Fourteen of those arrested were charged with involvement in the attack on PayPal’s web site, instituted after the online payment giant refused to

Page 9: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 9 Blue Chips Magazine — August 2011

process donations to whistle-blowing outfit WikiLeaks (See above and see graphic). One person was also arrested in Britain - reportedly a 16 year-old boy from South London - and four further arrests were made in Holland, the DOJ said. Altogether more than 35 search warrants were executed in the U.S., resulting in the 16 arrests.... The DOJ said that to date, more than 75 searches have taken place in the United States as part of ongoing investigations into the attacks.

‘Anonymous’: How danger-ous is hacker network defending WikiLeaks? The borderless digital militia ‘Anonymous’ has taken down corporate websites to defend WikiLeaks. In so doing, say Inter-net security experts, it has become a new force to be reckoned with by Mark Clayton, Christian science Monitor, 12/09/10. A self-styled and loosely affiliated group of Internet-freedom fighters dubbed “Anonymous” (See Good News above) has morphed into a borderless digital militia, sling-ing Twitter posts and virtual handbills across cyberspace to coordinate digital attacks in defense of WikiLeaks and becoming a new force to be reckoned with on the Internet. In the global furor since WikiLeaks’ release of secret US documents and the arrest of the group’s founder, Julian Assange, cyber attack-ers have crippled corporate websites. To do so they have deployed old digital weaponry forged by new social media tools into a novel virtual global attack system that is leaderless, anonymous and powerful. “Operation Payback” is the name that Anonymous has given its cyber-retribution campaign against corporations that have withdrawn sup-port and services from Mr. Assange, who

was arrested in Britain this week on a Swedish rape charge (See Graphics on Pages 17 through 19).

LulzSec, Anonymous show Latin America unprepared for cy-berwarfare: Hacker group LulzSec took down Brazilian government websites, while the group ‘Anony-mous’ threatened cyberattacks against the governments of Chile and Peru by James Bosworth, Latin America Monitor, 06/23/11. This week the Brazilian arm of the hacker group LulzSec announced they had taken down two Brazilian government websites, including the website of the president. The attack comes after the group Anonymous threatened to take down websites in Chile and Peru.... In recent days, LulzSec has threatened to break into government sites and steal sensitive or classified information.... Latin America is unprepared for cyber-warfare [See also GAO Report of DOD above]. There are no standing policies in place as to how the region should respond to an attack, certainly nothing

from a non-state group simply looking to cause havoc.

(Also of Note) Anonymous Vows Personal Attacks on U.S. Military Families, “War” on U.S. (http://www.dailytech.com/Anonymous+Vows+Personal+Attacks+on+US+Military+Families+War+on+US/article21087.htm)

Some Hacker ToolsSince you haven’t been able

to walk a mile in my moccasins, here’s the next best thing, a book on “Hacking” for you. This is no joke...

How To Become The Worlds No. 1 Hacker (a Book blurb) au-thored by Gregory Evans (Check out his web site at: http://howtobeco-metheworldsno1hacker.com).

What Hackers Don’t Want You To Know! Every day, we hear and see in the news about constant cyber at-tacks, where hackers have stolen iden-tities, taken millions of dollars, or even shut down websites and companies in their entirety. The reason why hacking will never die is because we hire IT-Managers,who are not hackers, to pro-tect our networks. Statistics show that every 6 seconds a personal computer is hacked into. Many consumers rely on the concept that the applications that came installed on their brand new com-

Page 10: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 10 Blue Chips Magazine — August 2011

puters, are kryptonite and impenetrable by hackers. They believe and trust that the “Geek Squad”, Norton and other anti-hacker applications can protect them. However, this is entirely false!

We have all heard the adage, “In order to catch a thief, it takes a thief,” well, “in order to catch a hacker it takes a hacker.” Gregory Evans, world re-nowned security expert, will show you step by step what tools hackers use to get into your network. Evans will then take those same tools and show you step by step how to hack into your own network.

