happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

For the record (excuse the pun) happygeek does not have a genre. The last record I listened to was 'Dan O'Hara' by The Pikemen (Irish folk), before that 'Needle of Death' by Bert Jansch (sixties singer/songwriter) and before that 'Different People' by Biffy Clyro (Scottish rock outfit).

Currently I am listening to 'Made of Stone' by the Stone Roses...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Welcome back, I will deal with your questions in order:

  1. No, it is not possible. Even administrators (such as myself) cannot see who is downvoting. The system is designed to be anonymous.

  2. You have contacted them as they, along with the administrators, read this forum. You can also flag individual posts as bad, which will bring those specific issues directly to the attention of the moderating team (flagged posts appear in a closed forum where the mods can review them and take action as necessary).

  3. Yes, the asp.net forum is being moderated. The only time that downvotes would be considerded a moderating problem is if a member, or members, were systematically and maliciously downvoting all posts by a specific member. Members do not need to give a reason for downvoting, as it does not impact upon your reputation (to leave reputation points a member has to comment and thus reveal themselves).

  4. Seriously, I would suggest you just ignore the downvotes and move on. There does not appear to be any campaign against you, nor any sign of malicious downvoting, as many of your recent posts remain unvoted upon.

geniusvishal commented: Thanks +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to a press release that arrived today, entitled "Kaspersky Lab identifies first targeted attack utilising malware for Android devices", it marks the "first serious wave of targeted attacks using Android malware" but just how worrying is that really?

ad9c332c555679ef709b67f0c7093e73 The PR company sending the release were at pains to point out that "this latest discovery is perhaps the first serious wave of targeted attacks using Android malware in-the-wild against Tibetan and Uyghur activists" and that "the malware secretly reports the infection to a command-and-control server. After that, it begins to harvest information stored on the device". The stolen data including contacts as stored on the phone and any associated SIM card, call logs, SMS messages, geolocation data, phone handset data such as phone number, OS version, phone model and SDK version. The release itself starts by stating how this is a similar attack style as others aimed at Uyghur and Tibetan activists, but targeting mobile devices instead of DOC, XLS or PDF documents exploiting zero-days for Windows computers and Macs.

It all sounds very serious stuff indeed, especially when you read statements such as "the Android malware used in the new attack steals private data from infected smartphones, including the address book and messaging history, and sends it to a command and control server. This attack is believed to be the first of this kind utilising fully functional Android malware and specifically targeting mobile devices of potential victims". But if you can get past the …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

It has been just over a month now since North Korea gloated about its successful nuclear weapon test. A test which prompted the imposition of new UN sanctions against Pyongyang, and if the Korean Central News Agency (KCNA) which acts as a state mouthpiece for the Democratic People's Republic of Korea is to be believed, it has also prompted "intensive and persistent" cyber-attacks. Attacks, according to the North Koreans, which have been jointly launched by South Korea and the United States.

28f2a88054ead0da521c67c6964c43a1 The KCNA claims that the attacks, which are believed to have taken down official state websites such as KCNA itself, were targeted to coincide with the military drills by the US and South Korea. Calling the attack cowardly and despicable, KCNA went on to insist that the "US and South Korean puppet regime are massively bolstering up cyber forces in a bid to intensify the subversive activities and sabotages against the DPRK". The KCNA statement went on to claim that "intensive and persistent virus attacks are being made every day on Internet servers operated by the DPRK".

It's not only the KCNA which is reporting that cyber attacks have been launched against the North Korean state. In Russia, the Ita-Tass news agency has also claimed that some official North Korean websites were disabled after servers were brought down during a "powerful hacker attack".

Of course, it is perhaps a little hypocritical that North Korea should be complaining about being the victim of state sponsored …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Given that MICHAEL is a student, and all the endorsing accounts which have posted are using the same IP address (which points to a CENIC ISP based in Irvine, California) it could well be that they are fellow students at the same school using the same network. Assuming that the school is based in Irvine.

