announced MEGAchat tests. Browser-based end-to-end encryption of audio and video chat: https: // at the beginning mega.nz] Twitter's Olhar numbers: Kim Dotcom lançaconcorrente do Skype - & - released by kaspersky.com ---''Twitter march Certification: SMS instead of the password?!" - & - by Cyper Kendra released '' uTorrent quietly installs BitCoin Mining Software! '' - & - issued by hotforsecurity.com ---"A bad week !! cybercriminals Britain! "-&- released by netresec.com 'Chinese MITM analysis on Google!?''-&- by ourlove520.com release of" pre-installed software on flooded Samsung Huawei Heibang !! "[article entry: Anonymous,,Editor : admin,,Update Time: 2015-3-7] -
---由自由時報報導的(1).伊拉克反攻IS,,兵分三路出擊!-(2).丟掉親生兒,,中國棄嬰變多,,每年10萬人!-(3).〈社論〉中國找台灣媒體洗腦真可釋疑?-(4).不准報導穹頂之下,,洩密員工遭停職!-由NTD,,新唐人電視台報導的(5).【热点互动】《穹顶之下》火爆: 雾里看花- 由BBC報導的(6).西非馬里首都巴馬科襲擊事件造成五人死亡 !-(7).美十億電郵數據被盜案:檢方起訴涉案黑客!--&- [MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz ]Twitter的Olhar數字:金·達康lançaconcorrente做的Skype?!-&-由kaspersky.com發佈的---Twitter的進軍認證:短信代替密碼 !-&-由Cyper Kendra發佈的''uTorrent quietly installs BitCoin Mining Software!''-&-由hotforsecurity.com發佈的---"一個糟糕的一周英國網絡罪犯!!"-由netresec.com發佈的''中國MITM對谷歌分析!?''-由ourlove520.com發佈的"预装软件泛滥成灾 三星华为上黑榜!!"[文章录入:佚名,,责任编辑:admin,,更新时间:2015-3-7]-
**All The World City / Country Lauguage**-
By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!
http://news.ltn.com.tw/news/world/paper/859415
Iraqi troops in three columns IS offensive attack
Iraqi security forces and Shiite fighters gathered in the north of Baghdad a day, chanting slogans, prepare advance toward Tikrit. (Reuters).
2015-03-03.
So far the largest offensive
[International Press Centre / roundup] Iraqi forces consisting of about three million people, the second day of the Shiite militia forces, troops in three columns, land and air hand forward dictator Saddam Hussein's hometown of Tikrit (Tikrit) advance in an attempt to regain lost territory from the Sunni militant group "Islamic State" (IS) hands. This is the Islamic State of Iraq last June seize half the territory of North and tries scored since the Iraqi capital of Baghdad, Iraq, in Salahuddin province (Salahuddin) largest military action.Jordan's King ︰ confrontation IS just like a third world war
In the meantime, Jordan's King Abdullah II told the US Cable News Network (CNN) interview, when the Western world for the moderator should ask how to deal with IS noted that "The extent, this is a third world war Muslims, Christians and other religious believers must unite to participate in this war. "On the 2nd morning, the Iraqi police, anti-terrorism forces, militias "mobilize the people" (Hashid Shaabi) and local anti-Islamic tribal Sunni country, with the cover of air strikes, launched an offensive; troops in three columns towards Tikrit, South Doyle (Ad-Dawr) and north Alan (Al-Alam) advance, warplanes, helicopters and artillery volley, on the one hand to cover the troops advancing on the one hand cut off supply lines. Located near Tikrit in northern Iraqi bases with offensive raid Tikrit city stronghold of the Islamic State.
Military sources said that Iraq sent warplanes in action, the US military said that, did not participate in the action. But the offensive launched after a few hours, the Iraqi army is still unable to enter Tikrit, visible, there should have to fight this battle.
Iraqi forces military progress in Salahuddin province, will greatly affect more Iraqi troops north of Iraq to regain the country's second largest city of Mosul plans. US officials said the fastest will launch a joint offensive in Mosul locking April, but officials declined to confirm the Iraqi national schedule.
Tikrit, about 130 kilometers from Baghdad, lies at the hub of Mosul, the largest city of the seizing of the Islamic State, also a Sunni town. After last year's offensive throughout the Islamic State of Iraq soon, hundreds of recruits to the Shiite majority in Iraq, at a military base near the city of Tikrit, killing of Sunni tribes are considered suspects, Shiite militia immediately vowed revenge. Iraq last year after losing Tikrit and Mosul and other cities, many times offensive, an attempt to regain lost ground, but they are lost.
Abadi day with Iraqi Prime Minister visited the city of Tikrit, Samarra same when Salahuddin province (Samarra), announced that it will expand the offensive. He called on the Sunni tribes to abandon the Islamic State, which was known as "the last chance" to lay down their arms, if not from "the punishment for supporting terrorism."
Shiite majority in Iraq since many years and a few extreme Sunni opposition, so the Sunni tribes to participate in this significant, but the Shiite troops entered Sunni areas, it may bring the opposite effect.
Jordan's King Abdullah II told CNN in an interview that the future will be in Arabic "Dayi Sha" (Daesh) called the Islamic State, in order to avoid giving the organization's legitimacy. "Dayi Sha" is pronounced "trample" the same, highlighting the international community's anger and contempt for the Islamic State.
===================================
http://news.ltn.com.tw/news/world/paper/860044
China abandoned baby birth child becomes lost more than 10 million people each year
2015-03-05.
[International Press Centre / roundup] compare competing Chinese people travel abroad birth, Chinese National People's Congress, the State Science and Technology Institute of Health and Family Planning Commission director 24 Ma Xu said China each year about one hundred thousand babies abandoned , to one's 九八 ○ grow two times, in which 99% of people with disabilities illness, abandoned children has become a major social problem.
99% of people with disabilities illness
Ma Xu said that one 九八 ○ years, the number of abandoned children in China each year about 5,000 people, nine ○ five million years; the latest statistics show, now abandoned children has reached thousands of people with an average annual growth of nearly twenty times failure to take relevant measures, the number probably will continue to rise. Abandoned babies, 99% of people with a disability disease, birth defects are increasing year by year, over 70% margin. Therefore, compared to rescue abandoned, but should pay attention to the prevention of birth defects.To rescue abandoned, Chinese Ministry of Civil Affairs 二 ○ 一 三年 established in dozens of cities' abandoned babies refuges ", receiving abandoned children; With rising number of abandoned children, abandoned children saturation Island crisis, many abandoned babies Island faced with a shortage of funds and other issues. Last year, the Guangzhou island abandoned babies start forty-eight days only to receive two hundred sixty-two abandoned, overload, forced to call a halt.
Statistics show that China's annual birth defects child about nine hundred thousand cases every ten thousand births, one hundred forty-nine. Nine people with congenital defects. Ma Xu admitted that the current status of the atmospheric environment, does affect birth defects; he suggested, for the prevention of disability screening by the government foot the bill, such as the introduction of free maternal prenatal screening. As for the full liberalization of the two tire problem, Ma Xu revealed that this policy will continue to study this year, the pilot should not be fully open a second child.
See More! Please join Liberty Times fans
=====================================
http://news.ltn.com.tw/news/opinion/paper/860166
<Editorials> China find Taiwan media
brainwashing arguably doubts?
Chinese National People's Congress opened today, yesterday's press conference China has asked the old question of how much this year's People's Liberation Army's military growth, the answer is ten percent, and last year more than twelve percent. Every year by the international media to ask these questions, Congress spokesman obviously very unhappy, he said, this year is no different from asking "why" to increase military spending. China's huge defense budget increases every year by the national concerns of the reason, of course, has a long history, as the NPC population speak out "bullied" the lessons of history, "we will not forget." Like, chill, not peace.
This era except for some terrorist organizations, government officials have been very few countries officially 宣达政 policy when put such resentment uneven posture. China's "Rise of shame," so "Kudachoushen", it is difficult for the Communists, always be put on public display Leather hedgehog-like, not only catches the eyebrows, it is difficult to reduce everyone's impression of China's de facto.
Emphasis on increasing military spending in Congress aims to let the Chinese people can concentrate on production, ease of life at the same time, there are towering pile of things happened. US Federal Bureau of Investigation (FBI) officers recently in California illegal confinement center on a large scale raids, turned out quite all the Chinese bourgeoisie number of women in order to give children the right of abode United States, have to go to the United States through underground pipes production, is now seen as the US government is a major event affecting the national security of the United States Customs and Border Protection has even posted a notice will be fully carried out on pregnant women immigrants strict trial, where there is danger of a visa valid for those of production, fear of being banned from entering the United States.
China's economic development by supporting the growing military spending, causing fear militaristic neighboring countries, is to defend the country under the pretext Weimin, but China has rich exodus to the United States as "American Dream," Sam got the degree of flooding Uncle To close the border point. This is really big shame, China's National People's layout and the layout of the Chinese seem diametrically opposed small intersection, weaving "China Dream" in Beijing regime Should not think this is why?
From this point of view the development of cross-strait relations contradiction, with regard to the original one-sided today announced the opening of M503 route, for example, now westward extension to resolve the rebound and Taiwan, have expressed dissatisfaction with horsehair system is acceptable, in turn, become The new M503 defense staff and commentator. It's like Zhuangzi ramshackle, four twilight towards Fable III, the monkey smile through tears. If the Chinese authorities to see that the Taiwan government's response to get this, it would be wrong, because the people of Taiwan is not a monkey, of course not, as China's Taiwan Affairs Office said politicized and paranoid.