This book was written for you, the laymen, the consumer, the small busi-ness owner who can not afford a high price computer security consultant or your personal computer hacker. Every-thing in this book is what hackers or computer security experts already know, but don’t want you to know! This is an easy to read step by step guide that can help any laymen to hack into their very own computer [and more?].

WiFi Hack WPA2 Crack Note. (WEP cracking is easier still) (www.youtube.com/watch?v=zJp5LY6vcuc&feature=related (332,880 Views)

How To Crack WPA/WPA2

[Backtrack4] (www.youtube.com/watch?v=yw32xeDKM_Y&feature=related (239,039 Views))

Well , that ’s what this Security-Related Report is trying to get across to you; “Stuff (sp?) happens,” any-way? Well, at least that’s what the bumper stickers/license plates tell us, anyway! ;-}

In SummarySo, what have I/we learned here?1. That “Stuff” (sp?) happens to

everyone of us, regardless of sex, color, religion and/or creed; “money has no conscience!”

2. That “it” is only going to get worse, never, ever, better, from here on.

3. Today, I hope you’ll have gained an appreciation of the dangers sur-rounding all of you out there. Moral: A virus won’t hack into your bank account and steal your mon-ey or your Identity..

BTW Smokey the Bear says, “Re-member, only you

can prevent forest [which in our case here is, computer] fires!”

4 . G o d help us, we’ll probably nev-er know if our PC has been “ H a c k e d ? ” It’s that pure and simple. By definition: “Pure Hack, Done Simply!”

5. In parting. We should be ashamed of ourselves for contributing to the decline of PC sales like we did at our annual picnic. But then, that’s to be expected, being as far-sighted as we are; the news is that the Tablet computer’s popularity is what fueled slower Desktop PC sales anyway. If it will make you feel any better, here’s all the proof you need:Tablet computers’ popularity fu-els slower desktop PC sales, Las Vegas Review-Journal, Business p. 2D, 14 Jul 2011. (San Francisco) The personal computer market grew more slowly than expected in the second quarter, hurt by the rise of tablet com-puters and anemic consumer demand in the U.S. and Europe. The tepid diagnosis of the PC industry’s health in two [sepa-rate] reports released Wednesday offers another sign of trouble for an industry at a crossroad.

Don’t we just k n o w ? P l a y i n g Barbara, “We’re in touch, so you stay in touch,” Walters, “ S t a y t u n e d ; Case not closed!”

And now, it’s time once again to bid you a fond adios/adieu/good-bye. Hasta la vista, my friends!

Page 11: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 11 Blue Chips Magazine — August 2011

Bon Chance! I leave you now for BHB 2011 and DC 19 9.

Caio!

Footnotes1 If you are reading this Review

from directly off of an Internet search, you are seeing it in HTML (or text) format. Yuk! There’s No Graphics there! To see all the beautiful Graph-ics in this Review - the ones that we’ve worked so very hard to entertain you with - you will need to follow the pro-cedures outlined in Footnote 2 below. Enjoy! Again, our web page (www.ucs.org).”

2 “See the actual Reports/Re-views in the Blue Chips Magazine (BCM) Archives (i.e., begin search on left-hand side of web page) at (www.ucs.org).

Note. Always choose the cen-ter option, i.e., PDF format for its beauty.

3 Feature(s) precisely identified as reason(s) for designating this Review/Report as “Security-Related.” In this case, everything.

