Monday, October 1, 2007

At Gap data of 800000 competitors have been stolen

Gap has informed on theft of the laptop, containing data about 800 thousand competitors of work from the USA, Puerto Rico and Canada. Laptop has disappeared from office of the foreign company employed Gap for work with data about applicants for work, and data have not been ciphered.

On the stolen computer there were names, addresses, numbers of social insurance and the resumes sent through the Internet or collected by phone from July, 2006 till June, 2007. Gap has begun the notification of competitors, whose numbers of social insurance have got to the third parties, and suggests to provide year monitoring of credit operations. Now information on use of the stolen data did not act.

Thursday, September 27, 2007

Private Guides in Belgium

Have found a few private guides working in Belgium.

Private Guide in Belgium Mike


40 years of tourism and hotel business experienced. Private guide in Belgium Mike able to recognize his guests, and to give them exactly what they are expecting and to take the appropriate attitude to their personality (history, arts, sites, nature, local gastronomy, etc).

Private guide in Belgium and private tours: Brussels - The Classical Tour, Brussels Arts Nouveaux,WATERLOO : 4 Hours visit,Bruges,Chent Ieper Ypres - Veurne - Diksmuide.

I will drive you in my personal Mercedes E, full options. ( 4 persons max. )

English, French, German, Dutch, Italian, Spanish, Swedish speaking.

---

Private Guide in Belgium Joyce

Joyce is a private driver guide in Belgium and a tourist guide in Belgium who has wide and profound experience in guiding. She would like to introduce her best tours to you: "Bruges guided tour", "Brussels guided tour", "Ghent guided tour ", "Ypres guided tour" and other tours, she also offers port of zeebrugge pick up, tours from zeebrugge, tailor-made tours in Belgium and a la carte tours Belgium that you can go for during your sightseeing Belgium.

Joyce is an expert in Art Nouveau/Deco architecture, Flemish medieval painting, and Gothic architecture and.... Legends! You should not loose your chance of having her as a tourist guide in Belgium during your sightseeing Belgium as following one of her tailor-made tours in Belgium will make your trip not only informative but really unforgettable.

Hm.. Very good testimonials!


What do you think about using of their services and using of private guides services in common?

Wednesday, September 26, 2007

Google: loads of new bugs

In services and products of Google on Monday, September, 24th, 2007, three vulnerabilities allowed the malefactor to execute an any code written in language JavaScript on behalf of a site and to steal requisites of registration record, kept in cookies have been found out, and in one case - to steal photos from online-storehouse. Vulnerability to between-sites scripting (CSS/XSS) have been found out in Google Groups, the search machine and Picasa.

Vulnerability in Google Groups to which at once there was a set of exploits, stealing requisites of access to GMail and sending contents of all mail box, has been eliminated. Exploites worked in four most known browsers: IE, Firefox, Opera and Konqueror. That vulnerability has worked, the victim should pass on specially generated URL, being in mail box GMail.

The second vulnerability of the same type is found out in search machines Google. Exploites, published in Mustlive blog, allowed to steal authentification cookies by means of specially generated URL, the leader on site ICANN and University of York.
The first has been eliminated ICANN, and the second while operates. Search in Google has shown, that approximately 200 thousand sites can be used for attack.

The third vulnerability allows to steal photos with Picasa, having enticed a victim on nocuous a web-page. Though in a basis lays between-sites scripting, for successful attack it is necessary a little making: use Flash, unreliability in URI proceeder and a fake of inquiries at data exchange between appendices. Vulnerability is not eliminated yet, however complexity of its operation will stop hackers for some time.

The previous large batch of bugs in Google has been found out in the end of May - the beginning of June. Then four vulnerabilities to between-sites scripting have existed for a week after detection.

Bug in Google Mail

There was an information about new vulnerability in Google web-mail which allows to organize interception of letters of the user privately. Known researcher Petko Petkov GNU Citizen has found out a bug, by the information from his blog having redirected logined Gmail user on a special site it is possible to create the filter which automatically will forward all messages with attachments on a mail box of the burglar in the mail.

Vulnerability is connected with the wrong data processing, transferred in forms (multipart/form-data POST). Petrkov has not laid out exploit for this vulnerability, however the colleague to whom hw showed breaking Gmail, confirm existence especially marking danger of a such mistake - " exploit works without any interaction with the user and it is absolutely imperceptible, it will be difficult to average user to notice, that its mail steal ". Google is engaged in studying of a mistake.

Friday, September 14, 2007

Condemned spamer struggles for a freedom of speech

One of the most active in the world of spammers Jeremiah Dzhejns sentenced for mass dispatch of advertising letters by nine years of prison, demands to recognize the law on an interdiction of a spam unconstitutional.

According to Dzhejnsa, the interdiction on a spam breaks its constitutional law on a freedom of speech. In due time Dzhejns dispatched on some hundreds thousand letters every day to the electronic addresses taken from stolen databases of companies America On Line and eBay.