Because, to take military action against Taiwan China may be in black and white after Congress passed. Politically, the Chinese leaders propaganda "peaceful development", but do not let go, "renounce the use of force"; in law, the so-called anti-secession law, has long been the construction of the legal basis of force against Taiwan, Xi took office also did not revocation, visible with Xi Hu regulation; in the military, deployed missiles opposite Taiwan continues to increase, the PLA exercises routine implementation of targeted air and sea blockade, amphibious landing operations, mountain warfare, urban warfare project does not fall; in particular, Taiwan often cracked a total spy case, actions endanger Taiwan's security is underway. These are further scientific evidence, however, did open the East China Air Traffic Control District to Taiwan media tour to doubts of brainwashing?
Existing A470 route congestion, low normal flight is one thing, not obtained the consent of Taiwan announced that M503 route is one thing, deliberately close to the Strait of midline is one thing, the three things that earlier path planning is to route a going on, these four things confuse the people of Taiwan will be able to stir the brain paste? See China's military spending and then break the table, Chinese women to the United States to produce these phenomena, probably not so simple. This is the reason why the sensitive waters of the Taiwan Strait, in fact, the source in China. After this "test", which shows the superficial cross-strait relations based on mutual trust and fragile, it is not reckless; as a big country, and find other routes to solve the record, stop go to provoke it involves complex neural lines, is committed to regional peace and stability The first step, it is wise to Taiwan to deepen understanding. Even standing in Beijing's point of view, it is not clear when the truth runs the risk.
==============================
http://news.ltn.com.tw/news/world/breakingnews/1249848
Employees are not allowed to report leaks under the dome was suspended
2015-03-06 23:26.
[CNA] The Financial Times reported that Chinese network, Shanghai First Financial Daily, an employee was suspended because of the employee leaked Communist propaganda department asked the media to stop "Under the Dome" documentary report instructions.
"Under the Dome" is a film about the Chinese film haze severity survey by CCTV host Chaijing before making one million yuan at their own expense. Published on the Internet after February 28, has attracted more than 166 million hits, and triggered a lively discussion.
The film originally been widely reported in the Chinese media, Chinese Minister of Environmental Chen Jining also expressed gratitude and praise. But to the November 2, 2008, but came CCP propaganda department issued instructions to stop media coverage related to this piece.
"Under the Dome" Although still available online to see discussions about it already disappeared from China's popular Sina Weibo topic.
Reported that earlier this week, First Financial Daily, a Chinese Internet executives share screenshots of this instruction. Two Informed sources said that the employee has been suspended, may eventually be dismissed.
This newspaper, said another employee, employee leaks absolutely know this is not public documents.
The directive requires the media to stop "Under the Dome" report is issued by the Publicity Department of the CPC Shanghai Municipal Committee, in charge of signing by First Financial Daily Shanghai Media Group's parent company, on behalf of receipt of order.
The Financial Times said the Chinese network, due to be held at a time when the continent annual NPC and CPPCC (Chinese People Consultative Conference, National People's Congres) during which employees were suspended, highlighting the sensitivity of propaganda affairs during the two sessions.
FT Chinese network also pointed out that can not be linked to the Shanghai Media Group to comment on the matter.
=======================================
by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors -
http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html
[Hot] interactive "Under the Dome" hot: smoke and mirrors?
[Hot]
interactive "Under the Dome" hot: smoke and mirrors? - See more at:
http://translate.googleusercontent.com/translate_c?depth=1&hl=zh-TW&rurl=translate.google.com&sl=zh-CN&tl=en&u=http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html&usg=ALkJrhhYJ8zIVkmrF_yG_fnHlcOVRBY5vg#sthash.9gSwR7nn.dpuf
[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.
- See more at:
http://translate.googleusercontent.com/translate_c?depth=1&hl=zh-TW&rurl=translate.google.com&sl=zh-CN&tl=en&u=http://www.ntdtv.com/xtr/gb/2015/03/03/articledownload1181558.html&usg=ALkJrhj0SJg1wzBP9t5tGX1zmS7GExrkaw#sthash.0tpFKCpF.dpuf[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.
View full text
360P View.
[NTD March 3, 2015 (Xinhua) - [interactive] Hot (1280), " Under the Dome "hot: smoke and mirrors: haze is a product of the CCP under the system.
Moderator: Dear viewers Hello everyone, and welcome to "hot spots interactive" live broadcasts of this issue, and today this episode we'll talk about, is now very popular in China a documentary, that is, before the CCTV reporter Chai Jing shooting, about the haze of the documentary " Under the Dome . " The documentary is hot to what extent? US cable television network CNN said that if you live in China still have not watched or heard of "Under the Dome", then you must be living under the stone.
This documentary on Saturday, was released on the Internet side, and finally spread quickly, I heard now in the different video sites get millions of hits. Chai Jing in this film, looking for answers to three questions, what is the haze? Where is it from? How to solve?
Prior to the beginning of that program today, we first tell you about the two gentlemen at the scene, one is Dr. Jason, Jason is good. Another is a political commentator, Mr. Yokogawa, Yokogawa hello. So we are still as usual, on this first look at a documentary newsreel.
February 28, the documentary "Under the Dome" for the first time publicly, provided free of charge to all network platform play, less than one day's time on the line, playing a total of more than 35 million times.
This up to over one hundred minutes of documentary shooting at their own expense by former CCTV host chaijing content about China increasingly serious air pollution problems.
People: "Every day, every year so attached three years, not one or two days."
Shanxi Environmental Protection Bureau deputy director Wang Jinglong: "Like those in fact, it is a strong carcinogen benzene, after a long time, accumulate in the human body is attached, with a plot to a certain extent, it creates the risk of cancer."
CCTV reporter as well-known, and Chaijing opened this open secret.
In fact, the biggest motivation Chaijing shooting this documentary, from pregnancy during her daughter was diagnosed with a benign tumor. Chai Jing to take care of her daughter in the process of haze feelings become more intense, and finally even the "healthy enough" has become a luxury.
So 柴静利 year's time, visiting many foreign experts and academic institutions of atmospheric pollution, visited some of the heavily polluted site, and also went to London, which had polluted the city of Los Angeles, trying to find some lessons of air pollution control and experience.
Measuring Results documentary quoted former Health Minister Chen Zhu CPC, noting that China's annual number of premature deaths due to air pollution is 500,000, over the past 30 years, lung cancer mortality increased by 465%. China's annual burn a lot of coal, iron and steel enterprises have more than 60% without any approval procedures.
After the documentary play, all walks of life there are different voices. Chai Jing has been criticized for selfish reasons, lack of objectivity; also been criticized for her cause haze of blame businesses and individuals, did not point out the responsibility of the government and institutions.
He Qinglian on Twitter scholars say, the film is very intuitive to let everyone see the Chinese people's living environment, officials, miners, all sorts of people who eat the bloody coal black interests of the chain, including their underlying and forced work by child slaves.
It is understood that the source of haze, including air pollution caused by coal combustion emissions; pollution emissions from fuel combustion, industrial pollution. Chinese authorities today the blind pursuit of economic development at the expense of the environment, but also the expense of the health of the Chinese people.
Moderator: Ladies and gentlemen, today we are hot live show, you are welcome to call to express your opinion or ask the guests questions. Two gentlemen, I would like to ask a question, because this haze is actually a lot of people know, so the news say this is an open secret. But why this film appeared Chaijing triggered such a strong reaction, Jason you please.
Jason: The first is to say that she certainly talked a let almost all Chinese people are a hot topic of empathy, the topic is hot. Second, she is indeed a more professional approach, a variety of scientific data, all aspects of giving a very intuitive, clear, immersive feeling. Another one, its website is very successful operation, no matter what kind of background, in February 28 such a critical time, official media and the Internet were also released, you can see all aspects of the operation of a large group behind. So weather, geography, and all aspects of polymerization in one, it creates an explosive effect. And it is the Internet, media operations is very positive. Indeed there have been three days to change an effect on the problem of the Chinese way of thinking.
Moderator: Yokogawa do you think?
Yokogawa: I think the most critical issue is a celebrity, of course, it is very important to the operation, the celebrity is also important achievements of the film together. In fact, some say it was filmed last year, a similar haze on the film, reportedly looks very good, the results are not even out of the seal gave killed. So it takes some conditions, it may come into contact with the audience.
Moderator: Do you see this film, what do you feel is the biggest?
Yokogawa: She's the one we all know the facts come out, but I do not think it is a professional piece, from the experts, the experts have done the work of experts, in fact, that the films are not really even science. It's just taken a personal film, and the film plays a put this things we have to pay attention to, and played a role in this.
Jason: But the positive significance of this film really is there, it uses a lot of their own way, in fact, a bit of knowledge, science, fun, integrated in one piece, let you in a very simple process, understanding to some of the concepts.
Moderator: It is relatively straightforward, right? Individuals.
Jason: Yes, more intuitive. You can see this one is Chaijing spend a lot of thought to do this film, some full of complex data, the full complexity of the science of speech, with all aspects of animation to take it out. And you can see that this person is the intention in doing, because at least in her film, the original intention was for the children, but also to end child. This motherly love can not say there is any adulterated ingredients inside. And I know a lot of people really have the same country, there is such a feeling, so this film every logic itself its online have been talked about. It is the entire film, from the first point to the last point, the last one from the first to feel the feelings, in fact, are already, but she integrated together, so that we resonate and produce such an outbreak The effect of this has become a cultural phenomenon.
Moderator: Yokogawa you just said, she mainly talked about some of the phenomena and to some of the issues raised, and you say what issues she raised major?
Yokogawa: I think it is like this, looping mechanism and all stakeholders in the chain formed throughout the haze, the more she talked, of course, is here so far.
Moderator: give some examples, such as the interests of the chain, which links you are referring to?
