Science and Technology

Code to exploit Windows graphics flaw now public,39037064,39194791,00.htm

Code to exploit Windows graphics flaw now public

By Robert Lemos, CNET
Thursday, September 23 2004 11:31 AM

A sample program hit the Internet on Wednesday, showing by example how malicious coders could compromise Windows computers by using a flaw in the handling of a widespread graphics format by Microsoft's software.

Security professionals expect the release of the program to herald a new round of attacks by viruses and Trojan horses incorporating the code to circumvent security on Windows computers that have not been updated. The flaw, in the way Microsoft's software processes JPEG graphics, could allow a program to take control of a victim's computer when the user opens a JPEG file.

"Within days, you'll likely see (attacks) using this code as a basis," said Vincent Weafer, senior director of security response for antivirus-software company Symantec. "This is dangerous in a sense that everyone processes JPEG files to some degree."

The program is the latest example of "exploit code," a sample that shows others how to create attack programs that can take advantage of a particular flaw. Such code preceded the Sasser worm by two days and the MSBlast worm by nine days.

( categories: )

Sound Cannon in Place in NY Pointed at Protesters

Photos from NY of the sound weapon in place and pointed at protesters.




Microwaving Your Food Isn't Safe

by Larry Cook

If you have ever wondered whether or not microwaved food is safe, here's an experiment you can do at home. Plant seeds in two pots. Water one pot with water that has been microwaved, the other with regular tap. The seeds that received microwaved water won't sprout. If microwaved water can stop plants from growing, think of what microwaved food can do to your health!


"Following decades of intense lobbying by the mind control psychiatrists and psychiatric-medical establishment, the U.S. government made plans to establish mega-agencies, such as HEW (Health, Education and Welfare) and VA (Veterans Administration). It can be no coincidence that through these agencies many of the atrocities of the Invisible War have been committed."



W.H. Bowart and Richard Sutton

this page is a copy of:

Table of Contents



    Cancer Epidemic Caused by U. S. WMD



    By Christopher Bollyn

    A growing number of U. S. military personnel who are serving, or have served, in Iraq or Afghanistan has become sick and disabled from a variety of symptoms commonly known as Gulf War Syndrome. Depleted uranium (DU) weapons have been blamed for many of the symptoms.

    Unprecedented Electronic Net for Olympics

    ATHENS, Greece (AP) - If you're planning on attending this month's Olympic Games, you'd best be careful what you say and do in public.

    Software will be watching and listening.
    Recent leaps in technology have paired highly sophisticated software with street surveillance cameras to create digital security guards with intelligence-gathering skills.

    ``It is a very vast network and it is the first time it is being done on such a scale at an international level,'' Greek police spokesman Col. Lefteris Ikonomou told The Associated Press.

    Plan Daisy

    Every discussion forum on the Web is monitored by Israeli loyalists. This is an organized and, where necessary, supported effort that is perfectly reasonable given the situation of Jews and Israel in the world not only today, but throughout history. Just as the ADL and the JDL and other organizations are properly watchful for those inimical for whatever reason to the well-being of Jews, and are very good at what they do, so we have among us at Liberty Forum not only those who advocate Israel's interests but those who simply watch for dangers. I support this, I have never not supported it, and firmly advocate that any discrete and identifiable grouping on whatever basis of association should do likewise. follow link for complete article... Microsoft is a collaborative project to produce a directory of public relations firms, think tanks, industry-funded organizations and industry-friendly experts that work to influence public opinion and public policy on behalf of corporations, governments and special interests

    Microsoft was founded in 1975 by Bill Gates and Paul Allen. Microsoft has a corporate history of disinformation going back to its very inception

    Halloween XI: Get The FUD

    some quotes from the article: "Let's start by reminding ourselves of the stakes. For Microsoft (or at least its present business model) to survive, open source must die..." ^^^^^ "...Expect Microsoft to ally even more closely with the RIAA and MPAA in making yet another try at hardware-based DRM restrictions — and legislation making them mandatory. The rationale will be to stop piracy and spam, but the real goal will be customer control and a lockout of all unauthorized software. Two previous attempts at this have failed, but the logic of Microsoft's situation is such that they must keep trying.

