Shaila’s Weblog

SAN FRANCISCO — You might think your password protects the confidential information stored on Web sites. But as Twitter executives discovered, that is a dangerous assumption.
The recent hacking of a Twitter employee’s personal e-mail account is raising questions about the security of storing personal information and business data on the Internet.

The Web was abuzz Wednesday after it was revealed that a hacker had exposed corporate information about Twitter after breaking into an employee’s e-mail account. The breach raised red flags for individuals as well as businesses about the passwords used to secure information they store on the Web.
hat account housed some of Twitter’s private financial documents and notes, according to Twitter’s official blog.

Some of those documents circulated the blogosphere on Wednesday, and TechCrunch, a technology blog, published a Twitter financial forecast. The hacker sent 310 documents to the tech site, according to a post by Michael Arrington, TechCrunch’s founder and co-editor.

he attack on Twitter highlights the problem. For its internal documents, the company uses the business version of Google Apps, a service that Google offers to individuals free. Google Apps provides e-mail, word processing, spreadsheets and calendars over the Web.

The content is stored on Google’s servers, which can save time and money and enable employees to work together on documents at the same time. But it also means that the security is only as good as the password. A hacker who breaks into one person’s account can access information shared by friends, family members or colleagues, which is what happened at Twitter.

The Twitter breach occurred about a month ago, Twitter said. A hacker calling himself Hacker Croll broke into an administrative employee’s e-mail account and gained access to the employee’s Google Apps account, where Twitter shares spreadsheets and documents with business ideas and financial details, said Biz Stone, a Twitter co-founder.

The hacker then sent documents about company plans and finances, confidential contracts, and job applicants to two tech news blogs, TechCrunch, in Silicon Valley, and Korben, in France. There was also personal information about Twitter employees including credit card numbers.

The hacker also broke into the e-mail account of the wife of Evan Williams, Twitter’s chief executive, and from there accessed several of Mr. Williams’ personal Internet accounts, including those at Amazon and PayPal, Mr. Stone said.

TechCrunch revealed documents showing that Twitter, a private company that so far has no revenue, projected that it will reach a billion users and $1.54 billion in revenue by 2013. Michael Arrington, TechCrunch’s founder, said in an interview that the hacker had also sent him detailed strategy documents about potential business models, the competitive threat from Facebook and when the company might be acquired.

Some analysts say the breach highlights how dangerous it can be for people and companies to store confidential documents on Web servers, or “in the cloud.”

But Mr. Stone said that the attack “isn’t about any flaw in Web apps,” but rather about a bigger issue that affects individuals and businesses alike. “It speaks to the importance of following good personal security guidelines such as choosing strong passwords,” he said.

Instead of circumventing security measures, it appears that the Twitter hacker managed to correctly answer the personal questions that Gmail asks of users to reset the password.

“A lot of the Twitter users are pretty much living their lives in public,” said Chris King, director of product marketing at Palo Alto Networks, which creates firewalls. “If you broadcast all your details about what your dog’s name is and what your hometown is, it’s not that hard to figure out a password.”

Security experts advise people to use unique, complex passwords for each Web service they use and include a mix of numbers and letters. Free password management programs like KeePass and 1Password can help people juggle passwords for numerous sites.

Andrew Storms, director of security operations for nCircle, a network security company, suggested choosing false answers to the security questions like “What was your first phone number?” or making up obscure questions instead of using the default questions that sites provide. (Of course, that presents a new problem of remembering the false information.)

For businesses, Google allows company administrators to set up rules for password strength and add additional authentication tools like unique codes.

The Twitter hacker claims to have wanted to teach people to be more careful. In a message to Korben, the hacker wrote that his attack could make Internet users “conscious that no one is protected on the Net.”
Shaila Smith

John Wooden
Be more concerned with your character than your reputation, because your character is what you really are, while your reputation is merely what others think you are.

Abraham Lincoln
Character is like a tree and reputation its shadow. The shadow is what we think it is; the tree is the real thing.

Warren Buffet
“It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you’ll do things differently.”

Marcus Tullius Cicero
“When you wish to instruct, be brief; that men’s minds take in quickly what you say, learn its lesson, and retain it faithfully. Every word that is unnecessary only pours over the side of a brimming mind.”

Colin Powell
“Success is the result of perfection, hard work, learning from failure, loyalty, and persistence.”

If a drop of water falls in lake there is no identity. But if it falls on a leaf of lotus it shines like a pearl. So choose the best place where you would shine…

NEW DELHI: Britain has put a roadblock on India’s efforts to get Jaish-e-Mohammad founder Maulana Masood Azhar on the UNSC terror list. India’s request to put the JeM chief along with Lashar-e-Taiba intelligence chief Azam Cheema, who is an accused in the Mumbai train blasts, on the list has hit a hurdle after Britain asked for a confirmation of the evidence provided by India. China has also raised similar objections, but it is the British doublespeak that has angered India more and is being seen as an attempt by Britain to play both sides.

