My bad!
But i guess with the exception of the first line, most of the info still 
applies.

Regards,
Douglas Onyango +256(0712)981329

Life is the educators practical joke in which you spend the first half 
learning, and the second half learning that everything you learned in the first 
was wrong.

--- On Tue, 1/19/10, Noah Sematimba <[email protected]> wrote:

From: Noah Sematimba <[email protected]>
Subject: Re: [LUG] OT- Google and China
To: "Douglas Onyango" <[email protected]>
Cc: "Linux Users Group Uganda" <[email protected]>
Date: Tuesday, January 19, 2010, 12:36 AM


I think Paul meant IP as in Intellectual Property...

On Jan 19, 2010, at 12:13 AM, Douglas Onyango wrote:
Paul,
It was not  IP addresses that they were after - any case this is public 
property and they don't have to steal. The MO suggests they weren't in search 
of the conventional big things like military technology either, because they 
have been doing this for years http://tinyurl.com/y8rvukp

These guys were after dissidents and have since got some whose emails they are 
forwarding - http://tinyurl.com/yg5nlft

And about words failing you logic test, i have seen the port of this code on 
the Metasploit and it gives you shell access to a Windows PC - now, any 
security practitioner will tell you, you couldn't ask for more than this.

But in conclusion i must agree with you; the number of conspiracy theories 
available make the issue very complex to understand

Regards,
Douglas Onyango +256(0712)981329
Life is the educators practical joke in which you spend the first half 
learning, and the second half learning that everything you learned in the first 
was wrong.

--- On Mon, 1/18/10, Paul Bagyenda <[email protected]> wrote:

From: Paul Bagyenda <[email protected]>
Subject: Re: [LUG] OT- Google and China
To: "Linux Users Group Uganda" <[email protected]>
Date: Monday, January 18, 2010, 6:51 PM

I'm sorry but this whole story seems a little doubtful to me. Why, if you are 
Chinese Intelligence, use such blunt-instrument methods to obtain IP from 
american companies? Why not develop a Kim Philby (yes, Google is your friend) 
for the purpose? Failing that, there must surely be hundreds of 
chinese-american techies in those companies who can be leaned on for whatever 
reason to provide info. 
 Great narrative this, what with words/phrases like "hacking" and "dissidents" 
and "IE flaw". Fails to pass basic logic tests though. 
P. 
On Jan 15, 2010, at 14:17, Thomas Bbosa , CISSP wrote:
The Advanced persistent threats (APT) technology said to have been used by 
these guys in the attack has been a real worry among security practioners. 
Because this simply means that the attacker has muscle!! There has been talk 
that the bad guys invest a lot in this technology that mostly involves stealthy 
tactics with zero day attacks.  Again holes in IE continue to worry many. 
But the real question though is, can Google afford to loose the China ? 
Regards;Thomas. 
Thomas Bbosa , CISSP BitWork Technologies (U) Ltd 
Plot 135, UMA show Grounds –Lugogo
P.O.BOX 851 , Kampala , UgandaTel:     +256-414-579099Mob:   
+256-782480878Fax:     +256-414-289218Website: http://www.bitworktech.comFrom: Daniel
 Bwente [mailto:[email protected]
Sent: 15 January 2010 12:25
To: Linux Users Group Uganda
Subject: Re: [LUG] OT- Google and China 
Insight on the attack Vectors used to hit Google and others,

http://siblog.mcafee.com/cto/operation-%E2%80%9Caurora%E2%80%9D-hit-google-others/

Operation “ Aurora ”
I am sure you are wondering about the name “ Aurora .”  Based on our analysis, 
“ Aurora ” was part of the filepath on the attacker’s machine that was included 
in two of the malware binaries that we have confirmed are associated with the 
attack.


CheersOn Thu, Jan 14, 2010 at 2:25 PM, Niles Collins <[email protected]> 
wrote:As much as the US needs China for that credit line, China needs the US 
because we buy all their products. If the US stopped buying Chinese made 
products and China called in the debt owed by the US I think that China would 
blink first. This might turn into the beginning of that struggle.

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------




-- 
 Dan
 +256-071-2-552035

"You won't have eyes tonight. You won't have ears or a tongue. you will wander 
the underworld blind, deaf and dumb and all the dead will know; This is Hector: 
the fool who thought he killed 
Achilles."_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------



-----Inline Attachment Follows-----

_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------


_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------





      
_______________________________________________
LUG mailing list
[email protected]
http://kym.net/mailman/listinfo/lug
%LUG is generously hosted by INFOCOM http://www.infocom.co.ug/

The above comments and data are owned by whoever posted them (including 
attachments if any). The List's Host is not responsible for them in any way.
---------------------------------------

Reply via email to