![]() |
SUBSIM: The Web's #1 resource for all submarine & naval simulations since 1997 |
![]() |
#19 | |
Dipped Squirrel Operative
|
![]() Quote:
Or, since we are at it, not Saudi-Arabia, or Germany ? It was financed and watched with sympathy, by Saudi-Arabia, and the terrorist cell met and worked in Germany. The main assassins are meanwhile known to have been employed by the US military in the US, some years before. Maybe they should have spied on and invaded themselves ? There are too much things not fitting together in those official statements - not that they have not changed themselves, in the last months. Regarding the latest known virus: The Flame update was legitimated by the "Microsoft Enforced Licensing Registration Authority CA", a Sub-CA of Microsofts Root Authority. Flame spread those updates over a virtual server named MSHOME-F3BE293C. All certificates used were valid, MS has admitted that. "The Gadget-MITM module only became active in eastern timezones like GMT +2 and higher. The Flame botnet infrastructure used 15 command servers, being in charge for 50 victims each [...] " or so Kaspersky said. A few hours after detection, the botnet went offline. The servers, using wrong identities, were placed in Germany, The Netherlands, Great Britain, Suisse, Hong Kong and Turkey. Most victims used a 32-bit Windows 7, followed by XP with 45 percent. Flame does not run under a 64-bit Win 7 or so it seems. Some of the domains could be relocated to a "sinkhole" though, so the infected PCs transferred their data to Kaspersky labs; it seems those data consist of PDF and Office documents, but also Auto-Cad and other technical software. The redirected data do now reside at Kaspersky labs, in .. Russia. Greetings, Catfish |
|
![]() |
![]() |
|
|