In September, 2006 Dzhejnsa have planted in prison, and its sister who, under the version of consequence, helped Dzhejnsu to dispatch letters, has been fined for 7500 dollars.

It is necessary to note, that on rates of dispatches Dzhejns essentially lags behind the the colleague, the arrested person in the USA in May of the last year Alan Soloueja. This spammer offered potential customers dispatch of twenty millions letters for two weeks.

The Australian software producer has brought an action against the Internet forum

The Owner of the Australian site of IT-news Whirlpool has received the summons in court. Software company 2Clix demands from site AU$150000 for the negative statement about its products.

In the claim it is spoken that at a forum of a resource the reputation of the company has been discredited. So, in messages [" Anyone used 2Clix? " (" And what, somebody in general uses 2Clix? "), " 2Clix or Not 2Clix " (" 2Clix or Not 2Clix ")] users state the discontent in occasion of quality of software products, policy of the company, accuse it in a deceit of buyers, informs The Inquirer.

In the USA forums are protected from similar claims by clause 230 " the Certificate about norms of decency in telecommunications " (Communications Decency Act) according to which owners of the resources giving to users an opportunity to leave public messages, do not bear the responsibility for the maintenance of messages. In Australia the similar law is not present.

Wednesday, September 12, 2007

Europarlament is going to ban explosive in the Internet

Recently prevented acts of terrorism in Germany have provoked a new coil of toughening of the legislation directed on struggle against terrorism. Under the official version, three terrorists wished to arrange explosion at the airport of Frankfurt by means of a self-made explosive. Probably, offered innovations turn around of an explosive and planes. According to " the German wave ", the package of the amendments directed on increase of efficiency of struggle against terrorism, has been promulgated by the Eurocommissioner on justice, freedom and safety Ex Frattini.

First of all is offered to create system of the account of explosives within the limits of the European Union, data about which will be brought in special base and will be accessible to law enforcement bodies. Except this it is planned to create system of the emergency notification about theft or loss of an explosive. Whether in this base all European peroxide of hydrogen or ammoniac saltpeter will be considered, not informed. Besides is offered to count all passengers of the planes making flights from the countries of the European Union, having created for them other special base.

In addition, remembering that criminals used a self-made explosive, the Eurocommissioner has suggested to establish the criminal liability for the publication of its recipes on the Internet. However, it is not absolutely clear, as it will help to struggle with the sites, being outside the European Union (we shall tell, in the same America with its First amendment owing to which there there are rather odious sites to close which nobody gathers). Besides eurodeputies are assured of necessity to block an opportunity of corresponding search inquiries.

In general, the question on the responsibility for the publication of recipes of explosives is interesting. In the Russian legislation there are the general interdictions formulated in laws on mass media and counteraction to extremism. However, any sanctions for usual physical persons for it it is not stipulated.

As a result with such recipes struggle usually or militiamen methods of " the telephone right " or hosters, providing an interdiction on an explosive alongside with porno.

Tuesday, September 11, 2007

Soft for iPhone unbloking is on sale

The software for unblocking of mobile phone Apple iPhone has gone on sale. As informs DailyTech, now the utility for removal of a binding iPhone to a network of operator AT&T is offered by four on-line shops - Wireless Imports in the United States, iPhoneWorldwideUnlock in Australia, 1digitalphone in Germany and iPhone4arab in Saudi Arabia.

The software has been developed by participants of the project iPhoneSimfree, and process of removal of protection does not demand entering of any changes into the hardware iPhone. Cost of procedure of unblocking is from 50 up to 100 US dollars. Unblocked by iPhoneSimfree method mobile phone of Apple company can be used in any compatible network of cellular communication.

However, thus the services given exclusively by company AT&T, will be inaccessible. Besides the probability is not excluded, that after installation of updated "insertion" phone again will be blocked.

Monday, September 10, 2007

Google has demanded to carry out reforms in the patent legislation

Google company has demanded to carry out reforms in the patent legislation of the USA, to exclude cases of judicial claims from the various companies with the purpose to receive profit, using imperfection of laws. It is said in the official blog of Google by Michel Li (Michelle Lee), the chapter of a department of patents and patent strategy of the company, and Johanna Shelton, main Google lawyer.

As they said, the patent legislation of the USA is the extremely imperfect and because of it many large companies working in sphere of high technologies have to spend huge money for proceedings.
Possibly, the reason of such application is the last judicial claim from company Polaris IP which has accused Internet-companies among which Google, Yahoo! And Amazon, in illegal use of the patent for technology of processing e-mail messages.

Sunday, September 9, 2007

3 000 000 internet crimes in 2006 year

In 2006 year in the Internet it has been accomplished about three millions crimes, the experts of the company 1871 investigated a crime rate in the Network under the order of firm Garlik consider. On the average, cybercriminal makes a crime each 12 seconds, newspaper The Telegraph cites the given researches.

