Jump to content

  • Log in with Facebook Log in with Twitter Log In with Google Sign In
  • Create Account

DFighter

DFighter's Photo

DFighter

Member Since 28 Dec 2011
OFFLINE Last Active Private
****-

#759987 Happy Birthday to Hodor & Okkeboe

Posted by DFighter on Today, 07:29 AM

Hold the doooorr :P happy birthday guys




#759483 U.S. Homeland Security probes possible abuse in Twitter summons case

Posted by DFighter on 22 April 2017 - 05:18 AM

download (1).jpg

The U.S. Homeland Security Department's inspector general said on Friday he was investigating possible abuse of authority in a case that triggered a lawsuit against the department by Twitter Inc 
 

Inspector General John Roth described the probe in a letter to Senator Ron Wyden, an Oregon Democrat who had asked for an investigation due to concerns about free speech protections.
 
In a lawsuit on April 6, Twitter disclosed that it received a summons in March from the U.S. Bureau of Customs and Border Protection, an agency within Homeland Security, demanding records about an account on the social media platform identified by the handle @ALT_uscis.
 
The account has featured posts critical of President Donald Trump's immigration policies, leading Twitter to complain in its lawsuit that the summons was an unlawful attempt to suppress dissent.
 
The agency dropped its demand of Twitter the day after the suit was filed.
 
Customs bureau spokesman Mike Friel said on Friday that the bureau requested the inspector general's review and will fully support it.
 
The people behind the Twitter account have not disclosed their identities, but the use of "ALT" with a government agency acronym has led many to assume government employees were behind the tweets critical of Trump.
 
The lawsuit said the account "claims to be" the work of at least one federal immigration employee. USCIS is the acronym of United States Citizenship and Immigration Services, a component of Homeland Security.

Roth's office is charged with investigating waste, fraud and abuse within Homeland Security. He wrote in his letter that he was looking at whether the summons to Twitter "was improper in any way, including whether CBP abused its authority."
 
"DHS OIG is also reviewing potential broader misuse of summons authority at the department," he added.
 
Wyden's office posted the letter online. A representative for Roth could not immediately be reached for comment. A Twitter spokeswoman declined to comment.

Source: http://www.reuters.c...y-idUSKBN17N2IY

 




#759348 I was banned on et

Posted by DFighter on 21 April 2017 - 09:13 AM

change your name tags instead =F|A= do for example -F|A- post on tracker if they can set your lvl make sure your ET jaymod and silent guid are added in your profile
you wont be kicked by server with the diffirent tags and will be setted by high admins if they see your tracker and your guids are added in your profile
https://fearless-ass...ns.com/tracker/

if a admin kicks you explain him you are a admin and you could send the admin a private message on forum so he can see a pm with your admin profile 
I just connected to nq1 it was a mistake i informed you are admin and the rest will be fine i guess 

exept im not setted on nq1 myself :P




#759155 Experts excited by brain 'wonder-drug'

Posted by DFighter on 20 April 2017 - 01:04 AM

_95698245_gettyimages-535164801.jpg

Scientists hope they have found a drug to stop all neurodegenerative brain diseases, including dementia.

In 2013, a UK Medical Research Council team stopped brain cells dying in an animal for the first time creating headline news around the world.

But the compound used was unsuitable for people, as it caused organ damage.

Now two drugs have been found that should have the same protective effect on the brain and are already safely used in people.


"It's really exciting," said Prof Giovanna Mallucci, from the MRC Toxicology Unit in Leicester.

She wants to start human clinical trials on dementia patients soon and expects to know whether the drugs work within two to three years.

Why might they work?

The novel approach is focused on the natural defence mechanisms built into brain cells.

When a virus hijacks a brain cell it leads to a build-up of viral proteins.

Cells respond by shutting down nearly all protein production in order to halt the virus's spread.


Many neurodegenerative diseases involve the production of faulty proteins that activate the same defences, but with more severe consequences.

The brain cells shut down production for so long that they eventually starve themselves to death.

This process, repeated in neurons throughout the brain, can destroy movement, memory or even kill, depending on the disease.

It is thought to take place in many forms of neurodegeneration, so safely disrupting it could treat a wide range of diseases.


In the initial study, the researchers used a compound that prevented the defence mechanism kicking in.