Yokogawa: for instance, the local iron and steel enterprises, local steel companies are actually supported by the local government authorities, although it did not complete all the formalities. Why is that? Because such a large enterprise will bring a lot of local taxes, which is an interest-driven, and now this is the steel industry. Then the other you see the legislative process, in the environmental legislation process, deliberately leaving a leak fixed, environmental law enforcement authorities do not explain it is by the environmental protection department of law enforcement.
Moderator: What is not explained in the law enforcement sector.
Yokogawa: Yes, the environmental protection department and finally becomes an obligation, no power, because when the legislation will stay neutral. That left a gap when the legislation, it says there were many ministries opposition, and these ministries is the enforcement of environmental protection to be the object of the background. So many many of these Li Yi chain, from the smallest to the largest, she could find, I think the typical sense she made, and in this respect there is no shortage.
Jason: This film is commendable is that it touches on some Chinese before we all know, but do not say a topic, such as the problem of interest groups. All standards are developed Sinopec oil old original cast, all cars are false, no purification equipment were wearing GB like standard out. Even local governments to sell cars marked with qualified instruction, all aspects of the entire range of national systems cause such a factor, it shows out.
But you can also see that it is indeed the product within the system, the end result is still a lot of it finally fell on Caomin of the factors, such as bad coal, coal bad, the worst comes to the final is the people scattered burning coal. Then he said we must solve the problem, but really can do to solve the problem is to sell his home under the meatloaf that person. So you see a lot of problems she sees the essence, mentioned that some of the previous point to the official media did not dare to point to interest groups, but then, the final solution, it seems we only have a dozen 12369 to report, farmers do not report land cover and the butcher do not smoke fumes. On a concept like this ......
Moderator: So some people say it is expediency on those answers.
Yokogawa: Not expediency, because the film, whether it's a conspiracy theory we Hao, Ye Hao or background, or no background or, the film should be able to come up, we must make compromises. No matter who is to compromise, or who let him compromise, it is another matter. If you really put the real reason for all the links are speaking out, then get out of the film.
Moderator: Or it fundamental solution ......
Jason: I think it is a reasonable guess, this speculation is Shane? This person wants to say Chaijing this film, trying to answer these three questions is clear that the desire is real. But when she did to a certain extent, it is very likely to rise, and some people think that they want to do another thing coincide, then the senior help her, but to help executives in the process, will also rise add to the mix. Finally, this film is a product of my Chaijing will and the will of an integrated mix of high-rise. You can see many of the problems go beyond that.
Of course, after this film recently when alive, not go beyond the discussion of Internet users, Internet users to discuss the idea really is a lot, to a certain extent, to date, the Chinese Central Propaganda Department issued a document that has already begun, to withdraw from the first page down, not allowed to comment, and so on. So to some extent, it is called "controlled bomb," senior Communist Party carried out a controlled explosion of style. The controllable blast force to achieve some kind of shock and vibration, shock and vibration force of this fact is that many users of discussion, the top in the end what to do? This is why the next day the whole green stocks rising, many other corresponding shares in the fall.
Chaijing not quite say how much this man deterrent, the fact is that many people interpreted to support this film that Chaijing senior power from the high-level interpretation of the future direction of the power economy.
Moderator: Yokogawa you agree with this view? It is a product that the Chinese government a certain level of public relations people?
Yokogawa: This question is this, if none of these factors, then, is to get out of this film.
Moderator: that it must get a certain number of people to support?
Yokogawa: Yes! You see the last shot of the films that will not come out. In addition, environmental pressure groups, up to now, the real pressure to engage in environmental protection, and now continues to carry out, is not said to have stopped in.
That no matter how kind of initial motivation? You just have to see this film, it is actually three parts of it! Haze how come? Very clear, right? And then, where is the problem? Speaks very clearly. Suddenly a cop-out! That result is in accordance with the general logic of fact, it can shoot in front of the two most people, is not going to shoot the third part, the third part will not be filmed like this. So anyway, it is there are other factors intervene into, is not simply a talking film haze.
Moderator: But no matter what factors caused it, because the environmental pollution, including haze in China has more than 10 years. Haze more than 10 years, environmental pollution for many years, why at this moment, it is this film can out of it?
Jason: I do not like conspiracy theories, but I like to push the logic, my own analysis, does anyone know this film in China, as long as the brain knows that it can not really be produced Chaijing this person from It works, in fact there are factors behind.
You take a closer look, this year there are two factors exist. First, the overall economy to slow to go, is the overall manufacturing overcapacity, has to be added to the degree. She also talked about himself in the film. Per ton of steel manufacturing a whole earn two dollars, buy boiled eggs on a ton of steel. The entire industry overcapacity has reached the extent of no longer continue. Some of the steel industry every year, banks have to give it two billion blood transfusion.
China's economic development model that is under the GDP-driven, relying on the surplus industrial development model has to die. This industry does not work, you have to make it a part of the bankruptcy, there will be a part of the unemployed people, then this process will make this thing this film has to do more in the name. If at this time you lose your job, you dare to walk in the street, then you are with the people of the country against the lung. So people saw this film onto the street people will curse, this is a problem.
Another problem is to say, this film directed several major industries, the automotive industry, the oil industry, power industry, coal industry. And this year, a Chinese New Year, the commission would send more than 100-finding missions to more than 200 central enterprises to do the investigation. This process, in fact, give this film the entire survey group has created a huge name, because the whole film it really is for these monopolies, many places talked about such a concept of monopoly industries, but also to Xi Jinping, the central enterprises want to break this one special forces group hit a nominal basis.
So you can see that this film is actually willing executives in the inside, so I think blasting, is one such sub-factors.
Moderator: Yokogawa you have any to add?
Yokogawa: From the film itself came out of view, it is time, the two sessions, the two organizations will certainly be some major policy because rubber stamp Well, it was the policy has been decided to green light, at least to cover up a stamp, it may with the industry on a number of adjustments related to, or related to the environment and those factors to be discussed among the two organizations.
Another is, in fact, the economic development over the years it is that time, had this adjustment, because pollution is not only to find today, but just started out 30 years ago, when the construction industry, the pollution problem has been raised. So the problem is not pollution does not know, or is suddenly found today. That is a blind alley, and this way the time has come to this step is no way, because of environmental resources have been used up.
Moderator: Do you mean to say that in the process of development, we have paid such a price?
Yokogawa: because people already have the experience of environmental pollution, and have taught. China's development, when in fact the previous lessons learned, then you can go well, the beginning of time, not so fast, but it can go well, but did not go this way, and so was going to repeat after someone pollution The road then governance. This could have been the most powerful industrial development, when most of the money when the time has come to do a considerable part of the wealth of the transition, but missed this time. Etc. So now forced to go to carry out his fall, when the green industry, in fact, is already too late, too late, too late, but this is no way to avoid.
This means that the Chinese Communist Party 30 years of economic development, which in fact is the key, the key is pollution, because we know that just haze, including water pollution, including pollution of land, it is a full range of pollution, this round The contamination is impossible to say for 30 years did say we do not know. It's out of the question!
Moderator: We now have an online audience, we first look at the audience pick the phone, we'll continue the discussion. Now there is a New Jersey-line Fang, Fang Hello, please.
New Jersey Fang: This film is not so much popular science, or is teaching film, I think it might be considered that sense politically, a barometer of the significance may be more important than others. I agree with the two experts say, that the pollution problem is not a matter of one or two days.
As early as 4.50 years ago, when the Cultural Revolution, Shanghai out of a journal called "Dialectics of Nature" magazine, was a way of publishing the extreme left of this publication. Put the capitalist society, including Japan, Europe, North America, including some industrial development that is blind industrial development, pollution caused by blind pursuit of profit, listed a lot, it does not know, but why now and only then this thing seriously? Is a kind of political needs.
Moderator: Well, Mr. Xie Xiefang. There is a line that we have in Los Angeles Ting phone, Ting hello.
Los Angeles Ting: The Philippines anchor well, Yokogawa good, Jason Good, happy Lantern Festival. About this fog ah, London is the world famous fog, I've been to London, the fog, people walking in the fog which is natural, which is very comfortable to walk in. Copenhagen, Oslo, Stockholm, is a little foggy, very comfortable.
Now as summer dust storms in China, now the haze in Beijing back a friend said he could not see the top of Mao Zedong in Tiananmen Square like; Shanghai a friend that I took out a pocket inside the yuan, Mao's like I can not see ! Right next to my pocket, is very serious. Two sessions this meeting, coordinating all the words on paper is of no use, must find an effective way, so that the impact on human health, but also worse than second hand smoke, this is not acceptable.
Moderator: Mr. Xie Xieding. You talk about Jason.
Jason: We talk about the views are the same, there is a problem is this child, this time a netizen, he released a film on the 28th, March 1 happened to Beijing out of the one called "Dust tax."
Moderator: That you raise up the dust.
Jason: You construction site, you raise the ash came. If you reach the "excellent" level, I only punish you ......
Moderator: "Excellent," there is no dust, or should I say ......
Jason: It is to reach its standard, and I only charge you a 5 1 kg; if you have reached is not particularly good, take you three; then you have to reach the general good, I charge you 6. Anyway, the deal is off to charge you money. Where is the problem? In many cases, there is a problem that is China, the government did not control things like this, then the government tube how do so? Money! But our money, this money go? People never know! It is not used to control the haze of? You do not know. But after this film came out, really from the public, then the creation of public opinion on the correctness of it.
And this film, why the newly appointed Environmental Protection Bureau is pleased to give chaijing call this film seems to understand the unknown EPA injustice. This process, in fact, for the people concerned, who may charge in the head one more classic. The problem how to do?