Law enforcement bodies do not know about 90 percent of similar crimes as frequently or cyber criminal's victims do not know that the law has been broken or consider, that the police will not begin investigate.

The majority of crimes, under version of 1871 is remarkable, that, online-squabbles, such as insults and threats and also their less widespread consequences, for example, blackmail concerns not financial frauds and seeming quite ordinary in life of the network community of elements.

Also experts have counted 207000 cases of financial frauds including using stolen data like numbers of credit cards and bank accounts, 144500 cases of breakings of computers and 850 thousand crimes in sexual sphere, such as uploading of a children's pornography or prosecution of minors.

Tuesday, September 4, 2007

Delphi RAD Studio 2007 is hidden

On Friday, August, 31st, on site CodeGear there were references to full-function version of Delphi RAD Studio 2007. The product was announced under working name Highlander. However, in some hours of the reference have been removed from a site of the company. Nevertheless, they continued to work.

In what the reason of removal of references from page CodeGear and, really-whether is release Highlander-not known. Probably, as it not time happened earlier, a server of the company simply have not sustained loading.

Links

From RussianDay forum

Embassy's e-mails stolen

The Swedish hacker has taken hold of passwords from hundred electronic mail boxes of employees of embassies of the several countries. In this list also the Russian embassy in Sweden.

The hacker has published passwords and e-mail addresses to diplomatic representatives of Russia (embassy in Sweden), Iran, India and of some other states on the web site "DEranged Security".

Uzbek diplomats are the most unlucky: the hacker has published addresses and passwords from e-mails of more than two tens embassies of this country. About how the Swede could take hold of this information, messages did not act yet.

Pensioner is a phone terrorist

Tomsk, Russia.

Pensioner, dissatisfied by the speed of his internet connection has reported by the phone about underming of the building of the local internet provider.

At the saturday the police have received a call about a bomb in the building of TOMTEL company. Immdeiately special forces of police have arrived, but they were not able to find a bomb. The call has turned to be faked. In an hour specialists have found the phone terrorist.

Police reporting: "the phone terrorist is a 60-year pensioner, unsatisfied by service support of his personal PC. Internet connection was slower than he waited for and he had to wait when computer games will be downloaded from the net."

The pensioner will be under the court in the nearest time.

10 the most weird ebay lots

The post from Women's forum Zhensovet

10 the most weird ebay lots

10. The Internet

If people are managed to sell parts of ground on the Moon, why not to sell the Internet? Approximately so the anonymous seller argued, exposing on sale all World Wide Web starting from 1 million US dollars. It could become the transaction of century (if, certainly, someone has bought this lot).

9. The detector of UFO activity

The prototype of this strange device has been created in Brazil. Manufacturers assured that this a little bit improved and altered magnitometr determines activity of UFOs, and its working capacity has been proved when aliens have appeared in the sky above the San-Paolo. The Final price on which lot has been sold - 135 dollars.

8. The meaning of the life

Someone eventually has found notorious meaning of life and on pleasures has exposed it on the auction. As it was found out, on meaning of life you won't earn very much - lot has been sold for 3,26 US dollars.

7. The test model of the Russian spacecraft

This unusual lot has been exposed on sale by one Russian company for the modest sum of 2 million US dollars, however later the price have been removed, having been replaced with a foggy word-combination «the small sum». It is not known, which sum sellers of the copied spacecraft Pine Forest-5 VKK wanted. The maximal rate has achieved 25 200 US dollars, however potential buyers, possibly, has frightened off cost of delivery - 5 000 US dollars.

6. The set of the beginning hunter on vampires

Any hunter on vampires will be satisfied by this stylish set of the beginning hunter: arbalet and arrows with silver tips, aspen picket, a bottle with sacred water and surgical tools. All subjects were in the box, executed of an integral piece of tree, waiting the hour. The Final price: 4 550 US dollars.

5. The dried up head

From jungle of Ecuador directly on the biggest virtual market have been delivered 26 dried up human heads. The highest rate for this lot - 25 US dollars.

4. A ghost in a bottle

The History of this lot is mysterious and surrounded by an aura of romanticism. The seller of lot has found an ancient wooden box during excavation and, having opened it, has found out inside two glass bottles and a diary. One of bottles by accident have been broken and the unlucky amateur of antiquities was shrouded with a black smoke. He has taken away the second bottle and a diary to home and since then, as he said, he was pursued by something, that he named «Black creation». Wishing to get rid of the second bottle (and ghosts at the same time), the man has exposed the second closed bottle on auction. Participants of the tenders so liked this history, that the price of lot has flied up up to 90 million US dollars. However it is not known, whether lot has been got, and whether the buyer was visited by supernatural forces.