4 My Hard Earned Byline: Happi-ness Is A Working Computer (HIAWC).

5 If you even care just a little about

all this Security-Related Report stuff, at the very least look at a 4:00 min-ute, stunning Nov. 12, 2010 YouTube video entitled: State of Cybercrime: Cybercrime is on the rise, created by Brandon McFarland for ArcSight (See Below*), one I personally watched, and was absolutely stunned by it at the just concluded, simply outstanding Syman-tec Vision 2011 Conference at the Cae-sar’s Palace. The very informative class that I viewed the video in was titled: Data Loss Prevention (DLP). Be sure and “Bookmark” this YouTube Video in your browser (merely to be used as a starting point only) and view this fascinating, educational video (plus other equally important Cyber Crime videos) at:

(*) State of Cybercrime (ArcSight Video 112010)

h t t p : / / w w w . y o u t u b e . c o m /watch?v=ZqxAk4tSBUM

Websense 2010 Threat Report (111110)

h t t p : / / w w w . y o u t u b e .c o m / w a t c h ? v = M 2 o J x o 2 3 -zc&feature=related

Cartoon: Safeguarding Your Computer-Cyber Crime

http://www.youtube.com/watch?v=MbBYIPOPcgk&feature=related

The State of Cybercrime Jan 20, 2011 ... Cybercrime involving stolen credit card numbers, money laundering, botnets and other black-hat activities is a huge business online.” - mashable.com/2011/01/20/black-hat-hacking-stats/

A point of reference. My U.S. patented DYCRAV AutoEnc Se-curity Suite Application (See my August 2006 BCM Review 1 & 2) uses the AES 256-bit Encryption Algorithm (Rjindael) to secure the Drag and Drop (DnD), Dual-layer, Compressed and Encrypted file(s).

It’s time now with a eye on the future to respectfully remind you to surf safely and for additional security information please refer to the May 2008 BCM Security-Related News and Views 101 Report 1 & 2, as well as, all the other Security-Related Reports 1 & 2 in the series I’ve been sharing with you here over the years in BCM.

Note. I invite you to pay partic-ular attention to the 2008 series: Encryption -What’s That Report 1

& 2 (July 2008); Encryption - Why Report 1 & 2 (August 2008); Security News n Views Part 2 Report 1 & 2 (September 2008); and, Security News n Views Part 3 Report 1 & 2 (November 2008).

6 “Don’t do the crime, if you can’t do the time.” A “hip” expression of the 1960’s-70’s that advises you not to do something risky unless you are willing and able to accept the full weight of the consequences. Ironically popularized by the theme song to the TV show “Baretta” starring Robert Blake. (Source: Urban Dictionary)

7 Hacking. Hacking is a broad term used to describe many complex activi-ties wherein the end goal is typically to obtain access to a computer system’s servers, database(s), or stored files. This access may be any combination of desired or undesired, condoned or not, and/or legal or illegal computer activity. Legal and condoned hacking is known as “white hat” hacking, and is used to test the security of a given computer network by hiring an individual or group of individuals to try to break in to it electronically, in order to determine the network’s flaws or lack thereof. Illegal or unwanted hacking is known as “black hat” hacking, however the term “crack-ing” is often used to describe malicious or malevolent hacking in which the end goal is to cause damage to the integrity of the targeted computers, whether to destroy, copy, or modify files, or pos-sibly to install easy routes back into the system known as “backdoors.” Not all condoned hacking is legal, however. For example, if Jim’s friend challenges him to hack or crack into his home computer, and Jim does so, it is still technically illegal despite the consent of his friend. Legal hacking (in the United States of America) needs to be approved with paperwork and status of employment; hobbyist hacking is generally always illegal. References: Cracker - Person who gains unauthorized access to a computer with the intention of causing damage. Cracking - Method by which a person who gains unauthorized access to a computer with the intention of causing damage. Hacker - Person who gains authorized/unauthorized access to a

Page 12: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 12 Blue Chips Magazine — August 2011

computer WITHOUT the intention of causing damage. Rupert Murdoch was arrested for phone-hacking performed by employees of his newspaper, The News of the World.

