Thanks for the ping, Mama Dearest.
http://www.freerepublic.com/focus/f-news/2048605/posts
“VINCE FOSTER’S DEATH (15th anniversary on July 20)”
boogieonline ^ | July 2008
Posted on July 20, 2008 7:42:23 PM PDT by doug from upland
Papua New Guinea angry with Canada
Snippets: The incident began July 4, when the dancers arrived in Vancouver, British Columbia, on the invitation of the Little Shushwap Indian band, the Canadian Broadcasting Corp., reported Tuesday. After four hours of questioning by border agents, the group was denied entry, as officials said they suspected the dancers intended to overstay their monthlong visit despite their return tickets, the report said.
"We will refuse to let Canadian companies come in here or meet with the appropriate people and I know there are a lot of oil licenses pending on that, so it'll cost Canadian companies a lot of money," Smith-Kela said.
Major security flaw discovered - internet privacy compromised at all levels
Yesterday, details were leaked of possibly the single largest threat to Internet security. Earlier this year, Dan Kaminsky, director of penetration testing for IOactive, discovered a major flaw in how Internet addresses function. The issue is in the design of the Domain Name System (DNS) and is not limited to any single product. An attacker could easily take over portions of the Internet and redirect users to arbitrary and malicious locations to engage in identity theft. For example, an attacker could target an Internet Service Provider (ISP) replacing search engines, social networks, banks, and other sites with their own malicious content. Against corporate or government environments, an attacker could disrupt or monitor operations by rerouting network traffic, capturing emails and other sensitive data.
Kaminsky immediately reported the issue to major authorities, including the United States Computer Emergency Response Team (part of the Department of Homeland Security), and began working on a coordinated fix; a patch was released July 8th, 2008. Chris Davis, CEO of Ottawa-based Defence Intelligence, has been working in coordination with Kaminsky to brief key agencies in the Canadian government. Details of the vulnerability were to remain a closely held secret until Kaminsky's public presentation on August 6th, 2008 in order to provide organizations with enough time to protect themselves. However, this window was drastically reduced due to the accidental posting of the details by an uninvolved party.
Papua New Guinea angry with Canada
Snippets: The incident began July 4, when the dancers arrived in Vancouver, British Columbia, on the invitation of the Little Shushwap Indian band, the Canadian Broadcasting Corp., reported Tuesday. After four hours of questioning by border agents, the group was denied entry, as officials said they suspected the dancers intended to overstay their monthlong visit despite their return tickets, the report said.
"We will refuse to let Canadian companies come in here or meet with the appropriate people and I know there are a lot of oil licenses pending on that, so it'll cost Canadian companies a lot of money," Smith-Kela said.
Major security flaw discovered - internet privacy compromised at all levels
Yesterday, details were leaked of possibly the single largest threat to Internet security. Earlier this year, Dan Kaminsky, director of penetration testing for IOactive, discovered a major flaw in how Internet addresses function. The issue is in the design of the Domain Name System (DNS) and is not limited to any single product. An attacker could easily take over portions of the Internet and redirect users to arbitrary and malicious locations to engage in identity theft. For example, an attacker could target an Internet Service Provider (ISP) replacing search engines, social networks, banks, and other sites with their own malicious content. Against corporate or government environments, an attacker could disrupt or monitor operations by rerouting network traffic, capturing emails and other sensitive data.
Kaminsky immediately reported the issue to major authorities, including the United States Computer Emergency Response Team (part of the Department of Homeland Security), and began working on a coordinated fix; a patch was released July 8th, 2008. Chris Davis, CEO of Ottawa-based Defence Intelligence, has been working in coordination with Kaminsky to brief key agencies in the Canadian government. Details of the vulnerability were to remain a closely held secret until Kaminsky's public presentation on August 6th, 2008 in order to provide organizations with enough time to protect themselves. However, this window was drastically reduced due to the accidental posting of the details by an uninvolved party.