Let me again one of the most concern is what? That she was talking about the interview, London said one official in London here when we have millions of industrial workers, then we have gone after this industry, we are transformed, and industrial numbers also increased. But she did not ask that, in the United States, the United Kingdom industry has a painful transition process, but these countries have established a very good social welfare system, and in this process you will not starve people, you are poor countries when he sent you food stamps, housing for you to solve, all aspects of the basic safety net has been established.
So in China, it is not often that the workers do not know when he was coal pollution, in fact, like Chaijing considering the safety of her child, when in fact the workers on the side of the furnace contaminated, that workers are not stupid I do not know, and he knew it. But his first problem is the problem of existence, and the second issue is the question of the lung.
So for these people, if these corporate restructuring, while China does not have a safety net to ensure their survival, these people how to live? In other words, when Chaijing this film came out, it allowed me to see the negative effects are very worried.
Moderator: Let's ask Mr. Yokogawa a problem, and then followed by two spectators line phone. Yokogawa, I want to ask you, just say this film is anticlimactic, it mentions some solutions, such as what to play hotlines, driving less or something, you are not referring to them is quite feasible?
Yokogawa: It is entirely feasible solutions! Because this matter did not find it, you is not feasible. You say you call hotlines, the EPA report, right? EPA has said, you do not even have enforcement powers. Conflicts around on it! Since the EPA that are not used, and you play to report what is the use?
Jason: EPA can control butcher.
Moderator: This film may come out a little more power in the future.
Yokogawa: more power to no avail, because the local government does not support you, or in the government under the Environmental Protection Agency, a division, so the government can not ...... this is not the same with the United States. US prosecutors that he was a fire under the mayor's official, an officer can close the city is ...... that year is hurricane comes, has been moved from New Orleans over 50,000 people, to live in the stadium inside, who entered the half , the fire inspector came and said to have been overloaded, closed! Such a big thing, you say who will not budge? No, he was a man, say close to closing. The city mayor officials there to discuss up. Law enforcement people to really, you can not do this.
So she told them, those who are up to scratch inside a neighbor's. So the question in what place? Your words, every link, but so many have been able to form part of a lot from her about the details view, the fundamental reason for the fact that in terms of policy, that the above policy development for so many years, when in fact it is the sacrifice the development of the three price, which is not only the cost of the sacrifice of the three, is intentional to sell.
Moderator: What are the three price?
Yokogawa: Human rights cost, resource cost, environmental costs, the cost of these three is deliberately sell out, it is unlikely that these costs do not attract much foreign investment, can not call this a sunset industry attracted to China, then rapidly. So back to why it do this? It can not choose a better way to develop it?
No!Because it has such a powerful feeling of being chased, that as long as it slowly step it up downfall. Jason: Actually economy is its legitimacy ...... Yokogawa: source of legitimacy. Jason: Under what circumstances say we have money ah! Moderator: the legality of doing this is to give it a good excuse. So we now have two online audience, we will soon take about two spectators phone, we may have to program time, then one is Mr. Money in New York, New Jersey Luk another. Mr. Qian, please first few brief comments. Mr. York Money: Hello. I'm a people, the people out is their lifestyles, and now this Chinese food is not good, not good air and water quality is not good, people will want this government? If I grow in China, I hate all hate it, I eat all drugs Well, the air we breathe are drugs, so the government is not a government of the people, the people should overthrow it it! Moderator: Thank you Mr. money. So the audience is under a New Jersey luk, luk hello. New Jersey Luk: Hello. I would like to talk about, the first one is in this film, I see it there are two inside view, one is a tendency for the environmental sector in mainland China, many people are aware of the EPA also called Helenians money to help people ward off evil In fact they did not like to speak so tragic. The second is for the oil, petrochemical negative attitude, it is clear now is follow the rhythm of walking Xi corruption, can look out behind the high-level operations. Then the other one, I think this film there are some positive, that is a part of citizenship wake some Chinese people, the people, so that people can participate in this civic movement which, in fact, it is said that the Communist Party is concerned it is fear, so that once again we see that the Central Propaganda Department to suppress the film. Well, that's my point. Moderator: Well, Mr. Xie Xielu. Then two a person may show two comments on the end. Jason: Yes, I agree with Mr. Lu talk about, this is a test product directional blasting a Communist, a concept with a sensational female indie producer, and then create a public foundation to reach some of the Chinese Communist Party to do something for the future. At the same time, then it does have a positive effect, that is, Mr. Lu said, "citizenship", that is, when more people accept this, his citizenship in the creation, which is the hope for the future. Yokogawa: I think if you want to embody the highest level of sincere, open environmental organization registered NGO. The question now is no national real effect, each such organization is not the NGO in the true sense. You want to open a registered NGO, in fact true to oversee civil, rather than manipulating the supervision, the result must be good. Moderator: Thank you very much actively involved in the audience today, thank you for watching our show, I hope the next program and you goodbye.
http://www.ntdtv.com/xtr/gb/2015/03/03/a1181558.html
==============================================
http://www.bbc.co.uk/zhongwen/trad/world/2015/03/150307_mali_nightclub_attack
Bamako, Mali, West Africa, the attack killed five people
- March 7, 2015
Northwest National Bamako the attacks, five people were killed. BBC correspondent reported from the scene, a Frenchman was shot and killed in a bar. When the gunmen fled the scene, the two Malian men were also killed.
In a nearby street, a Belgian man was killed by a grenade thrown at their car. Another Europeans were also taken to hospital after death.
Witnesses said the attackers was shouting "God is great" slogan.
A senior intelligence official told Reuters that two people related to the incident have been arrested by the authorities.
French President Francois Hollande on Saturday strongly condemned the attacks as "cowardly attack."
BBC correspondent reported that Smith from Bamako, French soldiers arrived at the scene quickly. They confirmed that the man was killed in bars is a Frenchman.
BBC correspondent, where a Malian who is a police officer killed, another person is security.
A witness told the BBC that he saw four people traveling in a car fled the scene, and another one who escaped by motorcycle.
A local hospital sources told AFP, the attack also resulted in an additional eight people were injured.
The Islamic militia in the past few years has been in combat with government forces in Mali. French and African troops in January 2013 on the situation in Mali to intervene to prevent the al-Qaida linked militants advancing to the capital, Bamako.
These militants in the north gradually cleaning up afterwards, but the Tuareg rebels and Islamist militia groups are still relatively active.
Mali between government forces and rebel militias in conflict situations due to join the Islamic complicated.
(Compiler / Editor: Xiao Er).
=====================================
http://www.bbc.co.uk/zhongwen/trad/world/2015/03/150307_us_it_hackers_crime
US one billion e-mail data theft case: Prosecutors indicted suspects hackers
- March 7, 2015.
US prosecutors on suspicion of theft of two e-mail data and a Vietnamese Canadian prosecution. US officials say this is one of the largest data breach in US history.
Hackers invade eight suspects accused of e-mail service provider, and stole nearly one billion e-mail address. They used to steal data to millions of users junk mail, and fake products sold to users.
US Department of Justice that they benefit from these activities in excess of $ 2 million (about 1.3 one million pounds).
Hacker indicted include two Vietnamese: 28 years old Giang Hoang Vu, as well as 25-year-old Viet Quoc Nguyen.
They were charged with suspicion of conspiracy and implementation of computer intrusions into computer fraud and other crimes, one of whom has pleaded guilty, the other person is still at large. Before March 2014 Vu was extradited to the United States, both living in the Netherlands.
The other defendant is Canadian David - Manuel Santos da Silva (David-Manuel Santos Da Silva), he was accused of involvement in money laundering.
Assistant US Attorney General Calder said were involved in Vietnam, the Netherlands and Canada committing the crime, they accused of the biggest in the history of a case of the US Internet e-mail and name data theft.
Authorities said that in 2009 and 2012, most American companies have been distributing e-mail hacking. Court documents did not disclose the specific e-mail between the company which was hacked.
US Justice Department officials said the hackers involved not only steal the company's e-mail data, and hijack the company's own e-mail distribution platform, a large number of e-mail spam out, will lead to the sale of counterfeit victim user software of Adobe Systems Web site, and from eligible Lee.
(Compiled: Intern Wangpei Yu, Editor: Xiao Er)
==========================================
https://twitter.com/MEGAprivacy/status/558087217730834432
@MEGAprivacy the Skype killer@MEGAprivacy La muerte de Skype aquí está caballeros, adelante... pruébenlo ;)@MEGAprivacy go megachat@MEGAprivacy HELL YEAH! Time to get my friends signed up.@MEGAprivacy Finally!!! I'm very exiced to test it.@MEGAprivacy@KimDotcom Oh dear, the USA and American Wannabe John Key are not going to like that ! This is going to be fun !@MEGAprivacy Please have support for mobile devices, I really, really want to use this on my phone and encourage everyone I know to use it.@MEGAprivacy I want to try this on my iPhone 6 Plus, it's going to be way better than@Microsoft 's failed@Skype .- Reply to
@MEGAprivacy Not hating or bragging but i bet@telegram didn't see that#VOIP implementation coming! I've been requesting for ages @MEGAprivacy is this built into the Android app?@MEGAprivacy@mz_chief Encryption is going to be made illegal. Bet on it.@ryandolan123@MEGAprivacy Skype USED to encrypted until "enthusiastic (nsa) team player" MS bought it.@Bill_Owen@MEGAprivacy & Twitter to replace passwords w/ cell verification? Hm https:// twitter.com/abbynormative/ status/558109039872446465 … https:// twitter.com/abbynormative/ status/558121313278369792 …@amplifyonly@mz_chief@MEGAprivacy@amplifyonly Abby account is protected. Found this. http:// blog.kaspersky.com/twitter-digits -new-authentication/ … Sigh...@Bill_Owen@MEGAprivacy@amplifyonly Other ways to do authentication. Sure looks like real-time user id/geolocation to me@OpPinkPower#YAN@mz_chief@MEGAprivacy@amplifyonly@OpPinkPower Absolutely. That makes perfect sense.