Benefit of the doubt given, but agree with Mikael that is does all look more than a little fishy...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

A recent survey, conducted by IT risk management specialists nCircle, suggests that as many as 50% of IT security professionals think that the organisations they work for are a potential target for state-sponsored hackers. A number that Tim Keanini, nCircle Chief Research officer, thinks is rather on the low side in reality.

"The number of organizations that are potential targets for state-sponsored cyber attacks is probably much higher than 50%, because if attackers can’t break into a targeted organization, they will go after partners and suppliers" Keanini insists, adding "Frankly, I’m surprised that the level of paranoia among information security professionals isn’t higher."

Of course, to paraphrase a well known saying, just because you are a paranoid IT security professional doesn't mean that China isn't out to get you. Or, perhaps more accurately, just because the media says that China is the country most likely to be hacking your business doesn't mean that everyone else isn't also at it. The public perception of who is behind state-sponsored attacks is not only shaped by media reporting, but also mis-shaped if you ask me. Ask Keanini and he will say the same: "The reality is that nations that are really good at cyber attacks don’t make the news because they don’t get caught." Interestingly, when it comes to those IT security pros who were surveyed (more than 200 of them who attended the 2013 RSA Conference in San Francisco) some 48% go with China as being the best equipped for launching state-sponsored …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

So...thoughts, ideas, suggestions?

Stick to getting the basics right for v1.0 - as long as I can read and post (including PMs) then I will be happy.

Bells and whistles can come later.

That said, an iPad specific version of the app would be appreciated as I hate using iPhone apps on the pad (that whole x2 jagged view does my head in).

Mike Askew commented: +1 on iPad comment +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The news wires have been buzzing over the weekend after it emerged that the Raspberry Pi website had been hit by a 'million zombie' Distributed Denial of Service (DDoS) attack during the week. Although the outage was relatively brief, with the Raspberry Pi Foundation admitting the attack with a Twitter message that stated "We're being DDoS'd at the moment—very sorry if you can't see the website" and continued "If it goes on, we'll try to get some more capacity in tomorrow". The attack meant that parts of the site were offline for e a few hours while others were very slow and intermittent.

0f61755115182e4c0e0f8b5af899f2c0 Forget the media obsession with that 'million zombies' headline, which seems to have come about after someone posted a statement claiming the attack took the form of a significant SYN flood from a botnet with about a million nodes. To be honest, botnets are out there for hire by people who want to launch such attacks and a million nodes may be on the large side but it's not particularly uncommon these days. What is uncommon, or so you might think, is for a DDoS attack to target something as harmless as Raspberry Pi in the overall scheme of things; a charitable foundation no less. The general perception is that hacktivism rules when it comes to DDoS attacks, and that the victims are mainly big business and political targets. That perception is, sadly, rather unfounded.

Sure, the Anonymous attacks with a political …

LastMitch commented: Thanks for Sharing! +11
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I totally agree the England management got it wrong by fielding the likes of Danny Care from the start and saving Ben Youngs for Wales - at least that's the way it looks. Youngs may not have turned the match around but he played a much more intelligent game of rugby, and had he been there for the first 60 things might have been a lot different. I have to admit my heart sank when I saw the starting 15...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I hope you have a tasty hat, as you are going to be eating it :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Comment from Lamar Bailey, Director of Security Research and Development at nCircle on the latest patch/fix:

Oracle has taken a beating this year on Java. It is good to see they are fixing critical vulnerabilities in a code base they want to quit updating but it is past time for them to get serious and do a deep dive on Java to fix the security issues. I hope Oracle will assign a team of their best security engineers to Java to squash any of the remaining security issues. Until then many users will be updating Java as often as they update AV signatures.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

You need to take your medication mate.

Scotland have no chance, absolutelty none, zilch and zip, of winning the 6N. Now, or in the foreseeable future...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

FireEye security researchers are warning that they have detected a new zero-day vulnerability that is being used successfully in the wild against browser clients with both Java 6u41 and Java 7u15 installed.

Given that the Java 7 update was only released a couple of weeks ago, this is yet more bad news for Oracle and for users of the Java browser plug-in. bad news, but not exactly surprising as security researchers have been finding flaws in the update since it was made available. The difference here is that this isn't just a lab-based, theoretical, vulnerability: this is, it would appear, a fully-blown in the wild exploit.

