Blizzard – Jupiter Broadcasting https://www.jupiterbroadcasting.com Open Source Entertainment, on Demand. Sun, 17 Jan 2021 23:44:42 +0000 en-US hourly 1 https://wordpress.org/?v=5.5.3 https://original.jupiterbroadcasting.net/wp-content/uploads/2019/04/cropped-favicon-32x32.png Blizzard – Jupiter Broadcasting https://www.jupiterbroadcasting.com 32 32 Linux Action News 172 https://original.jupiterbroadcasting.net/143967/linux-action-news-172/ Sun, 17 Jan 2021 14:00:00 +0000 https://original.jupiterbroadcasting.net/?p=143967 Show Notes: linuxactionnews.com/172

The post Linux Action News 172 first appeared on Jupiter Broadcasting.

]]>

Show Notes: linuxactionnews.com/172

The post Linux Action News 172 first appeared on Jupiter Broadcasting.

]]>
Brazil Remote Wipes Your Junk | Tech Talk Today 47 https://original.jupiterbroadcasting.net/65082/brazil-remote-wipes-your-junk-tech-talk-today-47/ Thu, 21 Aug 2014 09:40:34 +0000 https://original.jupiterbroadcasting.net/?p=65082 A court injunction demands Apple, Google, and Microsoft remove a “forbidden” app off thousands of users phones, reports claim Verizon is launching its own app store, which they have flat out denied & we acknowledge the sunset of a PC classic. Direct Download: MP3 Audio | OGG Audio | Video | HD Video | Torrent […]

The post Brazil Remote Wipes Your Junk | Tech Talk Today 47 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

A court injunction demands Apple, Google, and Microsoft remove a “forbidden” app off thousands of users phones, reports claim Verizon is launching its own app store, which they have flat out denied & we acknowledge the sunset of a PC classic.

Direct Download:

MP3 Audio | OGG Audio | Video | HD Video | Torrent | YouTube

RSS Feeds:

MP3 Feed | OGG Feed | iTunes Feed | Video Feed | Torrent Feed

Become a supporter on Patreon:

Foo

Show Notes:

Verizon denies plan to launch its own Android app store (update) | The Verge

Verizon is going to launch its own app store in an effort to compete with the Google Play Store on Android devices, claims a report from The Information. The new store will be available globally and is the result of a partnership with other carriers and hardware makers, says the report. In 2010, Verizon Wireless launched a similar app store for Android and BlackBerry smartphones in the US, but it shuttered it in January 2013. The Information says the discussions for a new app store are still in an early stage, and there is not a concrete date for when it would launch.

However, Recode received a statement from Verizon saying that the carrier had no plans to offer a new app store. “We have no plans to do that,” Verizon spokeswoman Debra Lewis said. “Been there. Done that.” Amir Efrati from _The Information _tweeted the following in response: “I and @theinformation stand by this report 100%.” Efrait also said that “Verizon’s comment is misleading.”

The Information claims that this new effort is a response to recent cutbacks from Google in revenue sharing with carriers and hardware makers for apps sold through the Google Play Store. Verizon would be stemming future losses with its own app store, as revenues from app store sales are expected to grow significantly over the next few years. The report says that Verizon would also use data like location, time of day, and social indicators to recommend apps to users.

Brazil Court Issues Injunction Against Secret And Calls For App To Be Remotely Wiped | TechCrunch

A court in Brazil has ruled (via UOL) that Apple and Google must remove Secret, the anonymous social networking app, from their mobile software stores — and also from user devices where it’s already installed. The court has issued a preliminary injunction in the case, pending the results of a final ruling, as a result of a complaints by users harmed by rumors spread via the app, who said that the app was used to share an “intimate photo” of him, which included personal identifying information including his full name and telephone number.

The injunction actually goes so far as to require that the companies remotely wipe the app from existing devices. That’s a tall order, of course, but the court has also applied a fine of around $9,000 per day following a 10-day grace period in case the rules haven’t been followed.

Uber Opens Its API With 11 Launch Partners, Including OpenTable, TripAdvisor, and United Airlines | TechCrunch

Today, the company is announcing its API will become available to app developers, with 11 launch partners already signed up.

For Uber, the introduction of its API is designed to increase reach and get it in front of lots of new potential users. The company is in 150 cities and nearly 50 countries around the world, but there are untold number of users who might not have tried its service. Showing up in other apps that those users already have installed is a simple way to introduce them to getting an Uber on-demand.

While it’s trying to appeal to as many app developers as possible, to start Uber is launching with 11 API partners that have already committed to introducing Uber to their users. Those apps include Expensify, Hinge, Hyatt Hotels & Resorts, Momento, OpenTable, Starbucks, Tempo, Time Out, TripAdvisor, TripCase, and United Airlines.

Samsung’s first Nook tablet arrives at Barnes & Noble today for $179 | The Verge

Samsung is becoming Barnes & Noble’s first partner to create a Nook-branded tablet today with the unveiling and release of the Galaxy Tab 4 Nook. The name is a mouthful, but it basically means that the tablet is a rebranded version of Samsung’s existing Galaxy Tab 4 tablet — part of its low-end line — that’s now been customized with some Nook software. The tablet has a 7-inch, 1280 x 800 display and will sell for $179.

Feedback:

Blizzard Not Expecting Major World Of Warcraft Growth

In a recent interview with MCV, World of Warcraft lead designer Tom Chilton admitted that Blizzard isn’t expecting to see the MMORPG grow like it did prior to the Cataclysm release. That’s likely because the subscription numbers have been on a steady decline since 4Q 2010

As of Q2 2014, World of Warcraft had 6.8 million subscribers. The upcoming fifth expansion pack, Warlords of Draenor, is expected to bring some players back. Previously, Blizzard indicated that it’s not unusual to see customers cancel their subscription until a new expansion arrives. Once that’s consumed, they will cancel again and wait for new content.


Last week, Blizzard announced that the upcoming Warlords of Draenor will be released on November 13, 2014.

The post Brazil Remote Wipes Your Junk | Tech Talk Today 47 first appeared on Jupiter Broadcasting.