    When The Chips are Down

    The selling point for implanting biochips beneath your skin is that they cannot be stolen. They can be used to access ATM's, pay bills, sign contracts, verify your identity--all without your wallet--and locate lost or kidnaped children. Should you, yourself, become lost or disabled, a global array of satellites will locate you, or any person who has been implanted with a SIB (Subdermally Implanted Biochip) anywhere on the planet.

    Zombie PCs spew out 80% of spam

    Four-fifths of spam now emanates from computers contaminated with Trojan horse infections, according to a study by network management firm Sandvine out this week. Trojans and worms with backdoor components such as Migmaf and SoBig have turned infected Windows PCs into drones in vast networks of compromised zombie PCs.... (follow link to read the complete article)
    ( categories: )

    2003 And Beyond


    Technology trends that will affect your business and how you do business.
    Warning: very little of the following is speculation. Most of it has already been announced and is being implemented. )


    Some very interesting pieces of information in this article clearly show Micro$ofts very dirty tactics to get more CONTROL and $$$$$$$. Fits right in with globalist elite's plan for a completely controlled New World Order...



    "...Microsoft's public image, carefully crafted through billions (literally) spent with PR firms, continues to erode under the weight of license extortion, anti-trust action, license compliance raids, buying political influence, endless lawsuits over stolen products and patents, insecure and unstable products, obvious astroturf (fake grass roots) media campaigns, and much more..."


    "...Microsoft used this method to quickly reduce Netscape's browser share from 80%+ to nearly nothing. They were convicted of multiple and very serious antitrust violations in doing so, but the newly appointed Bush/Ashcroft Department of Justice declined to apply punishment or effective remedy. Microsoft is thus free to use similar methods to remove other products from the market.

    Microsoft's current push is to have complete control over hardware design and availability. The practice of issuing joint Intel / Microsoft PC design specifications came to an end with the PC 2001 issue (J2). Microsoft alone now specifies PC design, leaving Intel as only a manufacturer (J3). This control is now made final and all encompasing by the Athens PC design..."

    Microsoft granted patent for double-click

    By Sam Varghese
    June 2, 2004

    Microsoft has been granted a patent on the double-click by the US Patents and Trademark Office. The patent, number 6,727,830, was granted on April 27.

    An abstract of the application says: "A method and system are provided for extending the functionality of application buttons on a limited resource computing device. Alternative application functions are launched based on the length of time an application button is pressed. A default function for an application is launched if the button is pressed for a short, i.e., normal, period of time.

    New Chinese Jets Superior, Eagle Loses to Flanker

    Charles R. Smith

    Wednesday, May 26, 2004


    China is about to receive 24 advanced Sukhoi Su-30MK2 Flanker fighters from Russia. The new fighter jets are reported to be the naval versions of the Sukhoi Su-30MKK fighter.

    The new Chinese fighters are reportedly equipped with enhanced anti-ship strike capabilities including the Kh-31 Krypton supersonic anti-ship missile.

    China has already purchased 78 Su-27SK/UBK fighters and 76 Su-30MKK fighters from Russia, and is building 200 more Flanker jets under license from Sukhoi. The PLA Naval Air Corps will deploy the latest batch of Su-30MK2 fighters.

    The disturbing news from Beijing adds to recent bad news for the U. S. Air Force. According to an unreleased U. S. A. F. report, the F-15 Eagle - the most advanced U.S. fighter in service - is inferior to the latest versions of the Sukhoi Su-30 Flanker.

    The report covers a series of air-combat training engagements earlier this year between Indian air force Su-30MKs and F-15Cs from Elmendorf AFB, Alaska. The U. S. F-15s were equipped with the U. S. latest long-range, high-definition radar systems.

