Beta

Slashdot: News for Nerds

×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Anonymous Claims To Have Hacked Sony PSN Again

samzenpus posted about 2 years ago | from the we're-back dept.

Security 239

hypnosec writes "Anonymous has claimed a new attack on Sony's PlayStation Network, and this time around it seems they have information from nearly 10 million user accounts. As a proof of the hack they dumped more than 3000 credentials online in the form of a pastebin post. The notorious hacktivist group is claiming that the entire set of hacked credentials contains over 10 million PSN accounts and that the file is of around 50GB." Update: 08/16 13:12 GMT by S : Sony has denied this claim.

cancel ×

239 comments

gdammit (-1)

Anonymous Coward | about 2 years ago | (#41008721)

gdammit

Why do people still use Sony (0, Troll)

Anonymous Coward | about 2 years ago | (#41008725)

Why are people still using Sony? They have done so much evil and have clearly shown that they don't care about protecting their users/customers.
Do people really like to be abused that much?

Re:Why do people still use Sony (0)

Anonymous Coward | about 2 years ago | (#41008765)

Yeah, Blizzard ftw.

Re:Why do people still use Sony (-1, Troll)

Kartu (1490911) | about 2 years ago | (#41008821)

Exactly what evil has Sony done pretty please?

Re:Why do people still use Sony (1, Redundant)

rvw (755107) | about 2 years ago | (#41008879)

Exactly what evil has Sony done pretty please?

They invented My First Pony!

Re:Why do people still use Sony (0)

Anonymous Coward | about 2 years ago | (#41009307)

They invented My First Pony!

And now, a conversation [youtube.com] between Anonymous and Sony; I'm just not sure who's who. (Oh, wait, now I'm sure. How could I have forgotten P for Pinketta [youtube.com] :)

Re:Why do people still use Sony (3, Informative)

Vanderhoth (1582661) | about 2 years ago | (#41008917)

I don't think there's enough space to list everything here.

Off the top of my head we can start with rootkit CDs, locking users out of their PSN accounts and denying them products they've already paid for, removal of the Other OS and poor security.

Re:Why do people still use Sony (2, Insightful)

Caerdwyn (829058) | about 2 years ago | (#41009529)

So to punish Sony for hurting their customers, Anonymous hurts Sony customers. But Anonymous is stealing credit card info for YOUR benefit!

Good going, guys. Way to take the moral high road and to convince the public to support you. What's next, scrambling blood types in breached medical records databases to teach insurance companies a lesson with dead patients, so you can portray yourselves as Robin Hoods with a pile of bodies?

Re:Why do people still use Sony (2)

CodeHxr (2471822) | about 2 years ago | (#41009621)

...But Anonymous is stealing credit card info for YOUR benefit!...

Where does TFA state that? Anonymous didn't mention anything about credit card info that I was able to see. Maybe its been modified in the time between when you read TFA and when I read TFA. Oh... wait...

Re:Why do people still use Sony (5, Informative)

andydread (758754) | about 2 years ago | (#41009007)

erm.. how about installing rootkits on people's computers disabling their CD drives in the name of "stopping piracy" then having the arrogance to claim that "people shouldn't worry about it, most of them commoners don't even know what a rootkit is so why all the fuss?" How about bankroling some of the most Draconian censorship laws for the Internet? PIPA, SOPA, ACTA, DMCA, PROTECT-IP all bankrolled and lobbied for by Sony and friends. Not to mention their relentless attempts to proprietize media formats. But wait... there's more! They sell you a device then remove features that you paid for after the fact then changed their EULA so that if you cannot sue them when they screw up. And this is just the tip of the iceberg. Sony used to be a good company when they only made hardware. The day Sony got into the content business is the day Sony went sour.

Re:Why do people still use Sony (2)

Charliemopps (1157495) | about 2 years ago | (#41009751)

The last hack... that resulted in us finding out they basically had no security at all.
The Rootkit DRM
Price fixing of CDs
Everything SOE (their subsidiary) has done since they bought Verrant has been pretty evil.

For the same reason people keep using Linux? (-1, Offtopic)

Anonymous Coward | about 2 years ago | (#41008967)

Because they don't know any better and because they can't learn from mistakes.

As far as the YEARS of /. propoganda of "Linux = Secure, Windows !=Secure"? I can only put out Linux's fails from 2011-2012 also:

2012:

Medicaid hack update: 500,000 records and 280,000 SSNs stolen:

http://www.zdnet.com/blog/security/medicaid-hack-update-500000-records-and-280000-ssns-stolen/11444 [zdnet.com]

So, what's dts.utah.gov running everyone?

LINUX (and yes, it got HACKED) -> http://uptime.netcraft.com/up/graph?site=dts.utah.gov [netcraft.com]

What's health.utah.gov running too??

YOU GUESSED IT: LINUX AGAIN -> http://uptime.netcraft.com/up/graph?site=health.utah.gov [netcraft.com]

* Ah, yes - see the YEARS OF /. "BS" FUD is CRUMBLING AROUND THE PENGUINS EARS HERE & 2012's starting out just like 2011 did below!

===

2011:

KERNEL.ORG COMPROMISED - The Cracking of Kernel.org: (that's VERY bad - do you trust it now?)

http://linux.slashdot.org/story/11/08/31/2321232/Kernelorg-Compromised [slashdot.org]

---

Linux.com pwned in fresh round of cyber break-ins:

http://www.theregister.co.uk/2011/09/12/more_linux_sites_down/ [theregister.co.uk]

---

Mysql.com Hacked, Made To Serve Malware:

http://it.slashdot.org/story/11/09/26/2218238/mysqlcom-hacked-made-to-serve-malware [slashdot.org]

What's that site running? You guessed it - Linux -> http://uptime.netcraft.com/up/graph?site=mysql.com [netcraft.com]

---

London Stock Exchange serving malware:

http://slashdot.org/submission/1484548/London-Stock-Exchange-Web-Site-Serving-Malware [slashdot.org]

(I mean hey - NOT ONLY DID LINUX FALL FLAT ON ITS FACE less than a few minutes into the job http://linux.slashdot.org/story/11/02/19/0147232/London-Stock-Exchange-Price-Errors-Emerged-At-Linux-Launch [slashdot.org] , & crash not only ONCE, but TWICE there? You see "Linux 'fine security'" in motion @ the LSE too!)

---

DUQU ROOTKIT/BOTNET BEING SERVED FROM LINUX SERVERS:

http://it.slashdot.org/story/11/11/30/1610228/duqu-attackers-managed-to-wipe-cc-servers [slashdot.org]

---

Linux Foundation, Linux.com Sites Down To Fix Security Breach:

http://linux.slashdot.org/story/11/09/11/1325212/linux-foundation-linuxcom-sites-down-to-fix-security-breach [slashdot.org]

---

Linux's showing in CA's breached recently too? Ok: (very, Very, VERY BAD for ecommerce, online shopping, banking, etc./et al)

http://uptime.netcraft.com/up/graph?site=StartCom.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=GlobalSign.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=Comodo.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=DigiCert.com [netcraft.com]

http://uptime.netcraft.com/up/graph?site=www.gemnet.nl [netcraft.com]

The list of CA Servers BREACHED that RUN LINUX (StartCom, GlobalSign, DigiCert, Comodo, GemNet)... per these articles verifying that:

http://itproafrica.com/technology/security/cas-hacked/ [itproafrica.com]

&

http://threatpost.com/en_us/blogs/site-dutch-ca-gemnet-offline-after-web-server-attack-120811 [threatpost.com]

---

The Stratfor SECURITY hack: (can't blame it on poor setup, this IS a security firm that uses Linux)

http://yro.slashdot.org/story/11/12/28/1743201/data-exposed-in-stratfor-compromise-analyzed [slashdot.org]

What's that domain run? Yes kids - you guessed it: LINUX -> http://uptime.netcraft.com/up/graph?site=www.stratfor.com [netcraft.com]

---

Phishers/Spammers FAVOR attacking LAMP: (Linux, Apache, mySQL, PHP)

http://www.theregister.co.uk/2011/06/10/domains_lamped/ [theregister.co.uk]

PERTINENT QUOTE/EXCERPT:

"Phishers compromise LAMP-based websites for days at a time and hit the same victims over and over again, according to an Anti-Phishing Working Group survey. Sites built on Linux, Apache, MySQL and PHP are the favoured targets of phishing attackers"

---

Toss ANDROID (yes, a Linux since it uses a Linux kernel) in also, since it's being "shredded" on the mobile phone security-front rampantly for years now?

(You get the picture... it was YEARS of false bullshit spread by Penguins here!)

* Oh yes - the /. "Linux shills" sink to a NEW LOW, only to "sink their own ship" being caught in the act, red-handed - by "yours truly"...

Piece of advice:

Listen - Don't try me again, because I'll just "blow you away" & catch you in your STUPID mistakes again, Leaving your attempts @ "discrediting me" by impersonating me (NOT a first), or altering data I posted before you do, every single time.

APK

P.S.=> Small wonder than an Open SORES "big name" in Bruce Perens even said this about how trolling shills work on forums:

"It just takes one Ubuntu sympathizer or PR flack to minus-moderate any comment. Unfortunately, once PR agencies and so on started paying people to moderate online communities, and to have hundreds of accounts each, things changed." - by Bruce Perens (3872) on Friday July 30, @03:55PM (#33089192) Homepage Journal

SOURCE -> http://linux.slashdot.org/comments.pl?sid=1738364&cid=33089192 [slashdot.org]

---

And, how the Chinese Water Army:

http://www.google.com/search?sclient=psy-ab&hl=en&site=&source=hp&q=%22Chinese+Water+Army%22&btnG=Search&gbv=1&sei=tSchUJjPGYn36gGYtIDACQ [google.com]

AND HBGary:

http://www.dailykos.com/story/2011/02/16/945768/-UPDATED:-The-HB-Gary-Email-That-Should-Concern-Us-All [dailykos.com]

PERTINENT QUOTES/EXCERPTS:

"According to an embedded MS Word document found in one of the HBGary emails, it involves creating an army of sockpuppets, with sophisticated "persona management" software that allows a small team of only a few people to appear to be many, while keeping the personas from accidentally cross-contaminating each other. Then, to top it off, the team can actually automate some functions so one persona can appear to be an entire Brooks Brothers riot online... And all of this is for the purposes of infiltration, data mining, and (here's the one that really worries me) ganging up on bloggers, commenters and otherwise "real" people to smear enemies and distort the truth... "

and

"They are talking about creating the illusion of consensus. And consensus is a powerful persuader... And another thing, this is just one little company of assholes. I can't believe there aren't others doing this already. From oil companies, political campaigns, PR firms, you name it. Public opinion means big bucks. And let's face it, what these guys are talking about is easy."

and

"To the extent that the propaganda technique known as "Bandwagon" is an effective form of persuasion, which it definitely is, the ability for a few people to infiltrate a blog or social media site and appear to be many people, all taking one position in a debate, all agreeing, for example, that so and so is not credible, or a crook, is an incredibly powerful weapon."

