The Emperor’s Garden

The Emperor instructed the gardener to set up the new court’s garden. “I want you to plant five trees growing the Crataan fruit,” the Emperor said, “Because we asked people what fruit they like best, and most named the Crataan fruit!”

The gardener replied, “Emperor, that is excellent thinking! But let me make some suggestions: First, how about we make one of the five trees bear the Muran fruit. Only one out of ten citizens loves it, but those peculiar citizens tend to love multiple times as much!”

“Second,” the gardener continued, “How about we make one of the five trees bear the Dratean fruit. No one loves it, but that’s because no one knows it yet!”

“Third,” the gardener said, “How about we leave one spot in the garden empty. Who knows what new type of tree we’ll discover that we can put there in the future!”

“Fourth,” the gardener spoke, the Emperor still seated on his throne, though growingly unrestful, “How about we plant one tree with no fruits at all. Its sparseness will serve as contrast to remind us how grateful we should be for all the other trees.”

“Fifth,” the gardener said, “Let us plant one tree which we’ll pick randomly. We thereby give fate a chance to escape the restrictions of human thinking, and excel even this land’s wisest man – you, my Emperor!”

http://blogoscoped.com/archive/2011-08-26-n80.html

Advertisements

How to secure your WordPress site against hacker attacks

How to secure your WordPress site against hacker attacks.

via How to secure your WordPress site against hacker attacks.

I recently had my WordPress websites for one of my clients shut down because of the recent increase of hacker attacks.

So I recently installed not only a firewall but one of my favorite plug-ins to limit login attempts.

http://wordpress.org/plugins/wordfence/

http://wordpress.org/plugins/better-wp-security/

http://wordpress.org/plugins/limit-login-attempts/

I was surprised at the number of bots and attempts to break into my humble sites so if you own a wp site ,do yourself a favor and install some security . The number one task is to replace the default admin login by creating another  admin user with a different secure pass username

http://www.pctools.com/guides/password/

Log out and test the new admin user before implementing any of the other security measures.

Cheers

What you need to know about the world’s biggest DDoS attack

Gigaom

This story was updated at 2.15am PT on Thursday to reflect CyberBunker’s denial that it or its hosting customers ever sent spam. The company does not deny involvement in the attack, though.

The last week has seen probably the largest distributed denial-of-service (DDoS) attack ever. It’s being reported in fairly dramatic terms, with the New York Times and BBC talking about the internet getting jammed or slowed down.

So what’s actually going on? Here’s a rundown of some key points:

A what attack?

DDoS attacks, as the “distributed” part suggests, involve large numbers of computers bombarding a target system with traffic, with the idea being to stop that system from functioning. A bunch of South Korean banks and broadcasters got temporarily crippled by such an attack a week ago, for example.

Who got hit this time?

The intended target appears to be Spamhaus, a European organization that maintains…

View original post 860 more words

Server Information – D9 Solutions Ltd.

wp-login.php DDOS Attack (In Progress)

Over the past 24 hours there has been a widespread DDOS campaign targeting the popular CMS script WordPress, in particular the file used to log into the admin area of the script; wp-login.php. Large numbers of IP addresses from across the world have been attacking any files they can find, resulting in massive issues for web hosts and the stability of web servers.

The last week has seen probably the largest distributed denial-of-service (DDoS) attack ever. It’s being reported in fairly dramatic terms, with the New York Times and BBC talking about the internet getting jammed or slowed down.

So what’s actually going on? Here’s a rundown of some key points:

A what attack?

DDoS attacks, as the “distributed” part suggests, involve large numbers of computers bombarding a target system with traffic, with the idea being to stop that system from functioning. A bunch of South Korean banks and broadcasters got temporarily crippled by such an attack a week ago, for example.

Read more

In addition  the attacks are now  being used by a “Map” of the WordPress  community to attack and break into anyone with admin as their user name… one of the largest attacks ever and has resulted in many isps shutting down any access to your word press installation .

How you may have inadvertently participated in recent DDoS attacks

The botnets driving the recent distributed denial of service attacks are powered by millions of infected computers. Their coordinated flood of requests overwhelms the Internet’s DNS servers, slowing them down and even knocking the servers offline. The long-term solution for site operators and visitors alike may rely on reluctant ISPs working together.

find out how  you can   protect your site and computer

Read More

Cheers

WindowsAndroid runs Google’s mobile OS natively on the Windows kernel

By Alexis Santos posted Jan 27th, 2013 at 1:49 AM

Sure, you could enjoy Android on your PC through dual-booting or virtualization, but the folks at Socketeq have whipped up yet another alternative: a port of Mountain View’s mobile OS, fittingly dubbed WindowsAndroid, that runs natively on the Windows kernel (under Vista, 7 and 8) instead of Linux. Not only does the operating system run speedily since its free of virtualization chains, but it serves up the appropriate tablet or smartphone UI based on window size, and plays nice with keyboards and mice, to boot. Socketeq’s solution serves up the full Android experience, but you’ll have to separately flash the Google apps that typically come baked in, according to Android Police. Ice Cream Sandwich is the freshest flavor of Android to have undergone the kernel-replacement treatment, and it’s currently being offered as a free “first-try” download at the source.

