Tuesday, July 26, 2016

Recent price AKG K142HD 64 95

Recent price: AKG K142HD. 95

AKG K142HD is listed in 08, also has to be a certain amount of years, positioned in the high-end monitor, with 40mm units, Velvet ear muffs and Austria custom made. Parameters are the 55 Ohm impedance, 101dB sensitivity.

Dolce Gabbana Cases

AKG K142HD low price $ 64.95, about the 400 yuan renminbi, the domestic price 599 yuan, 200 dollar price advantage is quite worthy of consideration. Dolce Gabbana Cases Dolce Gabbana iPhone plus Case

Purchase address

Tuesday, July 19, 2016

NET cloud loophole was closed overnight official response Public display pictures

NET cloud holes are closed, the official overnight in response to

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

The evening of July 19, 2016 news, well-known microblogger "Internet that something" issued at 11 o'clock in the evening news, said well-known white hat community cloud "out of business". Lei feng's network (search for "Lei feng's network", public interest) Edit immediately access the clouds official website page can not be found open, information display: is being upgraded.

Clouds, nearly 12 points on the night, officials issued a statement telling: clouds and related services are being upgraded.

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

However, less than 1 month before, one white hat presented to the cloud platform dating website jiayuan was arrested by the authorities after a vulnerability. This incident has not completely faded today.

At the same time, vulnerability and positioned close to the clouds, white hat communities box issued a statement, saying: Pause receiving Internet vulnerability and threat intelligence, Internet vulnerability and threat intelligence processes in the project system, the standard sort. On clouds and white hat community the "transient" stalled further progress, please pay attention to subsequent reports, Lei feng's network.

Baidu AI public display of music ability

Sohu technology Vans iPhone

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

The evening of July 19, joined Baidu ullens Center for contemporary art (UCCA) organized the "AI technology and the arts night" activities. Through artificial intelligence techniques, United States artist luobote·laosenboge (Robert Rauschenberg), two of the legendary masterpiece of the miles one-fourth paintings, and piano composed by more than 20 seconds, respectively, realize the transformation of Visual presentation to the hearing to express. This is Baidu's first attempt to apply artificial intelligence techniques combined with the Visual Arts and music.

In addition to the paintings of Rauschenberg, Robert, Van Gogh's the starry night, Xu Beihong running horse is a machine created by raw materials. It is reported that Baidu show the pictures of artificial intelligence music technology, through its world's largest neural network and deep learning algorithm implemented by machine learning.

Baidu neural network to "see" the image, first of all, to analyze and interpret the images, playing a number of visualization for the image tag, and then by searching for music information related to mining the music split restructuring, synthesis and image content that matches the music, eventually spliced into a full song. However, Baidu technician said, composing level of neural networks are still in their infancy, and chords in music part is implemented by human intervention. case iPhone Vans

Vans iPhone

Tesla's name changed to Tesla.com plot plan

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

Electric-car maker Tesla (Tesla Motors) teslamotors.com company domain name has been changed to Tesla.com, meant as a corporate secret "big plan" part of Tesla may change. According to the ICANN domain name management agencies according to Tesla from on Monday officially opened the new domain name Tesla.com. At present, teslamotors.com old domain name will be redirected to the new domain name.

Tesla.com the domain name is the Tesla in February this year is just to recover, before the domain name has been situ·geluosiman by a Silicon Valley engineer (Stu Grossman). Grossman 1992 bought the Tesla.com domain name, but has not been used in the next 24 years.

Tesla CEO ailong·masike (Elon Musk) on 10th of this month issued a Twitter message said he is working on a story about Tesla's "number one big plan", and is expected to be released within the next week. But so far, musk did not disclose the plan.

Apple patent suggests that there will be support LTE network for MacBook

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

According to United States Patent and Trademark Office, according to a new patent, Apple is secretly build a MacBook laptop that can connect 4G LTE network.

Since LTE network to connect, it must be equipped with an antenna. According to the description of Apple in patent documents, they will design a can be integrated in the antenna on the MacBook casing, like the rumored iPhone 7. This will effectively solve the problem of user outdoors does not have Wi-Fi. It is understood that this patent was submitted only after Apple entered the 2016.

Jobs in 2008, acknowledged that Apple really meant to put cellular network supports the MacBook, but it may make MacBook product line more confusion, Apple finally dismissed the idea.

Will be for the next generation of New York subway with free WiFi and USB charging port

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

The afternoon of July 19 news, the New York subway system is planning major reforms, plans by 2020 to introduce a modern lighting effects, guide signs and subway trains will be equipped with free Wi-Fi and USB charging port.

At a news conference on Monday, New York State Governor Andrew Cuomo (Andrew Guomo) announced that the Metropolitan Transportation Agency will invest 27 billion dollars in the next 5 years for 1025 metro cars, more digital information screens, better security features and in carriages and stations equipped with Wi-Fi and USB charging port.