FireEye researchers state that:

...this vulnerability leads to arbitrary memory read and write in JVM process. After triggering the vulnerability, exploit is looking for the memory which holds JVM internal data structure like if security manager is enabled or not, and then overwrites the chunk of memory as zero.

At the moment the exploit doesn't appear to be all that reliable, which is something, as the amount of memory being overwritten fails to execute and causes a JVM crash. Hopefully a more reliable update will be made available by Oracle soon, in time to prevent the bad guys from tweaking this exploit and making it work reliably. FireEye is working with Oracle to this end, but in the meantime advises users to disable Java in the browser until such a time that a patch becomes available.

Similar advice is being …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The endorsement system works best if you only endorse people in those forums where they have demonstrated skills worthy of being endorsed. In my opinion. If it just becomes a 'personality meter' then it is devalued.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Apple, Facebook and Twitter have all been the target of hackers recently, and now Evernote has admitted to a potential breach that has forced it to reset the passwords of approximately 50 million registered users. Evernote, a kind of web scrapbook that enables you to take notes, save web pages and web page content, sync files across devices and share ideas with friends and colleagues, did the right thing in notifying users and resetting passwords. However, it did the right thing in the wrong way; and here's why.

I received an email last night informing me that:

Evernote's Operations & Security team has discovered and blocked suspicious activity on the Evernote network that appears to have been a coordinated attempt to access secure areas of the Evernote Service.

dwebevnote
This immediately sought to put my, and the 49,999,999 other people who were reading the communication, mind at rest by assuring me that Evernote was taking this seriously enough to implement an across the board password reset. This despite there being no evidence, as yet, that any of my Evernote content had been accessed, changed or stolen. Evernote also told me that no payment information for 'premium' or 'business' customers had been accessed. So far so good you may be thinking.

The bad news is that the breach investigation does reveal that the hackers were able to gain access to usernames and the emails associated with them (sound familiar yet folks?) and, yes, those …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

My verdict on the weekend, which was a stonker for rugby as the Tigers/Saracens match on Saturday night was a belter as well (given that Tigers were missing the entire first team due to 6N duty and injuries - to lose 27/32 against a very strong Saracens side was a decent result, although surrendering the 17/6 first half lead was a bitch).

Italy v Wales

Very boring game, the scoreline sounds like it was decent but it was poor. Halfpenny was the only standout player on either side. Italy looked like, well, Italy (from a few years back) with error after error anf an inability to do anything well but kick the ball badly.

England v France

Actually, a very good game. The French showed that, when given a team with decent players all in the right positions, they are still a threat to anyone. The French management showed that, almost as to be expected, they don't have a bloody clue. Making pre-ordained changes, against the run of play or without taking into account how well things were going, well, just crazy. England struggled to hold the French back for the entire first half, although the defence wasn't bad. Second half, different story, different game. Interestingly, the England bench proved that the entire squad is really strong. Man of the match should have been Manu, what a strong and disruptive back that man is. The Manu try should never have been, of course, thanks to the accidental offisde kick that …

diafol commented: agreed +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to the network security team at Oxford University Computing Services (OxCERT) with the title of 'Google Blocks' the world famous seat of learning has decided to put a block, albeit a temporary one, on the use of Google Docs. Robin Stevens from the network security team at Oxford says that the "extreme action" was felt necessary in order to protect "the majority of University users".

dweb-oxford While admitting that Google Docs is a "perfectly legitimate site" and one which is "widely used by staff and students as part of their work and personal lives" Stevens explains that it is "also frequently used for illegal activities... which threaten the security of the University’s systems and data". Of course, the same could be said of the Internet itself, or the students themselves, and neither of these have been banned.

It would appear that the IT Security folk at Oxford University are particularly concerned about phishing, and specifically phishing which is targeted at harvesting University email account credentials. If successful, and one has to assume they have been seeing as it has been felt necessary to take such drastic action, the phishers are then using these compromised accounts in order to distribute spam. The method of choice for the phishermen is linking to web forms hosted on Google Docs.