]]>
Linux Wins CES | LAS | s25e03 https://original.jupiterbroadcasting.net/30066/linux-wins-ces-las-s25e03/ Sun, 13 Jan 2013 15:20:16 +0000 https://original.jupiterbroadcasting.net/?p=30066 The best gadgets at CES this year were running Linux. We round-up the highlights of these Linux powered goodies, and speculate about the future of the expo.

The post Linux Wins CES | LAS | s25e03 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

The best gadgets at CES this year were running Linux. We round-up the highlights of these Linux powered goodies, and speculate about the future of the expo.

Plus Blizzard’s big Linux bombshell, the sunset of WebcamStudio, why you might see a Firefox OS powered smartphone soon, and is Samba less relevant these days?

Plus: Your feedback, our picks of the week, and so much more!

All this week on, The Linux Action Show!

Use our code linux295 to get a .COM for $2.95.

Expires 1-31-13!

20% off your ENTIRE order just use our code go20off6.

Download:

HD Video | Mobile Video | Ogg Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent

RSS Feeds:

HD Video Feed | Large Video Feed | Mobile Video Feed | MP3 Feed | Ogg Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

Linux at CES 2013:


System76

Brought to you by: System76

Runs Linux:

Android Pick:

Desktop App Pick:

Search our past picks:

Git yours hands all over our STUFF:

News:

Feedback:

Chris’ Stash:

What’s Matt Doin?

Find us on Google+
Find us on Twitter:

Follow the network on Facebook:

Catch the show LIVE Sunday 10am Pacific / 1pm Eastern / 6pm UTC:

The post Linux Wins CES | LAS | s25e03 first appeared on Jupiter Broadcasting.

]]> Patch Your Password | TechSNAP 84 https://original.jupiterbroadcasting.net/27496/patch-your-password-techsnap-84/ Thu, 15 Nov 2012 20:59:13 +0000 https://original.jupiterbroadcasting.net/?p=27496 Allan will build the case for abandoning the password, the Skype flaw that will shock you. And we discuss picking the right server OS.

The post Patch Your Password | TechSNAP 84 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Allan will build the case for abandoning the password, the Skype flaw that will shock you,

And we discuss picking the right server OS, when to RAID or not to RAID, and a BIG batch of your questions, and our answers.

All that and more on this week’s TechSNAP!

Thanks to:

Use our code tech495 to get a .COM for $4.95, or go20off5 to save 20% on your entire order!

Pick your code and save:
techsnap7: $7.49 .com
techsnap10: 10% off
techsnap11: $1.99 hosting for the first 3 months
techsnap20: 20% off 1, 2, 3 year hosting plans
techsnap40: $10 off $40
techsnap25: 25% off new Virtual DataCenter plans
techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Get TechSNAP on your Android:

Browser Affiliate Extension:

  • Jupiter Broadcasting Affiliate Extensions for Chrome and Firefox
  • Why a password isn’t good enough anymore