    During the air combat exercises the Su-30MKs and F-15 pilots were seeing each other at the same time with their radars, but the Indian pilots were getting off the simulated first shot with their AA-10 Alamo missiles and often winning the long-range engagements.

    Flanker Beats Eagle

    According to a Richard Fisher, a defense analyst and noted expert on the Chinese military, the Chinese Flanker fighters can beat the U. S. top jet fighters including the F-15 Eagle.

    EU Moves Toward Software Patents

    The EU Council of Ministers is demonstrating that the concept of democracy is alien to the EU. This Wednesday, the Irish Presidency managed to secure a qualified majority for a counter-proposal to the software patents directive, with only a few countries - including Belgium and Germany - showing resistance. The new text proposes to discard all the amendments from the European which would limite patentability. Instead the lax language of the original Commission proposal is to be reinstated in its entirety, with direct patentability of computer programs, data structures and process descriptions added as icing on the cake. The proposal is now scheduled to be confirmed without discussion at a meeting of ministers on 17-18 May, unless one of the Member States changes its vote. In a remarkable sign of unity in times of imminent elections, members of the European Parliament from all groups across the political spectrum are condemning this blatant disrespect for democracy in Europe.

    Sounds to be in sync with the global elites' plans for the totalitarian global government they are encforcing...

    Pentagon Preps for War in Space

    By Noah Shachtman An Air Force report is giving what analysts call the most detailed picture since the end of the Cold War of the Pentagon's efforts to turn outer space into a battlefield. For years, the American military has spoken in hints and whispers, if at all, about its plans to develop weapons in space. But the U.S. Air Force Transformation Flight Plan (PDF) changes all that. Released in November, the report makes U.S.
    ( categories: )

    ID-Sniper Rifle

    What is the ID SNIPER rifle?

    "...It is used to implant a GPS-microchip in the body of a human being, using a high powered sniper rifle as the long distance injector. The microchip will enter the body and stay there, causing no internal damage, and only a very small amount of physical pain to the target. It will feel like a mosquito-bite lasting a fraction of a second. At the same time a digital camcorder with a zoom-lense fitted within the scope will take a high-resolution picture of the target. This picture will be stored on a memory card for later image-analysis.

    U.S. Patents to Control Us


    Patent 3,951,134 - Apparatus and method for remotely monitoring and altering brain waves

    Patent 4,717,343 - Method of Changing Person's Behavior

    Patent 4,858,612 - Hearing Device

    Patent 4,877,027 - Hearing System

    Patent 5,123,899 - Method and System for Altering Consciousness

    Patent 5,159,703 - Silent Subliminal Presentation System

    Patent 5,270,800 - Subliminal Message Generator

    Patent 5,507,291 - Method and an Associated Apparatus for Remotely Determining information as to Person's Emotional State

    Patent 5,539,705 - Ultrasonic Speech Translator and Communications System

    Patent 5,629,678 - Personal Tracking and Recovery System

    Patent 5,760,692 - Intra-oral Tracking Device

    Patent 5,878,155 - Method for verifying human identity during electronic sale transactions (Mark of the Beast)

    Patent 5,905,461 - Global Positioning Satellite Tracking Device

    Patent 5,935,054 - Magnetic excitation of Sensory Resonances

    Patent 5,952,600 - Engine Disabling Weapon

    Patent 6,006,188 - Speech Signal Processing for Determining Psychological or Physiological Characteristics Using a Knowledge Base

    Patent 6,014,080 - Body Worn Active and Passive Tracking Device

    Patent 6,017,302 - Subliminal Acoustic Manipulation of Nervous System

    Patent 6,051,594 - Methods and Formulations for Modulating the Human Sexual Response

    NO to software patents

    NO to software patents - come to brussels on 14 april

    We are protesting against software patents in Europe.

    Most software will become illegal to use in Europe if this dangerous directive is adopted without proper amending.

