|
Coffee Shop Talk of a non sexual Nature Visit Sam's Alfresco Heaven. Singapore's best Alfresco Coffee Experience! If you're up to your ears with all this Sex Talk and would like to take a break from it all to discuss other interesting aspects of life in Singapore, pop over and join in the fun. |
|
Thread Tools |
#1
|
|||
|
|||
Hackers who want to hack PAP GOVT now is your god given chance
An honorable member of the Coffee Shop Has Just Posted the Following:
What are you waiting for? HACK the fuck of it NOW! Wikileak all their secrets! http://www.irishtimes.com/business/s...mmer-1.1759455 Heartbleed software security error was not deliberate, says programmer German programmer denies deliberately leaving ‘back door’ in OpenSSL encryption software Programmer Robin Seggelmann said the ‘Heartbleed’ error in the OpenSSL software used to encrypt web communications was “fairly trivial” but, overlooked, had created a “fairly severe” security threat. Programmer Robin Seggelmann said the ‘Heartbleed’ error in the OpenSSL software used to encrypt web communications was “fairly trivial” but, overlooked, had created a “fairly severe” security threat. Derek Scally Topics: Business Technology Consumer Technology Jaime Blasco Robin Seggelmann Alienvault Labs Cisco Systems Juniper Networks Yahoo ! YouTube Sat, Apr 12, 2014, 01:00 First published: Sat, Apr 12, 2014, 01:00 A German programmer has denied deliberately leaving a so-called back door when he programmed an update to software at the heart of the ‘Heartbleed’ worldwide online security scare. The hole was left by Robin Seggelmann in the OpenSSL software used to encrypt web communications. For three years it potentially allowed unauthorised access to memory of computer systems running the software, compromising everything from email passwords to credit card numbers. The programmer from the western city of Münster said he made the coding mistake in 2011 while contributing to the new “Heartbleed” function of OpenSSL, an open-source program to which anyone can contribute. Changes submitted by programmers are reviewed for errors before being added to the final release and distribution via the web. Dr Seggelmann told Spiegel Online the mistake was “fairly trivial” but, overlooked, had created a “fairly severe” security threat. Embedded faults The faults in the code remained part of the final software release for over two years, potentially allowing data theft from websites that encrypted their connections with the SSL software. With worldwide web security compromised, firms today raced to fix the problem. Leading tech giant Google and its YouTube subsidiary announced today that they had patched their services. Facebook followed suit, saying there was no need for users to change their passwords. Of the major tech players, only Yahoo has encouraged users to change their passwords. It also emerged today that the Heartbleed flaw has been found in the hardware connecting homes and businesses to the internet, underscoring the amount of time and effort that will be needed to defuse the threat. Cisco Systems and Juniper Networks said some of their networking products were susceptible to the encryption bug. Security experts urged consumers to change their web passwords immediately, but it will take longer to fix networking equipment and software because Cisco and Juniper will have to rely on customers applying the patches they push out, according to Jaime Blasco, director of internet security research firm AlienVault Labs. ‘More painful’ “It’s more painful to update these kinds of devices,” Mr Blasco said. “You have to go one by one.” The vulnerability affects several of the routers, switches and security firewalls sold by Cisco and Juniper, the two manufacturers said in statements today. Cisco said it would tell customers when software patches for its affected products were available. “We encourage our customers to visit our website for ongoing updates.” Juniper issued a patch earlier this week for its most vulnerable products that feature virtual private network (VPN), technology. VPNs offer a secure way to connect remotely to corporate networks. Click here to view the whole thread at www.sammyboy.com. |
Advert Space Available |
Bookmarks |
|
|