---

ALL/EACH Were caught in the act pulling the same shit!

... apk

Re:For the same reason people keep using Linux? (-1)

Anonymous Coward | about 2 years ago | (#41009065)

From the looks of all those caps I'm thinking you're mad bro

Proof MULTIPLE people disagree with you (-1)

Anonymous Coward | about 2 years ago | (#41009151)

Roughly 200++ of them & I post as AC (hard to get even +1, as /. hides our posts & we "AC"'s start @ ZERO/0 points, unlike registered "lusers", lol!):

+5 'modded up' posts by "yours truly" (6):

HOSTS & BGP:2010 -> http://tech.slashdot.org/comments.pl?sid=1901826&cid=34490450 [slashdot.org]
FIREFOX IN DANGER: 2011 -> http://news.slashdot.org/comments.pl?sid=2559120&cid=38268580 [slashdot.org]
TESLA:2010 -> http://science.slashdot.org/comments.pl?sid=1872982&cid=34264190 [slashdot.org]
TESLA:2010 -> http://tech.slashdot.org/comments.pl?sid=1806946&cid=33777976 [slashdot.org]
NVIDIA 2d:2006 -> http://hardware.slashdot.org/comments.pl?sid=175774&cid=14610147 [slashdot.org]
COMPUTER ASSOCIATES BUSTED FOR ACCOUNTING FRAUD:2010 -> http://news.slashdot.org/comments.pl?sid=1884922&cid=34350102 [slashdot.org]

----

+4 'modded up' posts by "yours truly" (5):

APK SECURITY GUIDE:2005 -> http://developers.slashdot.org/comments.pl?sid=167071&cid=13931198 [slashdot.org]
INFO. SYSTEMS WORK:2005 -> http://slashdot.org/comments.pl?sid=161862&cid=13531817 [slashdot.org]
WINDOWS @ NASDAQ 7++ YRS. NOW:2009 -> http://tech.slashdot.org/comments.pl?sid=1290967&cid=28571315 [slashdot.org]
CARMACK'S ARMADILLO AEROSPACE:2005 -> http://science.slashdot.org/comments.pl?sid=158310&cid=13263898 [slashdot.org]
What I admire about Theo DeRaadt of BSD fame: 2012 -> http://linux.slashdot.org/comments.pl?sid=3007641&cid=40785151 [slashdot.org]

----

+3 'modded up' posts by "yours truly" (6):

APK MICROSOFT INTERVIEW:2005 -> http://developers.slashdot.org/comments.pl?sid=155172&cid=13007974 [slashdot.org]
APK MS SYMBOLIC DIRECTORY LINKS:2005 -> http://it.slashdot.org/comments.pl?sid=166850&cid=13914137 [slashdot.org]
APK FOOLS IE7 INSTALL IN BETA HOW TO:2006 -> http://slashdot.org/comments.pl?sid=175857&cid=14615222 [slashdot.org]
PROOFS ON OPERA SPEED & SECURITY:2007 -> http://slashdot.org/comments.pl?sid=273931&cid=20291847 [slashdot.org]
  HBGary POST in Fake Names On Social Networks, a Fake Problem:2011 -> http://tech.slashdot.org/comments.pl?sid=2375110&cid=37056304 [slashdot.org]
APK RC STOP ROOKIT TECHNIQUES:2008 -> http://it.slashdot.org/comments.pl?sid=1021873&cid=25681261 [slashdot.org]

----

+2 'modded up' posts by "yours truly" (18):

CODING FOR DEFCON (my compressed/packed exe + sizecheck @ startup technique): 2005 -> http://it.slashdot.org/comments.pl?sid=158231&cid=13257227 [slashdot.org]
HOW DLL API CALL LOADS WORK:2008 -> http://tech.slashdot.org/comments.pl?sid=1001489&cid=25441395 [slashdot.org]
WERNER VON BRAUN - A Nazi Scientist used by U.S.A. for rocketry: 2011 -> http://science.slashdot.org/comments.pl?sid=1957608&cid=34933062 [slashdot.org]
APK TRICK TO STOP A MALWARE:2008 -> http://tech.slashdot.org/comments.pl?sid=1010923&cid=25549351 [slashdot.org]
DOING SHAREWARE 1995-2004:2007 -> http://it.slashdot.org/comments.pl?sid=233779&cid=19020329 [slashdot.org]
MHTML SECURITY BUG FIX IE:2011 -> http://tech.slashdot.org/comments.pl?sid=1973914&cid=35056454 [slashdot.org]
EXCEL SECURITY FIX:2009 -> http://it.slashdot.org/comments.pl?sid=1139485&cid=26974507 [slashdot.org]
CODING JOBS OFFSHORING:2007 -> http://slashdot.org/comments.pl?sid=245971&cid=19760473 [slashdot.org]
WE SHOULD PENALIZE & TAX JOB OUTSOURCERS/OFFSHORERS: 2008 -> http://yro.slashdot.org/comments.pl?sid=978035&cid=25176841 [slashdot.org]
BOGUS POLITICIAN PERFORMANCE: 2008 -> http://yro.slashdot.org/comments.pl?sid=978035&cid=25176955 [slashdot.org]
MS PUTS YOU TO WORK:2006 -> http://it.slashdot.org/comments.pl?sid=174759&cid=14538593 [slashdot.org]
ARSTECHNICA & JEREMY REIMER LOL:2008 -> http://it.slashdot.org/comments.pl?sid=1021733&cid=25675515 [slashdot.org]
CYBERSECURITY LEGISLATIONS:2011 -> http://yro.slashdot.org/comments.pl?sid=2222868&cid=36379698 [slashdot.org]
FILTERING ONLINE:2010 -> http://politics.slashdot.org/comments.pl?sid=1790178&cid=33610372 [slashdot.org]
APK ON PLANTED SHILLS BY TELECOM/ISP/BSP:2010 -> http://tech.slashdot.org/comments.pl?sid=1827308&cid=33940988 [slashdot.org]
TAX THE TAR OUT OF OUTSOURCERS/OFFSHORERS & PENALIZE THEM ALSO #1 of 2: 2012 -> http://yro.slashdot.org/comments.pl?sid=2795637&cid=39728333 [slashdot.org]
HBGary & Chinese Water Army b.s. posted: 2012 -> http://developers.slashdot.org/comments.pl?sid=2615084&cid=38662598 [slashdot.org]
OPERA & MULTITHREADED DESIGN: 2007 -> http://slashdot.org/comments.pl?sid=290711&cid=20506147 [slashdot.org]
MICROSOFT "FLIPS THE SCRIPT" ON CISPA: 2012 -> http://yro.slashdot.org/comments.pl?sid=2817555&cid=39833573 [slashdot.org]

----

+1 'modded up' posts by "yours truly" (111) & we AC's start at ZERO, not 1 or 2 like registered users on /. do:

APK SSD/RamDrive/RamDisk usage since 1996:2008 -> http://tech.slashdot.org/comments.pl?sid=1014349&cid=25591403 [slashdot.org]
DISASSEMBLY & PROTECTING CODE:2010 -> http://news.slashdot.org/comments.pl?sid=1719570&cid=32907418 [slashdot.org]
APK ON RESERVED PORTS IN WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=235621&cid=19229493 [slashdot.org]
MEMORY FRAGMENTATION: 2007 -> http://slashdot.org/comments.pl?sid=367219&cid=21434061 [slashdot.org]
  NORTON DNS & DNSBL:2011 -> http://yro.slashdot.org/comments.pl?sid=2311948&cid=36708742 [slashdot.org]
IRON FILESYSTEMS:2007 -> http://it.slashdot.org/comments.pl?sid=359507&cid=21347933 [slashdot.org]
APK ROOTKIT KILLING TECHNIQUE USING RC:2011 -> http://tech.slashdot.org/comments.pl?sid=2428486&cid=37405530 [slashdot.org]
APK STOPPED CONFICKER BEFORE ANYONE DID:2009 -> http://it.slashdot.org/comments.pl?sid=1159209&cid=27178753 [slashdot.org]
APK ON WINDOWS DFS vs. LINUX COPYING FEATURES LIKE IT:2008 -> http://ask.slashdot.org/comments.pl?sid=447752&cid=22361236 [slashdot.org]
WINDOWS #CPU's SUPPORTED (much higher now in Win7/Srv2k8 now, 256):2009 -> http://hardware.slashdot.org/comments.pl?sid=1160287&cid=27191729 [slashdot.org]
DISK DEFRAG STRATEGY OPTIONS:2011 -> http://it.slashdot.org/comments.pl?sid=2435272&cid=37443738 [slashdot.org]
APK PART OF ULTRADEFRAG64 PROOF:2011 -> http://it.slashdot.org/comments.pl?sid=2435272&cid=37443252 [slashdot.org]
DATASTRUCTURES & SQL:2011 -> http://news.slashdot.org/comments.pl?sid=2080454&cid=35794668 [slashdot.org]
BINARY HEAPS:2010 -> http://developers.slashdot.org/comments.pl?sid=1686094&cid=32581292 [slashdot.org]
CACHE COHERENCY:2005 -> http://hardware.slashdot.org/comments.pl?sid=168793&cid=14070783 [slashdot.org]
DELPHI ROCKS VB/VC++:2007 -> http://it.slashdot.org/comments.pl?sid=236049&cid=19261269 [slashdot.org]
MEMORY FRAGMENTATION IN FF:2007 -> http://slashdot.org/comments.pl?sid=367219&threshold=-1&commentsort=0&mode=thread&cid=21434061 [slashdot.org]
CODING PROFESSIONALLY:2005 -> http://developers.slashdot.org/comments.pl?sid=170925&cid=14238424 [slashdot.org]
MULTIPLE MESSAGE QUEUES:2010 -> http://linux.slashdot.org/comments.pl?sid=1618508&cid=31847246 [slashdot.org]
APK ROOTKIT.COM ON WINDOWS VISTA IPSTACK SECURITY:2009 -> http://tech.slashdot.org/comments.pl?sid=1339085&cid=29106629 [slashdot.org]
USING CSC & SCIENCE TOGETHER IN ACADEMIA:2010 -> http://ask.slashdot.org/comments.pl?sid=1531366&cid=30971224 [slashdot.org]
PROGRAMMING CONCEPTS MORE IMPORTANT THAN SYNTAX:2009 -> http://tech.slashdot.org/comments.pl?sid=1314993&cid=28827429 [slashdot.org]
SSD DECADES OF USAGE:2009 -> http://hardware.slashdot.org/comments.pl?sid=1273501&cid=28375697 [slashdot.org]
CODING .NET FROM VB:2006 -> http://developers.slashdot.org/comments.pl?sid=176229&cid=14641701 [slashdot.org]
LAMP SECURITY:2011 -> http://it.slashdot.org/comments.pl?sid=2243006&cid=36462748 [slashdot.org]
SLASHDOT "Pro-*NIX" SLANT CONTROVERSY = GOOD:2005 -> http://slashdot.org/comments.pl?sid=154725&cid=12974078 [slashdot.org]
WINDOWS vs. IBM vs. LINUX ARCHITECTURE STEALING:2005 -> http://linux.slashdot.org/comments.pl?sid=160244&cid=13414756 [slashdot.org]
ADBANNERS & VIRUSES:2005 -> http://slashdot.org/comments.pl?sid=169309&cid=14112880 [slashdot.org]
SECURITY BUGS LINUX vs. WINDOWS:2011 -> http://news.slashdot.org/comments.pl?sid=2247480&cid=36485068 [slashdot.org]
NYSE+LINUX STOCK EXCHANGE LIE BY PENGUINS:2010 -> http://linux.slashdot.org/comments.pl?sid=1842764&cid=34046376 [slashdot.org]
APK ON PROCESSEXPLORER & NETSTAT:2009 -> http://ask.slashdot.org/comments.pl?sid=1328371&cid=28981169 [slashdot.org]
COMPLETION PORTS + SCHEDULING LINUX vs. WINDOWS:2005 -> http://linux.slashdot.org/comments.pl?sid=160290&cid=13419053 [slashdot.org]
WINDOWS vs. LINUX SECURITY ISSUES:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26948399 [slashdot.org]
LINUX IMITATING WINDOWS:2005 -> http://linux.slashdot.org/comments.pl?sid=170126&cid=14177851 [slashdot.org]
LINUX SERVING DUQU ROOTKIT: 2011 -> http://it.slashdot.org/comments.pl?sid=2551740&cid=38215752 [slashdot.org]
WINDOWS vs. Linux SECURITY VULNS UNPATCHED:2011 -> http://it.slashdot.org/comments.pl?sid=2077414&cid=35776848 [slashdot.org]
WINDOWS vs. Linux vs. Mac SECURITY VULNS UNPATCHED:2010 -> http://it.slashdot.org/comments.pl?sid=1681772&cid=32524188 [slashdot.org]
APK Windows vs. Linux on UNPATCHED SEC. VULNS:2011 -> http://it.slashdot.org/comments.pl?sid=2059420&cid=35656126 [slashdot.org]
PROOF MS HAD LESS BUGS THAN LINUX/MACOS X:2005 -> http://it.slashdot.org/comments.pl?sid=173564&cid=14442403 [slashdot.org]
PROOF MS HAD LESS BUGS THAN LINUX/MACOS X:2006 -> http://it.slashdot.org/comments.pl?sid=173016&cid=14398069 [slashdot.org]
LINUX & JAVASCRIPT ETC.:2009 -> http://it.slashdot.org/comments.pl?sid=1266651&cid=28307523 [slashdot.org]
APK USING KDE & LINUX:2010 -> http://linux.slashdot.org/comments.pl?sid=1750240&cid=33214838 [slashdot.org]
APK CONGRATS TO LINUX:2005 -> http://linux.slashdot.org/comments.pl?sid=170296&cid=14192885 [slashdot.org]
APK KUDOS TO LINUX:2005 -> http://slashdot.org/comments.pl?sid=162921&cid=13614370 [slashdot.org]
LINUX WENT DOWN 2x in LESS THAN 1 YEAR @ London Stock Exchange:2011 -> http://linux.slashdot.org/comments.pl?sid=1999478&cid=35231358 [slashdot.org]
LINUX SECURITY vs. JAVASCRIPT:2010 -> http://yro.slashdot.org/comments.pl?sid=1820234&cid=33892258 [slashdot.org]
CONGRATS TO LINUS TORVALDS ON MILLENIUM PRIZE: 2012 -> http://linux.slashdot.org/comments.pl?sid=2913441&cid=40308721 [slashdot.org]
KUDOS TO LINUX KERNEL 3.3 - 3.5 & NO BUGS PRESENT: 2012 -> http://linux.slashdot.org/comments.pl?sid=2995701&cid=40727067 [slashdot.org]
GENETICS PLAYING WITH GOD'S ENGINEERING on mice: 2011 -> http://science.slashdot.org/comments.pl?sid=2581286&cid=38423712 [slashdot.org]
1 GOOD THING ABOUT HACKER/CRACKERS:2011 -> http://yro.slashdot.org/comments.pl?sid=1982796&cid=35119212 [slashdot.org]
MINIMUM WINDOWS SERVICES:2005 -> http://slashdot.org/comments.pl?sid=157321&cid=13190570 [slashdot.org]
HIDDEN SECURITY BUGS:2005 -> http://linux.slashdot.org/comments.pl?sid=164039&cid=13698742 [slashdot.org]
APK & FIREFOX BUGFIX TEAM:2005 -> http://it.slashdot.org/comments.pl?sid=161697&cid=13526010 [slashdot.org]
WHY OPERA ROCKS:2005 -> http://slashdot.org/comments.pl?sid=170983&cid=14242283 [slashdot.org]
OPERA BEST SPEED & SECURITY: 2010 -> http://tech.slashdot.org/comments.pl?sid=1881444&cid=34333966 [slashdot.org]
OPERA "SUPERIOR WARRIOR":2009 -> http://developers.slashdot.org/comments.pl?sid=1309763&threshold=-1&commentsort=0&mode=thread&pid=28768721 [slashdot.org]
OPERA=FASTER & MORE SECURE:2005 -> http://it.slashdot.org/comments.pl?sid=157615&cid=13208800 [slashdot.org]
OPERA "The Superior Warrior" vs. FIREFOX:2007 -> http://slashdot.org/comments.pl?sid=286721&cid=20452183 [slashdot.org]
OPERA:2007 -> http://it.slashdot.org/comments.pl?sid=233227&threshold=1&commentsort=0&mode=thread&cid=18969947 [slashdot.org]
OPERA BY SITE PREFS:2010 -> http://tech.slashdot.org/comments.pl?sid=1881444&cid=34333758 [slashdot.org]
OPERA 64-BIT "FOR INDEPENDENT SMART PEOPLE" ROUND 1 FOR WINDOWS & MAC RELEASED:2011 -> http://tech.slashdot.org/comments.pl?sid=2576256&cid=38388178 [slashdot.org]
OPERA HAS AN ADBLOCK ADDON: 2012 -> http://news.slashdot.org/comments.pl?sid=2579684&cid=38412366 [slashdot.org]
APK SANDBOXING IE:2007 -> http://it.slashdot.org/comments.pl?sid=236547&cid=19310513 [slashdot.org]
APK ON SANDBOXIE:2010 -> http://it.slashdot.org/comments.pl?sid=1875754&cid=34281930 [slashdot.org]
CHROME NEEDS BY SITE PREFS TO SANITYINANARCHY:2011 -> http://slashdot.org/comments.pl?sid=2358734&cid=36946676 [slashdot.org]
DO YOUR BEST WORK OUR YOUNG MENS LIVES RIDE ON IT:2010 -> http://developers.slashdot.org/comments.pl?sid=1898806&cid=34472826 [slashdot.org]
STAT I/II SKEWING:2010 -> http://slashdot.org/comments.pl?sid=1504756&cid=30711074 [slashdot.org]
SEARCH ENGINES:2005 -> http://science.slashdot.org/comments.pl?sid=162717&cid=13598832 [slashdot.org]
PORTING CODE:2007 -> http://linux.slashdot.org/comments.pl?sid=236367&cid=19291677 [slashdot.org]
DARTH CHENEY POLITICALS:2007 -> http://yro.slashdot.org/comments.pl?sid=237091&cid=19362755 [slashdot.org]
WINDOWS EMPLOYS YOU BETTER:2006 -> http://linux.slashdot.org/comments.pl?sid=174277&cid=14498965 [slashdot.org]
MS PUTS YOU TO WORK:2005 -> http://books.slashdot.org/comments.pl?sid=169549&threshold=-1&commentsort=0&tid=109&mode=thread&cid=14132540 [slashdot.org]
"666":2008 -> http://news.slashdot.org/comments.pl?sid=548476&cid=23353722 [slashdot.org]
APK ON HARDCODES & SHELLOPEN ASSOCIATION:2010 -> http://tech.slashdot.org/comments.pl?sid=1519842&cid=30854906 [slashdot.org]
DR. DEMENTO SHOW:2010 -> http://news.slashdot.org/comments.pl?sid=1678308&cid=32494990 [slashdot.org]
CA DISREPUTABLE #2 of 2:2010 -> http://news.slashdot.org/comments.pl?sid=1884922&cid=34351020 [slashdot.org]
NO PROOF USED BY LOB:2010 -> http://tech.slashdot.org/comments.pl?sid=1907190&cid=34529734 [slashdot.org]
ON KIDS CODING & ARMCHAIR QB's:2011 -> http://science.slashdot.org/comments.pl?sid=2040490&cid=35508400 [slashdot.org]
FPGA & TERMINATORS:2011 -> http://it.slashdot.org/comments.pl?sid=2341586&cid=36842168 [slashdot.org]
APK ON CHESS:2010 -> http://ask.slashdot.org/comments.pl?sid=1877160&cid=34293988 [slashdot.org]
RON PAUL & WIKILEAKS:2010 -> http://yro.slashdot.org/comments.pl?sid=1907000&cid=34528958 [slashdot.org] /. "CATERING TO CRONIES":2010 -> http://it.slashdot.org/comments.pl?sid=1664046&cid=32336794 [slashdot.org]
BEING MORE "ALL AROUND" THAN 1 DIMENSIONAL IN IT/IS/MIS:2005 -> http://it.slashdot.org/comments.pl?sid=166174&cid=13863159 [slashdot.org]
GET RID OF S. BALLMER @ MS:2008 -> http://slashdot.org/comments.pl?sid=543962&cid=23310698 [slashdot.org]
COMBO OF CODER/NETWORKER = MOST DANGEROUS HACKER/CRACKER: 2011 -> http://yro.slashdot.org/comments.pl?sid=2590324&cid=38490476 [slashdot.org]
FACEBOOK ENHANCES mySQL: 2012 -> http://news.slashdot.org/comments.pl?sid=2643681&cid=38857629 [slashdot.org]
APPSTORE/WALLED-GARDEN DL OF APPS WON'T HELP vs. TODAY'S INFECTION VECTORS: 2012 -> http://it.slashdot.org/comments.pl?sid=2655681&cid=38943319 [slashdot.org]
REGISTRY ACCESS WINDOWS 32-BIT vs. 64-BIT in code: 2012 -> http://news.slashdot.org/comments.pl?sid=2680271&cid=39093835 [slashdot.org]
2nd REGISTRY ACCESS WINDOWS 32-BIT vs. 64-BIT in code: 2012 -> http://news.slashdot.org/comments.pl?sid=2680271&cid=39093873 [slashdot.org]
CHINESE "CYBER-WAR" THREAT: 2012 -> http://politics.slashdot.org/comments.pl?sid=2718289&cid=39312311 [slashdot.org]
ON DR. MARK RUSSINOVICH MS DESKTOPS APP & MORE: 2012 -> http://tech.slashdot.org/comments.pl?sid=2741569&cid=39445275 [slashdot.org]
DEFENDING STEVE GIBSON OF SPINRITE + "SHIELDS UP" vs. DEFAMATION: 2012 -> http://yro.slashdot.org/comments.pl?sid=2747957&cid=39479257 [slashdot.org]
OS/2 & What I thought was cool about it & when I used it: 2012 -> http://tech.slashdot.org/comments.pl?sid=2761033&cid=39550525 [slashdot.org]
ActiveX Usage in Korea still "huge": 2012 -> http://tech.slashdot.org/comments.pl?sid=2767885&cid=39584683 [slashdot.org]
On "insta-downmods" & /. "fine moderation" (b.s.!): 2012 -> http://news.slashdot.org/comments.pl?sid=2772023&cid=39606941 [slashdot.org]
TAX THE TAR OUT OF OUTSOURCERS/OFFSHORERS & PENALIZE THEM ALSO #2 of 2 + ECONOMIC CLASS 1984-1985: 2012 -> http://yro.slashdot.org/comments.pl?sid=2795637&cid=39729177 [slashdot.org]
GATTACA #1 of 2: 2012 -> http://science.slashdot.org/comments.pl?sid=2792033&cid=39722291 [slashdot.org]
GATTACA #2 of 2: 2012 -> http://science.slashdot.org/comments.pl?sid=2792033&cid=39711991 [slashdot.org]
ROMAN MARONI (lol) = arth1 "murder of the English Language": 2012 -> http://slashdot.org/comments.pl?sid=2773803&cid=39617941 [slashdot.org]
FLASHY FLASH DRIVES: 2005 -> http://slashdot.org/comments.pl?sid=154997&cid=12998477 [slashdot.org]
ROOTKIT CREATORS "GO PRO": 2005 -> http://it.slashdot.org/comments.pl?sid=165958&cid=13843462 [slashdot.org]
MS LESS SECURITY ISSUES THAN *NIX in 2005: 2006 -> http://it.slashdot.org/comments.pl?sid=173564&cid=14441639 [slashdot.org]
OPERA ROCKS & WHY: 2007 -> http://it.slashdot.org/comments.pl?sid=233227&cid=18969947 [slashdot.org]
McAfee, Symantec, ClamAV, COMODO, ArcaBit/ArcaVir, & Dr. Web "False Positive" of my "APK Hosts File Engine 5.0++": 2012 -> http://it.slashdot.org/comments.pl?sid=2872677&cid=40107921 [slashdot.org]
Linux "Fine Security" (lol, NOT!) 2011-2012: 2012 -> http://linux.slashdot.org/comments.pl?sid=2875333&cid=40119001 [slashdot.org]
SAY NO TO MS & SAY NO TO A JOB: 2005 -> http://books.slashdot.org/comments.pl?sid=169549&cid=14132540 [slashdot.org]
"START ME UP" REGARDING WINDOWS 8, METRO, & RIBBONS: 2012 -> http://tech.slashdot.org/comments.pl?sid=2955431&cid=40538813 [slashdot.org]
GHOSTERY TRUTHS #1: 2012 -> http://yro.slashdot.org/comments.pl?sid=2931443&cid=40413453 [slashdot.org]
GHOSTERY TRUTHS #2: 2012 -> http://yro.slashdot.org/comments.pl?sid=2931443&cid=40413493 [slashdot.org]
"DEAR MR. GATES": 2012 -> http://tech.slashdot.org/comments.pl?sid=2955431&cid=40536263 [slashdot.org]
Bill & Melinda Gates Foundation tax shield: 2012 -> http://news.slashdot.org/comments.pl?sid=2957987&cid=40549931 [slashdot.org]
Colorblindness and camouflage: 2012 -> http://games.slashdot.org/comments.pl?sid=3010409&cid=40798555 [slashdot.org]
HBGary and "Freedom of Speech" plus REAL NAMES on forums: 2012 -> http://yro.slashdot.org/comments.pl?sid=3012595&cid=40811497 [slashdot.org]