3. Rocket Falcon

On auction has been exposed the real rocket, which has not been equipped properly, if be honest. The highest rate - 3 950 US dollars.

2. Nails of serial murder

In 1979 Lawrence Bittejker and Dig Norris have killed 5 person in the Southern California. In 2007 nails of one of serial murderers, Norris's Plenty, have been sold on an auction for only 9,99 US dollars. Nails have been pasted to the christmas card signed by Norris by hand, with a print of his big finger as the signature and confirmation of authenticity of nails.

1. A painting «a Life amazed by illness»

Gloomy enough self-portrait of the man, known under a name "Harold". It is known, that in 2001 to him doctors have diagnosed «a cancer of a brain». Understanding, that he cannot care of the wife any more, suffering from a multiple sclerosis, he has put a double-barrelled gun to her head and has pressed on the cock. Then he has shot. The house in which there was a murder and suicide occured, has been sold and new owners have found out a painting. In the house strange things have started to happen. The dog of new owners howled, hardly having caught sight of a picture, therefore Harold had "to leave" - on auction.

Tuesday, August 28, 2007

Huge problems with Windows Genuine Advantage

Microsoft Windows Genuine Advantage is a software purpose of which is to check the proper licence on copy of Microsoft Windows operating system.

Since Friday's evening (24 aug 2007) Windows Genuine Advantage service was unable to react to user's requests. Many owners of Windows XP and Windows Vista couldn't check the authenticity of their operating systems and, as a result, to receive updates, also some functions in Windows Vista have been disabled.

Microsoft have confirmed the existence of this problem and explained it as problems with WGA servers. Microsoft needed 24 hours to dispose this problem (it was announced before that this error won't be disposed before Tuesday). Microsoft is advising to re-check operating system if users couldn't do it before.

Alex Kokis, the manager of Microsoft have commented such errors in the WGA in his blog.

According to Kokis, the first failures in the Windows Genuine Advantage service have been noticed in the daytime on Friday, but Microsoft experts have identified problem only at the evening. At the saturday's lunch-time all problems were disposed. Kokis wrote that this problem have touched at least 12000 users. Unfortunately, Kokis haven't written about the causes of problems with WGA. But Microsoft's manager pointed that corporation will try to avoid such situations in the future.

AllOfMP3.Com is going on its work

Famous mp3 music online store AllOfMP3.com is going to continue its work. It's announced in the formal blog of the store, posted from 31 august 2007.

I would like to remind that AllOfMP3.com has been closed in July, 2007 because of foreign possessors of the rights and USA authorities. This web-site (like majority of Russian music web sites and stores) offered music using licences of societies of collective management of composer rights in spite of real licences of possessors of rights.

The general director of the "MediaServices" company and owner of the AllOfMP3.com web-site Denis Kvasov has been justified by the court because of absence of crime.

In the formal blog it is not said if the store is going to change the principle of its business.

All in all, such business is legal according to the Russian legislation, but closing of AllOfMP3.com was one of the most important obstacles in the way to WTO for Russia because it's symbolizing the dynamic of Russian market. There are loads of actions against Russian music providers and online stores. It seems to me that AllOfMP3.com is going to continue its work in the beginning of september. Let's see the response from the foreign countries.

Monday, August 27, 2007

iPhone software is hacked

Two groups of enthusiasts have declared a final victory over protection of iPhone which did not allow owners of this communicator from Apple to use operators of cellular communication, except AT&T. The first who have learnt iPhone to work with SIM-cards of all possible mobile operators is the command iPhoneSimFree.com, after them UniquePhones crew have won the protection of iPhone communicator.

The decisions developed by both crews are the first program methods of full unblocking iPhone. In spite of the fact that earlier experts already managed to force iPhone to work in mobile networks of other operators, operation of communicator unblocking has been connected with updating the device hardware or reprogramming SIM-card. Obviously, both operations couldn't be done by ordinary users. Internet-edition Engadget has already confirmed, that offered by the first command, iPhoneSimFree.com, method of iPhone unblocking really works! By means of the program developed by hackers journalists managed to force iPhone to work in mobile network T-Mobile. For activation of phone the program iActivator was used, and work of service YouTube has been adjusted by means of this instruction. Thus communicator regularly called, transferred text messages and worked in the Internet.

Now on a site of a crew iPhoneSimFree.com it is informed on readiness for publication of way to unblock iPhone for everybody. As to the second crew, UniquePhones temporarily postponed release of program for unblocking iPhone. On preliminary data, UF were going to sell the program at the price of from 25 up to 50 dollars for a copy, however release of it is postponed.

According to the same Engadget, it can be connected with AT&T threats to hackers, the provider who has concluded the exclusive contract with Apple.