It halted the progress of prion disease in mice - the first time any neurodegenerative disease had been halted in any animal.

Further studies showed the approach could halt a range of degenerative diseases.

The findings were described as a "turning point" for the field even though the compound was toxic to the pancreas.

Neurodegeneration

  • A neurodegenerative disease is one in which the cells of the brain and spinal cord are lost
  • The functions of these cells include decision making and control of movements
  • These cells are not easily regenerated, so the effects of diseases can be devastating
  • Neurodegenerative diseases include Alzheimer's, Parkinson's, multiple sclerosis and Huntington's

Source: London Brain Centre

Safe drugs?

Since 2013, the research group has tested more than 1,000 ready-made drugs on nematode worms, human cells in a dish and mice.

Two were shown to prevent both a form of dementia and prion disease by stopping brain cells dying.

Prof Mallucci told the BBC News website: "Both were very highly protective and prevented memory deficits, paralysis and dysfunction of brain cells."

The best known drug of the pair is trazodone, which is already taken by patients with depression.

The other, DBM, is being tested in cancer patients.


Prof Mallucci said: "It's time for clinical trials to see if there's similar effects in people and put our money where our mouth is.

"We're very unlikely to cure them completely, but if you arrest the progression you change Alzheimer's disease into something completely different so it becomes liveable with."

But, although trazodone is a current medication, she added: "As a professional, a doctor and a scientists, I must advise people to wait for the results."

What do the experts think?


Dr Doug Brown, from the Alzheimer's Society, said: "We're excited by the potential of these findings, from this well conducted and robust study.

"As one of the drugs is already available as a treatment for depression, the time taken to get from the lab to the pharmacy could be dramatically reduced."

Dr David Dexter, from Parkinson's UK, said: "This is a very robust and important study.

"If these studies were replicated in human clinical trials, both trazodone and DBM could represent a major step forward."

Source: http://www.bbc.com/n...health-39641123




#759146 the saddest day of my life so far

Posted by DFighter on 20 April 2017 - 12:27 AM

my condolences stay strong and take care !




#759064 What song are you listening right now? - Part 6

Posted by DFighter on 19 April 2017 - 08:20 AM




#759059 What song are you listening right now? - Part 6

Posted by DFighter on 19 April 2017 - 07:24 AM




#759053 New solar-powered device makes water out of desert air

Posted by DFighter on 19 April 2017 - 06:24 AM

Scientists have a new solution for bringing clean water to remote areas.

A team has created a solar-powered device that can produce drinking water out of air -- even in desert climates, according to the researchers from the Massachusetts Institute of Technology and the University of California, Berkeley.
"I'm most excited about being able to realize a functioning device in these remote areas and to be able to provide clean water to all the people who need it," Evelyn Wang,
associate mechanical engineering professor at MIT and co-author of the paper first published in the journal "Science," told CNNTech.

While similar methods like atmospheric water generators already exist, the new project works in drier climates and uses less energy.
The new device looks like a box. Inside the box is a layer of a custom metal-organic framework (also called a MOF), which is essentially a material that acts as a sponge to capture as much water as possible when the box is open.

Once the water is captured, the box is closed and exposed to the sun. The sun heats up the material so it releases water from its surface in the vapor phase. The vapor is then converted to the liquid phase with a condenser -- which can cool the vapor even in hot climates -- to create clean drinking water.

170418160917-wang-prototype-780x439.jpg

It's capable of collecting 2.8 liters of water per kilogram of metal-organic framework that is used. It can do this in areas where the humidity level is as low as 20%, compared to existing devices that work in 50% humidity.

MOFs are one-, two- or three-dimensional compounds invented about 20 years ago by Berkeley professor Omar Yaghi, one of the researchers behind the new device. They are an extremely porous material and water molecules can easily attach to the framework. The MOF used in the new device is called MOF-801, which was first reported a few years ago.

 

Right now, the new system is in the "proof of concept" phase to show it can work, Wang said. The key, she added, will be scaling up the prototype. The researchers have developed the materials in a lab environment and now will have to make them in larger quantities -- which Wang said will reduce costs. Companies like German manufacturer
BASF have produced large-scale quantities of MOFs previously, she noted.
 