China, sources point out, has been consistent in its position of trying to block such bids. It was China’s opposition that had kept the Jamaat-ud-Dawa and its chief Hafiz Mohammad Sayeed off the UNSC terror list for a long time. After the Mumbai terror attacks, even China could not block India’s renewed bid to proscribe the JuD as a Let front.

After getting the JuD proscribed in December, India had then move to put Maulana Azhar, who was released by India in exchange for hostages of the hijacked IC-814 flight, on the UNSC terror list. Since the Jaish e Mohammad and LeT are already proscribed by the UNSC, New Delhi had hoped that complications would not arise in getting the two on the list even though it anticipated opposition from known quarters.

However, it was certainly not anticipating Britain to seek more evidence. The British move is being seen as unpalatable considering that the UK has also been the target of a series of terror attacks.

The British themselves have tried to justify their move by saying that they want to ensure that India has a foolproof case against Masood Azhar and Cheema. But this explanation has failed to find any takers in New Delhi which is confident of the case it has against Masood Azhar, who is accused of masterminding the Parliament attacks, and Cheema, who is wanted for the Mumbai train blasts.

This episode has once again revived memories of Mr Miliband’s disastrous visit to India in January this year. Mr Miliband managed to kick up a diplomatic storm after he linked the resolution of the Kashmir issue to the Mumbai terror attacks. He was further accused of being arrogant during bilateral talks.

In spite of the road block, India will continue with efforts to get the two on the UNSC list of terrorists and terror organisations, which was set up through the “Al Qaeda and Taliban Sanctions” resolution (1267). Individuals and groups on this list are subjected to a travel ban, freezing of accounts and a travel ban.

India is keen to get the JeM chief on the UNSC list even though Pakistan has continued to express ignorance about his whereabouts. This is seen as one of the ways to put pressure on Pakistan. After the JuD was proscribed, Pakistan was forced to arrest Sayeed and take some preliminary action against the JuD, which had for long been operating as a charity organisation.

For All animal lovers, Animal love can be dangerous- especially if you are in love with Swine!

swine flu cause

Think twice before you kiss any swine – it might cause swine flue!!

image002

Swine flu spreads in the same way as ordinary colds and flu.

image003

Swine influenza does not normally infect humans, although this occasionally does occur – usually in people who have had close contact with pigs.

image004

Swine flu regularly causes outbreaks in pigs.

image005

Pity the poor pig. The otherwise estimable mammal has never had a very good rep — something about the mud, the snout, the oink. Now add the flu.

image006

When bird flu viruses replicate in pigs, they pick up the viral machinery that gives more selective flu strains the power to spread to other mammals, like us. That’s what makes pigs such potent mixing bowls for flu.

image007

Avian flu that is passed through the pig’s mammalian system, however, can be passed readily among humans.

image010

Pigs that carry influenza tend not to die en masse the way flocks of birds do, eliminating the immediate tip-off that a serious pathogen is at large.

image011

I was just reading the nytimes news report (dt: December 24, 2007) that US officials see waste in Billions of American money sent to Islamic Republic of Pakistan, a country located in South Asia, defamed for harbouring Global terrorists and terrorist organizations like Al kaida, taliban, lashkar a toiba.

This American money had been diverted to help finance weapons systems designed to counter India, not Al Qaeda or the Taliban, the officials said, adding that the United States has paid tens of millions of dollars in inflated Pakistani reimbursement claims for fuel, ammunition and other costs.

This is now evident, as they used the American money to enrich their goal of making improvised Islamic nuclear bomb with the help of china. They succeeded in their plans, they made nuclear bombs, proliferated the nuclear technology to terrorist states like North Korea in exchange of missile technology and still harboring global terroirsts and reaping money.

But US strategists and law makers are still sleeping, they are not understand the pakistan is making fool of them and reaping US tax payers money for their own cause of developing  weapons of mass destruction. Recently, U.S. Secretary of State Hillary Clinton said that the United States would provide $100 million to Pakistan in humanitarian aid such as food, tents, radios, generators and other items and that the U.S. Defense Department would give a further $10 million in unspecified assistance. After announcing this huge money of $110 million to Pakistan, she said that “Providing this assistance is not only the right thing to do but we believe it is essential to global security and the security of the United States and we are prepared to do more as the situation demands,” .

Clinton also described the last three decades of U.S. policy toward Pakistan as “incoherent,” saying that the United States had worked with Pakistan to arm the Mujahideen fighters who helped drive the Soviet Union from Afghanistan in the 1980s only to effectively abandon both countries.

She needs to understand that they shake hands with US for their own strategic interests and they got huge money in return of their grey support to US during these years.

They are now a bigger threat than afganistan and long time enemy Russia…as it is now starkly evident that they are the biggest nuclear proliferator regime in the world.