===========
@MEGAprivacy最後我們有東西可以摧毀的Skype
回复@ MEGAprivacy不恨還是在吹牛,但我敢打賭@ 電報沒有看到#VOIP實施來了! 我一直要求的年齡
Kim Dotcom lança concorrente do Skype
Por Reda ão Olhar Digital - em 22/01/2015 às 11h45
Kim Dotcom cumpriu a promessa de lançar um concorrente do Skype que use criptografia para tornar a comunicação mais segura e, nesta quinta-feira, 22, apresentou o MegaChat.
Ainda em fase beta, o serviço permite que os internautas conversem por
vídeo ou áudio sem a preocupação de que o conteúdo seja desviado.
MEGA @MEGAprivacy Seguir
MEGA announces MEGAchat beta. Browser based end-to-end encrypted audio and video chat: https://mega.nz
Todos os usuários do Mega podem testar o chat através do novo domínio mega.nz . Segundo Dotcom, mais de 15 milhões de pessoas já estão cadastradas no Mega, número que tende a subir: "Acredito que o MegaChat pode nos fazer passar de 100 milhões de usuários até o fim de 2015.".
Kim Dotcom ✔ @KimDotcom Seguir
#Mega has over 15 million registered users now. I think #MegaChat could elevate us to 100+ million users by the end of 2015. #Prediction
A princípio só a conversa por vídeo está disponível, as funções de chat e videoconferência virão em seguida.
=======================
Twitter's Foray into Authentication: SMS to Replace Passwords
The microblogging service and social network Twitter is now the latest entrant in the race to replace passwords, with a new system called “Digits”. It's got a hip name and the idea behind Digits seems very promising. Digits authentication is based entirely on cellular access. Your username is your phone number and a real-time, disposable SMS-generated code is your password.The most interesting thing is that it isn't just for Twitter — it's available for any developer that wants Digits authentication in their app. And there is a reason why they will be glad to have it.
“Phone numbers are the primary identity for the fastest growing mobile demographics, including emerging markets, which account for over 70% of the world's mobile population,” Twitter says. “With Digits, you can build a customized onboarding and sign-in experience for these markets.”
“Onboarding” seems to be new-age developer jargon for getting people to sign up for a particular app. As in: getting users onboard.
#Twitter plans to replace usernames with mobile phone numbers & #passwords w/ one-time, SMS-generated codes.
The service seems particularly useful in parts of the world that aren't beholden to the near-ubiquitous tech-giants. In the United States, for example, countless applications will offer users the capacity to sign up for, and later authenticate themselves into a certain app or service by using their Facebook or Twitter or Gmail account identity as their username along with a specific password. Email accounts are obviously the most popular variation. Just take a moment to think about how many online accounts are tied to your email…
But once you move a couple of thousand miles from nearest Tesla charging station and your favourite organic food store at the corner, you realise that it isn't that common there to use email, Facebook, Twitter and so on. There is huge amount of people who don't have anything from this list. But what they do have is mobile phone number. Because in many places of the world cellular network is the only option for making call or getting Internet access.
As example of how it works we can look at mobile banking in emerging markets. Africa, particularly the sub-Saharan parts, home to many of the world's most aggressively emerging markets, rely in part on something of a cashless economy. Payment is dominated by mobile telecoms in Kenya. And people aren't paying with apps on their smart phones: they're relying on relatively simple services like M-Pesa, which work on the older variety brick or burner phones. Through M-Pesa, users can transfer money, make payments and even take out withdrawals from local merchants.
The graphic below comes from the Wall Street Journal and is based on World Bank statistics:
This illustrates that simple mobile phone based services are growing in the developing world. It's hard to say if Twitter's move was based in part on the M-Pesa economy in places like Kenya, Tanzania, India and South Africa, but I think that reality, that cellular access if relatively cheap and available in emerging markets, bodes well for a service like Digits.
But it isn't just about emerging markets. The core idea looks interesting for developed countries too. We're generally skeptical of new ideas to replace passwords, but Digits strikes us as a simple solution to a tough problem, prompting us to wonder why no one has thought of this before?
I've written about heartbeat-based, fingerprint-based, iris-based, smell-based, earlobe-based, electromagnetic tattoo- and pill-based, geolocation-based and who knows how many other forms of biometric and wearable authenticators. They we're all interesting but they all seemed overly complicated.
“When users forget what they used to sign up for your app — you can lose customers. By using our SMS verification you can minimize both support costs and sign-in failures” – says Twitter
Digits is designed to shift the authentication paradigm away from email and toward mobile number. Perhaps more importantly, Digits offers a seamless replacement for static passwords. It also could help resolve the problem of forgotten passwords. “When users forget which service they used to sign up for your app — email addresses, usernames, or passwords — you can lose customers,” Twitter argues in its promotional material. “By using our SMS verification in lieu of passwords, you can minimize both support costs and sign-in failures — all while keeping your users happy and your app growing.”
Of course, it can't be all good news. Digits isn't particularly helpful in places without a cellular signal. That's not such a big deal out in the wild, where you probably don't have Internet access anyway, but it could spell trouble in your parent's basement.
Eugene Kaspersky ✔ @e_kaspersky Follow
10 tips on how to stop your #iPhone from revealing your secrets https://kas.pr/F9tr
============================================
http://www.donotlink.com/framed?621363
07 Mar 2015.
uTorrent quietly installs BitCoin Mining Software
If you are using latest version of the BitTorrent client uTorrent application for download torrent file then here is a warning for you all. The latest version of the Utorrent installation file came up with the bundle of the unwanted application know as Epic Sale, which is generally a bitcoin mining software.
On the official forum of the Utorrent, users have reported that uTorrent had silently installed cryptocurrency software from Epic Scale as part of version 3.4.2 build 28913. Once installed, Epic Scale uses some of the computer's spare processing power to generate cryptocurrency (such as Bitcoin or Dogecoin).
The software generates revenue for uTorrent while also contributing some funds to charity. “In the future, Epic Scale plans to contribute CPU cycles to other initiatives, such as Genome mapping and other academic studies that require a great deal of processing power.”Utorrent manager also mentioned that installing the Epic Share application on the user's computer was with the users agreement acceptance. uTorrent employee says Epic Scale can be easily uninstalled from Add/Remove programs in windows OS. After the uninstallation of the application, software folder will remain on the system drive of the computer within Programs Files folder, users can safely delete this folder once the uninstall is complete.
If you see the End-User-Agreement of the latest uTorrent, you see notice that utorrent have clearly mentioned that application came with the bundle of the Epic Scale, hence by accepting the agreement for installing the utorrent users are also accepting to install Epic Scale.
This is why, it is recommend to read all the policy agreement be for installing or download in the application onto your system.
About Author
Vivek Gurung is the Founder and Editor-in-chief of 'Cyber Kendra'. He is Certified Information Security Expert and an Ethical Hacker. Apart from this he is Internet activist, love to learn about technology innovations. Very much interested in Cyber Security. Follow him on===================
上午8點五十的uTorrent悄悄安裝比特幣挖掘軟件首頁>比特幣»的BitTorrent»新聞»安全»uTorrent的»uTorrent的悄悄安裝比特幣挖掘軟件uTorrent的悄悄安裝比特幣挖掘軟件如果您使用的是BitTorrent客戶端uTorrent的應用程序下載torrent文件的最新版本,那麼這裡就是你所有的警告。該uTorrent的安裝文件的最新版本想出了不必要的應用程序包所知道的史詩銷售,這通常是一個比特幣挖掘軟件。在uTorrent的官方論壇上,網友紛紛報導了uTorrent的默默從史詩級安裝cryptocurrency軟件版本3.4.2安裝後構建28913.一部分,史詩級使用了一些計算機的空閒處理能力產生cryptocurrency(如比特幣或多吉幣)。在上面的用戶聲稱,uTorrent的經理證實了這個問題,並指出,母公司的BitTorrent與史詩級的合作夥伴關係。在聲明中,他說 -
該軟件生成收入uTorrent的同時也有助於一些資金用於慈善事業。 “在未來,史詩規模的計劃作出貢獻CPU週期以其他舉措,如基因組圖譜,並且需要大量的處理能力等學術研究。”uTorrent的經理還提到,安裝在用戶的計算機上的史詩分享應用程序與用戶的一致認可。 uTorrent的員工說,史詩規模可以從添加可以很容易地卸載/刪除在Windows操作系統的程序。該應用程序的卸載之後,軟件文件夾將保持在程序文件文件夾的計算機的系統驅動器上,用戶可以安全地刪除此文件夾,一旦卸載完成。如果你看到的最新的uTorrent的最終用戶協議,你看發現的uTorrent已經明確提到,應用程序附帶的史詩規模的捆綁,從而通過接受協議安裝uTorrent的用戶也接受安裝史詩級。這就是為什麼,這是推薦閱讀所有的政策協議是在應用程序安裝或下載到您的系統。
==========================================
http://www.hotforsecurity.com/blog/a-bad-week-for-uk-cybercriminals-11533.html
A bad week for UK cybercriminals
56 suspected hackers have been arrested by the UK's National Crime Agency (NCA) as part of what British police are calling “strike week” against cybercriminals.In 26 separate operations across the country, people were arrested in connection with a variety of offences related to distributed denial-of-service (DDoS) attacks, internet fraud, phishing attacks, the theft of intellectual property, and malware.
Those arrested include a 22-year-old man, suspected of involvement in a hack by “D3DDs Company” that saw over 400,000 email addresses and passwords stolen from Yahoo in 2012.