    • An article by Mat Honan, the Wired writer who had his entire online existence destroyed earlier this year
    • An attacker wanted to steal the twitter handle @mat, and so started by trying to do a password reset on twitter.
    • This directed the attacker to Mat’s gmail account
    • When trying to initiate a password reset set on the gmail account, he was directed to Mat’s Apple account
    • The attacker called Apple and using information about Mat from Twitter, Facebook, Google etc, he managed to reset the password for Mat’s Apple account
    • Using the Apple account, the attacker was able to disable and remotely wipe Mat’s Apple devices (iPhone, iPad and Macbook)
    • Once the attacker was in control of the Apple account, he was able to reset the password for the Gmail account
    • Then to reset the password for the Twitter account
    • Watch TechSNAP 70 for the full story
    • In this followup article we get an even closer look at what happened, and an in-depth analysis of other recent happenings
    • A lot of the problems discussed in the article are not weaknesses in passwords specifically, but in the people and systems that use them
    • Authentication Bypass – When an attacker finds a way to access an account or service without needing the password at all. We have seen this with Dropbox, Oracle and others in past episodes of TechSNAP, or the recent case with Skype, where it failed to properly authenticate you before allowing you to reset account, we’ll cover that later in this episode.
    • Brute Force – Accounts for services like POP3, FTP, SSH, and SIP are under constant attack, all day, every day. Attackers attempt to compromise the accounts in order to gain access for various reasons, from using the initial password as a stepping stone to gain access to more sensitive accounts, to using your machine to scan for yet more weak passwords, or as a source of spam. Attackers are constantly attempting common username and password combinations against every public facing server on the internet, using apps such as DenyHosts, Fail2Ban or SSHGuard to protect these servers is a must.
    • Database Compromise – Services such as Sony PSN, Gawker, LinkedIn, Yahoo, eHarmony, LastFM and others had their databases compromised, and their lists of passwords dumped online. Often these passwords were hashed (MD5, SHA1, SHA256), but not always. Even a hashed password is little protection, it doesn’t immediately disclose your password, but with tools like Rainbow Tables and GPU accelerated cracking, these hashes were quickly cracked and the plain text passwords posted online. Hopefully more services will start using properly secure Cryptographic Hashes (sha512crypt, bcrypt) that take tens of thousands of times more computational power for each attempt to crack a password. Some algorithms like bcrypt are also, thus far, immune to GPU acceleration, actually taking longer on a GPU than a CPU.
    • Disclosure – People often share their passwords, I don’t know how many facebook accounts have been ‘hacked’ by friends or ex’s because you willingly gave them your password, or you gave them the password to something else, and they used one of the other techniques described here to gain access to something you didn’t mean for them to have access to.
    • Eavesdropping – Someone could be listening on the wire (or in the air in the case of wireless or mobile data connections) and see your password as it goes between your computer and the remote service. Most services now login over SSL to prevent this, but older services such as FTP (still very popular for web hosting, where your password may be shared with the web hosting control panel that has access to reset your email password) are not encrypted.
    • Exposure – This is when you accidently give away your password, it happens on IRC at least once a week, someone attempts to enter the command to identify, but prefixes it with a space or something and ends up displaying their password to the entire chat room. Users will also sometimes accidentally enter their password in the username field, or their credit card number in the field that is for the ‘name as it appears on the card’, which causes it not to be treated with the same level of security.
    • Guessing and Inference – When people base their password on birthdays or pet’s names, they become easy to guess. If you compile a largish list of keywords about a person, including bands and songs they like, their family and friends names, important dates, sports teams etc, and run it through an app like John The Ripper, which will make variations of those passwords, including l33t speak transformations, adding numbers and symbols, are are likely to get a fairly high success rate. In addition to guessing, there is inference, if you know that Bob’s password for gmail is: bobisgreat@gmail then you can probably guess that his password for facebook is: bobisgreat@facebook. If there is a pattern or ‘system’ to your passwords, once someone compromises ONE of those passwords, they have a much greater chance of compromising them all.
    • Key Logging – When an attacker, using hardware or software, is able to record the keys you type in your keyboard, thus capturing your password as you input it. Apps like LastPass may seem to help with this, but they usually use an OS API to simulate typing the keys to remain compatible with all applications. Clipboard scanners can also often catch passwords.
    • Man-in-the-Middle – An attack that intercepts your traffic and pretends to be the service you are trying to connect to, allowing it to capture your password, even if it was encrypted. SSL/TLS was designed to prevent Man-in-the-Middle attacks by verifying the identity of the remote server, however with Certificate Authority being compromised and issuing false certificates and tools such as SSLStrip to trick you into not using SSL, it is still possible for your communications to be intercepted.
    • Phishing – Emails meant to look like they are from an official source, whether is be eBay, PayPal or your bank, prompt you to login on a page that looks like the legitimate one, but is not. Once you enter your details, the attackers have all they need to know to compromise your real account. Combine this with the weak DKIM keys from a few weeks ago, a compromised Certificate Authority and a man-in-the-middle DNS attack, and you have no way of knowing that when you entered https://www.paypal.com in to your browser, you actually ended up on an attackers site instead.
    • Reply Attack – When an attacker is able to capture you authenticating in some secure manner, but is able to resend that same information and authenticate as you later, without ever knowing your password
    • Reuse – Using the same password on multiple sites means that when one of them is compromised, they all are. I keep telling you, use lastpass.
      • Secret Questions – So, when you setup that new account and it prompts you for some secret questions/answers, consider carefully what you put down. You’re going to need to be able to remember it later to regain access to the account (or some accounts ask them when they suspect you are logging in from a different computer), but if they are simple ones that someone could look up via google or facebook (remember, the attacker could be someone you know, so your privacy settings on facebook might not be enough), then it isn’t good enough.
      • Social Engineering – In the case of the Mat Honan compromise, the weakest link turned out to be AppleCare Support, they very much wanted to be helpful and allow him to recover his accounts, the only problem was, the caller was not Mat Honan, but the attacker, to managed to guess and trick his way through the security questions and gain control of the Apple and Amazon accounts.
      • See some old Blog post by Allan for more reading at [GeekRoundTable] ](https://www.geekrt.com/read/88/Myths-of-Password-Security/) and AppFail
    • These issues are endemic across the entire internet, and it is important that you be aware of them and take steps to protect yourself as best you can
    • A comparison of two major password dumps has shown that half of all passwords were used on both sites, the problem of password reuse is growing rather than shrinking
    • Having a long and strong password is important, but you have to consider the other ways someone could compromise your account, the weakest link is the most likely avenue of attack
    • If you have the option, you should enable two-factor authentication, adding one more step makes the attackers job that much harder, but remember, this doesn’t mean you are immune, RSA and Blizzard authenticators have been compromised in the past when their seed values were stolen from the central databases.

    Skype IDs hijackable by anyone who knows your email address

    • An attacker found a way to bypass the authentication in skype’s password reset system, and take over any target account for which the email address was known
    • The Instructions
    • Register for a new account, using the email address of the victim
    • Login to Skype using that new account
    • Initiate a password reset for the victim’s account
    • Skype will email the victim a password reset token, but the token will also pop up in the skype client for all accounts that use that email address, allowing the attacker to get the token
    • Use the token to reset the password of the victim account
    • Login to the victim’s account and remove their email address and add your own (one that no one knows) and you now own that account
    • Skype disabled the password reset system a few hours later, then fixed the issue and re-enabled the password reset system. Tokens are no longer displayed in logged-in skype clients. This makes sense, and I question why it was ever the other way around, because if you are logged in, you are unlikely to have forgotten your password (unless it was saved I guess).
    • Skype’s Reaction
    • NextWeb Coverage
    • NextWeb Followup

    Feedback:

    Round Up:

    The post Patch Your Password | TechSNAP 84 first appeared on Jupiter Broadcasting.

    ]]> Server Puppeteering | TechSNAP 71 https://original.jupiterbroadcasting.net/23236/server-puppeteering-techsnap-71/ Thu, 16 Aug 2012 15:46:51 +0000 https://original.jupiterbroadcasting.net/?p=23236 Automating your server deployments and configurations has never been easier, find out what Allan uses to get the job done! Plus Blizzards database beach details

    The post Server Puppeteering | TechSNAP 71 first appeared on Jupiter Broadcasting.

    ]]>

    post thumbnail

    Rumor has it the playstation network has been hacked again, but we’ve got the real story. Blizzard suffered a nasty database breach, and it might be much worse then they are letting on.

    Plus: Automating your server deployments and configurations has never been easier, find out what Allan uses to get the job done!

    All that and a lot more, in this week’s TechSNAP!