---

* THE HOSTS FILE GROUP 36++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

BANNER ADS & BANDWIDTH:2011 -> http://hardware.slashdot.org/comments.pl?sid=2139088&cid=36077722 [slashdot.org]
  HOSTS MOD UP:2010 -> http://yro.slashdot.org/comments.pl?sid=1907266&cid=34529608 [slashdot.org]
  HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1490078&cid=30555632 [slashdot.org]
  HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1869638&cid=34237268 [slashdot.org]
  HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1461288&threshold=-1&commentsort=0&mode=thread&cid=30272074 [slashdot.org]
  HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1255487&cid=28197285 [slashdot.org]
  HOSTS MOD UP:2009 -> http://tech.slashdot.org/comments.pl?sid=1206409&cid=27661983 [slashdot.org]
  HOSTS MOD UP:2010 -> http://apple.slashdot.org/comments.pl?sid=1725068&cid=32960808 [slashdot.org]
  HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1743902&cid=33147274 [slashdot.org]
  APK 20++ POINTS ON HOSTS MOD UP:2010 -> http://news.slashdot.org/comments.pl?sid=1913212&cid=34576182 [slashdot.org]
  HOSTS MOD UP:2010 -> http://it.slashdot.org/comments.pl?sid=1862260&cid=34186256 [slashdot.org]
  HOSTS MOD UP:2010 (w/ facebook known bad sites blocked) -> http://tech.slashdot.org/comments.pl?sid=1924892&cid=34670128 [slashdot.org]
  HOSTS FILE MOD UP FOR ANDROID MALWARE:2010 -> http://mobile.slashdot.org/comments.pl?sid=1930156&cid=34713952 [slashdot.org]
  HOSTS MOD UP ZEUSTRACKER:2011 -> http://it.slashdot.org/comments.pl?sid=2059420&cid=35654066 [slashdot.org]
  HOSTS MOD UP vs AT&T BANDWIDTH CAP:2011 -> http://tech.slashdot.org/comments.pl?sid=2116504&cid=35985584 [slashdot.org]
  HOSTS MOD UP CAN DO SAME AS THE "CloudFlare" Server-Side service:2011 -> http://it.slashdot.org/comments.pl?sid=2220314&cid=36372850 [slashdot.org]
  HOSTS and BGP +5 RATED (BEING HONEST):2010 http://tech.slashdot.org/comments.pl?sid=1901826&cid=34490450 [slashdot.org]
  HOSTS & PROTECT IP ACT:2011 http://yro.slashdot.org/comments.pl?sid=2368832&cid=37021700 [slashdot.org]
  HOSTS MOD UP:2011 -> http://yro.slashdot.org/comments.pl?sid=2457766&cid=37592458 [slashdot.org]
  HOSTS MOD UP & OPERA HAUTE SECURE:2011 -> http://yro.slashdot.org/comments.pl?sid=2457274&cid=37589596 [slashdot.org]
  0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1197039&cid=27556999 [slashdot.org]
  0.0.0.0 IN HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1143349&cid=27012231 [slashdot.org]
  0.0.0.0 in HOSTS:2009 -> http://it.slashdot.org/comments.pl?sid=1198841&cid=27580299 [slashdot.org]
  0.0.0.0 in HOSTS:2009 -> http://tech.slashdot.org/comments.pl?sid=1139705&cid=26977225 [slashdot.org]
  HOSTS MOD UP:2009 -> http://hardware.slashdot.org/comments.pl?sid=1319261&cid=28872833 [slashdot.org] (still says INSIGHTFUL)
  HOSTS MOD UP vs. botnet: 2012 -> http://it.slashdot.org/comments.pl?sid=2603836&cid=38586216 [slashdot.org]
  HOSTS MOD UP vs. SOPA act: 2012 -> http://yro.slashdot.org/comments.pl?sid=2611414&cid=38639460 [slashdot.org]
  HOSTS MOD UP vs. FaceBook b.s.: 2012 -> http://yro.slashdot.org/comments.pl?sid=2614186&cid=38658078 [slashdot.org]
  HOSTS MOD UP "how to secure smartphones": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2644205&cid=38860239 [slashdot.org]
  HOSTS MOD UP "Free Apps Eat your Battery via ad displays": 2012 -> http://mobile.slashdot.org/comments.pl?sid=2734503&cid=39408607 [slashdot.org]
  HOSTS MOD UP "How I only hardcode in 50 of my fav. sites": 2012 -> http://it.slashdot.org/comments.pl?sid=2857487&cid=40034765 [slashdot.org]
  APPLYING HOSTS TO DIFF. PLATFORM W/ TCP-IP STACK BASED ON BSD: 2008 -> http://mobile.slashdot.org/comments.pl?sid=1944892&cid=34831038 [slashdot.org]
  HOSTS vs. TRACKING ONLINE BY ADVERTISERS & BETTER THAN GHOSTERY: 2012 -> http://yro.slashdot.org/comments.pl?sid=2926641&cid=40383743 [slashdot.org]
  HOSTS FOR ANDROID SMARTPHONES: 2012 -> http://yro.slashdot.org/comments.pl?sid=2940173&cid=40455449 [slashdot.org]
  HOSTS vs. DEMONOID MALSCRIPTED ADBANNERS: 2012 -> http://yro.slashdot.org/comments.pl?sid=3022017&cid=40856945 [slashdot.org]

* THE APK SECURITY GUIDE GROUP 18++ THUSFAR (from +5 -> +1 RATINGS, usually "informative" or "interesting" etc./et al):

APK SECURITY GUIDE:2009 -> http://it.slashdot.org/comments.pl?sid=1361585&cid=29360367 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://yro.slashdot.org/comments.pl?sid=1218837&cid=27787281 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&cid=25093275 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://tech.slashdot.org/comments.pl?sid=1885890&cid=34358316 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=154868&cid=12988150 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://ask.slashdot.org/comments.pl?sid=970939&threshold=-1&commentsort=0&mode=thread&no_d2=1&cid=25092677 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://tech.slashdot.org/comments.pl?sid=1027095&cid=25747655 [slashdot.org]
APK SECURITY TEST CHALLENGE LINUX vs. WINDOWS:2007 -> http://it.slashdot.org/comments.pl?sid=267599&threshold=1&commentsort=0&mode=thread&cid=20203061 [slashdot.org]
APK SECURITY GUIDE:2010 -> http://yro.slashdot.org/comments.pl?sid=1638428&cid=32070500 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://books.slashdot.org/comments.pl?sid=168931&cid=14083927 [slashdot.org]
APK SECURITY GUIDE:2009 -> http://news.slashdot.org/comments.pl?sid=1135717&cid=26941781 [slashdot.org]
APK SECURITY GUIDE:2008 -> http://it.slashdot.org/comments.pl?sid=416702&cid=22026982 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&cid=30649722 [slashdot.org]
APK SECURITY GUIDE: 2008 -> http://ask.slashdot.org/comments.pl?sid=970939&no_d2=1&cid=25092677 [slashdot.org]
APK SYSTEM TUNING:2010 -> http://hardware.slashdot.org/comments.pl?sid=1497268&threshold=-1&commentsort=0&mode=thread&cid=30649722 [slashdot.org]
APK SECURE SETUP FOR IP STACK:2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14211084 [slashdot.org]
APK SECURITY GUIDE (old one):2005 -> http://it.slashdot.org/comments.pl?sid=170545&cid=14210206 [slashdot.org]
MICROSOFT SECURITY:2010 -> http://news.slashdot.org/comments.pl?sid=1546446&cid=31106612 [slashdot.org]

---

* Now, what was that YOU said again? Let's see:

"From the looks of all those caps I'm thinking you're mad bro" - by Anonymous Coward on Thursday August 16, @08:40AM (#41009065)

See above, & "argue with the numbers", + the thoughts & opinions of our peers on slashdot... ok? Good luck - you'll need it, as you're outnumbered by MANY orders of magnitude, troll... lol!