Microsoft has updated campaign against Linux "Get the Facts"

Corporation Microsoft has cleaned the Internet from the advertising campaign " Get the Facts ", directed against Linux, having replaced it on Web-pages entitled "Compare". On pages of section "Compare" on Microsoft site, as well as in " Get the Facts ", resulted compared data about various advantages of OS of corporation Microsoft (Windows Server) above alternative decisions.

If earlier Microsoft advertising company was organised against Linux-systems (in this case it is considered particularly Red Hat Enterprise Linux), now it is organised against IBM mainframes under control of OS UNIX. Many concrete items/conclusions are accompanied by references to researches and other documents. In comparison of server decisions Microsoft and Red Hat such aspects as cumulative cost (TCO), reliability, safety, opportunities of a choice, administration, interoperability are allocated.

Saturday, August 25, 2007

No Freedom in Russia

There are loads of discussions in the Internet and press about this topic. Being in Russia for a long time I exactly can say that we have freedom only on the paper, only in the theory, in the law. But in the reality all world have seen our "freedom". Do you remember the latest "disagreeing march"? Such actions of Russian citizens are well-known all around the world: different countries such as Germany, USA and others have criticized our authorities and police because there were loads of people beaten by police.

But let's think about the freedom of press, there are so many books forbidden in Russia! Have you aver heard about it? One of bloggers have published a short list of books forbidden in Russia. He's commenting this situation in this way: "If the first three books are seemed to be extremist literature and I can understand why these books are arrested, destroyed and forbidden in our country, but it's impossible to understand being in this list book written by Stanislav Belkovskij "Business of Vladimir Putin". Because if there is a noise about a book this book exactly will be a bestseller!"

Exploring this theme in the Internet I've realised that there are loads and loads of books forbidden in Russia. The main label of site providing forbidden literature online is "You shouldn't allow somebody to decide what you can know and what you can't". I can only consent with this label. Of course, a lot of books should be forbidden for our children, but adult people should decide on their own what they should read.
The biggest collection of forbidden books and films I have seen on this web site. But I do not think that it will be able for a long time to book these books online, on this web site.

The foreign newspapers are writing that we do not have a democracy in Russia and it's really true! How can we have a democracy if all decisions are made by our authorities? It's impossible. The opposition is very appreciated in a lot of civilized countries, also the freedom of press and discussions are the base of the democracy. Now we have only one way to know real news: the Internet. But even there authorities are trying to make a censorship.

The computer pirate is forced to change his OS to Windows

Very curious case has occured in the USA. The former manager of torrent-tracker EliteTorrents having a nickname sk0t (Scott Makkozlend) has been sentenced to five months of prison and five months of house arrest because skot has put on distribution an episode of " Star wars ". He has already been in the prison, time for the second part of punishment now has come. Guy has put on a radiobracelet on a wrist, and authorities decided to install on his personal computer program for shadowing to check all actions of the former pirate through the Internet.

But they have faced a very big problem. It has appeared, that the program for shadowing works only under Windows operating system, but condemned on the personal computer has established Ubuntu Linux. Without thinking twice, authorities have put Scott the ultimatum: or you format disk and establish Windows, or absolutely refuse using a computer.

Such punishment skot did not expect. Being in the prison he has still gone through, but daily use Windows has appeared above his forces. " I have communicated with the lawyer, - speaks Scott, - and we shall struggle with it. I am done not disturbed with the fact, that I will be watched, the matter is that to me will have completely to reconstruct the life (other OS, other programs)... It is simply ridiculous. Why I should be arranged under their software, in fact should be on the contrary? ".

Things you should do in the elevator

Do not forget to do one of these things when you will be in the elevator for the next time:

  • When there's only one other person in the elevator, tap them on the shoulder and then pretend it wasn't you.
  • Push the buttons and pretend they give you a shock. Smile, and go back for more.
  • Ask if you can push the button for other people, but push the wrong ones.
  • Call the Psychic Hotline from your cell phone and ask if they know what floor you're on.
  • Hold the doors open and say you're waiting for your friend. After a while, let the doors close and say, "Hi Greg. How's your day been?"
  • Drop a pen and wait until someone reaches to help pick it up, then scream, "that's mine!"
  • Bring a camera and take pictures of everyone in the elevator
  • Move your desk in to the elevator and whenever someone gets on, ask if they have an appointment.
  • Lay down a Twister mat and ask people if they'd like to play.
  • Leave a box in the corner, and when someone gets on, ask them if they hear something ticking.
  • Pretend you are a flight attendant and review emergency procedures and exits with the passengers.
  • Ask, "Did you feel that?"
  • Stand really close to someone, sniffing them occasionally.
  • When the doors close, announce to the others, "It's okay. Don't panic, they open up again."
  • Swat at flies that don't exist.
  • Tell people that you can see their aura
  • Call out, "group hug!", then enforce it.
  • Grimace painfully while smacking your forehead and muttering, "Shut up, all of you, just shut up!"
  • Crack open your briefcase or purse, and while peering inside, ask, "Got enough air in there?"
  • Stand silently and motionless in the corner, facing the wall, without getting off.
  • Stare at another passenger for a while, then announce in horror, "You're one of THEM!" and back away slowly.
  • Wear a puppet on your hand and use it to talk to the other passengers.
  • Listen to the elevator walls with your stethoscope.
  • Make explosion noises when anyone presses a button.
  • Stare, grinning at another passenger for a while, and then announce, "I have new socks on."
  • Draw a little square on the floor with chalk and announce to the other passengers, "This is my personal space!"
  • Fart loudly then exclaim "Was that you. There's no way I could do that one because unfortately mine don't come out loud."
  • Before the elevator door opens shout "DING" and then laugh and say "beat you again Mr Elevator."
  • Hire a labrador, wear sunglasses and repeatedly walk into the walls whilst pretending to not hear the other passenger's direction