"Google Docs has many advantages. One significant one is that millions of people use it for perfectly law-abiding purposes. Another is that traffic is encrypted" Stevens says, …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The latest VIPRE Report from GFI Labs suggests that 2013 started off as a bad year for social network-based cybercrime attacks. The report, which analysed the ten most prevalent threats detected during the month of January, identified phishing messages on both Twitter and Facebook as well as malicious spam messages disguised as event invites on LinkedIn.

The report identified a substantial upturn in social networking-related phishing, with Twitter, Facebook and LinkedIn all being targeted with a variety of new creative attacks, a situation not helped by the announcement from Twitter that it had been hacked, resulting in over 250,000 user accounts and passwords being compromised.

LinkedIn, the site that mixes social and business networking to good professional effect, saw business owners in particular being targeted by spammers. The spam emails came in the form of notifications that a supposed employee had sent them an event invitation. Not unusual within the LinkedIn networking sphere, but these were malicious in that they redirected to sites distributing malware to exploit unpatched system vulnerabilities.

As far as Twitter users were concerned, GFI Labs uncovered a direct message phishing campaign targeting them. These claimed the user was, somewhat ironically, being targeted by a Twitter user spreading false accusations on 'nasty blogs' and, of course, containing links to those postings. The links sent the victim to a cloned Twitter login screen where account information entered was harvested. The site first sent them to a 404 error message, and then redirected them to the real …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

i don't even know what the England team is called

I hope you are sitting down <MICHAEL> as this may come as something of an eye-opener.

The England team is called.....

..... erm, England :)

<M/> commented: Oh, i thought they had a fancy name to it... like that Los Angeles Clippers... you know what i mean? +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The 'World's Greatest Anti-Malware Software' is the spurious claim being made by Malwarebiter, which just so happens to sound an awful lot like Malwarebytes which could perhaps justifiably lay claim to that accolade. Take a look at this forum and you will see that Malwarebytes is a very valuable tool for discovering just what nasties are present on your computer, and for getting rid of them. Malwarebiter, on the other hand, is most certainly nothing of the kind.

Malwarebiter, if you hadn't guessed by now, is a prime example of the Rogue Anti-Virus genre, identifying perfectly legitimate files as malware and ignoring those malware files that do exist. Indeed, the Malwarebiter website (which DaniWeb advises you not to visit, for obvious reasons) will distribute a Zeus-family Trojan by way of a drive-by exploit that is delivered in either Java or PDF format. According to Malwarebytes researchers who looked around the site from within a sandboxed labs-based environment "traffic analysis from our visit revealed “roe.js”, a file containing javascript. Upon further inspection the file revealed an embedded iFrame object that links to a rogue IP hosting the Blackhole Exploit Kit, a somewhat funny outcome to visiting a supposed anti-malware site".

Malwarebiter is still showing up in Google searches, although Google does helpfully suggest you might be searching for Malwarebytes instead, but the Facebook page which had more than 25,000 'likes' has been closed down.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Security vendor Malwarebytes has reported that a new variation of an old password stealing Trojan is out in the wild, but all is not as it may seem. Notably, this particular Trojan is signed with an apparently 'genuine' digital certificate that authenticates the file. Which rather prompts the question: "say what?" Or to put it another way, if the billion-dollar digital certificate and encryption market can't actually guarantee squat, then what's the point of it?

The Trojan, it appears, evades many security barriers by a system of spoofing that involves the criminal enterprise behind the scheme setting up a bogus company which in turn has obtained genuine , legitimate and otherwise perfectly valid digital certificates of trust from Digicert. "This allows the cybercriminals to slide an infected PDF file into a large number of organisations, since the certificate is the equivalent of the baggage checked tag on luggage as it is carried by an airline to its destination" warns Calum MacLeod, a director at security vendor Venafi, who continues "in this case, everyone in the electronic chain takes the certificate - as they should – at its face value and the legitimate certificate authenticates the Trojan". MacLeod blames the trust management rather than the certificate authority schema in this case, explaining that "it is management and control flaws like this that undermine confidence in the structural status quo of Internet security – and this is not good for anyone, or any user, of the World Wide Web, email and other …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

PS, <MICHAEL>:

hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha

<M/> commented: i don't know what i said? +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Italy or Scotland?

hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahahaha
hahahahahahahaha!