Separately, a 23-year-old man from Sutton Coldfield suspected of hacking into the US Department of Defence last June, and stealing data from the Enhanced Mobile Satellite Services global communications system. In that attack, the contact information of approximately 800 people – including name, title, email addresses and phone numbers – was stolen, as well as details of around 34,400 devices.
Following that attack, a message was posted on PasteBin with what appeared to be a message for the notorious LizardSquad hacking gang:
“We smite the Lizards, LizardSquad your time is near. We're in your bases, we control your satellites. The missiles shall rein upon thy who claim alliance, watch your heads, ** T-47:59:59 until lift off. We're one, we're many, we lurk in the dark,we're everywhere and anywhere. Live Free Die Hard! DoD, DISA EMSS : Enhanced Mobile Satellite Services is not all, Department of Defense has no Defenses.”The following video shows the arrest, on 3 March 2015, of a 22-year-old man suspected of developing and distributing malware.
Crackdown on cyber crime
You probably won't be surprised to see the suspect is wearing a hoody as the police take him away.
In other police swoops, a 33-year-old man from Barry was arrested by South Wales police, suspected of launching a denial-of-service attack against a rival company.
But perhaps the biggest operation of the week involved the 25 suspects apprehended in London and Essex by the Metropolitan Police Fraud and Linked Crime Online (FALCON) unit, after allegedly using the net to steal and launder money and carry out fraud.
Andy Archibald, deputy director of the NCA's National Cyber Crime Unit, warned those breaking the law on the internet that they could not assume they would remain anonymous to the authorities:
“Criminals need to realise that committing crime online will not make them anonymous to law enforcement. We are continuously working to track down and apprehend those seeking to utilise computers for criminal ends, and to disrupt the technical networks and infrastructures supporting international cyber crime.”The National Crime Agency sent a stark warning via Twitter to others who might be involved in internet criminality:
This is just the start. Wherever #CyberCriminals hide we will work with industry and international law enforcement to bring them to justiceWe shouldn't be duped into believing that a large wave of arrests such as this can make the internet a safe place. But it will, hopefully, make some online criminals think twice about what they are doing, and understand that the repercussions if caught could be serious.
=====================================
http://www.netresec.com/?page=Blog&month=2014-09&post=Analysis-of-Chinese-MITM-on-Google
Thursday, 04 September 2014 23:55:00 (UTC/GMT)
Analysis of Chinese MITM on Google
The Chinese are running a MITM attack on SSL encrypted traffic between Chinese universities and Google. We've performed technical analysis of the attack, on request from GreatFire.org, and can confirm that it is a real SSL MITM against www.google.com and that it is being performed from within China.We were contacted by GreatFire.org yesterday (September 3) with a request to analyze two packet captures from suspected MITM-attacks before they finalized their blog post. The conclusions from our analysis is now published as part of GreatFire.org's great blog post titled “ Authorities launch man-in-the-middle attack on Google ”.
In their blog post GreatFire.org write:
From August 28, 2014 reports appeared on Weibo and Google Plus that users in China trying to access google.com and google.com.hk via CERNET, the country's education network, were receiving warning messages about invalid SSL certificates. The evidence, which we include later in this post, indicates that this was caused by a man-in-the-middle attack.Our network forensic analysis was performed by investigating the following to packet capture files:
While the authorities have been blocking access to most things Google since June 4th, they have kept their hands off of CERNET, China's nationwide education and research network. However, in the lead up to the new school year, the Chinese authorities launched a man-in-the-middle (MITM) attack against Google.
Capture Location | Client Netname | Capture Date | Filename | MD5 |
---|---|---|---|---|
Peking University | PKU6-CERNET2 | Aug 30, 2014 | google.com.pcap | aba4b35cb85ed218 7a8a7656cd670a93 |
Chongqing University | CQU6-CERNET2 | Sep 1, 2014 | google_fake.pcapng | 3bf943ea453f9afa 5c06b9c126d79557 |
Client and Server IP adresses
The analyzed capture files contain pure IPv6 traffic (CERNET is a IPv6 network) which made the analysis a bit different then usual. We do not disclose the client IP addresses for privacy reasons, but they both seem legit; one from Peking University (netname PKU6-CERNET2) and the other from Chongqing University (CQU6-CERNET2). Both IP addresses belong to AS23910 , named "China Next Generation Internet CERNET2".
Peking University entrance, by galaygobi (Creative Commons Attribution 2.0)
Chongqing University gate, by Brooktse (Creative Commons Attribution-Share Alike 3.0)
The IP addresses received for www.google.com were in both cases also legit, so the MITM wasn't carried out through DNS spoofing. The Peking University client connected to 2607:f8b0:4007:804::1013 ( GOOGLE-IPV6 in United States) and the connection from Chongqing University went to 2404:6800:4005:805::1010 ( GOOGLE_IPV6_AP-20080930 in Australia).
Time-To-Live (TTL) Analysis
The Time-To-Live (TTL) values received in the IP packets from www.google.com were in both cases 248 or 249 (note: TTL is actually called ”Hop Limit” in IPv6 nomenclature, but we prefer to use the well established term ”TTL” anyway) . The highest possible TTL value is 255, this means that the received packets haven't made more than 6 or 7 router hops before ending up at the client. However, the expected number of router hops between a server on GOOGLE-IPV6 and the client at Peking University is around 14. The low number of router hops is is a clear indication of an IP MITM taking place.
Image: CapLoader with both capture files loaded, showing TTL values
Here is an IPv6 traceroute from AS25795 in Los Angeles towards the IP address at Peking University (generated with ARP Networks' 4or6.com tool):
#traceroute -6 2001:da8:201:[REDACTED]
1 2607:f2f8:1600::1 (2607:f2f8:1600::1) 1.636 ms 1.573 ms 1.557 ms
2 2001:504:13::1a (2001:504:13::1a) 40.381 ms 40.481 ms 40.565 ms
3 * * *
4 2001:252:0:302::1 (2001:252:0:302::1) 148.409 ms 148.501 ms 148.595 ms
5 * * *
6 2001:252:0:1::1 (2001:252:0:1::1) 148.273 ms 147.620 ms 147.596 ms
7 pku-bj-v6.cernet2.net (2001:da8:1:1b::2) 147.574 ms 147.619 ms 147.420 ms
8 2001:da8:1:50d::2 (2001:da8:1:50d::2) 148.582 ms 148.670 ms 148.979 ms
9 cernet2.net (2001:da8:ac:ffff::2) 147.963 ms 147.956 ms 147.988 ms
10 2001:da8:201:[REDACTED] 147.964 ms 148.035 ms 147.895 ms
11 2001:da8:201:[REDACTED] 147.832 ms 147.881 ms 147.836 ms
12 2001:da8:201:[REDACTED] 147.809 ms 147.707 ms 147.899 ms
As can be seen in the traceroute above, seven hops before the client we find the 2001:252::/32 network , which is called “CNGI International Gateway Network (CNGIIGN)”. This network is actually part of CERNET, but on AS23911 , which is the network that connects CERNET with its external peers. A reasonable assumption is therefore that the MITM is carried out on the 2001:252::/32 network, or where AS23910 (2001:da8:1::2) connects to AS23911 (2001:252:0:1::1). This means that the MITM attack is being conducted from within China.
Response Time Analysis
The round-trip time between the client and server can be estimated by measuring the time from when the client sends it initial TCP SYN packet to when it receives a TCP SYN+ACK from the server. The expected round-trip time for connecting from CERNET to a Google server overseas would be around 150ms or more. However, in the captures we've analyzed the TCP SYN+ACK package was received in just 8ms (Peking) and 52ms (Chongqing) respectively. Again, this is a clear indication of an IP MITM taking place, since Google cannot possibly send a response from the US to CERNET within 8ms regardless of how fast they are. The fast response times also indicate that the machine performing the MITM is located fairly close to the network at Peking University.
Even though the machine performing the MITM was very quick at performing the TCP tree-way handshake we noticed that the application layer communication was terribly slow. The specification for the TLS handshake ( RFC 2246 ) defines that a ClientHello message should be responded to with a ServerHello. Google typically send their ServerHello response almost instantly, ie the response is received after one round-trip time (150ms in this case). However, in the analyzed captures we noticed ServerHello response times of around 500ms.
X.509 Certificate Analysis
The X.509 certificates were extracted from the two PCAP files to .cer files using NetworkMiner . We noticed that both users received identical certificates, which were both self signed for “google.com”. The fact that the MITM used a self signed certificate makes the attack easily detectable even for the non-technical user, since the web browser will typically display a warning about the site not being trusted. Additionally the X.509 certificate was created for ”google.com” rather than ”*.google.com”. This is an obvious miss from the MITM'ers side since they were attempting to MITM traffic to ”www.google.com” but not to ”google.com”.
Image: NetworkMiner showing list of X.509 certificates extracted from the two PCAP files
Certificate SHA1 fingerprint: f6beadb9bc02e0a152d71c318739cdecfc1c085dA copy of the fake certificate is available on Google drive thanks to GreatFire.org.
Certificate MD5 fingerprint: 66:D5:D5:6A:E9:28:51:7C:03:53:C5:E1:33:14:A8:3B
Conclusions
All evidence indicates that a MITM attack is being conducted against traffic between China's nationwide education and research network CERNET and www.google.com. It looks as if the MITM is carried out on a network belonging to AS23911, which is the outer part of CERNET that peers with all external networks. This network is located in China, so we can conclude that the MITM was being done within the country.
It's difficult to say exactly how the MITM attack was carried out, but we can dismiss DNS spoofing as the used method. The evidence we've observed instead indicate that the MITM attack is performed either by performing IP hijacking or by simply reconfiguring a router to forward the HTTPS traffic to a transparent SSL proxy. An alternative to changing the router config would also be to add an in-line device that redirects the desired traffic to the SSL proxy. However, regardless of how they did it the attacker would be able to decrypt and inspect the traffic going to Google.
