My bad! But i guess with the exception of the first line, most of the info still applies.
Regards, Douglas Onyango +256(0712)981329 Life is the educators practical joke in which you spend the first half learning, and the second half learning that everything you learned in the first was wrong. --- On Tue, 1/19/10, Noah Sematimba <[email protected]> wrote: From: Noah Sematimba <[email protected]> Subject: Re: [LUG] OT- Google and China To: "Douglas Onyango" <[email protected]> Cc: "Linux Users Group Uganda" <[email protected]> Date: Tuesday, January 19, 2010, 12:36 AM I think Paul meant IP as in Intellectual Property... On Jan 19, 2010, at 12:13 AM, Douglas Onyango wrote: Paul, It was not IP addresses that they were after - any case this is public property and they don't have to steal. The MO suggests they weren't in search of the conventional big things like military technology either, because they have been doing this for years http://tinyurl.com/y8rvukp These guys were after dissidents and have since got some whose emails they are forwarding - http://tinyurl.com/yg5nlft And about words failing you logic test, i have seen the port of this code on the Metasploit and it gives you shell access to a Windows PC - now, any security practitioner will tell you, you couldn't ask for more than this. But in conclusion i must agree with you; the number of conspiracy theories available make the issue very complex to understand Regards, Douglas Onyango +256(0712)981329 Life is the educators practical joke in which you spend the first half learning, and the second half learning that everything you learned in the first was wrong. --- On Mon, 1/18/10, Paul Bagyenda <[email protected]> wrote: From: Paul Bagyenda <[email protected]> Subject: Re: [LUG] OT- Google and China To: "Linux Users Group Uganda" <[email protected]> Date: Monday, January 18, 2010, 6:51 PM I'm sorry but this whole story seems a little doubtful to me. Why, if you are Chinese Intelligence, use such blunt-instrument methods to obtain IP from american companies? Why not develop a Kim Philby (yes, Google is your friend) for the purpose? Failing that, there must surely be hundreds of chinese-american techies in those companies who can be leaned on for whatever reason to provide info. Great narrative this, what with words/phrases like "hacking" and "dissidents" and "IE flaw". Fails to pass basic logic tests though. P. On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote: The Advanced persistent threats (APT) technology said to have been used by these guys in the attack has been a real worry among security practioners. Because this simply means that the attacker has muscle!! There has been talk that the bad guys invest a lot in this technology that mostly involves stealthy tactics with zero day attacks. Again holes in IE continue to worry many. But the real question though is, can Google afford to loose the China ? Regards;Thomas. Thomas Bbosa , CISSP BitWork Technologies (U) Ltd Plot 135, UMA show Grounds –Lugogo P.O.BOX 851 , Kampala , UgandaTel: +256-414-579099Mob: +256-782480878Fax: +256-414-289218Website: http://www.bitworktech.comFrom: Daniel Bwente [mailto:[email protected]] Sent: 15 January 2010 12:25 To: Linux Users Group Uganda Subject: Re: [LUG] OT- Google and China Insight on the attack Vectors used to hit Google and others, http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/ Operation “ Aurora ” I am sure you are wondering about the name “ Aurora .” Based on our analysis, “ Aurora ” was part of the filepath on the attacker’s machine that was included in two of the malware binaries that we have confirmed are associated with the attack. CheersOn Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]> wrote:As much as the US needs China for that credit line, China needs the US because we buy all their products. If the US stopped buying Chinese made products and China called in the debt owed by the US I think that China would blink first. This might turn into the beginning of that struggle. _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. --------------------------------------- -- Dan +256-071-2-552035 "You won't have eyes tonight. You won't have ears or a tongue. you will wander the underworld blind, deaf and dumb and all the dead will know; This is Hector: the fool who thought he killed Achilles."_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. --------------------------------------- -----Inline Attachment Follows----- _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. --------------------------------------- _______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
_______________________________________________ LUG mailing list [email protected] http://kym.net/mailman/listinfo/lug %LUG is generously hosted by INFOCOM http://www.infocom.co.ug/ The above comments and data are owned by whoever posted them (including attachments if any). The List's Host is not responsible for them in any way. ---------------------------------------