Thanks <MICHAEL> for cheering me up this snowy morning here in West Yorkshire.

<M/> commented: Did i say something wrong? +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Well, have to say that was a much better performance from Wales to not only break the long run of losing internationals but to do so in Paris. The French looked like a shadow of their former selves, never really getting into the game at all.

Now, fingers crossed that England can continue with the good form and the record breaking stuff to beat Irelaand in Dublin for the first time in, what, ten years?

Please note, I am not holding my breath...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The real problem (well, one of the real problems) with the remake was that Rooney Mara was a very pale shadow of the Lisbeth Salander that Noomi Rapace brought to life in the original. It was nothing short of a travesty that Hollyhwood felt it needed to recast that part...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to new research from Kaspersky Lab, in the form of a report called Evaluating the threat level of software vulnerabilities, 72% of Java users haven't switched to the latest, safest, version despite highly publicised vulnerabilities and resulting security exploits.

dweb-java011 And it's not just Java, the report also shows that users of older versions of Adobe Flash Player and Adobe Reader are also failing to upgrade to safer versions, leaving their systems and their data at potential risk of breach.

Researchers looked at the most dangerous vulnerabilities (those known to be actively exploited by cybercriminals) found in assorted programs during the last year, and analysed the enthusiasm with which users were upgrading to the safer updated editions once they were made available. The unsettling result was the discovery that for a large number of people the older, unsafe and often obsolete, versions of popular software applications remain installed on "a significant number of PCs" for "months and even years".

Here are the key points of the Kaspersky Lab paper:

Data analysis from more than 11 million users was used to reveal more than 132 million vulnerabilities, with an alarming average of 12 vulnerabilities per user.

In total more than 800 specific and different vulnerabilities were discovered, and of these a miniscule 37 were found to be present on at least 10% of computers for one week or more during 2012. Yet these same vulnerabilities incredibly accounted for a massive 70% of all the …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

You could use 'damn kick-shit computer' instead :) Or how about going all British with kick-arse?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Research published today by data governance software developer Varonis reveals that, when it comes to the virtualized environment, security awareness appears to be something of a black hole.

The study found that data security in these virtualized environments can all too often be totally neglected, and some 48% of IT organisations reported or suspected there had been unauthorised access to files kept on virtual servers. The findings suggest that when it comes to awareness of security matters regarding virtualized servers and the data stored upon them, the harsh truth of the matter is that there is very little. Indeed, the survey found that 70% of those questioned had 'little or no' auditing in place for example.

When you consider that Gartner reckons there are now in excess of 50 million Virtual Machines installed on servers, it should come as no surprise to discover that 87% of respondents to the Varonis study said their application servers were already virtualized. The reasons for this virtualization being mainly a combination of deployment speed (76%) and disaster recovery potential (74%). Yet file security appears to be neglected almost across the board.

dweb-virtualservers

Sure, nearly 60% did claim to be "very careful about setting permissions and controlling subsequent updates" there's no escaping from the fact that 70% had implemented little or no auditing regardless of the company size. A statistic made all the more surprising by the revelation that in enterprises of more than 5,000 employees some 20% admitted …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to new independent research commissioned by Corero Network Security, and conducted by the Ponemon Institute, two thirds of banks in the United States have suffered a Distributed Denial of Service (DDoS) attack during the last 12 months. The 64% statistic refers to the number of IT and IT security practitioners who reported that the banks at which they work were subject to at least one DDoS attack during 2012.

dweb-banks The research questioned 650 IT and IT security professionals working at a total of 351 banks, including some of the biggest in the world, and the sadly not at all surprising conclusion was that these DDoS attacks will continue, or 'significantly increase' during 2013 according to 78% of them.

With 48% of the banks concerned having been targeted multiple times during the course of 2012, the IT security professionals also admitted that Zero-Day attacks targeting previously unknown vulnerabilities were also hitting banks hard. Insufficiently experienced staff, along with ineffective security technology such as traditional firewalls (deployed by 35% of banks), were cited as the main barriers preventing the banks from being able to deal with these attacks more efficiently in 50% of cases. A lack of funding for security was the third most cited cause for concern.

