Recent Posts

Pages: [1] 2 3 ... 10
Suggestions / Re: Signature add on?
« Last post by plodr on Today at 01:32:45 PM »
Code is wrong

remove the = and replace with a ]
at the end add a close tag, which is [/img] but first remove the ] after gif
LandzDown Lounge / Re: Related Word
« Last post by Pete! on Today at 12:50:19 PM »
LandzDown Lounge / Re: Word Association
« Last post by Pete! on Today at 12:49:42 PM »
LandzDown Lounge / Re: 2 Word Game
« Last post by Pete! on Today at 12:48:08 PM »
Independence hall
Suggestions / Signature add on?
« Last post by hayc59 on Today at 12:43:49 PM »
trying to add image to my sig
why wont it take? thanks
Summary: Drupal has issued a highly critical announcement that unless Drupal installs were patched against the latest SQL injection attack within seven hours of its unveiling, the site should be considered compromised.

Drupal's security team has released a "public service announcement" calling upon all users of the Drupal content management framework to consider their sites as compromised, and to start afresh, unless their sites were patched against the SQL injection attack revealed two weeks ago within seven hours of the announcement of the vulnerability.

Full Article -
Wow. I'm starting to feel like the person who replied to the Wired article.

Quote: "To keep your computer data totally safe, turn the computer off and disconnect it from the internet. It will be safe until the computer is stolen or confiscated."

Have to admit, the Petraeus trick is a cool one. It never dawned on me, yet then again, I don't sneak around on the wife.

Typing from my Mac.
LandzDown Lounge / Re: Whats your Halloween Avatar
« Last post by hayc59 on Today at 05:35:38 AM »
Here is mine in all its glory and it will change fo sure ;)
I have lots
In his career-ending extramarital affair that came to light in 2012, General David Petraeus used a stealthy technique to communicate with his lover Paula Broadwell: the pair left messages for each other in the drafts folder of a shared Gmail account. Now hackers have learned the same trick. Only instead of a mistress, they’re sharing their love letters with data-stealing malware buried deep on a victim’s computer.

Researchers at the security startup Shape Security say they’ve found a strain of malware on a client’s network that uses that new, furtive form of “command and control”—the communications channel that connects hackers to their malicious software—allowing them to send the programs updates and instructions and retrieve stolen data. Because the commands are hidden in unassuming Gmail drafts that are never even sent, the hidden communications channel is particularly difficult to detect. [...]

I see only one attachment.  That is the 2nd to the last. the last shows the results of a search 3E1X9F88.

I will send the others I captured again. I sent 3 and one or more may be duplicates.  I can't tell what you have.

I am done for tonight.  Thanks for your support. 

Pages: [1] 2 3 ... 10