"People want to work and want their devices 24 hours a day. "Como Transport Museum at an event in New York, the Governor said," they don't want to look, you must have Wi-Fi, also must have the charging port. "

Sesame launch credit "Ganoderma lucidum" system provides enterprise-level credit information services

Phoenix Technologies

NET cloud loophole was closed, overnight official response! Public display pictures music Baidu AI | Lei feng's morning news

On July 19, Sesame through credit business credit announced it had filed, exclusive research and development of small and micro enterprise credit insight "Ganoderma lucidum" system, launched cloud business credit reports, risk, credit scores and indices, watch list and risk monitoring and early warning of the five products, would provide credit services for small and micro businesses.

Due to the lack of credit histories and collateral, and no complete credit information, small and micro enterprise credit assessment is difficult. Credit Sesame the Chief data scientist Yu Wujie expressed, "Ganoderma lucidum" system have access to industry and commerce, the judiciary, customs, tax, carriers, enterprise data sources, and achieved a small micro-enterprise credit of one-stop data access.

"Ganoderma lucidum" systems also have cat, Taobao, Alipay, covering millions of merchant trading, logistics, customs, import and export data. These multi-dimensional data can be turned into the small micro-enterprise credit holographic portrait.

It is reported that once the data source has updated, Sesame credit will immediately update to the Bank and other partners, for the first time will be able to identify risk.

Tuesday, July 12, 2016

Windows8 1 preview of the trial

Windows8.1 preview of the trial

Build 2013 Conference, Microsoft released new Windows 8.1, this new system is released, most people excited is the "Start button" to return. Also the new system supports multiple tasks of split-screen display, built-in Xbox Music, have a whole new Outlook, has a touch-screen version of the Office. On the right, the new system is the first operating system that supports 3D printing.

Return of the Start button

The new system declared that "Start button" will return, which attracted the attention of many older users. And after a little public inquiry, concluded that we had imagined click "Start button" effect should be like this.

iPhone 5 Disney case

Windows8.1 preview of the trial

Imagination will bring up the "start" menu (currently you can plug-in to achieve the effect)

Though still the default Win key as "start" keys, but this time we activate "Start button" brings up is not the traditional start menu, but a Metro interface. If people think that you can "Start menu" on the back of operating habits, then the "Start button" return may let you down.

Windows8.1 preview of the trial

Click on the "Start button" enter the Metro interface iPhone 5 Disney case

Multi task split-screen display

The new system, supporting multiple tasks synchronized split screen display, only practical question.

Windows8.1 preview of the trial

Built-in Bing news

Windows8.1 preview of the trial

Using split-screen display multiple task

Built-in Xbox Music

New version of Xbox Music adds music features, we can use the radio to listen to your personal music collection list and will get music recommendations from the system.

Windows8.1 preview of the trial

New XBox Music haven't experience Disney iPhone 5 Case

IE 11

IE in Windows 8.1 and 11 finally meet you support WebGL technologies, as well as 3D.

Perhaps Microsoft IE11 appears in a new attitude in front of everyone, and to provide users with a more powerful performance, but I'm sorry, use IE to download a Chrome, it has become an attitude of many users.

Windows8.1 preview of the trial Windows8.1 preview of the trial

IE 11 began to heed good advice, while indicating that a new attitude, but we can't deny that was a little late this time for several beats. Of course, "wait" is something we are most willing to do.

Tuesday, July 5, 2016

Hackers blackmailing backup file extortion from antivirus software It s not

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

    

In parallel with the development of network technology, a series of malicious software has been derived. Ransomware is hackers to hijack users assets or resources and as a condition to extort a malware to the user. CryptXXX has a variety of very hot lately, the new version of CryptXXX has become more aggressive.

Currently there are no solutions

New CryptXXX Ransomware not only encrypt the destination user's computer and all the files on the network, users are also unable to use data backup to restore the files--this is one of the most important features of the new CryptXXX upgrade.

Kaspersky Lab security researchers have been struggling with CryptXXX: previous researchers had published a decryption tool, the victims don't need to pay a ransom to restore their own files if no decryption tools, victims need to pay at least $ 500 to decrypt the file. CryptXXX developer found after Kaspersky's move, also begin to adjust program code makes it harder to break into. Recently developers have released a new version of CryptXXX. Security SentinelOne this company mentioned in a blog post Monday, June 4-June 21, the new version has reached the total ransom 45228 dollars, of course, this does not include the income of the previous version.

When actually as early as May 21, CryptXXX developers of the malware code is updated to version 3.0. The purpose of this update is to prevent Kaspersky launch RannohDecryptor decryption program, free unlocking the encrypted files.

New version CryptXXX is still supported to encrypt a single file, but the file size limit in the 512KB. New versions of the main improvement is difficult to crack a lot. Other improvements included, than before. and crypz. crypt suffix, suffix version CryptXXX build encrypted files into the. crypt1; there is previously mentioned, delete shadow volume the volume of the system back up, prevent data can be restored from the backup. In addition, its communication is conducted through the spam, but SentinelOne said, hackers may also use other ways of communication.