APK

(Plus, lol, as per YOUR usual troll? You made it so for me by shooting your mouth off again)...

... apk

Re:For the same reason people keep using Linux? (0)

Forty Two Tenfold (1134125) | about 2 years ago | (#41009119)

So, what's dts.utah.gov running everyone?

LINUX

SuSE is not Linux. Linux is not an operating system. Windows is (are?).

Re:For the same reason people keep using Linux? (0)

Anonymous Coward | about 2 years ago | (#41009223)

So true. Linux is a kernel. An operating system? Oh, you must mean emacs. No, that's not it. Maybe you mean "Gnome" or "KDE"? No, that can't be it either. Perhaps it is Ubuntu, Slackware, Debian, SuSe, Fedora Core, CentOS, Knoppix, and a million more? In fact, maybe that's why everyone uses "Linux" to refer to the whole lot of them? And no, they don't use GNU/Linux RMS, sorry.

Any Proof? (-1)

Anonymous Coward | about 2 years ago | (#41009247)

Do you have proof? Show us a citation of that from a reputable source and that SuSE is not a Linux distro. That's right, you can't because you are WRONG.

Just as APK has predicted before (-1)

Anonymous Coward | about 2 years ago | (#41009193)

Just as APK previously predicted, his post would be modded down by AC unix trolls that can't handle the facts. If they had anything actually to say, they would disprove his facts, but they can't. At least one supported is willing to stand up to the trolls and vote it as 'informative', as any righteous slashdotter should.

Re:Just as APK has predicted before (-1)

Anonymous Coward | about 2 years ago | (#41009607)

Funny, when tried to disprove you, you said it was off-topic http://tech.slashdot.org/comments.pl?sid=3033483&cid=40921545

Again? (-1)

Anonymous Coward | about 2 years ago | (#41009643)

You were off topic. Still, eventually earth's sun will go supernova.

Still, you avoided simple questions that were on-topic. The answer was there though -> http://tech.slashdot.org/comments.pl?sid=3033483&cid=40930575 [slashdot.org] (also AC troll, getting too lazy to make a proper link now?).

* Thus, by common-sense alone, Windows is CLEARLY, superior - whereas by way of comparison? Linux &/or MacOS X apparently do NOT!

APK

P.S.=> "Here endeth the lesson", & of course, you just KNOW I've just GOTTA say it, as-is-per-my-usual "inimitable style":

This? Ah, yes... This was just "too, Too, TOO EASY - just '2EZ'"... lol, & it ALWAYS is, vs. noobish "Pro-*NIX trolls" on /.

... apk

Re:Why do people still use Sony (5, Insightful)

Anrego (830717) | about 2 years ago | (#41009081)

Depends on which people you are talking about.

The public at large doesn't give a shit about this kind of thing, which isn't really all that unreasonable. The slashdot crowd is very privacy/security conscious.. the general publis is not. Lest we forget when the network was hacked the first time around, the biggest, loudest complaint was not that CC info was leaked, along with personal details, but that the network was down and people couldn’t play the games they paid for.

Even the rootkit thing. Again, the biggest reaction from the general public, even with all the news coverage, was “well that was naughty of them..”.

Almost all companies are evil. Sony happens to be evil in a way that is perceived as particularly bad by the Slashdot community, but perceived as status quo by the general public.

And of course, even if everyone that even remembers the rootkit thing stopped using Sony for the rest of their life and recommended to all their friends that they do the same, wouldn't make a dent in the profit statements. Which means they don't care about us either!

Re:Why do people still use Sony (0, Insightful)

Anonymous Coward | about 2 years ago | (#41009491)

I use Sony because when I play a game online I don't like being called a f****t n****r by ignorant dolt. Say what you will but every time I'm at my friend's playing on his xbox people are making racist and out of line comments, whenever I play at home on my PS3, I don't hear that most of the time.

Re:Why do people still use Sony (0)

Anonymous Coward | about 2 years ago | (#41009611)

That's because people are stupid, people buy CDs they buy TVs and they buy game consoles, they don't usually care about what brand they're buying from!

Now if this were true

if everyone that even remembers the rootkit thing stopped using Sony for the rest of their life and recommended to all their friends that they do the same

It would create a noticeable impact on their profits actually. But then, people are too stupid to care. Try weaning them off 'America's Got [No] Talent!' then we're talk.

Re:Why do people still use Sony (2)

Stan92057 (737634) | about 2 years ago | (#41009309)

I use Sony because i love gaming and Sony makes great machines and great games are made for Sony. I don't store any banking info for anywhere i have bought stuff on the internet because no one can be trusted. So even if they do get into my account there's nothing there to steal. No internet business can be trusted none

Is that time of year already? (1)

Anonymous Coward | about 2 years ago | (#41008745)

Nice job as usual, Sony.

Screw you, anonymous! (5, Insightful)

Soluzar (1957050) | about 2 years ago | (#41008769)

Those assholes really need to think about who they are hurting with this crap. It is the users, like me. I've got a substantial amount of PS3 games, both from PSN and retail. I just want to use them in peace without veing harassed by cyber-terrorists!

Re:Screw you, anonymous! (5, Insightful)

Anonymous Coward | about 2 years ago | (#41008825)

That's the thing about poor security, Anonymous isn't the only one that was able to access the credentials. Perhaps you should be wondering why Sony isn't storing your hashed password in a salted format -- it appears to be a SHA1 hash represented in base64. Who else had access to your information that didn't advertise it to the world, and for how long? That's where your concern needs to be.

Re:Screw you, anonymous! (0)

Anonymous Coward | about 2 years ago | (#41009731)

This may not apply to this, but I was curious what the $H$9 represented as it's the same for all the listed passwords, and I found this:

"The digit, 7 or 9, determines the number of times MD5 is called - 2 powered by (7+2) or 2 powered by (9+2); in other words, 512 iterations for $H$7 hashes and 2048 for $H$9 hashes.
P.S. In the hash $H$912345678XrPnr88MEJbtB3N4JTgfg/ the 12345678 string is salt.
P.P.S. The MD5(phpBB3).dll module supports hashes with any digit - 7, 9, or any other."

And also mention of it's used by phpBB3

Re:Screw you, anonymous! (4, Informative)

Xest (935314) | about 2 years ago | (#41008887)

Sure, and I want to live my life without Sony lobbying governments to fuck up the internet, but thanks to people like you giving them money I can't.

Besides, it's not as if Sony has a great track record of keeping your data safe so why do you keep putting it in their hands in the first place? Honestly, if a company can't notice 50gb of sensitive data flying out of it's network it has to have a pretty high degree of incompetence.

Re:Screw you, anonymous! (1)

CastrTroy (595695) | about 2 years ago | (#41008995)

I'm sure that if you send the data slow enough, that it wouldn't even show up as a blip on their radar. 50 GB is nothing compared to the amount of data that goes over their networks. Granted, it would be braindead simple to make a completely segregated user login system from the systems which actually handle the game servers, and to make that system very secure, by only have it doing 1 simple thing, but they probably didn't do that.

Re:Screw you, anonymous! (2)

Soluzar (1957050) | about 2 years ago | (#41009015)

It's not as though I can exactly take my data out of their hands without depriving myself of the things I already purchased, is it? I'm effectively stuck with Sony, and Anonymous aren't helping the situation for me. Sony aren't exactly my favourite company in the world, but I was already into them for a big chunk of change before any of this idiotic nonsense by anonymous ever started or had reason to.

Re:Screw you, anonymous! (2)

Xest (935314) | about 2 years ago | (#41009095)

I guess it depends what country you are in. In the UK I think the repeated displays of ineptitude by Sony in holding your data secure would be grounds enough to be able to cancel your account and demand a refund for any content you would hence no longer have access to. The small claims court here is quite effective at dealing with those sorts of cases and the time/cost for using it is pretty low (£20 IIRC which you can claim back if you win). Many other countries have a similar thing.

Re:Screw you, anonymous! (1)

jellomizer (103300) | about 2 years ago | (#41009379)

With a company as Big as Sony I wouldn't be surprised if there is a guy who Works there is part of Anonymous. Oh I need to do maintenance on the server today. While he is doing maintenance plugs in a USB Disk... (Heck an iPod or a Cell Phone could hold the data) and copies the data down.

And how Dare people who do not have the same political priorities and views of you not alter their lives to match you views. "Freedom for speech just as long as you are saying what I want to hear!!!"

Re:Screw you, anonymous! (1)

Xest (935314) | about 2 years ago | (#41009661)

"And how Dare people who do not have the same political priorities and views of you not alter their lives to match you views. "Freedom for speech just as long as you are saying what I want to hear!!!""

That's a rather ass-backwards way of reading the discussion. I simply made the point that I suffer when he funds Sony, so why should I care when he suffers for funding Sony?

I didn't say I expect him to change, I'm just saying don't expect sympathy when not changing comes back to bite you. It's a two way street.

Extrapolating that into a comment about freedom of speech doesn't make any sense whatsoever.

Re:Screw you, anonymous! (1)

Shavano (2541114) | about 2 years ago | (#41009389)

record of keeping your data safe so why do you keep putting it in their hands in the first place? Honestly, if a company can't notice 50gb of sensitive data flying out of it's network it has to have a pretty high degree of incompetence.