"It really comes as no surprise that DDoS attacks are one of the most severe security risks cited by the banking industry and these results clearly demonstrate the level to which they are being targeted on …

LastMitch commented: Nice Article! +11
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Yes there is a way, but we don't use it as old 'dead' threads may still have relevant life breathed into them at a future date.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Yep, got it, deleted it, warned him...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Google's seemingly always changing indexing algorithm continues to hit site rankings as the search giant continues to drive a new generation of SEO relying upon original and relevant content generation and sharing above all else. Now a panel of SEO experts in the UK has warned that companies need to avoid putting all their SEO eggs into the one Google basket and instead embrace SEO strategic evolution in order to maintain and grow traffic.

dweb-google At a round-table discussion, hosted by cloud provider UKFast, Sam Allcock, CEO of Custard Media, stated that the key to successful audience growth was traffic stream diversification rather than a reliance upon Google-led SEO strategies. "Businesses must investigate every alternative method of traffic, including Facebook and Twitter. It just so happens now the easiest way to attract traffic is through Google but will this be the case in five years?” Allcock said.

Naturally, much of the discussion revolved around the rise of social media and how this has ensured that link-building is no longer enough. "With the advent of social media it’s no longer about focusing on the link but on the traffic stream the content can give you" Christian Hill, director of strategy at digital agency Project Simply insisted, adding "It’s now about building the value of the business”.

UKFast MD Jonathan Bowers stated that his company has spent a lot of time assessing the role that hosting and page load speed plays in Google’s search ranking, but admitted that …

tux4life commented: Nice article :) +13
Lauren Variant commented: Thanks for your information +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Interesting comments from security outfit Rapid7's CSO and chief architect of Metasploit, HD Moore:

The Java applet security model has not kept up with up with browser-based threats. In an era where sandboxing at the process level has become the norm (Adobe Reader, Flash on Chrome, Chrome itself, Internet Explorer low-privacy mode), Java continues to enforce all security at the interpreter level.

Notwithstanding sandbox escapes, the capabilities available to a Java applet still exceed what comparable plugin technologies allow. Java has a ridiculous amount of functionality and has to contend with backwards compatibility issues to boot. The recent vulnerability involving the JMXBeanServer class is a great example of a Java applet being able to access a class it really has no business using in the first place.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Impossible to answer the 'what product should I buy' question, as with all things, until you answer the 'what do you want to use it for' one. And saying 'take photos' isn't good enough to get a good enoguh response :)

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Last week saw the discovery of YAJE: Yet Another Java Exploit. Sadly, Java vulnerabilities are neither new nor uncommon and the bad guys are quick to exploit them in the wild. Some claim that Oracle is in too much of a rush to extricate itself from this unholy mess and while being quick to patch whatever vulnerability is currently making the media headlines is still leaving far too many insecurities in the software unfixed. But does that mean it's time to give up on Java?

dweb-java01 AlienVault's Head of Labs, Jaime Blasco, reproduced the latest exploit in a previously fully patched Java installation and found that the exploit was probably "bypassing certain security checks tricking the permissions of certain Java classes as we saw in CVE-2012-4681". In fact, according to Blasco, the exploit is the "same as the zero day vulnerabilities we have been seeing in the past year in IE, Java and Flash".

Most vendors, AlienVault included, were advising that prior to the Oracle patch the only sensible option to protect against the threat was to disable Java. Simple as. But is it really that simple, and should we be writing off software such as Java (or indeed Flash and Internet Explorer) as being 'too vulnerable' and 'too insecure' and therefore not fit for purpose?

Let's look at the facts for a moment: Oracle released a patch for this latest vulnerability within a few days of exploits being seen in the wild. That …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

According to IT security outfit Kaspersky, which has just published details of the information security landscape as it was shaped during 2012, 99% of all mobile malware threats now target Android devices.

With 6300 new mobile malware samples discovered every month on average across 2012, Android has become the focus for the criminal fraternity for a second year in a row. The remaining 1% of threats, in case you wondered, were mainly targeting Java and Symbian-based smartphones.