    The Commission and the Council of Ministers are covertly pushing for unlimited patentability of software, heavily lobbied by multinationals and patent lawyers. They are ignoring the democratically voted decision of the European Parliament from 24 september 2003, which has the support of more than 300.000 citizens, 2.000.000 SMEs, dozens of economists and scientists.
    ( categories: )

    The Once and Future King - Now the Only Way Microsoft Can Die is by Suicide

    ..."A company wanted to hold off on upgrading Microsoft Office for a year in order to do other projects. So Microsoft gave a 'free' copy of the new Office to the CEO -- a copy that of course generated errors for anyone else in the firm reading his documents. The CEO got tired of getting the 'please re-send in XX format' so he ordered other projects put on hold and the office upgrade to be top priority. This is an implementation of Microsoft's treadmill way of abusing its customers. Put them on a treadmill and start spinning it so fast that the customers can't look at anything else besides Microsoft products. They even have their own language, something that would fit perfectly into Orwell's 1984. A 'neutral PC' has 100 percent Microsoft software. Their 'embrace and extend' is really 'embrace, extend, and exterminate.' Even how they view competitors, they have the term 'NOISE' (Novell, Oracle, Intuit, Sybase, and Everyone else). When they say they work in a heterogeneous environment, they list MS 95, MS98, NT4, W2K. Oh yeah, that's heterogeneous. In Silicon Valley, hardware people look forward to the day someone like Cisco buys their company or technology and makes them rich. Software people fear the day that Microsoft notices their niche because they will get sucked dry. Some have even said that venture capital people are tending to avoid software companies '...because Microsoft will pull a Netscape on you."

    Complete article

    ( categories: )

    You know its 2004 when ...

    You know you are in the year 2004 when:

    1. You just tried to enter your password on the microwave.
    2. You have a list of 15 phone numbers to reach your family of three.
    3. You call your son's beeper to let him know it's time to eat. He e-mails you back from his bedroom, "What's for dinner?"
    4. Your daughter sells Girl Scout Cookies via her Web site.
    5. You chat several times a day with a stranger from South Africa but you haven't spoken with your next door neighbor yet this year.
    6. You check the ingredients on a can of chicken noodle soup to see if it contains Echinacea.
    7. Your grandmother asks you to send her a JPEG file of your newborn so she can create a screen saver.
    8. You pull up in your own driveway and use your cell phone to see if anyone is home.
    9. Every commercial on television has a Web site address at the bottom of the screen.
    10. You buy a computer and six months later it is out of date and now sells for half the price you paid.
    11. Leaving the house without your cell phone, which you didn't have the first 20 or 30 years of your life, is cause for panic and turning around to go get it.
    12. Using real money, instead of credit or debit, to make a purchase would be a hassle and takes planning.
    13. Cleaning up the dining room means getting the fast food bags out of the back seat of your car.
    14. Your reason for not staying in touch with family is that they do not have e-mail addresses.
    15. You consider second-day delivery painfully slow.
    16. Your dining room table is now your flat filing cabinet.
    17. Your idea of being organized is multiple-coloured Post-it notes.
    18. You hear most of your jokes via e-mail instead of in person.
    19. You get an extra phone line so you can get phone calls.
    20. You disconnect from the Internet and get this awful feeling as if you just pulled the plug on a loved one.
    21. You get up in the morning and go online before getting your coffee.

    ( categories: )

    Google Watch

    Google Watch A look at how Google's monopoly, algorithms, and privacy policies are undermining the Web.
    Google Watch
    ( categories: )

    Black Helicopters - silly conspiracy theory?

    note: Linda Thompson was the 2nd Continental Army's (Militia) Intelligence Service Station Chief who responded to the attack at Waco. She was the producer of the film "Waco, The Big Lie" - which showed the flame throwing tank firing up the building. She stood in the middle of the Waco town square, wearing camos & waving an AR-15 and begging for people to help save the Branch Davidians. She was yelling that if people didn't get their guns and help her defend them, that they would be burned to death.