Friday, August 24, 2007

63 ways to infuriate COP (Police Officer)

63 ways to infuriate COP (Police Officer):
(Be careful, it can be dangerous!!)

1. When you get pulled over, say "What's wrong, officer, there's no blood in my alcohol?"
2. When he asks why you were speeding, tell him you wanted to race.
3. When he talks to you, pretend you are deaf.
4. If he asks if you knew how fast you were going, say no, my speedometer only goes to......
5. Ask if you can see his gun.
6. When he says you aren't allowed, tell him I just wanted to see if mine was bigger.
7. Touch him.
8. When he asks why you were speeding, tell him you had to buy a hat.
9. Ask him where he bought his cool hat.
10. Refer to him by his first name.
11. Pretend you are gay and ask him out.
12. When he says no, cry.
13. If he says yes, accuse him of sexual harassment.
14. If the cop is a woman, tell her how ugly she is, but in a nice way.
15. If he asks you to step out of the car, automatically throw yourself on the hood.
16. When he asks you to spread them, tell him you don't go that way.
17. When he puts the handcuffs on, say "Usually my dates buy me dinner first"
18. Ask to be fingerprinted with candy, cause you don't like ink on your fingers.
19. After you sign the ticket and give it to him, say "Oops! That's the wrong name."
20. Bribe him with donuts, and when he agrees, tell him sorry, I just ate the last one.
21. When he comes up to the car, say "License and registration, please" right when he says it.
22. When he goes to read you your rights, sing "La La La, I can't hear you!"
23. Trip and fall into him.
24. Accuse him of police brutality when he pushes you away.
25. Before you sign the ticket, pick your nose. You have to sign with his pen.
26. Chew on the pen, nervously.
27. Clean your ear with the pen.
28. If it's a click pen, take it apart and play with the spring.
29. Ask if he has a daughter. If he says yes, say I thought the name sounded familiar.....
30. Ask him if he ever worked in a prison. If he says yes, ask him how the plumbing was.
31. Act like you are retarded.
32. When he's telling you what you did wrong, start repeating him, quietly.
33. Mumble to yourself.
34. When he tells you to stop, say what are you talkin about, DUDE?
35. Drive to Dunkin Donuts and say hmmm....only 5 of you here tonight.......
36. Ask if they know how to make the donuts.
37. When he comes to the car, say I have a badge just like yours!
38. Ask if he watches Cops.
39. Ask if ever watched Cop Rock.
40. Giggle if he did.
41. Talk to your hand.
42. Ask if he knows somone named Rosy Palm and her Five Favorite Friends.
43. Accuse him of Sexual Harassment if he does.
44. When he frisks you, say You missed a spot, and grin.
45. When he asks to inspect your car, say there is no alcohol in my car, sir, the last cop got it.
46. Try to sell him your car.
47. Ask if you can buy his car.
48. If he takes you to the station, Ask to sit in front.
49. Play with the siren.
50. If you know him, say you had his wife for dinner.
51. If you don't know him, ask if you can have his wife for dinner. Oops...I meant OVER for inner
52. Ask if he ever had pu-tang er.
53. If he asks what it is, point at him and giggle.
54. If there is someone else in the car, talk to each other in tongues.
55. When he acts confused, keep talking, look at him and laugh.
56. When you are in the back, touch his neck through the fencing.
57. Turn your head and whistle.
58. When he pulls out his night stick, say what you gonna do with that.
59. If you are female, say I don't do that on the first date.
60. If he sticks you in the back of the car, cower in the corner, suck your thumb, and whine.
61. Stare at his lights and say "Look at the pretty colors!"
62. Tell him you like men in uniform.
63. Ask if you can borrow his uniform for a Halloween party

Gmail is forbidden in Germany

According to the decision of court, Google cannot use name Gmail in Germany as it breaks trade mark G-mail belonging businessman Daniel Girsh. As specify in Google, the judicial verdict will not prevent to give service of Web-mail in the country which will be offered by the company under name Google Mail. Under the same name Gmail operates in the Great Britain where also was a corresponding brand. Google has put service of Web-mail into operation in 2004, and for today owns trade mark Gmail more than in 60 countries. According to representatives of the company, after promulgation by court of its reasons in favour of decision-making against Gmail in Google still can try to appeal against an interdiction in the Supreme court of Germany. As Girsh informed, he has registered trade mark G-mail in 2000, but Google conducts judicial struggle last three years. Under brand G-mail, as he said, he offers "hybrid" service which unites usual post and e-mail.

