See also IT News - DDoS Attack On Wikileaks Improving - tetrahedrassface writes "According to the Twitter feed for Wikileaks, the assault on the controversial site is improving and is now at 10 Gigabits per second. In light of the recent release of highly sensitive documents and calls by many lawmakers around the world to swiftly find, extradite, and try suspected rapist Julius Assange for breaches of national security,
office pro 64 bit key, one nation, Ecuador,
microsoft office Ultimate 2007, has offered asylum." - Facebook's 'Like This' Button Is Tracking You - Stoobalou submitted a story about some of the most obvious research I've seen in a while ... "A researcher from a Dutch university is warning that Facebook's 'Like This' button is watching your every move. Arnold Roosendaal, who is a doctoral candidate at the Tilburg University for Law,
office 2007 Professional Plus license, Technology and Society, warns that Facebook is tracking and tracing everyone,
office 2010 Professional cd key, whether they use the social networking site or not. Roosendaal says that Facebook's tentacles reach way beyond the confines of its own web sites and subscriber base because more and more third party sites are using the 'Like This' button and Facebook Connect." - GNU Savannah Site Compromised - Trailrunner7 writes "A site belonging to the Savannah GNU free software archive was attacked recently, leading to a compromise of encrypted passwords and enabling the attackers to access restricted project material. The compromise was the result of a SQL injection assault against the savannah.gnu.org site within the last couple of days and the site is still offline now. A notice on the site says that the group has finished the process of restoring all of the data from a clean backup and bringing up access to some resources, but is still in the middle of adjusting its security settings." - Aussie Government Gives PDF the Thumbs Down - littlekorea writes "The central IT office of the Australian Government has advised its agencies to offer alternatives to Adobe's Portable Document Format to ensure folks with impaired vision are able to consume information on the Web. A Government-funded study found that PDFs can present themselves as image-only files to screen readers, rendering the information contained within them unreadable for the vision impaired." - Assault of the Trojan Printers - snydeq writes "Security professionals are tapping Trojan horse access points cloaked in printers and other office equipment to infiltrate clients who want their defenses tested, InfoWorld reports. Attackers dressed in IT supplier uniforms drop off printers to a company for a test-drive. Once the device is connected to the network, the penetration testers have a platform behind any perimeter defenses from which to attack. 'You can put your box inside a printer tray and glue it shut,
microsoft office pro 2010 32 bit key, and who will notice if there are one or two or three power cables coming out?' one security researcher says of the method. A variant of the assault, presented by Errata Security at the Defcon hacking convention, uses an attack-tool-laden iPhone mailed to a target company to get inside the firm's network defenses."