    Black Helicopters
    by Linda Thompson

    There is nothing cosmic, paranormal, or ethereal about black helicopters. They belong to the U.S. military, 160th Special Operations Aviation Regiment, based in Ft. Cambell, Kentucky, in Hopkinsville, KY. They park many of the helicopters at different locations where they are used, however.

    The only reason the color black is significant is that only this one military unit gets this particular type of paint for its helicopters, the 160th Special Operations Aviation Regiment ("160th SOAR") in Ft. Campbell, Kentucky.

    The paint is called "CARC" and it is used because it is chemically resistant and non-radar reflective .

    Other military units do get this paint for use on airplanes and other craft, except helicopters, however. If you look at military webpages of aircraft, you will find plenty of pictures.

    The 160th SOAR is a military special operations unit that began as an intentionally covert, illicit and illegal arm of what was formerly called "Delta Force," which was a branch of 5th Group, Special Forces, and a "reserve" branch called 12th Group, the way special forces was FORMERLY set up. It was operated and funded through CIA and this alliance continues to this day.

    Many former members also are now prominent in the media, which is why it has been a relatively simple matter for them to run the stories calling people exposing the activity of the 160th "loonies" or claiming the helicopters are associated with "UFO" activity, etc., in efforts to keep the public ignorant of the true military source and illegal purposes of these craft and their pilots and unit members. Robert K. Brown, of Soldier of Fortune Magazine, and his patsy, James Pate, are two examples. Joe Gelarden of the Indianapolis Star-News (the same company also owns the Arizona Republic) is another. Governor O'Bannon's press secretary is another. U.S. Congressional Representative Dan Burton's Chief of Staff is another (straight out of the 160th before he worked for Burton). These are just a few examples out of dozens.

    Placing members in such prominent locations, it is quite simple to undermine Congressional investigations and place stories prominently in the media discrediting any "leaks" of truthful information.

    In recent years, the military created two separate branches from what was formerly the legitimate "special forces" and this covert band of CIA-sponsored thugs operating under the cover of being "special forces." (You may remember "Operation Phoenix" and "Air America" as two examples of the CIA sponsored illegal activity of the illicit group).

    Now, there is a separate military branch, known as special forces, and another, known as special operations.

    Special Forces branch consists of the traditional "green berets," and "airborne" branch of the Army with a fairly long, special infantry, history.

    Special operations is the bastard step child and brainchild of a bunch of former covert thugs and rogues of the self-styled "Delta force," that has gained "legitimacy" (through lobbying and funding) and is now its own separate branch of the military, headed in the pentagon by a Col. (probably a general by now) Sheldon. Immediately prior to his appointment to head special ops at the pentagon, he was the commander of the 160th Special Operations Aviation Regiment. (See above . The 160th is the unit which has the black helicopters.)

    These helicopters flew missions to decimate Panama, under the leadership of (now) "drug czar" MG McCaffrey. We show this same unit, the supposed "heros" returning from Somalia (broadcast on NBC and named by name) in a video that shows what they really did in Somalia -- firing down on crowds of civilians as a "diversion" while paratroopers were dropped into the area.

    EC erects toll booth for Microsoft's open source rivals Far from penalizing Microsoft, Wednesday's decision by the European Commission assures a bright future for the company as a patent licensing operation, according to one representative only two open source interests called to testify before the investigation. Because Microsoft will be allowed to pursue royalty revenue from the APIs it publishes, Jeremy Allison says that the projects such as Samba, which he jointly leads, may face a prohibitive hurdle. Microsoft's competitors use software such as Samba to access file and print services on Windows machines.
    ( categories: )

    What's So Bad About Microsoft?

    What's So Bad About Microsoft? From a Software User's Perspective
    ( categories: )

    More Microsoft Astroturfing?