Filed under: , , , ,

Comments

Via: Android Police

Source: Socketeq

and the download file

The 5 biggest tech myths | Fox News

For an industry that’s based on math, science and engineering, technology sure spawns a surprising amount of myths.

Some of these myths are amusing or only mildly annoying. A relative might send you a chain email claiming that Microsoft will pay you cash to forward it on. Another rumor surfaces occasionally that Facebook is going to start charging users a subscription fee.

However, clinging to certain myths can cost you time and money. Let’s take a closer look at these serial offenders.

1. Macs never get viruses

Last year’s outbreak of the malicious Trojan called Flashback infected more than 600,000 Macs. The year before that, the fake anti-virus rogueware known as MacDefender also caused chaos for Mac users.

These high-profile security breaches were a wake-up call for Mac users who believed that Apple computers were immune to the viruses that plague PC users.

Apple once boasted in its ads that Mac users could relax and let the built-in defenses of OS X do all the heavy lifting to safeguard their data. The tech giant has since toned down that message.

Don’t let your purchase of a Mac lull you into a false sense of security. Like PC users, Mac users should make safe browsing and vigilant virus monitoring a top priority.

Download one of the excellent — and free — Mac security programs in my Security Center. And keep it up to date!

2. You get what you pay for with software

Even with budget systems available, computers are a sizeable investment. Fortunately, the software you install doesn’t have to add to the bill.

Modern computer users are lucky to have a vast and growing library of free, open-source software available. Open-source free software can save you hundreds or thousands of dollars over commercial programs without sacrificing essential features.

LibreOffice and Thunderbird, for example, are free programs that can effectively replace Microsoft Office and Outlook. GIMP is a popular free alternative to Adobe Photoshop.

Free software isn’t about all work and no play. VLC is one of the best media players available. It will handle nearly any video or movie format you throw at it, including DVD and Blu-ray.

Click here for a larger list of free software that you’ll love.

3. The more megapixels, the better the camera

Many consumers focus too much on megapixel count when buying cameras. A 16MP camera has to be better than a 12MP camera, right?

Read more: http://www.foxnews.com/tech/2013/02/09/5-biggest-tech-myths/#ixzz2Kbr6t7TH

The rest of the myths

via The 5 biggest tech myths | Fox News.

The Intermediate Guide to Mastering Passwords with LastPass

LastPass is easy, secure, and works across systems and browsers—it’s our favorite password solution. Here’s how to take LastPass further: force saving on uncooperative sites, manage notifications, “rate” your passwords, use two-factor authentication, and more.

If LastPass is intriguing, but you’ve not quite made the jump, consider our previous feature on why it works so darned well. Founding editor Gina Trapani also considers LastPass as the sweet spot between convenient and security, as detailed in this embedded entry from her Work Smart video series:

Once you’ve picked up the basics of importing and storing passwords, Secure Notes, and setting up your browsers with LastPass instead of insecure password storage, you can get more out of LastPass by exploring its features around the edges.

via The Intermediate Guide to Mastering Passwords with LastPass.

For a review and link to last pass

Security Holes Almost Everyone’s Vulnerable To

WEP/WPA Passwords on Your Router Are Easy to Crack

Chances are that your router is using either a WPA (Wi-Fi Protected Access) password or a WEP (Wired Equivalent Privacy) password. Unfortunetly, it’s pretty simple to crack a Wi-Fi network’s WPA password and a WEP password.

Both of these vulnerabilities exist for different reasons. In the case of WEP, it’s as simple as cracking the password with an automated encyrption program (and a lot of time), while in WPA, it’s more about a vulnerability in WPS (Wi-fi Protected Setup) on certain routers. This can be corrected by turning WPS off. If you can’t turn WPS off, you can install DD-WRT or Tomato so you can. DD-WRT should add a nice security layer to your home network.

via 5 Security Holes Almost Everyone’s Vulnerable To.

ScanNow for Universal Plug and Play (UPnP) | Rapid7

The free scanner checks whether your network-enabled devices might be vulnerable to attack through the UPnP protocol.

Recent research from Rapid7 revealed that around 40-50 million network-enabled devices are at risk due to vulnerabilities found in the Universal Plug and Play (UPnP) protocol. UPnP enables devices such as routers, printers, network-attached storage (NAS), media players and smart TVs to communicate with each other. Three groups of security flaws in the protocol are exposing millions of users to remote attacks that could result in the theft of sensitive information or other criminal activity such as spying.

via ScanNow for Universal Plug and Play (UPnP) | Rapid7.

via ScanNow for Universal Plug and Play (UPnP) | Rapid7.