A recent Congressional report has told US lawmakers that North Korea received designs for uranium enrichment centrifuges from Pakistan’s disgraced nuclear scientist A Q Khan in return for its long range missiles.

I don’t understand the use of AQ khan instead of Pakistan because North Korea has provided missiles to Pakistan not to AQ Khan. North Korea has been exporting missiles to countries in the Middle East and South Asia and has had joint collaboration in development of missiles with Iran and Pakistan, it said.

In the 1990s, North Korea exported Scud and Nodong missiles to Pakistan, Iran, Yemen, Syria and reportedly Egypt. It entered into joint development programmes with both Pakistan and Iran.

Pyongyang received designs for uranium enrichment centrifuges from Pakistan nuclear “czar” A Q Khan and has attempted to purchase overseas key components for uranium enrichment centrifuges, but some of these purchases have been blocked, according to the report.

Even after so many reports were declassified to US law makers they are still providing hundreds of millions of dollars to Pakistan and they in turn are conspiring with Iran and North Korea to design new power corridor by developing weapons of mass destruction. I am not a strategic analyst, nor I am a defense person…  I am just a common citizen but still I wish to know from our responsible / sensible government, why they are directly/ indirectly supporting terrorist nations.



The Deo Ad – Really Creative! – “People Move Away When You Have Body Odour”.

deoadvert

Life-size stickers of people were stuck on automatic sliding glass doors at a mall in Mumbai, India. When someone approaches the doors move apart and it feels like the people on the door are moving away. The person enters to find the message ‘People Move Away When You Have Body Odour’.

In a country where ghosts are traditionally believed to hide in the loo, a Japanese company is advertising a new literary experience – a horror story printed on toilet paper.

suzuki-t
Each roll carries several copies of a new nine-chapter novella written by Koji Suzuki, the Japanese author of the horror story `Ring,` which has been made into movies in both Japan and Hollywood.

suzuki-ring

suzuki-blue

`Drop,` set in a public restroom, takes up about three feet (90 centimeters) of a roll and can be read in just a few minutes, according to the manufacturer, Hayashi Paper.

The company promotes the toilet paper, which will sell for 210 yen ($2.20) a roll, as “a horror experience in the toilet.”

Toilets in Japan were traditionally tucked away in a dark corner of the house due to religious beliefs. Parents would tease children that a hairy hand might pull them down into the dark pool below.

HOUSTON: A decommissioned Navy warship USNS General Hoyt S Vandenberg has been intentionally sunk off the Florida Keys to create the world’s second largest artificial reef which will serve as a long-term habitat for several marine fish species.

The 17,250-tonne ship USNS Vandenberg sank in the Florida Keys National Marine Sanctuary on Wednesday in less than two minutes, said Andy Newman, spokesman for the Florida Keys Tourism Council.

“It went down like a rock,” Newman was quoted as saying by CNN. “Everything looked very, very smooth.”

The goal of the $8.6 million project is to divert fishing and diving pressure away from natural reefs, according to the Florida Fish and Wildlife Conservation Commission.

The Vandenberg was built in 1943. It was commissioned as a World War II troop transport ship. After Japan surrendered, the Vandenberg was the first Navy ship to return to New York Harbour.

During the 1950s, the ship was used to transport refugees from Europe and Australia to America. In the 1960s the Air Force used the Vandenberg to track missiles. It also was used to track rockets and early space shuttle launches.

The ship, which was decommissioned in 1986, featured in the 1999 movie Virus, starring Donald Sutherland and Jamie Lee Curtis.

The age-old love triangle of Archie comics has finally been broken, after Riverdale’s ultimate playboy Archie Andrews the beloved, freckled protagonist of the Archie comic books picked the vixen Veronica over girl-next-door Betty to be his wife.

ArchieComicsLogo

So what if Betty was a blonde, loyal and kind- when it came to popping the question Archie chose the raven-haired, charming and rich Veronica.

After 67 years of being in a dilemma, Archie – the eternal teenager is all set to tie the knot with the vixen-a choice that left many Archie comic fans in gasps.

Archie Comic Publications announced on May 27 that the flighty redhead from Riverdale picked Veronica over Betty Cooper.

Already in mid-May, the publisher sent speculation swirling when it announced a special marital-themed storyline for release in August, but didn’t reveal the lucky lady.

The wedding will take place after the gang graduate from college, and venture out into the working world.

However, the response to the proposal has been markedly divided-Betty fans are outraged that the girl next door has been ditched yet again for the beautiful, yet spoilt, Ronnie.

While many fans are questioning whether Archie should marry at all, because it could mean a possible end to the enduring comic-book soap opera.

The cover of Archie Comics (issue 600) shows Archie proposing to Veronica.

a

Pages

July 2020
M T W T F S S
 12345
6789101112
13141516171819
20212223242526
2728293031