Analysis of the new CryptXXX

View a malicious DLL file properties file properties details found it actually comes from a legitimate file called _BigBang.dll, details of both are essentially the same.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

Details from the files, didn't see anything unusual, so that it looks just like a normal program. Previous CryptXXX samples will be disguised as legitimate DLL file from Microsoft. From unpacker imports, most of the content seems no problem, occasionally some vocabulary related to crypto encryption. Judging from list of imports and exports, many functions are related to image processing (and the above mentioned legal _BigBang.dll is certainly not the same), there seems to be no eggs used, these should be used to hinder analysis.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

   

Unpack process is by VirtualAlloc allocates memory as an encrypted payload, and then copy the encrypted bytes. Then decrypt the payload, but it is still compressed.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

   

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

   

Based on the experience of a version where you can look for "MZ" header, but found the "M8ZP8" part and read the string "This? Progr3am ... ", but this is normal for Windows executable. M8ZP8 consistent with the aPLiB compression PE files.

Click here to view a Python script, which has its compression algorithm implementation, and run the technical description for details. First fragment of memory dump contains compressed payload, trim the null byte, use this Python script extracted successfully. Resulting file analysis with IDA, is in fact not complete and does not contain a valid import table (import table).

After you decrypt the payload, unpacker creates the file C:\PROGRA~2\Z (c:\ProgramData\Z), the file Kernel32. GetFileType to verification, check for FILE_TYPE_CHAR. If it were, in the case of execute malicious payload, the code ends. Subsequently, the current time, file name, and \r\n, writing to the z files. That looks like the following:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

   

Shortly after the write strings to a file, the file will be deleted. Not sure why you want to do may be to interfere in the analysis process.

Unpaker queries the registry to confirm that the Startup location:

SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Shell Folders\Startup

Jack Spade iPhone 5 Case

C:\Users\ \AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup (Win7 context path)

The role of this position is very clear, Unpack the code inside HTML blackmail letters focused on the process of this is extortion.

From the analysis of the sample, from a. Ink the shortcuts perform, the shortcut Rundll32.exe F0F3.tmp.dll,MSX3. Here, behind the MSX3 is an additional parameter, this command F0F3.tmp.dll is loaded, subsequent MSX3 function. MSX3 function unpacker does not actually exist, so it must be part of the payload.

So there is likely to be dumped by calling the VirtualProtect unpack after the payload. Since it requires the MSX3 the address of the function, I set a breakpoint in GetProcAddress.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

MSX3 address back, execution jumps to the address, file encryption, blackmail begins.

Seems to be payload compiled with Delphi, known from the following information. From the list below, some imports seem to be using DNS, POP3, and SMTP protocols. But these functions compared to MSX3, should be invoked by a different entry point.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

Eventually, Ransomware locked files using RSA and RC4 encryption, encryption file extension after. cryp1, previous versions of the extension. crypt. As mentioned earlier, the previous version can decrypt the decryption tool, but the new version will not be achieved.

Inside each folder that contains the file that is encrypted with extortion. One is a text file, another is the HTML format. Text forms of extortion are the following:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

As mentioned earlier a new version CryptXXX added new feature: file encryption, backup of all files on the disk will be deleted, prevents users from using a file recovery this trick.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

Blackmail information is displayed on the screen looks like this:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

In order to alert the user that the seriousness of the problem, CryptXXX

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

Path, created .html and .bmp files. Also blackmail, but mentioned above are slightly different, and will appear after you restart the computer:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

Takes you to the payment page, the page will be for victims to fill out the appropriate information, Ransomware is assigned ID:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

After you log in with the ID, the following page is displayed:

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

If victims have never heard of coins, or will not be paid for with coins, so it does not matter, this page will teach you how to do the following.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

In order to prove that they are indeed provide a decryption services, this page is primarily intended for decrypting services for victims of the trial (service very close), but this so-called trial service, decrypt the file size limit in 512KB.

Hackers blackmailing: backup file extortion from antivirus software? It's not that simple

       

Prevent rogue blackmail software recommendations

Ransomware to avoid infection, as well as other malware. Keep the browser and Windows-related components (Java, Adobe, etc) get the latest updates. In addition, to keep the browser clean, attention can lead to infection of malicious adware prevention of intrusion, and don't open unknown email attachments easily. This version of the CryptXXX have the ability to delete shadow volume the disk backup file, then you may actually consider backing up important files to a different location. Jack Spade iPhone 5 Case Jack Spade iPhone 5 Case

Lei Feng network Note: article source: arstechnica, and sentinelone, compiled by the rice ball-June, FreeBuf exclusive article authorized network of Lei Feng (search for "Lei feng's network" public concerns), published, reproduced, please indicate the source (FreeBuf.COM FreeBuf hackers and geeks).