50 GB is nothing to data traffic on a game server.

Re:Screw you, anonymous! (1)

mellyra (2676159) | about 2 years ago | (#41009613)

record of keeping your data safe so why do you keep putting it in their hands in the first place? Honestly, if a company can't notice 50gb of sensitive data flying out of it's network it has to have a pretty high degree of incompetence.

50 GB is nothing to data traffic on a game server.

Shouldn't an IDS primarily care about the structure and contents of the packets and not so much about the raw volume of data transferred?

Re:Screw you, anonymous! (1, Insightful)

Anonymous Coward | about 2 years ago | (#41008891)

Those assholes really need to think about who they are hurting with this crap. It is the users, like me. I've got a substantial amount of PS3 games, both from PSN and retail. I just want to use them in peace without veing harassed by cyber-terrorists!

You support Sony with your money, you can't expect that you can just finance whatever crap you like and think that it won't come back and hurt you. (Unless you are one of the 1%, then you can obviously expect that.)
Sony is evil and you trusted your money to them. They, however do not care enough about you to protect your data properly. You should be thankful that it was Anonymous that got to your personal information first. If any other hacker group would have been there first then you would have been screwed for real, assuming that no other group was there first and Sony just did't want to tell you.

I hope you make a better decision next time you consider buying a Sony product.

Re:Screw you, anonymous! (1)

Soluzar (1957050) | about 2 years ago | (#41009025)

I'm not in the least thankful to anonymous. I'm angry at them for being at least twice as troublesome as most of the evil they claim to fight. They are petulant children who need to stop annoying people, now please. Or failing that, they could at least stick to Scientologists.

Re:Screw you, anonymous! (1, Insightful)

Anonymous Coward | about 2 years ago | (#41009385)

You are so clueless that you don't even understand what Anonymous have done _for_ you. They have exposed the fact that your data was being held with security that was so weak everyone could come get it and peddle it on the black markets. Perhaps you don't mind having your data sold around like a cheap whore, just so long as you are left ignorant of it.

To make it perfectly clear, Anonymous didn't do anything to make your data insecure. Sony did that. Anonymous just demonstrated for you that Sony is doing that. That was a service to you.

Re:Screw you, anonymous! (1)

Soluzar (1957050) | about 2 years ago | (#41009443)

I understand perfectly well. Anonymous fucked me over because they thought it was funny. They posted my details online. There is absolutely zero proof anyone else has hacked into the PSN.

Re:Screw you, anonymous! (0)

Anonymous Coward | about 2 years ago | (#41009563)

So, by your logic, it is ok for someone to come along and kick in my front door just to show me how weak my door is? And I am supposed to thank them for kicking in my door?

Re:Screw you, anonymous! (1, Insightful)

AmiMoJo (196126) | about 2 years ago | (#41008931)

You should be thanking Anonymous for making you aware of how poorly Sony is protecting your personal data. After all, if those guys can get in then I'm sure people who do it for more than just lulz can too.

Re:Screw you, anonymous! (0)

Soluzar (1957050) | about 2 years ago | (#41009105)

Not. Thanking. Anonymous. As far as I'm concerned, they are assholes and petulant children who need a good spanking. I wish they'd grow up and start doing something different.

Re:Screw you, anonymous! (0)

Anonymous Coward | about 2 years ago | (#41009489)

You enjoy spanking children, huh?

Re:Screw you, anonymous! (1)

Soluzar (1957050) | about 2 years ago | (#41009585)

Did I say I'd be the one to spank them? I believe that I did not. I said they need a good spanking. I did not add (though perhaps should have) that it should be from their parent, guardian or other authority figure in their life. It also doesn't need to be an actual, physical spanking. Taking away their computers for a month ought to be more than sufficient of a metaphorical spanking, and quite appropriate since they haven't learned to use them like adults.

Re:Screw you, anonymous! (5, Insightful)

Caerdwyn (829058) | about 2 years ago | (#41009657)

Thanking Anonymous for stealing my credit card info to demonstrate Sony's/Stratfor's/whatever's poor IT practices is akin to thanking an arsonist for burning down my house to demonstrate that it's flammable.

There's not a shred of morality or good intention in Anonymous. None. They're vandals and thieves who never got over resenting authority figures when they were 13. Having the ability to run Metasploit against a video game host doesn't change the basic mindset.

Cyber-terrorists? (2)

neoshroom (324937) | about 2 years ago | (#41008935)

Is the intent of anonymous' actions really to inspire fear? Have we gotten to the point now where we accuse anything that inconveniences us as an act of terrorism?

Re:Cyber-terrorists? (1)

Soluzar (1957050) | about 2 years ago | (#41009061)

Yes! They want to make account holders feel fear for the security of their credentials. What else could possibly be the purpose of this attack? Well, other than 'teh lulz' of course. Fuck anonymous. Fuck them hard.

Re:Cyber-terrorists? (0)

d3ac0n (715594) | about 2 years ago | (#41009229)

Oh quit your whining. It's not Anon's fault that you were stupid enough to sink money into Sony crap.

Mind you, I don't approve of the illegal methods Anon sometimes uses, but I agree with the principle. Sony is a notorious abuser of both the law and their own customers. The sooner they either close down or radically restructure (IE: shareholders fire the CEO, the entire board of directors, most of the upper management and ALL the lawyers for extreme douchbaggery) the better. While there are far worse issues facing us today, Sony is still a boil on the face of the entertainment and gaming industries.

Oh, and just in case it wasn't clear, you were and are a fool for buying any of their products and supporting them. You can still redeem yourself by cancelling your account and taking the financial hit as penance. Or you can wait for Anon to do it for you. Your choice.

Re:Cyber-terrorists? (2)

Soluzar (1957050) | about 2 years ago | (#41009295)

Honestly? I'm not really dissatisfied with what I've bought from Sony. I'm a little dissatisfied with some of their business choices, but the games I've bought are fine thanks. I happen to actually like them. I didn't do anything wrong by buying them, no matter what you and those like you want to claim.

If I'm deprived of them by any illegal action of Anonymous, then I expect to get them back at some future time. If you actually believe in what you wrote in your final paragraph, you're by far a bigger fool than I.

Get off the high horse. I bought products and services. People do that. Anonymous are just being out-and-out criminals, hope all of them get arrested and sent to PITA prison.

Re:Screw you, anonymous! (1)

deadbeefcafe (1371017) | about 2 years ago | (#41008999)

Some men aren't looking for anything logical, like money. They can't be bought, bullied, reasoned or negotiated with. They don't feel pity, or remorse, or fear.
And they absolutely will not stop, ever, until you are dead.^W^W^W^W^W^W^W^W^W^W^W
Some men just want to watch the world burn.

Re:Screw you, anonymous! (1)

Soluzar (1957050) | about 2 years ago | (#41009115)

Sounds like anonymous to me. Sociopaths.

Do we need to draw attention to this on Slashdot? (5, Insightful)

ctheme (2694307) | about 2 years ago | (#41008771)

Even if this is true, and PSN was compromised, what's the point? This benefits no good cause, and Sony isn't even the one being exposed here -- its users are.

Anonymous is repeating the mistakes of Cablegate; releasing private information of parties who didn't ask to be involved. That's bullying, not hacktivism.

Re:Do we need to draw attention to this on Slashdo (0)

Anonymous Coward | about 2 years ago | (#41008893)

That's the same argument that the TSA uses, when you advertise that maintenance and crew have unfettered access to the planes. If a terrorist wants to blow up a plane, they'll simply drive around back instead of standing in line to go through the TSA checkpoints. How dare anyone mention that? Who does it help? Only the terrorists win with that information getting out!

Here's the deal. It was a known problem before, and it was ignored. Then they got hacked. It was a known problem again (unsalted passwords, really guys?). Your reaction is to blame Anonymous for putting its users in jeopardy. You missed the boat. The users were already in jeopardy, and anyone with access to the database and cursory knowledge of rainbow tables was already exploiting users.

Ignorance of the problem is not the same as security.

Re:Do we need to draw attention to this on Slashdo (1)

ctheme (2694307) | about 2 years ago | (#41008987)

From the pastebin document:

I got no twitter,facebook, neither I go in IRC.. if someone takes credit for this pwnage, he's a faggot.
What's the target?...It's SONY, MOTHERFUCKER.
Contact me at anon@prvt.org for the full database, which is 50GB, fuck.
About 10 million fuckers at risk. Yes, if you play playstatio network, you're included

This is the language of someone who wants to be perceived as a threat to many people. It is not the language of democratic engagement.

Re:Do we need to draw attention to this on Slashdo (1)

Soluzar (1957050) | about 2 years ago | (#41009147)

It's the language of a child who wants attention. He screams, he shouts, he throws his toys at things. He doesn't know any better, but his parents at least should keep him away from computers until he's old enough to learn not to be a dick.

Think about it (1)

Anonymous Coward | about 2 years ago | (#41009425)

If a attention-whoring kid can defeat the security measures that a global corporation installed, after they have been hacked before, well, that's one really smart kid. Or Sony still doesn't think your data should be secure.

I'm betting on that last one. Arrogant fuckers that they are.

Re:Do we need to draw attention to this on Slashdo (1)

rvw (755107) | about 2 years ago | (#41008927)

Even if this is true, and PSN was compromised, what's the point? This benefits no good cause, and Sony isn't even the one being exposed here -- its users are.

Anonymous is repeating the mistakes of Cablegate; releasing private information of parties who didn't ask to be involved. That's bullying, not hacktivism.

It depends. If this is the only way to show that Sony doesn't give shit about security, then this is the way. They released 3000 credentials. If they release the 10 million, that's another case. But anyhow, Anonymous is not about going the diplomatic way.

Re:Do we need to draw attention to this on Slashdo (1)

Soluzar (1957050) | about 2 years ago | (#41009135)

Oh shit, some clear and rational thinking? Wasn't expecting that.

Came into topic expecting usual Sony hatefest.

Leaving partially disappointed.

Re:Do we need to draw attention to this on Slashdo (0)

Anonymous Coward | about 2 years ago | (#41009733)

PSN wasn't compromised. Someone ripped off a credentials list pasted on pastebin in february, and presented it as a current hack. That was discovered a couple of days ago.

Again? (1)

autonomousautomator (2709383) | about 2 years ago | (#41008781)

Its becoming like finding holes in a fishnet.

Re:Again? (1)

rvw (755107) | about 2 years ago | (#41008933)

Its becoming like finding holes in a fishnet.

A hole in a fishnet is a feature, and I'm not kidding. Without those holes, it would become useless. So better find a car analogy!

Wow... you are dumb (2)

SmallFurryCreature (593017) | about 2 years ago | (#41009447)

Finding holes in a fishing net is a saying, meaning it isn't any kind of challenge. Like finding freckles on a redhead.