    More Microsoft astroturfing?
    More Microsoft astroturfing? Nick Confessore has an interesting article in which he reveals that webzine Tech Central Station is actually published by DCI, an organization that specializes in astroturfing. An extract: TCS’s articles have also complemented work being done by DCI. During 2000, Microsoft contracted with DCI to perform various services, among them generating “grassroots” letters opposing a breakup of Microsoft and launching Americans for Technology Leadership, an anti-breakup group funded in part by Microsoft and run out of DCI’s office. Meanwhile, down the hall, Tech Central Station went on the offensive, inaugurating an “anti-trust” section that over the coming months would publish little except defenses of Microsoft and attacks on the software maker’s corporate and governmental antagonists, with occasional detours into the subject of lawsuit reform. (Microsoft smartly plugged some of the articles on its own Web site.)....
    ( categories: )

    New Documents Shed Light on Microsoft's Tactics

    New Documents Shed Light on Microsoft's Tactics - Tigen writes "As the NY Times reports, even as MS prepares to face penalties from the European Union, testimony during the second week of trial in the consumer ... [Slashdot]

    New report finds 1.8 tons of material are used to manufacture desktop PC and monitor

    According to the study, the manufacturing of one desktop computer and 17-inch CRT (cathode ray tube) monitor requires at least 240 kilograms of fossil fuels, 22 kilograms of chemicals and 1,500 kilograms of water. In terms of weight, the total amount of materials used is about equal to that of a mid-size car. here

    Leaked Memo Says Microsoft Raised $86 million for SCO

    Leaked Memo Says Microsoft Raised $86 million for SCO - badzilla and numerous others wrote in with this: "Eric S. Raymond's Open Source site has a new Halloween memo. The Halloween X memo, which ESR says he received ... [Slashdot]

    Interesting discussion on the subject
    ( categories: )

    Giant Space Shield Plan To Save Planet

    By Mark Townsend
    The Observer - UK

    Just like doctors prescribing medicine to their customer$...I mean patients, as a remedy, these scientists (or the people with power) do not not address the CAUSE of global warming, instead they let the global warming and destruction of the earths ecosystem continue.(and continue making $$profit $$) and just put a big shield up in the sky to make it all better.

    Ofcourse someone is going to earn massive amounts of $$ from the projects outlined below...


     Humanity could not exist without it - yet in an extraordinary plan that underlines the catastrophic implications of climate change, scientists now want to curb the Sun's life-giving influence to save mankind from its biggest threat: global warming.

    Key talks involving the Government's most senior climate experts have produced proposals to site a massive shield on the edge of space that would deflect the Sun's rays and stabilise the climate.

    Hundreds of thousands of tonnes of metallic 'scatterers' would be ejected into the upper atmosphere under the plans. In addition, billions of tiny barrage balloons could serve as a secondary barrier to block rays from the Earth's nearest star.

    On land, giant reservoirs holding saline water could be built to offset the rise in sea levels caused by the melting of the polar ice-caps. The oceans, too, would be modified to cope with the planet's increasingly warmer weather. Massive floating cloud-making machines would be dotted across their surface while, below, large plantations of algae would be grown to absorb greenhouse gases from the atmosphere.

    The theories were discussed by Britain's most eminent climatologists at a meeting in Cambridge last week to analyse the latest theories to tackle the problem of the planet heating up. They included the Government's chief scientist, Sir David King, who warned last week that climate change was the most severe problem facing civilisation.

    Professor John Schellnhuber, former chief environmental adviser to the German government and head of the UK's leading group of climate scientists at the Tyndall Centre, said: 'These are exotic ideas and we probably will have to come up with the right mixture. But the problem has not gone away, so we think this analysis is just in time.

    'The present climate policy does not seem to be working. We are not saying we have the magic bullet, but this is a desperate situation and people should start thinking about the unconventional. Preventative plans on a larger scale are needed.'

    Environmentalists maintain that the solutions are so radical they serve only to underscore how unprepared governments are to deal with the threat. Last week researchers predicted that a quarter of land animals and plants will die out because of global warming over the next 50 years.

    Syndicate content