Thursday, August 23, 2007

Popular Monster.com hack was carried out from Ukraine

Breaking of the world's largest recruiting site Monster.com, fixed in the end of the last week, has been carried out from a computer located in territory of Ukraine. To such conclusion have come experts from Symantec company which is responsible for the security of web site Monster.com.

Malefactors have stolen about 1,6 million records from Monster database. Though not each of them contained personal information of users of this site, in hands of hackers there were particularies on hundreds thousand person. Administration of Monster has promised "to arrange", however in what they will consist, is not specified yet. Access to databases of site on which placed more than 70 million resume, has been carried out by means of Trojan program Infostealer. Monstres. Users left the following information on: addresses, phones and e-mail; any data of numbers of credit cards and bank accounts was not on the Monster web site.

Malefactors have begun dispatches of letters ostensibly on behalf of Monster with the offer to establish a certain additional module for work with a site. Under a kind of the module hackers try to compel to establish users on the machines espionage programs.

To my mind, each protection system can be hacked, but security companies have to protect user's data. It is simply work of security companies, in this case such company is Symantec. In our real world I can't trust internet my confidential data like number of credit card or something like this because I know that it can be stolen. But when will we be protected completely? Let's wait for the evolution of internet...

Funny signs from around the world

Signs from around the world :D :D :D
From Zhensovet Forum

Cocktail lounge, Norway:
"LADIES ARE REQUESTED NOT TO HAVE CHILDREN IN THE BAR."

At a Budapest zoo:
"PLEASE DO NOT FEED THE ANIMALS. IF YOU HAVE ANY SUITABLE FOOD, GIVE IT
TO THE GUARD ON DUTY."

Doctors office, Rome:
"SPECIALIST IN WOMEN AND OTHER DISEASES."

Dry cleaners, Bangkok:
"DROP YOUR TROUSERS HERE FOR THE BEST RESULTS."

In a Nairobi restaurant:
"CUSTOMERS WHO FIND OUR WAITRESSES RUDE OUGHT TO SEE THE MANAGER."

On an Athi River highway:
"TAKE NOTICE: WHEN THIS SIGN IS UNDER WATER, THIS ROAD IS IMPASSABLE."

On a poster at Kencom:
"ARE YOU AN ADULT THAT CANNOT READ? IF SO, WE CAN HELP."

In a Bangkok temple:
"IT IS FORBIDDEN TO ENTER A WOMAN, EVEN A FOREIGNER, IF DRESSED AS A
MAN."

In a City restaurant:
"OPEN SEVEN DAYS A WEEK AND WEEKENDS."

A sign seen on an automatic restroom hand dryer:
"DO NOT ACTIVATE WITH WET HANDS."

In a cemetery:
"PERSONS ARE PROHIBITED FROM PICKING FLOWERS FROM ANY BUT THEIR OWN
GRAVES."

Tokyo hotel's rules and regulations:
"GUESTS ARE REQUESTED NOT TO SMOKE OR DO OTHER DISGUSTING BEHAVIOURS
IN BED."

On the menu of a Swiss restaurant:
"OUR WINES LEAVE YOU NOTHING TO HOPE FOR."

In a Tokyo bar:
"SPECIAL COCKTAILS FOR THE LADIES WITH NUTS."

Hotel, Yugoslavia:
"THE FLATTENING OF UNDERWEAR WITH PLEASURE IS THE JOB OF THE CHAMBERMAID."

Hotel, Japan:
"YOU ARE INVITED TO TAKE ADVANTAGE OF THE CHAMBERMAID."

In the lobby of a Moscow hotel across from a Russian Orthodox monastery-cemetery:
"YOU ARE WELCOME TO VISIT THE CEMETERY WHERE FAMOUS RUSSIAN AND SOVIET
COMPOSERS, ARTISTS, AND WRITERS ARE BURIED DAILY EXCEPT THURSDAY."

A sign posted in Germany's Black Forest:
"IT IS STRICTLY FORBIDDEN ON OUR BLACK FOREST CAMPING SITE THAT PEOPLE
OF DIFFERENT SEX, FOR INSTANCE, MEN AND WOMEN, LIVE TOGETHER IN ONE TENT
UNLESS THEY ARE MARRIED WITH EACH OTHER FOR THIS PURPOSE."