    Thanks to:

    Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

    SPECIAL OFFER! Save 20% off your order!
    Code: go20off5

    Pick your code and save:
    techsnap7: $7.49 .com
    techsnap10: 10% off
    techsnap11: $1.99 hosting for the first 3 months
    techsnap20: 20% off 1, 2, 3 year hosting plans
    techsnap40: $10 off $40
    techsnap25: 25% off new Virtual DataCenter plans
    techsnapx: 20% off .xxx domains

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | HD Torrent | Mobile Torrent

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

 

Support the Show:

   

Show Notes:

Attacker claims to have broken in to Sony PSN again, Sony denies claim

  • Attackers have pasted 3000 password hashes and email addresses from an alleged list of 10 million
  • The official Playstation twitter account has denied the claim
  • Most of the password hashes appear to be the phpBB modified version of the openwall phpass hashing system, although some appear to be raw SHA1 hashes
  • This specific hashing algorithm suggests that the passwords are not from PSN, but from a forum database
  • However, since the Sony network might use a single-signon system, it may be possible that these passwords are the same as ones on the PSN network
  • Others have suggested it is just data from the previous attack last year

Blizzard admits Battlenet was compromised

  • This week the security team at Blizzard discovered unauthorized access to their internal servers
  • Information that is known to have been accessed includes:
    • Email Address
    • Answer to security question
    • Cryptographic verifiers for account passwords
    • Information relating to Mobile and Dial-In Authenticators
  • Blizzard does not believe at this time that any payment information (credit card numbers, billing addresses, real names) were taken
  • Battlenet uses the Secure Remote Password protocol (SRP), which is designed to allow remote users to authenticate in such a way that an network eavesdropper would not be able to retrieve the user’s password, or perform an offline dictionary attack against it
  • The need for such a protocol has long been obviated by SSL/TLS, which provider stronger protection against eavesdroppers, and also prevents attacks that involve altering the messages or spoofing the identity of the endpoint
  • This might have made sense when battlenet was originally introduced, SSL was too costly in terms of performance
  • Using a standard password cryptographic hashing algorithm, even just md5crypt would likely have been more secure (obviously bcrypt would have been better) as far as a compromised database. Maybe they will transition to something better now
  • One blogger who took the time to read the official SRP whitepaper written by the protocol author has gone so far as to request a retraction or clarification from Blizzard President Mike Morhaime.

    “Blizzard is incorrect in claiming that SRP ‘is designed to make it extremely difficult to extract the actual password’ after the verifier database is stolen,”

  • Jeremy Spilman, the founder of a company called TapLink, wrote in a blog post titled “SRP Won’t Protect Blizzard’s Stolen Passwords,”
  • However: a Battle.net 2.0 emulator suggests that at least some of the hashed Blizzard’s passwords were generated with an SRP implementation that uses a 1024-bit modulus, rather than the 256-bit modulus described in the whitepaper. The tweak makes password cracking take about 64 times longer than it would using the lower-bit setting.
  • Why hacked Blizzard passwords aren’t as hard to crack as company says
  • Additional Coverage: PCMag
  • Additional Coverage: Gamespot

Feedback:

  • Raymii created a Security Question Answers Generator Page!
    • Violates rule #3 of a security question, the answers are not ‘memorable’
    • Randomly generated answers are technically not stable or definitive either
    • Relies on you remembering or storing the answer, in case you fail to remember or store your password… (the secret answers should not be stored, or stored as security as the original password itself, since they can be used in place of, or to reset the password)
    • Cool site, decent random password generator ala XKCD
  • White Spiral from the chatroom wrote in with a number of suggestions for security questions
    • Your questions are not very applicable to average users (none of my ex-girlfriends had bad breath)
    • Questions related to sex pose numerous problems, including offending customers, or causing an unpleasant work environment for support employees who must ask these questions over the phone
    • User generated questions require more database resources, but likely solve the problems of applicability
    • Most users are likely worse at coming up with their own questions than the site will be
  • Jim emails in and suggests: why not use pictures of people you know! The first question might be their name and the second question may be the location.
    • You can’t use this type of security question over the phone
    • There may be privacy issues with storing pictures of 3rd parties on behalf of the customer (what if the database gets hacked, and now pictures of me uploaded by someone else are leaked)
    • I may not be able to remember the location the picture was taken in a few years
  • Peter suggests committing a lot of crimes , and confessing one to each company that requires a security answer

  • Q: I did bad-do I have to give up my internet license?

  • Q: Configuration management automation?

Question for a future episode:

Sr. SysAdmins and Techs, what would you like your Jr. co-workers to know or learning more about before joining the work force?

Round-Up:

The post Server Puppeteering | TechSNAP 71 first appeared on Jupiter Broadcasting.

]]> Man In the Browser Attack | TechSNAP 59 https://original.jupiterbroadcasting.net/19902/man-in-the-browser-attack-techsnap-59/ Thu, 24 May 2012 16:48:35 +0000 https://original.jupiterbroadcasting.net/?p=19902 Yahoo has made a mistake so big, you have to hear it to believe it. And Blizzard's huge security blunder hitting Diablo III customers.

The post Man In the Browser Attack | TechSNAP 59 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Yahoo has made a mistake so big, you have to hear it to believe it. A common feature in firewalls could actually make you more susceptible attack, Blizzard huge security blunder.

PLUS: Separating traffic out between your network cards, and so much more on this week’s TechSNAP.

Thanks to:

GoDaddy.com Use our codes TechSNAP10 to save 10% at checkout, or TechSNAP20 to save 20% on hosting!

Limited time offer:

New customers 25% off your entire order, code: 25MAY7
Expires: May 31, 2012

 

Direct Download:

HD Video | Mobile Video | MP3 Audio | Ogg Audio | YouTube | Torrent File

RSS Feeds:

HD Video Feed | Mobile Video Feed | MP3 Audio Feed | Ogg Audio Feed | iTunes Feeds | Torrent Feed

Support the Show:

Show Notes:

Yahoo accidentily released the private certificate key for thier new browser extension