The prototype is currently the size of a small tissue box, but the final product is expected to be about as big as a carry-on suitcase so it can produce enough water for a family of four.
It's designed for places that are extremely dry, but that still have a lot of sun, such as North Africa and India. "We can deploy [the] devices in those types of regions, where all they need is this device and sun," Wang said.
Two-thirds of the world's population is experiencing water shortages, according to the researchers.

Source + video: http://money.cnn.com...ater/index.html



#759051 Holiday Inn hotels hit by card payment system hack

Posted by DFighter on 19 April 2017 - 05:40 AM

_95702798_8b3e7513-096f-4ab1-8a37-62b17cea905a.jpg
 

The owner of the Holiday Inn and Crowne Plaza hotel brands has disclosed that payment card-stealing malware has struck about 1,200 of its franchisees' properties.
UK-based Intercontinental Hotels Group (IHG) said all but one of the locations affected were in the US, with the other being in Puerto Rico.
Guests have been warned they could have had money stolen as a consequence.
One expert said there might be further hotels affected.

Buckinghamshire-based IHG had previously reported in February that a dozen US hotels that it managed itself had been affected by the same attack.
"Individuals should closely monitor their payment card account statements," a spokeswoman told the BBC following the latest discovery.
"If there are unauthorised charges, individuals should immediately notify their bank.
"Payment card network rules generally state that cardholders are not responsible for such charges."
Other affected brands include Hotel Indigo and Candlewood Suites.
Hijacked card data

IHG said an investigation had detected signs the malware had been active at front-desk payment locations at the hotels between 29 September and 29 December 2016.
However, it only has confirmation that the threat was definitely eradicated last month.
The attack hijacked information taken from the payment cards' magnetic strips as it was being routed through the hotels' computer servers, said the hotel group.
This could include the card number, expiration date and verification code.
IHG does not believe other guest information was stolen.
It has published a tool for visitors to check if hotels they stayed at are among those affected.

_95702806_4faca6e4-a1a4-4b93-8830-ebf6881e4b9d.jpg

The firm notes that other franchisees that had adopted an encryption-based security measure would not have been affected.
But one cybersecurity expert said that the list might not be comprehensive.
"IHG has been offering its franchised properties a free examination by an outside computer forensic team," wrote Brian Krebs.
"But not all property owners have been anxious to take the company up on that offer.
"As a consequence, there may be more breached hotel locations yet to be added to the state look-up tool."
Other hotel chains to have been struck by payment system hacks in recent years include Hyatt, Mandarin Oriental and Trump Hotels.
The US has been slower to switch to a chip-and-pin system than many other countries, which makes it more difficult to carry out such attacks.

Source: http://www.bbc.com/n...nology-39642172

 




#759006 Zuckerberg addresses 'Facebook killing'

Posted by DFighter on 18 April 2017 - 03:33 PM

Facebook's chief has paid his respects to the family of a man whose killing was filmed and posted onto its site.

"Our hearts go out to the family and friends of Robert Godwin Sr," said Mark Zuckerberg near the start of Facebook's annual F8 developers conference.His social network had been criticised over the amount of time it had taken to take the clip offline.About an hour before the event got underway, police had revealed that the murder suspect had killed himself.

Steve Stephens had been the subject of a national manhunt.He was believed to have uploaded a video to Facebook showing his killing of 74-year-old Mr Godwin in Cleveland on Sunday and then boasting on subsequent Facebook Live streams that he had killed others.Facebook subsequently acknowledged it had taken it more than two hours to remove the clips after the first video was posted, despite it having received complaints in the interim.

"We have a lot of work and we will keep doing all we can to prevent tragedies like this from happening," added Mr Zuckerberg.

Source + video: http://www.bbc.com/n...nology-39629343




#758789 Microsoft patched 'NSA hack' Windows flaws before leak

Posted by DFighter on 17 April 2017 - 06:58 AM

_95666416_mediaitem95666409.jpg
 

Microsoft says it had already fixed software flaws linked to an alleged breach of the global banking system before they were exposed last week.
On Friday, a group called the Shadow Brokers published details of several hacking tools, indicating they had been used by the US National Security Agency (NSA) to spy on money transfers.

Reports suggested Microsoft's Windows operating system remained vulnerable.
But the firm revealed it had in fact addressed the problem in March.
"Customers have expressed concerns around the risk [Shadow Brokers'] disclosure potentially creates," it said in a security update.
"Our engineers have investigated the disclosed exploits, and most of the exploits are already patched."