Hotel, Zurich:
"BECAUSE OF THE IMPROPRIETY OF ENTERTAINING GUESTS OF THE OPPOSITE SEX
IN THE BEDROOM, IT IS SUGGESTED THAT THE LOBBY BE USED FOR THIS PURPOSE."

Advertisement for donkey rides, Thailand:
"WOULD YOU LIKE TO RIDE ON YOUR OWN ASS?"

In the window on a Swedish furrier:
"FUR COATS MADE FOR LADIES FROM THEIR OWN SKIN."

The box of a clockwork toy made in Hong Kong:
"GUARANTEED TO WORK THROUGHOUT ITS USEFUL LIFE."

In a Swiss mountain inn:
"SPECIAL TODAY - NO ICE-CREAM."

Airline ticket office, Copenhagen:
"WE TAKE YOUR BAGS AND SEND THEM IN ALL DIRECTIONS."

A laundry in Rome:
"LADIES, LEAVE YOUR CLOTHES HERE AND SPEND THE AFTERNOON HAVING A GOOD TIME."

Wednesday, August 22, 2007

News from Apple: What it have chosen?



Apple has chosen T-Mobile, O2, and Orange as its European launch partners for the iPhone after wrangling a revenue-sharing agreement, according to the Financial Times.

The four companies are set to announce their partnership by the end of the month, the report said. The deals would require the carriers to share 10 percent of all revenue from voice and data services over the iPhone with Apple, according to the report. Apple has a revenue-sharing agreement in place with AT&T, the exclusive iPhone carrier in the U.S.

No new details surfaced in the report about the type of iPhone that would hit Europe, but most industry observers think Apple has a 3G model in mind for across the pond. T-Mobile provides mobile service to Germany, Orange operates in France, and O2 is based in the U.K.

Apple has said it wants to launch the iPhone in Europe by the end of this year. Tim Cook, the company's chief operating officer, mentioned that Apple wants to start in Europe with "a few major countries," and France, Germany, and the U.K. probably fall into that category.

Monitoring Kids

Parents already have a way to monitor kids' phone calls and text messages, and soon they might have the means to track children wearing school uniforms.

An English manufacturer of uniforms is considering adding satellite tracking devices to its line of school clothing so that parents can locate their child's whereabouts at all times, according to an article from the Daily Telegraph in Australia. The manufacturer, Lancashire-based Trutex, believes there is a demand for such clothing. In a recent survey of its own, the company found that 59 percent of 800 parents surveyed were interested in buying uniforms with embedded Global Positioning Systems.

Still, it seems unlikely that a teenager would willingly wear a GPS-laced outfit. According to the article, only half of kids 12 and under (who were surveyed) said that they wouldn't mind wearing the clothes.

Spamer is sentenced to 30-years imprisonment

The court has sentenced 20-years Christopher Smith, considered to one of the most malicious spamer. Smith has begun the illegal activity several years ago. The Young man dispatched millions electronic messages with advertising pornography and medical products which are released under recipes.

Belonging cyber-criminals the pharmaceutical firm Xpress Pharmacy, engaged illegal sales of medicines, made millions-strong profit. In total Smith realized preparations for the sum of 24 million US dollars. The young man went on expensive cars and lived in magnificent apartments. AOL, the Internet-division of mediagiant Time Warner, initiated the claim against Smith, having accused him in illegal dispatching of advertising.

For the period of trial the court has obliged young man to stop trade in medical products and has frozen bank accounts of spamer. However he, using the counterfeit passport, has left the United States, having tried to renew illegal business in Dominican republic. The court has passed the final decision on Christopher Smith's business, having sentenced the young man to 30 years of imprisonment.


from forum

Russian programmer has been arrested


In the USA Russian programmer Roman Voznjuk has been arrested, writes The Wall Street Journal. He was accused of plundering of initial codes of American company Alibre Inc. Having copied codes, the Roman has returned home where authorities of the USA could not get him. Roman visited USA in the beginning of August. Voznjuk has been arrested on August, 6th in New York where he has arrived from Canada. Right after arrest he has been forwarded to Dallas where 4 years ago source codes have been stolen.

Floor Grejson, the founder of company Alibre, has told, that Roman Voznjuk was software developer up to the end of 2003. Then because of recession of demand for production Alibre he has got under reduction. After that Roman has returned to Russia as could not find other work in the USA.

Grejson marks, what source codes were exactly on the Russian servers for the first time. The source codes of RaceCAD - programs for spatial modelling and creation of virtual prototypes of various objects and products. Grejson speaks, that after detection of source codes in the Network has contacted Voznjuk and has demanded from it to stop distribution of codes, however correspondence in what has not resulted. Then Alibre has decided to bring an action. The court will be today - the lawyer of Roman will achieve its clearing on the security.