Whoops! (5, Funny)

phrackwulf (589741) | about 2 years ago | (#41008787)

Sonic is really going to have to hurry to get all those rings back! I hate this level!

Fail. (5, Informative)

Anonymous Coward | about 2 years ago | (#41008793)

Proven false.

* the document of leaked data linked to in the Twitter account appears to be identical to one posted on the Internet back in March.
* Anonymous has deleted the Tweet claiming that it hacked the PSN.
* Direct statement from Sony: "We’ve confirmed that the recent claim that PlayStation Network was illegally hacked and that customer passwords and email addresses were accessed is completely false."

Re:Fail. (2)

bob zee (701656) | about 2 years ago | (#41009083)

i'd sure like some links to your claims. i am not saying your are trying to mislead anyone, i would just like to have some further reading. i suppose it is off to google now to find it. thank you for the heads up!

Re:Fail. (1)

repvik (96666) | about 2 years ago | (#41009755)

I've seen the pastebin from march (Or was it february? I'm not entirely sure). I can't find it in my twitter feed atm though.
It's just a kid trying to scare people.

I can't shed any tears for Sony (0)

Anonymous Coward | about 2 years ago | (#41008803)

Anything that further erodes the public's confidence in Sony is a good thing.

Their antics with rootkits, feature disabling and poorly-secured websites are murdering the once mighty Sony brand.

Some day Sony will be the text-book example of why it is a bad idea to repeatedly shit on your customers, destroying a valuable brand in the process.

This could be...not good (1)

JavaBear (9872) | about 2 years ago | (#41008805)

Fool me once, shame on you and all that. The first time they could be excused a little by having put too much faith in their internal systems. If this is true, there can be no excuses left.

Sweden? (1)

Vintermann (400722) | about 2 years ago | (#41008813)

Seems like all the email adresses are for Swedes. Wonder what they've got against Swedes.

Re:Sweden? (2)

OzPeter (195038) | about 2 years ago | (#41008861)

Seems like all the email adresses are for Swedes. Wonder what they've got against Swedes.

I dunno .. maybe because of that little thing between Julian, the UK, Sweden and Ecuador?

Re:Sweden? (0)

Anonymous Coward | about 2 years ago | (#41009057)

Wonder what they've got against Swedes.

There is just so much to choose from.

The most likely is that Anonymous is a Norwegian-Danish coalition with the intent to get revenge for Swedens acquisition of Norway after the Napoleonic Wars.

HA! HA! (0)

Anonymous Coward | about 2 years ago | (#41008815)

Ha! Ha! Misfortune for you!

Sony's says this is fake (5, Informative)

deadbeefcafe (1371017) | about 2 years ago | (#41008827)

http://www.videogamer.com/news/psn_hack_claims_are_false_says_sony.html [videogamer.com]

Last night someone claiming to be a member of Anonymous posted what was alleged to be information obtained from 50GB of compromised PSN data, but it turned out the data was the same as that released last year when PSN was hacked. "We've confirmed that the recent claim that PlayStation Network was illegally hacked and that customer passwords and email addresses were accessed is completely false," assured Sony in a statement.

Re:Sony's says this is fake (1)

Dave Whiteside (2055370) | about 2 years ago | (#41009037)

isn't that what they said last time?

Pavlovian Response (3, Funny)

frinsore (153020) | about 2 years ago | (#41008851)

The last time that this happened Sony gave me two free games. Now that it appears to have happened again my initial thoughts are regarding more free games. Somehow I don't think that this response is intentional on Sony's part.

Re:Pavlovian Response (1)

rvw (755107) | about 2 years ago | (#41008969)

The last time that this happened Sony gave me two free games. Now that it appears to have happened again my initial thoughts are regarding more free games. Somehow I don't think that this response is intentional on Sony's part.

It's the new marketing strategy. You are conditioned now. The hack is a hoax. You want games. Sony wins! HAHAHAHAHAHA!!!!!!

Probably not true.. Sony has best security (5, Funny)

rgbrenner (317308) | about 2 years ago | (#41008923)

I can't imagine this is true.. Sony has always been on the cutting-edge of security tech. I mean this is the company that designed the text-based CAPTCHA:
http://pro.sony.com/bbsc/jsp/forms/generateCaptcha.jsp [sony.com]

Right click is disabled so it's impossible to crack.

I somehow think you are joking (1)

maroberts (15852) | about 2 years ago | (#41008975)

..quoth he pressing F12 and looking at the Firebug output

Re:I somehow think you are joking (1)

rgbrenner (317308) | about 2 years ago | (#41009019)

Wow.. you're a really talented hacker. But be careful about posting exploits like that or you might be prosecuted for unauthorized computer access.

Re:Probably not true.. Sony has best security (1)

thegarbz (1787294) | about 2 years ago | (#41009117)

Wait what? Right click is disabled? Was that foiled my noscript running on my browser?

Re:Probably not true.. Sony has best security (1)

pnot (96038) | about 2 years ago | (#41009175)

Holy shit, that's incredible. They've invented a Captcha that's easier for a bot than for a human. I can only assume that they never figured out what CAPTCHAs were for, and assumed that their sole purpose was to annoy users.

Re:Probably not true.. Sony has best security (0)

Anonymous Coward | about 2 years ago | (#41009417)

Why the fuck is that Informative?

Government & Stealth Malware (-1)

Anonymous Coward | about 2 years ago | (#41008925)

Nobody Seems To Notice and Nobody Seems To Care - Government & Stealth Malware

In Response To Slashdot Article: Former Pentagon Analyst: China Has Backdoors To 80% of Telecoms 87

How many rootkits does the US[2] use officially or unofficially?

How much of the free but proprietary software in the US spies on you?

Which software would that be?

Visit any of the top freeware sites in the US, count the number of thousands or millions of downloads of free but proprietary software, much of it works, again on a proprietary Operating System, with files stored or in transit.

How many free but proprietary programs have you downloaded and scanned entire hard drives, flash drives, and other media? Do you realize you are giving these types of proprietary programs complete access to all of your computer's files on the basis of faith alone?

If you are an atheist, the comparison is that you believe in code you cannot see to detect and contain malware on the basis of faith! So you do believe in something invisible to you, don't you?

I'm now going to touch on a subject most anti-malware, commercial or free, developers will DELETE on most of their forums or mailing lists:

APT malware infecting and remaining in BIOS, on PCI and AGP devices, in firmware, your router (many routers are forced to place backdoors in their firmware for their government) your NIC, and many other devices.

Where are the commercial or free anti-malware organizations and individual's products which hash and compare in the cloud and scan for malware for these vectors? If you post on mailing lists or forums of most anti-malware organizations about this threat, one of the following actions will apply: your post will be deleted and/or moved to a hard to find or 'deleted/junk posts' forum section, someone or a team of individuals will mock you in various forms 'tin foil hat', 'conspiracy nut', and my favorite, 'where is the proof of these infections?' One only needs to search Google for these threats and they will open your malware world view to a much larger arena of malware on devices not scanned/supported by the scanners from these freeware sites. This point assumed you're using the proprietary Microsoft Windows OS. Now, let's move on to Linux.

The rootkit scanners for Linux are few and poor. If you're lucky, you'll know how to use chkrootkit (but you can use strings and other tools for analysis) and show the strings of binaries on your installation, but the results are dependent on your capability of deciphering the output and performing further analysis with various tools or in an environment such as Remnux Linux. None of these free scanners scan the earlier mentioned areas of your PC, either! Nor do they detect many of the hundreds of trojans and rootkits easily available on popular websites and the dark/deep web.

Compromised defenders of Linux will look down their nose at you (unless they are into reverse engineering malware/bad binaries, Google for this and Linux and begin a valuable education!) and respond with a similar tone, if they don't call you a noob or point to verifying/downloading packages in a signed repo/original/secure source or checking hashes, they will jump to conspiracy type labels, ignore you, lock and/or shuffle the thread, or otherwise lead you astray from learning how to examine bad binaries. The world of Linux is funny in this way, and I've been a part of it for many years. The majority of Linux users, like the Windows users, will go out of their way to lead you and say anything other than pointing you to information readily available on detailed binary file analysis.

Don't let them get you down, the information is plenty and out there, some from some well known publishers of Linux/Unix books. Search, learn, and share the information on detecting and picking through bad binaries. But this still will not touch the void of the APT malware described above which will survive any wipe of r/w media. I'm convinced, on both *nix and Windows, these pieces of APT malware are government in origin. Maybe not from the US, but most of the 'curious' malware I've come across in poisoned binaries, were written by someone with a good knowledge in English, some, I found, functioned similar to the now well known Flame malware. From my experience, either many forum/mailing list mods and malware developers/defenders are 'on the take', compromised themselves, and/or working for a government entity.

Search enough, and you'll arrive at some lone individuals who cry out their system is compromised and nothing in their attempts can shake it of some 'strange infection'. These posts receive the same behavior as I said above, but often they are lone posts which receive no answer at all, AT ALL! While other posts are quickly and kindly replied to and the 'strange infection' posts are left to age and end up in a lost pile of old threads.

If you're persistent, the usual challenge is to, "prove it or STFU" and if the thread is not attacked or locked/shuffled and you're lucky to reference some actual data, they will usually attack or ridicule you and further drive the discussion away from actual proof of APT infections.

The market is ripe for an ambitious company or individual to begin demanding companies and organizations who release firmware and design hardware to release signed and hashed packages and pour this information into the cloud, so everyone's BIOS is checked, all firmware on routers, NICs, and other devices are checked, and malware identified and knowledge reported and shared openly.

But even this will do nothing to stop backdoored firmware (often on commercial routers and other networked devices of real importance for government use - which again opens the possibility of hackers discovering these backdoors) people continue to use instead of refusing to buy hardware with proprietary firmware/software.

Many people will say, "the only safe computer is the one disconnected from any network, wireless, wired, LAN, internet, intranet" but I have seen and you can search yourself for and read about satellite, RF, temperature, TEMPEST (is it illegal in your part of the world to SHIELD your system against some of these APT attacks, especially TEMPEST? And no, it's not simply a CRT issue), power line and many other attacks which can and do strike computers which have no active network connection, some which have never had any network connection. Some individuals have complained they receive APT attacks throughout their disconnected systems and they are ridiculed and labeled as a nutter. The information exists, some people have gone so far as to scream from the rooftops online about it, but they are nutters who must have some serious problems and this technology with our systems could not be possible.

I believe most modern computer hardware is more powerful than many of us imagine, and a lot of these systems swept from above via satellite and other attacks. Some exploits take advantage of packet radio and some of your proprietary hardware. Some exploits piggyback and unless you really know what you're doing, and even then... you won't notice it.