Across 2012 as a whole, Kaspersky reports, the number of known malicious samples on the Android platform increased "explosively" compared to the previous year. "From just eight new unique malicious programs in January 2011" Kaspersky says "the average monthly discovery rate for new Android malware in 2011 rose to more than 800 samples".

Looking at the statistics more closely, the Android malware threat can be pretty much split into three distinct functional groups: SMS Trojans (premium-rate number scams), Backdoor Trojans (installing a channel to distribute further malware) and Spyware (collecting private data). The most widespread of which are the SMS Trojans, although Kaspersky warns the much less widespread mobile banking Trojans are actually far more dangerous in terms of financial impact to the user.

And the reason that Android finds itself in this position? Well that's simple, and twofold: it's now far and away the most popular smartphone and tablet device platform for one, and it allows software installation from untrusted sources for the second. You could add a third, I …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

But you already know if you are online or not, surely?

That said, I'm seeing my purple dot of onlineliness...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

And that's like World of Warcraft how exactly?

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

This special edition of the Guinness World Records book will appeal to geeks and nerds the world over. Not just because it is packed full of the kind of trivia that we all thrive on in social situations, but also because that trivia is firmly based in the realm of video gaming. Previous editions have been described as being a veritable gaming almanac, and this sixth installment of the series does nothing to degrade that opinion. It's packed with facts, figures, lists, stats and high quality imagery.

dweb-guinness01It's also more than just a collection of lists though, the 2013 edition has a number of really rather well presented and very in-depth feature spreads covering games such as Call of Duty, Grand Theft Auto and Forza. There are even some more unexpected features like the one that looks at the relationship between the mediums of comic books and gaming, or another that delves into the top 50 videogame villains of all time.

As many of you may have been drawn to this review by the mention of Bowser, Darth Vader and Donkey Kong in the first place, let's start with a quick look at the Top 50 Video game Villains list which was compiled by polling Gamer's Edition readers and resulted in more than 12,000 votes in all. The broadness of gaming genres represented is quite staggering, as are the number of years covered. This is not just a list of the current bad guys and monsters …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

This one is for UK-based DaniWeb members, or those of you who are visiting the UK and want to be able to charge your smartphone via a USB mains charger that is neither bulky or heavy. I'm not usually the type of person to get excited by a plug, honestly, but I will make an exception for the Mu.

Mu02

The designer of the Mu, Min-Kyu Choi, says that he was frustrated by the dimensions of a traditional plug and thought that it was about time to redesign something that dated back to 1947 and hadn't really changed much since. "My idea was very simple – redesign the plug to bring it in line with the clean look and feel of today’s technology; without compromising functionality" Min-Kyu Choi reckons. DaniWeb reckons he was succeeded, with knobs on (although not literally as that would spoil the sleek design of the Mu). And sleek the Mu certainly is; it's a startlingly compact design for both a plug and a USB charger in one. Folding completely flat for storage, to a depth of a smidgeon over half an inch thick.

If you want to be precise, when folded flat the Mu is 14mm x 55mm x 60mm. That's a reduction in size, over a traditional UK-spec plug, of more than 70%. Yet when you come to unfold it and use the thing then the user is not faced with a fiddley, nail-breaking, annoying exercise in temper control. Simply unfold …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I think you surprise me because the amount of tattoos and your personality doesn't really fit your profile. I do feel over the years people don't take you serious of what you do but in the end you manage to win people over.

You are wrong then :) People have taken me seriously enough in both my personal and professional lives, and have done so by and large very quickly indeed - usually within a few minutes of striking up a conversation or listening to a pitch. Most people, I am happy to report, see beyond my tattoos just as most people see beyond skin colour, sexual orientation, gender etc etc.

I think if you have time you can ask someone to drive and you can go to see Maria and ask her to do 1 tattoo once and while. I think knowing someone more 10 years is a long time and it's always good drop by and say hi you might made her day.