The company has not, however, revealed how it became aware of the flaws.
Microsoft normally acknowledges third parties who tip it off to problems, but has not done so in this case.
The Reuters news agency reported that the company had told it that neither the NSA nor any other part of the US government had informed it of the hacking tools' existence.
That calls into question how Microsoft learned of the issue - tech blog Ars Technica commented it was "highly unlikely" that the patch and leak would both have occurred so close together by coincidence.

'God's eye'

Whisteblower Edward Snowden had previously leaked documents in 2013 that alleged the NSA had carried surveillance of the Brussels-based Society for Worldwide Interbank Financial Telecommunication (Swift) for several years, but did not specify how.
Swift allows the world's banks to send payment orders and other messages about large financial transactions in a "secure and reliable" manner.

It is used by about 11,000 financial institutions. The allegation is that third parties - known as Swift Service Bureaus - that provide access to Swift's network were targeted by the NSA, rather than Swift itself.
"If Shadow Brokers' claims are indeed verified, it seems that the NSA sought to totally capture the backbone of [the] international financial system to have a God's eye [view] into a Swift Service Bureau - and potentially the entire Swift network," blogged security researcher Matt Suiche after the latest leak.
"If the US had a specific target in the region's financial system, NSA penetration offers [an alternative to] merely relying upon good faith compliance procedures, standard diplomatic requests, or collaborating with Swift."

Swift has not confirmed it was compromised.
"We have no evidence to suggest that there has ever been any unauthorised access to our network or messaging services," it said in a statement on Friday.
The BBC has not been able to verify the authenticity of the Shadow Brokers' claims, and the NSA has not provided comment.

Source: http://www.bbc.com/n...nology-39620534



#758457 NSA's powerful Windows hacking tools leaked online

Posted by DFighter on 15 April 2017 - 10:11 AM

A hacking group has dumped a collection of spy tools allegedly used by the National Security Agency online. Experts say they are damaging.
The exploits, published by the Shadow Brokers on Friday, contain vulnerabilities in Windows computers and servers. They may have been used to target a global banking system. One collection of 15 exploits contains at least four Windows hacks that researches have already been able to replicate.

Late Friday, Microsoft said the exploits had been patched in previous updates, or are not able to be replicated on supported platforms. Windows users should make sure their software is up to date and upgrade to Windows 7 or a newer version.
"This is quite possibly the most damaging thing I've seen in the last several years," said Matthew Hickey, founder of security firm Hacker House. "This puts a powerful nation state-level attack tool in the hands of anyone who wants to download it to start targeting servers."

The exploits target a variety of Windows servers and Windows operating systems, including Windows 7 and Windows 8. Hickey was able to test out exploits in his UK firm's lab and confirmed they "work just as they are described."

The Shadow Brokers is a group of anonymous hackers that published hacking tools used by the NSA last year. Last Saturday, the group returned and published a batch of NSA exploits it had previously tried, and failed, to sell. This Friday's release contains more serious exploits. The releases are published with strange and misspelled blog posts, and recent posts have been critical of the Trump administration. The group complained about the lack of media coverage of its release last Saturday.

 
Hickey said the Windows exploits leaked on Friday could be used to conduct espionage and target critical data in Windows-based environments. Consumers using Windows PCs could be at risk, though experts say these kinds of tools are more commonly used to target businesses.
"The individual consumer is a little less at risk, as these kinds of tools are targeted at enterprise and business environments," Hickey said.
An email to the NSA's press office was not returned.

"We've investigated and confirmed that the exploits disclosed by the Shadow Brokers have already been addressed by previous updates to our supported products," a Microsoft spokesperson told CNNTech. "Customers with up-to-date software are already protected."
Microsoft told CNNTech no one from the government had contacted it about the exploits listed in the dump. Since the Shadow Brokers previously said they had obtained NSA exploits, the agency was likely aware of the potential for these hacks to be exposed to the public.
"At this time, other than reporters, no individual or organization has contacted us in relation to the materials released by Shadow Brokers," a Microsoft spokesperson said in an email on Friday.