We can also conclude that the method used to perform the MITM attack was similar to the Chinese MITM on GitHub , but not identical.
============================
週四,2014年9月4日23時55分零零秒(UTC / GMT)
中國MITM對谷歌分析
中國人正在運行的MITM攻擊SSL加密流量中國的大學和谷歌之間。 我們已經進行的攻擊的技術分析,從GreatFire.org請求,可以確認,這是針對www.google.com一個真實的SSL MITM並且它正在從內中國進行的。我們進行了接觸,通過GreatFire.org昨日(九月三日)有一個請求,分析涉嫌MITM,攻擊2數據包捕獲,才最終確定自己的博客文章。 從我們的分析得出的結論是,現在公佈為GreatFire.org最偉大的博客文章標題為部分“ 當局發動人在這方面的中間人對谷歌的攻擊 “。
在他們的博客中寫GreatFire.org:
從2014年8月28日報導出現在微博上和谷歌加中國用戶嘗試通過CERNET,該國的教育網絡,正在接受有關警告無效的SSL證書的信息訪問google.com及google.com.hk。 這些證據,我們將在這篇文章後來包括表明這是由中間人攻擊造成的。被調查以下數據包捕獲文件執行我們的網絡取證分析:
而當局一直阻止自6月4日訪問最多的事谷歌,他們已經保留了他們的手離開CERNET,中國的全國性教育和科研網絡。 然而,在通往新學年,中國當局發動了對谷歌一個人在這方面的中間人(MITM)攻擊。
拍攝地點 | 客戶端網絡名 | 採集日期 | 文件名 | MD5 |
---|---|---|---|---|
北大 | PKU6-CERNET2 | 2014年8月30日 | google.com.pcap | aba4b35cb85ed218 7a8a7656cd670a93 |
重慶大學 | CQU6-CERNET2 | 2014年9月1日 | google_fake.pcapng | 3bf943ea453f9afa 5c06b9c126d79557 |
客戶端和服務器的IP不會忽略
該分析捕獲文件包含純IPv6流量(CERNET是一個IPv6網絡),這使得分析有點不同,那麼平常。 我們不會透露隱私的原因在客戶端的IP地址,但他們似乎都合法的; 一個來自北京大學(網絡名PKU6-CERNET2),另一個來自重慶大學學報(CQU6-CERNET2)。 這兩個IP地址屬於AS23910 ,命名為“中國下一代互聯網CERNET2”。
北大門口,由galaygobi(知識共享署名2.0)
重慶大學門口,由Brooktse(知識共享署名-相同方式分享3.0)
收到www.google.com地址的IP是在這兩種情況下也合法,所以MITM不進行通過DNS欺騙。 北京大學客戶端連接到2607:f8b0:4007:804 :: 1013( GOOGLE-IPV6在美國)和重慶大學的連接到2404:6800:4005:805 :: 1010( GOOGLE_IPV6_AP-20080930澳大利亞)。
時間到現場(TTL)分析
時間生存(TTL)值從www.google.com收到的IP數據包是在兩種情況下248或249(注:TTL實際上是所謂的IPv6的術語“跳數限制”,但我們更喜歡用井建立所謂“TTL”反正)。 最高可能的TTL值是255,這意味著接收到的報文沒有提出結束了在客戶機之前超過6或7路由器啤酒花。 但是,路由器的預期數量上GOOGLE-IPV6的服務器和客戶端在北京大學之間跳躍大約是14路由器的低躍點數是在一個IP MITM發生的明顯標誌。
圖片: CapLoader既捕獲文件加載,顯示TTL值
下面是從AS25795在洛杉磯對北京大學的IP地址(與ARP網絡“產生的IPv6路由跟踪4or6.com工具):
#traceroute -6 2001:DA8:201:[刪除]
1 2607:f2f8:1600 :: 1(2607:f2f8:1600 :: 1)1.636毫秒1.573毫秒1.557毫秒
2 2001:504:13 :: 1A(2001年:504:13 :: 1A)40.381毫秒40.481毫秒40.565毫秒
3 * * *
4 2001:252:0:302 :: 1(2001:252:0:302 :: 1)148.409毫秒148.501毫秒148.595毫秒
5 * * *
6 2001:252:0:1 :: 1(2001:252:0:1 :: 1)148.273毫秒147.620毫秒147.596毫秒
7 pku-bj-v6.cernet2.net(2001:DA8:1:1B :: 2)147.574毫秒147.619毫秒147.420毫秒
8 2001:DA8:1:50D :: 2(2001年:DA8:1:50D :: 2)148.582毫秒148.670毫秒148.979毫秒
9 cernet2.net(2001:DA8:AC:FFFF :: 2)147.963毫秒147.956毫秒147.988毫秒
10 2001年:DA8:201:[刪除] 147.964毫秒148.035毫秒147.895毫秒
11 2001年:DA8:201:[刪除] 147.832毫秒147.881毫秒147.836毫秒
12 2001年:DA8:201:[刪除] 147.809毫秒147.707毫秒147.899毫秒
如在上面的跟踪路由中可以看出,在客戶端之前7啤酒花我們發現2001:252 :: / 32網絡 ,它被稱為“CNGI國際網關網絡(CNGIIGN)”。 該網絡實際上是賽爾的一部分,但在AS23911 ,它是與它的外部對等連接賽爾網絡。 因此,一個合理的假設是,MITM進行的2001年:252 :: / 32網絡,或者AS23910(2001:DA8:1:2)連接到AS23911(2001:252:0:1 :: 1) 。 這意味著,MITM攻擊正在從中國境內進行。
響應時間分析
客戶端和服務器之間的往返時間,可以通過測量從當客戶端發送它初始TCP SYN數據包時,它接收到一個TCP SYN + ACK從服務器到時間來估計。 預期的往返時間為從賽爾連接到谷歌服務器海外將約為150毫秒或更多。 然而,在捕獲,我們已經分析了接收,在短短的8ms(北京),並分別為52ms(重慶)的TCP SYN + ACK包。 再次,這是一個IP MITM發生的明顯標誌,因為谷歌不可能送的8ms內來自美國的回應CERNET不管他們的速度有多快。 快速的響應時間也表明,在執行MITM機器位於相當靠近網絡在北大。
即使執行MITM機器的速度非常快,在執行TCP樹握手,我們注意到,在應用層通信是非常緩慢的。 該規範的TLS握手( RFC 2246 )定義了一個ClientHello消息應該回應以ServerHello。 谷歌通常發送它們ServerHello響應幾乎瞬間,即響應一個往返時間(在此情況下,150毫秒)後接收。 然而,在被分析的捕獲,我們注意到大約500ms的ServerHello響應時間。
X.509證書分析
在X.509證書是從兩個PCAP文件提取到.CER使用文件NetworkMiner 。 我們注意到,這兩個用戶收到相同的證書,這是簽署了“google.com”這兩個自我。 該MITM中使用的自簽名的證書,這使得攻擊甚至對非技術用戶容易檢測的,因為web瀏覽器通常將顯示大約不被信任站點警告。 此外,該X.509證書的“google.com”創造,而不是“* .google.com”。 這是從MITM'ers側的明顯失,因為他們試圖MITM流量為“www.google.com”而不是“google.com”。
圖片:NetworkMiner表示從兩個PCAP文件中提取X.509證書列表
證書SHA1指紋:f6beadb9bc02e0a152d71c318739cdecfc1c085d假證書的副本可在谷歌驅動器感謝GreatFire.org。
證書MD5指紋:66:D5:D5:6A:E9:28:51:7C:03:53:C5:E1:33:14:A8:3B
結論
所有的證據都表明,一個MITM攻擊正在對中國的全國性教育和科研計算機網CERNET和www.google.com之間的流量進行。 它看起來好像MITM進行屬於AS23911一個網絡,這是賽爾的外部部分,與所有外部網絡對等體上。 該網絡位於中國,因此我們可以得出這樣的結論MITM正在該國境內進行。
這很難說究竟如何MITM攻擊進行了,但我們可以辭退DNS欺騙為使用的方法。 我們已經觀察到的,而不是有證據表明,MITM攻擊要么通過執行進行IP劫持或簡單地重新配置路由器的HTTPS流量轉發到一個透明的SSL代理服務器。 一種替代改變路由器配置也將增加一個串聯裝置,該期望的通信重定向到SSL代理。 然而,不管他們怎麼做的,攻擊者能夠解密和檢查交通去谷歌。
我們還可以得出結論,用於執行MITM攻擊的方法是類似於中國MITM GitHub上 ,但不完全相同。
短網址: http://netres.ec/?b=14955CB
=====================================================
http://www.ourlove520.com/News/zonghe/201503/352143.html
Swamped with pre-installed software on Samsung Huawei Heibang
Article Entry: Anonymous Editor: admin Updated: 2015-3-7 10:34:54
2014 "315" on the eve of a Internet company
released "phone preloaded software survey report" that the three
pre-installed software unreasonable risks: take a lot of phone memory,
automatic network traffic consumed, preset Trojan viruses cause disclosure of personal privacy.
Samsung preloaded rate of 97.5%
"Third-party companies brush will certainly be no safety factors, and some will destroy the stability of the system, like pre-installed PC system as well. "Paper CEO in Nanjing Yi Bin told reporters.
Nevertheless, in the highly competitive mobile phone software market,
APP operators in order to improve its own products in the mobile
Internet market share tends to "seize the initiative" in the phone
before it reaches the target user's own software that is preloaded .