  • Yahoo released their new browser extension, a ‘search browser’ called Axis
  • Yahoo accidentally included the private half of their certificate key in the files for the extension
  • This allows anyone with a copy of this key, to sign a new extension and have it appear as if it was legitimately created by Yahoo
  • This could be exploited further, using DNS Spoofing or various other techniques, an attacker could issue an updated version of the Axis plugin, appearing to be signed by Yahoo, but actually containing malware including a key logger and a cookie stealer
  • Yahoo has since released a new version of Axis without the private key
  • It is unclear if Yahoo has taken additional steps beyond publishing the new extension archive without the private key
  • It is imperative that the Yahoo certificate be revoked from trust, meaning Yahoo will need to get a new certificate and resign all of their extensions so they again appear as legitimate
  • Yahoo should probably be using an HSM (Hardware Security Module) to store the private key, rather than having it laying around in a plaintext file
  • Original Discovery
  • Proof of Concept Exploit
  • ThreatPost Coverage
  • Additional Coverage

Researchers find that a common firewall feature makes you more vulnerable

  • Most firewalls include a feature that checks the validity of the TCP initial sequence number (ISN)
  • The ISN is purposely randomized, to prevent spoofed packets from being injected into a TCP stream and prevent TCP session hijacking
  • The main goal of the firewall feature is to conserve bandwidth and other network resources by immediately dropping spoofed or suspicious packets
  • However, if the attacker has malware installed on the target machine behind said firewall, they will be able to determine which packets are being blocked for invalid ISNs and which are not, thus allowing them to determine what are infact valid ISNs
  • Once the attackers has the valid ISN, they can inject data into the TCP stream, and may be able to hijack a connection and present a phishing style login page for services such as facebook
  • Researchers managed to successfully execute a number of different attacks, including the phished facebook login page, injecting javascript to cause users to send tweets and follow people on twitter, injecting malicious links into MSN Messenger conversations between trusted users, and executing DDoS attacks against offsite targets
  • The research focused on mobile devices such as smart phones
  • The researchers found that 31.5% of the 149 mobile network nodes of major US national carriers that they surveyed had firewalls with the ISN tracking feature
  • Research Paper
  • Was presented at the IEEE Symposium on Security and Privacy 2012

New MitB (Man in the Browser) attack targets mobile banking

  • A new trojan called tatanga, uses rootkit type techniques to compromise almost all popular browsers on the windows platform, including: Internet Explorer, Firefox, Chrome, Opera, Safari and Konqueror
  • The trojan also includes elements to remove competing trojans such as the Zeus botnet, and defeat antivirus applications
  • The trojan specifically targets banks in Spain, the United Kingdom, Germany and Portugal
  • The trojan modifies the page inside the browser, so bypasses the encryption of SSL/TLS and even multi-factor login requirements
  • This type of MitB attack is hard to prevent
  • One such way to mitigate these attacks is an out-of-band transaction verification, confirming money transfers with the user outside of their online banking session
  • The tatanga trojan keeps this in mind, and uses social engineering to defeat it
  • When the user logs in to their online banking, passing the multi-factor authentication, the trojan injects a new page in to the user’s browser prompting them to enter a TAN (Transaction Authorization Number) that they will receive via SMS, to verify their login
  • The TAN that the user receives, is actually for the transfer of a large sum of money from their account to that of a mule
  • The trojan instructs users to ignore the specifics on the TAN provided in the SMS, stating that it is experimental, or a test message
  • The effectiveness of the social engineering attack is degraded by the weak writing skills of the author, a future variation of this attack could be far more effective
  • Background on Tatanga
  • Additional Coverage

Feedback:

Q: James asks about routing traffic out different network cards

A:
+ Policy Based Routing on Linux (based on Source Address)
+ Linux Advanced Routing & Traffic Control HOWTO
+ Cross platform policy based routing
+ FreeBSD Example using multiple FIBs
*

Q: Danny asks about Version Control and Auditing

A:

  • Subversion Manual
  • TortoiseSVN Shell Extension for Windows
  • Tortoise and many other SVN clients support a number of different protocols, including https:// and https:// (via WebDAV), svn:// (running an SVN daemon), svn+ssh:// (running the SVN CLI over SSH) and file:/// (directly accessing the repository, possible over windows file sharing or NFS)

Round Up:

The post Man In the Browser Attack | TechSNAP 59 first appeared on Jupiter Broadcasting.

]]> League of Legends | MMOrgue 18 https://original.jupiterbroadcasting.net/12662/league-of-legends-mmorgue-18/ Sat, 08 Oct 2011 18:59:26 +0000 https://original.jupiterbroadcasting.net/?p=12662 What mechanics, economics and community interplay have led to LoL being the breakaway hit that it clearly is.

The post League of Legends | MMOrgue 18 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

It’s not an MMO. But you asked for coverage of League of Legends, and I’m here to deliver from the MMO perspective… what mechanics, economics and community interplay have led to LoL being the breakaway hit that it clearly is? Can the MMO industry learn from these mechanics? Join me and my tournament-tested correspondent as we ramble our way thru an open editorial regarding the unique leader of Multiplayer Online Battle Arena gaming.

This episode also contains a very important announcement from Jeremy regarding the future of MMOrgue. Fans of the show can’t afford to miss it!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | YouTube

MMOrgue iTunes Feeds: MMOrgue RSS Feeds:
HD Video
iPad & Apple TV Video
iPod Video
MP3 Audio
HD Video RSS
Large Video RSS
Mobile Video RSS
MP3 Audio RSS

Show Notes:

MECHANICS

No persistence of world

Persistence of character – partial

Skill-based… condenses the experience of getting better and growing as a character into a ~1 hour experience

Bartle Test: Explorer, Achiever, Killer, Socializer
link to the test at GamerDNA.com

  • Explorer = Non-existant
  • Achiever = Will enjoy leveling up from base to cap in a condensed timeline compared to MMOs
  • Killer = Visceral, fast-paced PvP combat
  • Socializer = Multiplayer interaction, and access to “police” the community via Tribunal System
ECONOMICS

Free to play with cash shop

Earn cash shop currency with game time

It is also the primary form of player advancement (Runes, etc)

Free champion each week, to give free players a chance to try before you buy… if you are patient

Weekly champion rotation helps eliminate stagnation for free gamers

COMMUNITY

Tribunal System

e-Sports
Valve’s $1.6 million prize pool for a DOTA championship – largest EVER in eSports

Studio Rumble

OTHER MOBA TITLES:

Defense of the Ancients (player-built mod for Warcraft III)

Defense of the Ancients 2 (aka “DOTA2” – being made by Valve, release TBA)

SMITE (entering beta, premiered at PAX Prime 2011 – www.smitegame.com for info)

The post League of Legends | MMOrgue 18 first appeared on Jupiter Broadcasting.

