Jump to content

hotmail


NTM

Recommended Posts

  • Replies 33
  • Created
  • Last Reply

Top Posters In This Topic

Top Posters In This Topic

WTF? The White House doesn't back up it's computers every night? I find that hard to believe. Maybe I just missed the obligatory "we back up to tape even though tapesucks.com" in the article?

 

it's called destroying evidense honey.

 

hey looky, history repeats itself:

 

 

While Nixon continued to refuse to turn over actual tapes, he did agree to release edited transcripts of a large number of them; Nixon cited the fact that any sensitive national security information could be edited out of the tapes; it was also speculated that the tapes may have contained both foul language and racial slurs, which would have worsened Nixon's image. The tapes largely confirmed Dean's account, and caused further embarrassment when a crucial, 18½ minute portion of one tape, which had never been out of White House custody, was found to have been erased. The White House blamed this on Nixon's secretary, Rose Mary Woods, who said she had accidentally erased the tape by pushing the wrong foot pedal on her tape player while answering the phone.

 

 

and put a :pagetop: on that next time

Link to comment
Share on other sites

April 12, 2007 (Computerworld) -- A massive spam outbreak that tries to trick recipients into opening a file attachment that can hijack their computers has already broken records, security companies said today.

 

According to researchers at Postini Inc., the spam run is the largest in the last 12 months, and more than three times the volume of the two biggest in recent memory: a pair of blasts in December and January. "We're seeing 50 to 60 times the normal volume of spam," said Adam Swidler, senior manager of solutions marketing at Postini.

 

Arriving with subject headings touting Worm Alert!, Worm Detected, Spyware Detected!, Virus Activity Detected!, the spam carries a ZIP file attachment posing as a patch necessary to ward off the bogus attack. The ZIP file, which is password protected -- the password is included in the message to further dupe recipients -- actually contains a variant of the "Storm Trojan" worm, which installs a rootkit to cloak itself, disables security software, steals confidential information from the PC and adds it to a bot army of compromised computers.

 

Irony, it seems, isn't lost on the attackers. "This is really a self-fulfilling prophecy," said Swidler, "by warning users about a worm attack to get them to click on a worm."...

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.




×
×
  • Create New...