I don;t need to get ink to keep in touch with a good friend :)

LastMitch commented: I think I learn something from you today. Thanks! +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

What happens after we die? ;)

Well, after I died, the medical team brought me back to life. Dunno if that happens every time though :)

deceptikon commented: A better answer there never was. +0
~s.o.s~ commented: AFAIK, it doesn't happen every time... ;) +0
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Yes. Ink is sexy. End of...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

There can be no denying the impact that social media has had on business, you only have to look at the reach it has: well over a billion people between Facebook, Twitter and LinkedIn subscribers. What's more, there is no sign of the social media bubble bursting just yet.

socmedtutorial However, social media is actually much more than just a numbers game and in order for any marketing campaign to succeed then businesses simply have to understand how to embrace it properly. Indeed, the potential for extending the reach of your business and your brand has never been bigger. The time for action is now, but jumping onto the social media bandwagon without first doing your homework and making careful preparation is just inviting the wheels to fall off your campaign. And that means constructing a relevant and worthy social media marketing strategy.

DaniWeb has already covered how social video plays a key role in online advertising campaigns so I won't bother going over that same ground again. Likewise, DaniWeb has detailed why buying social media reviews is a recipe for disaster when it comes to any sensible marketing campaign that expects customer retention and brand longevity.

What we haven't done so far is compile a basic list of social media marketing campaign tips, until now...

Think of social media networks as marketing channels and match your products to those which are appropriate. The scattergun approach of simply throwing your efforts into …

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

I can't imagine using DaniWeb on my iPhone to be honest, that would have to be a real emergency situation for me. As my vision has become worse I tend to use the iPhone where Siri can be stirred into action, and the iPad for most everything else. The iPhone has become, and I hope everyone is sitting down, a phone more than anything else...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

BUT please post your questions in the appropriate forums. A question about VB.NET does not go in Geeks' Lounge. I've moved it to the vb.net forum, oddly enough...

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Why post in purple? It's annoying, and it doesn't make your posting any easier to read. If what you have to say is worthy then you don't need flashing lights, bright colours, big pointy arrows etc as the content will stand up for itself.

happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

The voting you refer to is for the post itself, and anyone who reads it can react to that: they can like what you've said, dislike it, think that you shouldn't have revived such an old post and down vote for that reason, appreciate that you've revived and up vote, etc etc.

That's exactly what the up and down voting system is for, giving members the ability to express appreciation or otherwise for individual postings without impacting upon the reputation of the member concerned. So in this case, I would assume, the members who have downvoted have done so as they are displeased with the specific response to such an old posting (there is probably little point replying to a posting about a Beta version of phpBB 2.1.2 from 8 years ago just to point out that it's on a higher version now and the features have changed to be honest). It doesn't mean they are out to get you, and the fact that they have not 'neg repped' you would suggest to me that they value your contributions to DaniWeb as a whole.

LastMitch commented: Thanks for the Explanation +9
happygeek 2,411 Most Valuable Poster Team Colleague Featured Poster

Network security vendor Stonesoft predicts that the top infosec threats to watch out for in 2013 will include unseen and unknown targeted cyber-attacks, espionage and hacktivism. Jarno Limnell, director of cyber-security at Stonesoft, reckons that in 2013 the security of the digital world will become an even more pressing issue, and this will lead to increasing pressure to consider international norms, rules and regulations. "As nation-states continue to invest heavily in cyber capabilities (defence and offence), it is also likely that they will be more inclined to use these capabilities and the use of cyber force in the world will increase" Limnell says "this may have severe consequences – in particular with regard to unpredictable side-effects. A single attack can spread rapidly around the world, even by a mistake. There is a myriad of players who are investing immense resources to change the cyber reality".

stonesoft The top six security trends to watch for in 2013 according to Stonesoft are:

  1. The world will experience more targeted cyber-attacks. The development of highly sophisticated malware by state-sponsored organisations has the potential to radically affect the speed at which the wider threat landscape evolves. Cyber threats will become more unpredictable than ever before.
  2. Espionage by nation-states will continue to rise. In 2012 we saw botnets and malware silently send the whole contents of the user’s hard drive to a control machine. This will continue to be a problem in 2013. The protection of critical national infrastructure will …
LastMitch commented: Thanks for sharing! +9