]]> Hellgate Review | MMOrgue 10 https://original.jupiterbroadcasting.net/10528/hellgate-review-mmorgue-10/ Fri, 22 Jul 2011 23:16:51 +0000 https://original.jupiterbroadcasting.net/?p=10528 Enter the gates of Hell, otherwise known as the slums of London! Join Jeremy for a live review of the first few hours of gameplay for Hellgate:Global

The post Hellgate Review | MMOrgue 10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Enter the gates of Hell, otherwise known as the slums of London! In today’s episode, join Jeremy for a live review of the first few hours of gameplay for Hellgate:Global, as well as the usual smattering of MMO news and leaks, including hints of Comic-Con announcements from Bioware!

Also included in this episode is a proposal for an audience-participation segment on the topic of The Best of MMO Music. Tune in to hear the details, then join the conversation!

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | YouTube

MMOrgue iTunes Feeds: MMOrgue RSS Feeds:
HD Video
iPad & Apple TV Video
iPod Video
MP3 Audio
HD Video RSS
Large Video RSS
Mobile Video RSS
MP3 Audio RSS

Show Notes:

T-Shirt of the Week: https://store.hbo.com/game-of-thrones-stark-t-shirt-black/detail.php?p=298870&v=hbo_best-sellers

It seems we’ve hit a slight lull in big MMO news. Not an outright drought – just a lack of stories that are prompting my usual editorial spiel.

In order to combat this, I have a proposal: an episode dedicated to the best of MMO music

I need YOUR submissions…
* If there is a specific GAME that sticks out in your mind as having an incredible soundtrack.
* If there is a specific SONG that you think is fantastic (EQ2’s Qeynos theme, e.g.)
* If you don’t care for music, I’d like to hear why, or what sort of music you listen to while gaming.

Please include links to samples I can listen to when submitting your responses!

LINKS WORTH TALKING ABOUT:

APB may be charging a box fee for their “F2P” game?
https://www.mmocrunch.com/2011/07/14/free2play-apb-hitting-store-shelves/

GW2 World Tour ‘11:  NCSoft @ GamesCom, ArenaNet @ PAX
https://www.mmocrunch.com/2011/07/18/guild-wars-2-world-tour/

HELLGATE: REVIEW

Getting the game downloaded, installed and patched can be a long, tedious, boring process.
And the patcher is always on top! It cannot be moved beneath other windows!
– It has been recommended to use the uTorrent download, but I went the traditional route.

This game was originally published in 2007 and was already showing its age.
– I’ll let the visuals speak for themselves at this point, and audio listeners may get more value by watching the video version of this particular episode.

I will making frequent comparisons of this game to Diablo II, Torchlight and Borderlands.
– And unfortunately, while this game sits somewhere between those three spiritually and mechanically-speaking, it doesn’t really stack up to any of them individually. And not for any single particular reason, just as a compounding of all the little things. Most of which I hope to show you in this review.

It’s an easy, casual experience. Pick it up, shoot some stuff, grab some loot, walk away. But don’t expect any deep or meaningful experience.

The gameplay is driven by greed and power — kill things to get better gear, so you can kill bigger things to get even better gear. This cycle breaks down at the high end of the game however, where it suddenly becomes necessary to care about the world, in order to care about progressing. Unfortunately, the world as a whole is relatively bland with no real sense of urgency or community.

The sole virtue this game has going for it, is the non-existent barrier for entry. For the cost of nothing but a few hours of your time, you can start enjoying a basic hack-and-slash, shoot-em-up mindless loot grind, and even bring along some friends for the ride.

For my part, I still feel like this game fails as a comparison to Diablo II due to shallow mechanics, and incomplete feeling animations. Add to that the confusion of the crafting system, frustration of inventory management, and the lack of a compelling storyline, and it leaves me thinking that FREE is about as much as I’d honestly pay for this title.

If you want a good loot-whoring shooter, go play Borderlands. It’s worth the box cost, and contains multiplayer. And if you’re willing to try out an older title for your fix, Diablo II has aged surprisingly well, and Torchlight 2 is just around the corner!

Next Week: Comic-Con in review!

  • It’s happening at the time this episode is being published, and already there is speculation that several large announcements may be occurring, including:
    The unveiling of Zenimax’s MMORPG (assumed to be based on the Elder Scrolls universe)
  • Official details on Blizzard’s “TITAN” project (though I suspect this will happen @ BlizzCon)
  • The official release date of SWTOR

Speaking of TOR announcements…
SW:TOR’s box art released (Standard & Collector’s)
https://www.mmorpg.com/gamelist.cfm/loadNews/21245

The post Hellgate Review | MMOrgue 10 first appeared on Jupiter Broadcasting.

]]> Player Housing | MMOrgue 8 https://original.jupiterbroadcasting.net/9901/player-housing-mmorgue-8/ Sat, 02 Jul 2011 15:03:02 +0000 https://original.jupiterbroadcasting.net/?p=9901 We bring on correspondents to discuss the ins-and-outs of different versions of player housing, and how different MMOs have incorporated owning your own home

The post Player Housing | MMOrgue 8 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

In a break from our usual format, we’ve invited a number of correspondents onto this episode to discuss the ins-and-outs of different versions of player housing, and how different MMOs have incorporated owning your own home into the worlds we participate in. Through these conversations, we’ll discuss Second Life, Everquest II, Star Wars: Galaxies, Star Trek Online and City of Heroes.

We’ll also talk about the announced shut-down of SWG, the upcoming changes made to World of Warcraft’s Trial Account, and a press release that should be THE BEST NEWS EVER … and why it has disappointed Jeremy so much.