The Windows hacking tools may have been used to target the SWIFT financial security system, specifically an anti-money laundering financial institution called EastNets. The leaked documents contain notes about passwords, configuration data and networks.
The U.S. government has long been able to access financial data through SWIFT as part of an anti-terrorism effort. However, according to security researcher Nicholas Weaver of the International Computer Science Institute, the methods in the documents show the NSA was going beyond its "official access."
"Whenever the NSA is caught going in the backdoor when they already had front-door access (such as the backdoor monitoring of Google and Yahoo's internal communication revealed in the Snowden documents), it not only closes the backdoor but also results in legal pushback that may limit the front-door access," Weaver told CNNTech in an email.
SWIFT told reporters it has not seen unauthorized access on its networks, and EastNets said the same.

Source + video: http://money.cnn.com...kers/index.html



#758427 US government 'hacked global bank system'

Posted by DFighter on 15 April 2017 - 08:06 AM

_95648738_mediaitem95648734.jpg
 

A huge range of security weaknesses, said to be worth over $2m if sold on the black market, have been leaked online.
The tools are said to have been created by the US National Security Agency (NSA), and accompanying documents appear to indicate a possible breach of the Swift global banking system.

Such a hack could have enabled the US to covertly monitor financial transactions, researchers said.
The files were released by Shadow Brokers, a hacking group that has previously leaked malware.
If genuine, it represents perhaps the most significant exposure of NSA files since the Edward Snowden leaks in 2013.
On Twitter, Mr Snowden described it as the "Mother Of All Exploits" - a reference to a bomb recently used by the US military in Afghanistan.

Multiple experts have said this latest "data dump" is credible - though the institutions implicated have dismissed the claims, or refused to comment.
Swift, which is headquartered in Belgium, said: "We have no evidence to suggest that there has ever been any unauthorised access to our network or messaging services."
The BBC is not able to verify the authenticity of the files - and the NSA has not commented on the leak.
Swift was successfully targeted by hackers last year when criminals stole $81m from the Bangladeshi central bank. 
Watching the Middle East

Swift is a network that allows global banks to move money around the world.
In the Swift network, smaller banks often make use of service bureaus to handle transactions on their behalf. Documents included in the leak suggest at least one major bureau, EastNets, may have been compromised.
"If you hack the service bureau, it means that you also have access to all of their clients, all of the banks," said Matt Suiche, founder of the United Arab Emirates-based

cybersecurity firm Comae Technologies, speaking to Reuters.
Headquartered in Dubai, EastNets has clients in Kuwait, Dubai, Bahrain, Jordan, Yemen and Qatar. Spreadsheets published by Shadow Brokers appeared to list banks that had been breached with "implants" - secret data-gathering software.
Cris Thomas, a security researcher with Tenable, said analysis of the leaked files suggested the US government had the capability "to monitor, if not disrupt, financial transactions to terrorists groups".

In a statement on Friday, EastNets strongly denied the claims.
"The reports of an alleged hacker-compromised EastNets Service Bureau network is totally false and unfounded," a spokesperson said.
"The EastNets Network Internal Security Unit has run a complete check of its servers and found no hacker compromise or any vulnerabilities.
"The photos shown on Twitter, claiming compromised information, is about pages that are outdated and obsolete, generated on a low-level internal server that is retired since 2013."

Windows threat

The files contained several "zero day" exploits - vulnerabilities that were previously unknown to the companies that create the software, or the security community at large.
The zero-days targeted Windows machines, though researchers said none in the cache would be effective against the latest version, Windows 10.
That said, multiple experts said the sheer number of zero days released at the same time was unprecedented. One researcher, speaking to Vice, said the exploits would have been worth more than $2m if sold privately. 

In January, a Twitter account believed to be run by the group announced an auction of the exploits, but it appears the group did not find any buyers. The NSA is now facing criticism for not sharing details of the exploits with Microsoft once it became clear the tools were in the hands of a hacking group.
Microsoft said in a statement to the BBC that it was "reviewing the report and will take the necessary actions to protect our customers".

Source: http://www.bbc.com/n...nology-39606575



#758217 Star Wars: The Last Jedi Official Teaser

Posted by DFighter on 14 April 2017 - 08:18 AM


 




#758215 What song are you listening right now? - Part 6

Posted by DFighter on 14 April 2017 - 08:06 AM