Back to the Windows users, a lot of them will dismiss any strange activity to, "that's just Windows!" and ignore it or format again and again only to see the same APT infected activity continue. Using older versions of sysinternals, I've observed very bizarre behavior on a few non networked systems, a mysterious chat program running which doesn't exist on the system, all communication methods monitored (bluetooth, your hard/software modems, and more), disk mirroring software running[1], scans running on different but specific file types, command line versions of popular Windows freeware installed on the system rather than the use of the graphical component, and more.

[1] In one anonymous post on pastebin, claiming to be from an intel org, it blasted the group Anonymous, with a bunch of threats and information, including that their systems are all mirrored in some remote location anyway.

[2] Or other government, US used in this case due to the article source and speculation vs. China. This is not to defend China, which is one messed up hell hole on several levels and we all need to push for human rights and freedom for China's people. For other, freer countries, however, the concentration camps exist but you wouldn't notice them, they originate from media, mostly your TV, and you don't even know it. As George Carlin railed about "Our Owners", "nobody seems to notice and nobody seems to care".

[3] http://www.stallman.org/ [stallman.org]

Try this yourself on a wide variety of internet forums and mailing lists, push for malware scanners to scan more than files, but firmware/BIOS. See what happens, I can guarantee it won't be pleasant, especially with APT cases.

So scan away, or blissfully ignore it, but we need more people like RMS[3] in the world. Such individuals tend to be eccentric but their words ring true and clear about electronics and freedom.

I believe we're mostly pwned, whether we would like to admit it or not, blind and pwned, yet fiercely holding to misinformation, often due to lack of self discovery and education, and "nobody seems to notice and nobody seems to care".

##

Schneier has covered it before: power line fluctuations (differences on the wire in keys pressed).

There's thermal attacks against cpus and temp, also:

ENF (google it)

A treat (ENF Collector in Java):

sourceforge dot net fwdslash projects fwdslash nfienfcollector

No single antimalware scanner exists which offers the ability to scan (mostly proprietary) firmware on AGP/PCI devices (sound cards, graphics cards, usb novelty devices excluding thumb drives), BIOS/CMOS.

If you boot into ultimate boot cd you can use an archane text interface to dump BIOS/CMOS and examine/checksum.

The real attacks which survive disk formats and wipes target your PCI devices and any firmware which may be altered/overwritten with something special. It is not enough to scan your hard drive(s) and thumb drives, the real dangers with teeth infect your hardware devices.

When is the last time you:

Audited your sound card for malware?
Audited your graphics card for malware?
Audited your network card for malware?

Google for:

* AGP and PCI rootkit(s)
* Network card rootkit(s)
* BIOS/CMOS rootkit(s)

Our modern PC hardware is capable of much more than many can imagine.

Do you:

* Know your router's firmware may easily be replaced on a hacker's whim?
* Shield all cables against leakage and attacks
* Still use an old CRT monitor and beg for TEMPEST attacks?
* Use TEMPEST resistant fonts in all of your applications including your OS?
* Know whether or not your wired keyboard has keypresses encrypted as they pass to your PC from the keyboard?
* Use your PC on the grid and expose yourself to possible keypress attacks?
* Know your network card is VERY exploitable when plugged into the net and attacked by a hard core blackhat or any vicious geek with the know how?
* Search out informative papers on these subjects and educate your friends and family about these attacks?
* Contact antimalware companies and urge them to protect against many or all these attacks?

Do you trust your neighbors? Are they all really stupid when it comes to computing or is there a geek or two without a conscience looking to exploit these areas?

The overlooked threat are the potential civilian rogues stationed around you, especially in large apartment blocks who feed on unsecured wifi to do their dirty work.

With the recent news of Russian spies, whether or not this news was real or a psyop, educate yourself on the present threats which all antimalware scanners fail to protect against and remove any smug mask you may wear, be it Linux or OpenBSD, or the proprietary Windows and Mac OS you feel are properly secured and not vulnerable to any outside attacks because you either don't need an antivirus scanner (all are inept to serious attacks) or use one or several (many being proprietary mystery machines sending data to and from your machine for many reasons, one is to share your information with a group or set database to help aid in threats), the threats often come in mysterious ways.

Maybe the ancients had it right: stone tablets and their own unique language(s) rooted in symbolism.

#

I'm more concerned about new rootkits which target PCI devices, such as the graphics card and the optical drives, also, BIOS. Where are the malware scanners which scan PCI devices and BIOS for mismatches? All firmware, BIOS and on PCI devices should be checksummed and saved to match with others in the cloud, and archived when the computer is first used, backing up signed firmware.

When do you recall seeing signed router firmware upgrades with any type of checksum to check against? Same for PCI devices and optical drives and BIOS.

Some have begun with BIOS security:

http://www.biosbits.org/ [biosbits.org]

Some BIOS has write protection in its configuration, a lot of newer computers don't.

#

"Disconnect your PC from the internet and don't add anything you didn't create yourself. It worked for the NOC list machine in Mission Impossible"

The room/structure was likely heavily shielded, whereas most civvies don't shield their house and computer rooms. There is more than meets the eye to modern hardware.

Google:

subversion hack:
tagmeme(dot)com/subhack/

network card rootkits and trojans
pci rootkits
packet radio
xmit "fm fingerprinting" software
"specific emitter identification"
forums(dot)qrz(dot)com

how many malware scanners scan bios/cmos and pci/agp cards for malware? zero, even the rootkit scanners. have you checksummed/dumped your bios/cmos and firmware for all your pci/agp devices and usb devices, esp vanity usb devices in and outside the realm of common usb devices (thumbdrives, external hdds, printers),

Unless your computer room is shielded properly, the computers may still be attacked and used, I've personally inspected computers with no network connection running mysterious code in the background which task manager for windows and the eqiv for *nix does not find, and this didn't find it all.

Inspect your windows boot partition in *nix with hexdump and look for proxy packages mentioned along with command line burning programs and other oddities. Computers are more vulnerable than most would expect.

You can bet all of the malware scanners today, unless they are developed by some lone indy coder in a remote country, employ whitelisting of certain malware and none of them scan HARDWARE devices apart from the common usb devices.

Your network cards, sound cards, cd/dvd drives, graphics cards, all are capable of carrying malware to survive disk formatting/wiping.

Boot from a Linux live cd and use hexdump to examine your windows (and *nix) boot sectors to potentially discover interesting modifications by an unknown party.

#
eof

Re:Government & Stealth Malware (1)

ledow (319597) | about 2 years ago | (#41009027)

"Nobody Seems To Notice and Nobody Seems To Care."

About crackpot conspiracy theories posted on Slashdot in a hideously verbose article (and I'm one of the worst culprits for verbosity)? Damn right.

Now, please go away. If the government want in to my computer, they will get it. Chances are that I detect the attempt but even if I didn't, so what? What precisely do you think will happen that wouldn't have happened without intrusion into my personal computer?

P.S. tampering with boot sectors is a DUMB way to try to take over a computer. First, it won't work if the options for Boot Sector Protection are on. Secondly, it interferes with lots of perfectly innocent programs that people might be using (let's start at things like partition managers and go up to more interesting things like Truecrypt). Third, it's likely to balls up a minority of machines totally (Hell, I just encountered a set of machines whose BIOS checks a very specific sector on any NTFS partition for a Windows-like signature and hangs if you try to boot off anything else - so full-disk encryption is TOTALLY incompatible with that machine until the BIOS is fixed) and thus draw attention to itself.

Fourthly, those who care about people getting into their machines WILL notice. Those who don't, won't. Guess who the governments of the world would be most interested in?

Don't want the government to "find" you? Never let your machine out of your sight, never connect to the Internet, wrap it in a tinfoil hat (which seems oddly appropriate here). If they have physical access to your machine or its components at any point, it's game over. Seriously. Nothing has ever proven defeat of that.

Want to *use* your computer? Do so.

Hell, if they are going to put malware in something, they'll just stick it in an Intel chip. Who's going to see it among billions of transistors, hypervisors, microcode, etc.? Nobody. And it has complete access to anything without any hassle at all.

Please re-align your conspiracy theory and point it at brick walls. How can you be sure your house has brick walls? How do you know they didn't plant a microphone in it? How do you know there's not a thermal camera on the other side? Same thing, just as serious, just as crackpot.

Re:Government & Stealth Malware (-1)

Anonymous Coward | about 2 years ago | (#41009241)

Talk about the mother of all TL;DR...

Sony BMG Rootkit (0)

Anonymous Coward | about 2 years ago | (#41008945)

how many USERS were rooted and how was Sony BMG PUNISHED? At all?

Of course it's fake (1)

Pecisk (688001) | about 2 years ago | (#41009009)

Sorry to burst bubble, but this can be easily be forged with old data from previous hack. For me it's bigger posibility than Sony haven't taken previous attack seriously.

Most of the time its silly (1)

DarkOx (621550) | about 2 years ago | (#41009103)

Most of the time I think of Anon's actions as pointless vandals, best discouraged.

When the f**k with Sony though I can't help but cheer them on.

How are Anonymous NOT terrorists? (0)

toddmbloom (1625689) | about 2 years ago | (#41009127)

Seriously? Continuing to do crap like this.. hopefully they'll get what is coming to them.

Anonymous (-1)

Anonymous Coward | about 2 years ago | (#41009137)

Who give a flying squirrel F*$k about 'Anonymous'? Bunch of tards.

It Seems (1)

DaMattster (977781) | about 2 years ago | (#41009159)

It would seem that one of the official sports of the hacktivist community is to continually embarrass Sony. I think this is positively hilarious that Sony still cannot get it right.

Re:It Seems (1)

JavaBear (9872) | about 2 years ago | (#41009233)

Some people have pointed out that this hacker claim may be fraud. If true, how can you claim "Sony still cannot get it right" ?

Sony screwed up, and probably spent millions hardening their security, and will have to continue to do so. Time will tell if they have done enough. Bit if this is an invalid claim, and Sony weren't hacked, how did they get it wrong?

So, the headline ought to be (5, Insightful)

JavaBear (9872) | about 2 years ago | (#41009187)

"Someone claiming to be from Anonymous claims to have hacked PSN."

Re:So, the headline ought to be (1)

Sponge Bath (413667) | about 2 years ago | (#41009339)

"Internet web site speculates about someone claiming to be from Anonymous claiming to have hacked PSN."
Editor: "Run it!"

It's A HOAX (1)

Anonymous Coward | about 2 years ago | (#41009421)

Guys, he stole the "passwords" from this post that was made back in march.

http://pastebin.com/hhU8Q9di

Wow (2)

drewco (1631735) | about 2 years ago | (#41009507)

Why can't Anonymous do something good or interesting for the world, like expose drug cartels or find Mitt Romney's taxes. All they ever do is steal people's identity and post it on the internet. Disagreeing with the way Sony does business is one thing, but why punish the PSN users for it?
Load More Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Create a Slashdot Account

Loading...