Direct Download Links:

HD Video | Large Video | Mobile Video | MP3 Audio | YouTube

MMOrgue iTunes Feeds: MMOrgue RSS Feeds:
HD Video
iPad & Apple TV Video
iPod Video
MP3 Audio
HD Video RSS
Large Video RSS
Mobile Video RSS
MP3 Audio RSS

Show Notes:

Supreme Court upholds decision to strike down Violent Video Game law
Originally penned in California, the law included dubious wording that would result in heavy fines against retailers that sold “excessively violent” video games to minors.
There’s lots more, but let’s just say… it was bad news for gamers! And NOT just because we wanna get our frag on, and witness our buddies’ heads explode in fountains of gore.

What it came down to, was First Amendment rights in the US. Our freedom of speech, and whether or not video games qualified as a protected form of artistic expression.

According to the highest authority we honor, they do.

In fact, their decision on this matter went so far as to quote their similarly favorable judgement on FILM, from the 1950s.

This decision sets a precedent that cannot be denied or overruled – that Video Games now stand shoulder-to-shoulder with books and films, as a protected media under Free Speech. Furthermore, it places additional faith in the non-government agency, the ESRB, to continue doing their part in ensuring that the content we are now guaranteed the freedom to enjoy, is appropriately categorized for our consumption.

With the decision handed down by the Supreme Court, we should now also be free from hearing about lawsuits over the “offensive” nature of some games’ content, and story after story of litigators attempting to blame the gaming industry for the bad behavior of modern youth. Not that complaints about violent subject matter will ever really go away… but at least, with this ruling as a foundation, the cries may quiet down to something more reasonable.

Second Life // EverQuest II
Guest : Ruth

You worked as a GM on Second Life for several years…

I’m an outsider to that game, or simulation, however it’s generally categorized. But as I understand it, the concept of “Player Housing” as defined by the MMORPG market, is a bit of a misnomer for SL.

In fact, housing in SL more-or-less -IS- the entire game, isn’t it?

What issues arise from having an entire economy and community based on personal property and infinite customization? (A specific anecdote to explain a point would be good here, if possible)

I don’t foresee any other MMO in the near future offering similar functionality to what SL offered. But if a developer chose to attempt it, are there any primary pitfalls that you might point out to avoid when implementing a similar system?

Now… let’s move on to EverQuest 2…
Demo Video 1
Demo Video 2

EQ2 included options to:
– Place pre-made objects in almost any position in your home
– Own several different homes/apartments
– Visit other players’ homes
– Through the use of log files and macros, even allowed an external editing tool

How did EQ2’s system stack up against SL?

How well did EQ2’s housing system mesh with its adventuring and crafting components?

Any major drawbacks of the system?

I, personally, consider EQ2’s housing system to be superior to anything else I’ve seen on the market in terms of striking a balance between customization and ease of creating esthetically pleasing atmospheres. Your thoughts?

SWG
Guest: Heather

Let’s start with SWG, since it is, at this point, mostly ancient history…

Player City and Tatooine House Interior (2:40 for house, 9:35 for Mall)

I’ll admit, I actually “employed” myself within this game, as an interior decorator. Briefly. I would go to peoples’ houses and rearrange their belongings in more pleasing ways, or provide them with specific projects (like aquariums, fireplaces, complex furniture, etc) for a small fee.

The fact that this game launched without a means to move items on the Z-axis felt like an absolute insult to gamers, considering how much they talked up the option of building your own home and decorating it however you liked. Eventually this was added, but workarounds like using a built-in staircase were common for many months.

They even added pitch/roll/yaw eventually. Jerks.

This game was known as a sandbox, leaving players to create their own fun from the ground up, and housing was no exception to this rule. Decorating a home required vast amounts of imagination, as there was very little pre-made decor. Sure, architects could make furniture and such, but after a very short time it all looked the same. Coming up with original-looking designs was more fun than actually adventuring, in my opinion.

As for the homes themselves, and the placing of them… hoo-boy… SWG was always plagued with issues regarding server stability and sync issues (at least up ‘til when I quit just before the NGE), so placing a home was sometimes a crap shoot. I knew people that’d lost entire homes and millions of credits worth of belongings, because their brand new spacious pad just up and vanished when the server randomly burped.

The pristine wilderness known to be so abundant in the Star Wars universe was dotted with harvesters, homes, factories, warehouses, shops, cantinas, shuttleports, and more… everywhere you looked. When cities were introduced, it only made the urban sprawl even worse. However, I would like to note that no other game has, to my knowledge, incorporated a series of local governing controls like SWG had for player cities. You had zoning controls, taxation, a voting system, and even a population census at the city hall. Very robust, even if utterly worthless in the long run.

STO / COH:
Guest: Sean

STO

Ship Interiors were never intended to be offered at time of launch. But a small, vocal minority of players within the community continued to LOUDLY pound the drum for this feature, continuing to insist that it was a necessary part of the Star Trek experience.

Eventually, Cryptic broke down and gave players Bridges. But with zero functionality. Eventually full interior layouts were added, but most players see them as worthless fluff. The sole function that cannot be accessed from elsewhere, has become a pain in the ass instead of a welcome diversion (Mission Replay).

Now, here we are more than a year after launch, and there remains very little functionality within ship interiors.

Sadly, this mimics how Cryptic treated Base Building in COX…

Before we move on from STO, I’d like to dig out some opinions from YOU on the matter of ship interiors, and player housing…

Q&A:

  • Many episodes of Star Trek take place entirely within ship interiors… If you, as a player, had to give up customization of your interior, to play missions similar to those, would you be OK with that?
  • Is the fact that this feature appears to have been rushed, a commentary on the developer in any way, and their ability to be swayed by a vocal community?
  • What additional functionality do these ship interiors need?

OK, tell me more about how Cryptic treated Base Builders in COX…

City of Heroes was launched in April 2004. Super Group Bases added in the paid expansion, City of Villains in June 2006.

Options: Small, Medium, or Large. Big rooms separated by corridors.
At launch: ~12 walls/ceilings/floors, about a dozen functional items, and ~100 decor items.
5 years later: 8 or so functional items added, removed clipping of placed items.