Minister of Consumer Council's Legal Department, Shenzhen Jin told
"Consumer Reports" reporter, "the point of consumer complaints focused
mainly reflected in the pre-installed software will consume the phone in
the background flow, power, occupy the phone memory. These preinstalled
software only After obtaining root privileges to be uninstalled. "
But let consumers helpless, after root treatment phones, brand rework
point is usually no longer comply with the warranty obligations.
IResearch "Chinese smartphone preloaded software user survey report
2013" shows that China's domestic and international market circulation
mainstream brand mobile phones "have caught", topped the list of Samsung
is 97.5 percent of the phones are pre-existing third party install the
software situation. Nanjing easy Paper CEO Yu Bin told reporters, "Andrews systems
mainstream mobile phones will have varying degrees of pre, at least one
or two types, as many as dozens of species. parallel phone Original
less intact, the situation will be preloaded compare minor. "
The strange thing is, you can not enjoy the country's "three
guarantees" policy instead of parallel phone is preloaded with fewer
cases. Now a television company
's operations director Ding asked reporters to explain is that the
"parallel phone and then stores selling smuggled from abroad, the whole
assembly, little circulation, general stores only links can be
pre-installed."
Swamped with pre-installed software Samsung Huawei Heibang
Preinstalled unlimited phone
In the film company as director of operations before, Ding APP translation in the field of distribution channels "for years."
He told reporters: "The mobile phone sales channels and more channels
per link more experienced, so give APP operators to provide more
opportunities to cut into that cell phones can be shipped preinstalled
unlimited, unlimited uninstall again.."
Mr Ding worked most of the time was "at least the same phone brush four
times, each time a new implant preinstalled software." Location is a
Beijing Tongzhou Business Hall, "the former boss brush or salesperson to
some money line. "
It is understood that the mainstream mobile phone factory, pre-route
roughly threefold: First, when the factory phone, mobile phone
manufacturers in the direct system
built-in pre-installed software, the software vendors can develop their
own software, but also software and third-party co-APP . With vendors operating standardized malicious software preinstalled basic expelled brand market. Second, cooperation and communication operators, mobile phone software on a custom binding or contract machine. The third is a brush manufacturers in mobile phone sales channels directly cut into the middle and lower pre-installed.
However, a dedicated pre-installed software to help operators APP palm
Star conception manager surnamed Wang told reporters, "In fact, sales
channel flows downstream phones are mostly brush upstream suppliers have
been cut, but even so, the downstream channel is also unlikely to be
found phone unpacked traces "in order not to be other providers anti
brush Brush, Brush, another company - Ding open Internet company is the preferred mobile phone sales channels downstream preinstalled.
"This can reduce the phone by other manufacturers anti brush Brush
probability and shorten the time to reach the pre-installed software
consumers." White, director of its business philosophy, told reporters.
Even due to repeated brush on pre-industrial chain is very common,
tripod open palm stars such Brush quotient is "follow the trend of the
times", launched the "arrival" and "activate" the two billing methods.
Phone sold preinstalled software is still in the hands of consumers,
just "arrived", the software is point into use, be considered
"Activate."
With the recent pre-APP carriers demand is greater than the
pre-installed capacity Brush manufacturers, installed costs soared all
the way, from the initial 0.5 yuan each software mentioned above 1.5
yuan each software.
As Brush object, two brush machine manufacturers have said that they
are currently pre-installed "tentacles" have been extended to Samsung,
Huawei, millet and other mainstream brand mobile phones.
Swamped with pre-installed software on Samsung Huawei Heibang
Preinstalled software doorway
In the mobile phone sales channels, they must attack the "Brush providers" who has become the most crucial hub. In fact, to be brushed off the phone, whether or not to activate, distributors can get about 3-10 yuan per unit profit.
CCTV was in 2014 on the 315 because of pre-exposure of malware tripod open Internet company
philosophy white commercial director told the "Consumer Reports"
reporter, depending on each software category, whether it can unload the
demand charge each "reaches" phone preloaded cost at least 1.5 yuan.
Another trader palm brush Star conception company manager surnamed Wang, told reporters the "charter" and "Brush" in two modes of cooperation. Charter for small and medium channel that will be pushed into two main software system layer, and can not be directly unloaded.
Work in accordance with the number of the phone to activate the
software calculations, while 18% of the total mobile phone starting
activation. According to this mode of cooperation, each channel can get three yuan profit.
The brush is generally suitable for experienced and one hundred
thousand shipments monthly phone-level large-scale channels, the channel
needs to novice company 's help guide.
Brush entire legacy phone system replacement opportunity, the new
system and the original system difference is that the former is
implanted in their recommended software; this mode, you can do half of
the pre-installed software are left in the system layer. Whether or not the phone is activated, the channel can get about $ 10 each profit.
Consumers should return the right to uninstall
For now, the face of pervasive Brush, consumers usually no way.
Back in April 2013, the State Ministry of Industry issued "on the
strengthening of mobile intelligent terminal management notice"
(hereinafter referred to as the "Notice"), requires the same year in
November from handset manufacturers can not preset five categories of
malware. In November, the "notice" the official implementation, and now has in the past year.
The Chinese public legal aid lawyer Zhang Xingbin platform founder, is a bit helpless. He told reporters, "the Ministry" notice "more of the nature of the initiative, the lack of appropriate and binding."
However, in the White philosophical view, even though the "notice" is not the nature of the initiative, not a threat.
"Currently, Brush providers based on the Ministry for the mobile phone
pre-installed licenses. As long as APP to get permission of the Ministry
of preloaded preloaded no legal risk." He told reporters.
Although the "notice" does not stipulate the question of how to
perform, but in the Ministry of Industry conference by the end of
October 2013, the Ministry of Communication Development Division Deputy
Director workers had done Zhujun supplementary explanation that
"requiring manufacturers to apply intelligent network access terminal
application preinstalled software-related information. "
Accordingly, the reporter found that thirteen major mobile phone
manufacturers, only five parameters in the mobile column indicate the
built-in software applications, which are millet, apples, vivo, Meizu
and hammer.
Among them, millet and Apple applications are developed its own; hammer
will be built-in applications and third-party software preinstalled
separate clearly marked.
"Mobile pre-installed software is similar to a tying behavior,
according to the sales contract rights, business is obliged to inform
consumers of the tying product, but consumers should not be forced to
have to accept the tying product." Guangzhou Kingland Law Firm Zhu
Shaobo lawyer told reporters, the proposed regulations must be clear
right to uninstall the software pre-installed should be returned to
consumers.
At October 23, 2014, led by the Guangdong Provincial Council, to join
the province's 23 Council petitioned the Ministry of Industry, require
that the phone should be pre-installed software applications allow
consumers to freely unloaded.
| ||||
http://melody-free-shaing.blogspot.com/2015/03/by-liberty-times-reported-1-iraq.html
========================================================
*---By the Liberty Times reported (1) Iraq offensive attack in three columns IS ,, -!. (2) lost biological children abandoned children become more,,China 10 million people each year -! (3). <Editorials> China find Taiwan media brainwashing arguably doubts? - (4) are not allowed to report leaks ,,Under the Dome staff were suspended - by NTD,,NDTV reported (5) [interactive] Hot "Under the Dome" hot:! Smoke and mirrors - reported by the BBC.(6) West Africa Bamako, Mali attacks killed five people - (7) of the United States billions of e-mail data theft case:!! prosecutors indicted suspects hacking - & - [MEGA announced MEGAchat tests. Browser-based end-to-end encryption of audio and video chat: https: // at the beginning mega.nz] Twitter's Olhar numbers: Kim Dotcom lançaconcorrente do Skype - & - released by kaspersky.com ---''Twitter march Certification: SMS instead of the password?!" - & - by Cyper Kendra released '' uTorrent quietly installs BitCoin Mining Software! '' - & - issued by hotforsecurity.com ---"A bad week !! cybercriminals Britain! "-&- released by netresec.com 'Chinese MITM analysis on Google!?''-&- by ourlove520.com release of" pre-installed software on flooded Samsung Huawei Heibang !! "[article entry: Anonymous,,Editor : admin,,Update Time: 2015-3-7] -
---由自由時報報導的(1).伊拉克反攻IS,,兵分三路出擊!-(2).丟掉親生兒,,中國棄嬰變多,,每年10萬人!-(3).〈社論〉中國找台灣媒體洗腦真可釋疑?-(4).不准報導穹頂之下,,洩密員工遭停職!-由NTD,,新唐人電視台報導的(5).【热点互动】《穹顶之下》火爆: 雾里看花- 由BBC報導的(6).西非馬里首都巴馬科襲擊事件造成五人死亡 !-(7).美十億電郵數據被盜案:檢方起訴涉案黑客!--&- [MEGA宣布MEGAchat測試。 基於瀏覽器的終端到終端加密的音頻和視頻聊天: https://開頭 mega.nz ]Twitter的Olhar數字:金·達康lançaconcorrente做的Skype?!-&-由kaspersky.com發佈的---Twitter的進軍認證:短信代替密碼 !-&-由Cyper Kendra發佈的''uTorrent quietly installs BitCoin Mining Software!''-&-由hotforsecurity.com發佈的---"一個糟糕的一周英國網絡罪犯!!"-由netresec.com發佈的''中國MITM對谷歌分析!?''-由ourlove520.com發佈的"预装软件泛滥成灾 三星华为上黑榜!!"[文章录入:佚名,,责任编辑:admin,,更新时间:2015-3-7]-
**All The World City / Country Lauguage**-
http://melody-free-shaing.blogspot.com/2015/03/by-liberty-times-reported-1-iraq.html
===Melody.Blog===THE END===>/
&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&&
沒有留言:
張貼留言
window.___gcfg = {
lang: 'zh-CN',
parsetags: 'onload'
};