Hacking - Gaining of access (want-ed or unwanted) to a computer and viewing, copying, or creating data (while leaving a trace) without the intention of destroying data or maliciously harming the computer. This represents the Good Guys, most of the time, for they are the ones who search for these types of exploits to prevent crackers from using a method called cracking (the opposite of hacking. See above). Hacking and hackers are commonly mistaken to be the Bad Guys, most of the time. Crackers are the ones who screw things over as far as creating virus, cracks, spyware, and destroying data.

Hacktivism - The use of nonvio-lent albeit illegal digital weapons toward political ends - is hardly new either. Nor is defacing websites, denial of service at-tacks, and the hacking and sabotage of computer systems - all things hacktivists specialize in doing.

Spyware - A Program that was created by a person (most fre-quently a Crack-er) to watch the computer and it’s actions, and re-port the details to the origional maker. Virus - A maliciously made

program that is used to destroy data

(Source: Urban Dictionary)8 Yoda: “No. Try not. Do... or do

not. There is no try.” (Star Wars: Episode V - The Empire Strikes Back (1980))

9 Yoda: “Ready are you? What know you of ready? For eight hundred years have I trained Jedi. My own counsel will I keep on who is to be trained. A Jedi must have the deepest commitment, the most serious mind. This one a long time have I watched. All his life has he looked away... to the future, to the horizon. Never his mind on where he was. Hmm? What he was doing. Hmph. Adventure. Heh. Excitement. Heh. A Jedi craves not these things. You are reckless.” Star Wars: Episode V - The Empire Strikes Back (1980))

10 “Fear is the path to the dark side. Fear leads to anger. Anger leads to hate. Hate leads to suffering.” (Star Wars: Episode I - The Phantom Menace (1999))

11 Memorable quotes from The Untouchables (1987):

Malone: You said you wanted to get Capone. Do you really wanna get him? You see what I’m saying is, what are you prepared to do?

Ness: Anything within the law. Malone: And “then” what are you

prepared to do? If you open the can on these worms you must be prepared to go all the way. Because they’re not gonna give up the fight, until one of you is dead.

Ness: I want to get Capone! I don’t know how to do it.

Malone: You wanna know how

to get Capone? They pull a knife, you pull a gun. He sends one of yours to the hospital, you send one of his to the morgue. “That’s” the “Chicago” way! And that’s how you get Capone. Now do you want to do that? Are you ready to do that? I’m offering you a deal. Do you want this deal?

Ness: I have sworn to capture this man with all legal powers at my disposal and I will do so.

Malone: Well, the Lord hates a coward. [jabs Ness with his hand, and Ness shakes it]

Malone: Do you know what a blood oath is, Mr. Ness?

Ness: Yes. Malone: Good, ‘cause you just

took one.(Source: (www.imdb.com/title/

tt0094226/quotes)

WELL DONE AMERICA!

Page 13: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 13 Blue Chips Magazine — August 2011

Page 14: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 14 Blue Chips Magazine — August 2011

Page 15: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 15 Blue Chips Magazine — August 2011

Page 16: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 16 Blue Chips Magazine — August 2011

Page 17: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 17 Blue Chips Magazine — August 2011

Page 18: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 18 Blue Chips Magazine — August 2011

Page 19: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 19 Blue Chips Magazine — August 2011

Page 20: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 20 Blue Chips Magazine — August 2011

Page 21: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

Page 21 Blue Chips Magazine — August 2011

Page 22: Volume 29, No. 8 August 2011 TAKE A LOOK AT …Utah’s Award Winning Computer Magazine! This Month’s Meeting: Wednesday 10th at 7 pm Volume 29, No. 8 August 2011 ISSN 1061-5725

UCSBoard ofTrustees

C&C Bldg.RoomN3005

6:30 p.m.

Blue Chips — Utah’s Computer Guide in the 21st Century

Utah Blue Chips CalendarAugust 2011, September 2011

??Stay Tuned!

MagazineDeadline

U of U7:00pm

UBCGeneral Meeting

U of U7:00 p.m.

MagazineDeadline

UBCGeneral Meeting

7:00 p.m.

TouchPad

?

?