Once a very active community (chat channels, contests, forum activity)
Cryptic ignored the base building issues until they sold to NCSoft in 2007.
NCSoft continued ignoring it, except to nerf the storage availability. (2500 items, down to 30)

Part of Issue 13 was slated to include lots of base stuff. (DATE?)
When Issue 13 was split into two separate updates, the base features mysteriously vanished from EITHER set of patch notes.
Attempts to get commentary on this were met with silence, or locked threads.

In 2008 a dev named Sunstorm took on the role of Base Building Developer
https://boards.cityofheroes.com/showthread.php?t=126267
He started a thread asking for some suggestions for additions and improvements to bases, made a few more posts, and then went silent. In October 2009, he posted that he’s still working on some stuff for bases. https://boards.cityofheroes.com/showthread.php?p=2355311
But in December 2009, someone noticed that his forum name was no longer red. That only happens on the forums when a staff member is no longer employed.

  • So, what are the primary issues that Bases faced in CoH?
  • What role were they supposed to fill, functionality-wise?
  • The silence from developers is scary, disappointing, and a lingering dark blotch on their overall PR efforts. Is there anything they could say at this point to make up for these bad decisions?
  • Cryptic Studios is now behind Champions Online, which will soon be implementing “Hideouts” as a form of Player Housing. Do you have any sage words of wisdom for them on the subject, to assist in avoiding the pitfalls of the past?

————————

Tease of the Week:

Darkcryo Entertainment has announced Firefly Universe Online!
– No funding.
– No licensing.
– No names on the credits.
– No public access to the company website.
Color me beyond skeptical. I’m almost insulted.

Also, as a quick update to last week’s F2P-dedicated episode, I thought I’d point out that none other than World of Warcraft, the juggernaut itself, has decided to take a step in that direction. They are upgrading their Trial accounts to remove the time limit, and instead impose a level limit of 20. But you can make as many characters as you like.

Yay? Let’s face it – WoW at level 20 is pretty darn lame, and Blizzard has spent so many resources making their end-game and raid content top notch that this lowbie junk is just as old and busted as it’s always been. Despite some sites running with a headline of “WoW goes F2P!” just to draw in clicks, this is nothing of the sort, and will probably result in less than a blip on the subscription radar.

NEXT WEEK:

  • I will be digging deeper into the EVE controversies.
  • Also, based on feedback I received re: Hellgate, I will be trying out the Open Beta which opens June 30th. And I’ll have some initial impressions to share.

Play smart everyone, and remember … sometimes an emote is just an emote.

Download & Comment:

The post Player Housing | MMOrgue 8 first appeared on Jupiter Broadcasting.

]]> Epic Snow | J@N | 1.18.11 https://original.jupiterbroadcasting.net/4632/epic-snow-jn-11811/ Tue, 18 Jan 2011 23:04:19 +0000 https://original.jupiterbroadcasting.net/?p=4632 Tonight we share tales and woes of the most epic snow storms of our times... Well at least the ones know about!

The post Epic Snow | J@N | 1.18.11 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Tonight we share tales and woes of the most epic snow storms of our times… Well at least the ones know about!

Plus the live stream viewers submit pictures and videos of their crazy snow events!

Show Feeds:

Show Notes:

Download:

The post Epic Snow | J@N | 1.18.11 first appeared on Jupiter Broadcasting.

]]>
Cataclysm | J@N | 12.7.10 https://original.jupiterbroadcasting.net/3947/cataclysm-jn-12710/ Tue, 07 Dec 2010 23:12:27 +0000 https://original.jupiterbroadcasting.net/?p=3947 Today marked the biggest expansion ever to the biggest game ever, in the history of MMORPGs. Blizzard tore their entire World of Warcraft apart and re-shaped it, and even destroyed and revamped a number of game-defining mechanics.

The post Cataclysm | J@N | 12.7.10 first appeared on Jupiter Broadcasting.

]]>

post thumbnail

Today marked the biggest expansion ever to the biggest game ever, in the history of MMORPGs. Blizzard tore their entire World of Warcraft apart and re-shaped it, and even destroyed and revamped a number of game-defining mechanics.

What impact can this have on the gaming market as a whole? What’s the scuttlebutt from the trenches? Worth the price for a returning absentee from the land of Azeroth, or better to stay gone? And how does Blizzard manage to keep their siren call going after after more than 7 years of production?

Show Feeds:

Show Notes:

THE GAME:

For newbies & returners:
Joystiq claims there’s never been a better time to start in, or return to, Azeroth
– Updated “old world” content including a complete revamp of itemization and quest overhauls.
– New races (goblin / worgen) and 13 new race/class combos
– Brand new low- and mid-level zones never before seen

For hardcore fans & current WoW addicts:
– Guild leveling
– New lvl 80-85 content and an increased level cap
– The new high-end content is much more difficult than that found in Lich King
– An entire zone submerged under water, with seahorse mounts!

Should you try and join, here’s a Primer article for what to expect, and what to do:
https://www.tentonhammer.com/wow/guides/general/cataclysm-primer

THE MONEY:

  • Lich King sold 3 million copies in the first 24 hours
  • Cataclysm is expected to almost double that, according to pre-order comparisons.
    • As of two weeks ago, had 519,000 retail pre-orders reported. This number does not include digital pre-sales via Battle.net
  • First time: Blizzard selling a digital download directly (no retail handlers) that offered immediate-on access at 12:01am this morning.  For the same price as a retail box.

IN OTHER NEWS:

Artix (HeroSmash) apologizes to Blizzard for stealing the thunder on their launch day
“We had no idea we were releasing the alpha test on the same day until a player told me last night,” says Artix’s Founder/Paladin Adam Bohn. “The impact our new game release on Cataclysm could be catastrophic. They could lose literally 10s… or even single digits… of players. This was not anyone’s fault, just bad timing. If Blizzard decides to push back their release date we are sure everyone will understand.”

On this date in 1979, Star Trek: The Motion Picture debuted.
Talk about a cataclysm! 😉

Download:

The post Cataclysm | J@N | 12.7.10 first appeared on Jupiter Broadcasting.

]]>