RCA DCM425 Cable Modem

Problems with your Modem? Me too. I might have figured out mine, maybe yours.
Elevated Modem

For the past few weeks I have had connectivity problems. I called,and called and called. Nobody could find the problem inside or outside. Then it hit me. Maybe the modem is getting hot. Why did I think of this? Well last month when I was paying my bill, a fellow in front of me had his modem and it had caught on fire. Yes on FIRE! It was melted and had he not been home who knows what may have happened.

Well today was the last straw for me. My RCA DCM425 cable modem no warmer to the touch than usual went off again. So I thought, it might have a safety knock off switch inside that acts just like a Breaker or Fuse in your house does when overloaded and becomes hot. It Knocks itself off to prevent a fire or damage to the device.

So I took the modem and Put it In the Freezer to cool it down for about 15 minutes. After the 15 mins, I reconnected it and booted it up. It has know maintained its connection. I elevated the modem instead of it sitting on the desk so air could circulate through it better. I also placed a small fan blowing directly on it keeping it that much cooler. So far this seems to have solved the problem.

The problem NOT SOLVED and there are many people unaware of it is, The Modem Overheats and May cause a fire in your home while you are Not there or sleeping. I pull the Power plug on mine at night, when not in use or I'm not home.

I do not think going to your provider will solve this, as they will only swap it for another just like it.

In my personal opinion, the RCA DCM425 is defective.

What can you do: [NOTE: Do this at your own risk. I will not be held responsible.]

* Do as I explained above to keep your Modem cool.

* When Not in use, unplug the modem. Do not use the Power button, this only puts it in standby mode.

* Go and BUY a different modem from your local store and replace it. If you do this, be sure to let your Internet Service Provider[ISP] know about this so you can give them theirs back. This will also reduce your Bill a couple of dollars.

* You may have to have them come out to your house and reconnect the service, if they have a WALLED GARDEN and you don't know how to access it to reconnect. **There may be a service charge for this**.

I'm going to use mine for a couple more days like this just to see for sure if this was the problem. It's been 3 hours now and no problems. Either way, in the next couple of days I will go buy one and replace it. I will post an update later this week letting you know if this solved the problem or whether it was just a temporary fix.


Windows Task Manager Not Working / Accessible- EXPLOIT

After seeing post after post on various security / computer forums where people are stating their task manager No Longer works, I decide to look around. I first suspected a virus disabling the Task manager to hide it's process from the user. Little did I know, it would be verified. So if you have this problem, it isn't your only problem. You more than likely have a Virus or some type of Malware.
This is Not a fix, It is a possible Reason.

Windows XP SP2 Taskmgr bug


Back in 2006 Izee of the EOF virus writing team discovered a possibility to crash the Windows Taskmanager. It was easily done by setting a REG_BINARY value in the Registry of Windows to 0x00. The key is the following:

HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\TaskManager:Preferences

If you set it to 0x00, 0x00, 0x00... the Taskmanager will crash on the next startup. I (skyout) have therefore coded an exploit and used it back in 2006 in one of my first viruses as a very basic technique to hide my process to the user. Then we waited for a long time without using this bug anymore. With the release of Windows Vista we tested it again and it was fixed. In 2008 now, exactly in February, I got in contact with Microsoft Germany and informed them about the bug. They told me, that they will work on it, but for weeks not even an email came back. Now it is time for making this public! Now this bug is open for every person and everyone can use it and put pressure on Microsoft to fix it.

Here you can find the exploit: [taskmgr_dos.c.txt]


polimedia.us / doingfine.org

How to ruin your reputation

by paperghost

This is a really weird one - I've had quite a few people email me about this, thinking it might be along the lines of ye olde 419 scamme. Everything about it just looks a little odd, but it's more down to the people responsible for the marketing than the site itself. With that in mind, here's a cautionary tale with regards how your online rep can take a very sudden nosedive when you hire the wrong people to promote your website.


Related posts on this subject:

The Right Way, The Wrong Way

Scamming By Spamming – They Just Won’t Quit!

Tips for safe blog advertising

419 scams

FlickrCentral/Discuss polimedia.us


B-2 and the Flying Wing

After the Crash of The Spirit of Kansas, a B-2 Spirit On 23 February 2008 shortly after takeoff from Andersen Air Force Base in Guam, I thought I would provide a little History of the Wing.

The B-2 might look futuristic, but the basic design isn't new at all, the same manufacturer Northrop did two very similar designs just after world war two, the propeller driven B-35 and the jet driven B-49.

Northrop B-35

The B-35 was America's first attempt at an all-wing heavy bomber. In the darkest days of World War II, when it
appeared that Nazi Germany might well conquer Great Britain and the Soviet Union, the Army Air Forces saw the
need for a large bomber with intercontinental range. Such a plane, based in the United States, must be able to cross
the Atlantic and hit Germany with a large bomb load. The XB-35 was required to carry a 10,000-pound bomb load
a distance of 10,000 miles. Four Pratt & Whitney R-4360 engines mounted internally, close to the leading edge.
Each engine drove a pair of counter-rotating four-bladed propellers by means of a long extension shaft and a complex
gearbox. The XB-35's first flight, on June 25, 1946, was a success. But that was about the only trouble-free flight the
bomber was ever to have. Numerous equipment failures had already delayed the plane's development by more than a year.
Only three B-35s were completed. The remainder of the initial test models were converted to jet power.

Northrop B-49

With the wing development program falling farther behind schedule daily, the AAF entered into negotiations with Northrop during the summer of 1944 about the possibility of replacing the troublesome R-4360 engines with (General Electric designed) Chevrolet built TG-180-A7 jet engines and designated YB-49. The final YB-49 configuration was powered by eight Allison J-35-A-15 engines developing 3,750 pounds of static thrust.

Still without a production contract, Northrop explored the possibility of producing a B-49 derived photo-reconnaissance aircraft designated YRB-49. To make room for photographic equipment, extra fuel and flash bombs, the six engined aircraft carried two jet engines in pods outboard of the main landing gear under the wings.

Slower, shorter ranged than its progenitor, and not wanted by the USAF signaled the end of flying wing bombers in the U.S. until the advent of the Northrop B-2 bomber. No examples of the XB-35/YB-49 family exist today. The last YRB-49 was scrapped by December 1953.

Northrop B-2

The first B-2 was publicly displayed on 22 November 1988, when it was rolled out of its hangar at Air Force Plant 42, Palmdale, California, where it was built. Its first public flight was on 17 July 1989. The B-2 Combined Test Force, Air Force Flight Test Center, Edwards Air Force Base, California, is responsible for flight testing the engineering, manufacturing and development aircraft.

The original procurement of 132 aircraft was later reduced to 75 in the late 1980s. In his 1992 State of the Union Address, President George H.W. Bush announced total B-2 production would be limited to 20 aircraft, with a total inventory of 21 by upgrading the first test aircraft to B-2A Block 30 standard. This reduction was largely a result of the disintegration of the Soviet Union, which effectively rendered void the Spirit's primary mission.

The cost of the B-2 program in 1994 dollars was reported at $737 million per plane; however, the total cost of the program with development, spares, and facilities averaged over $2.1 billion per plane as of 1997 according to the B-2 program office

The first operational aircraft, christened Spirit of Missouri, was delivered on December 17, 1993

Related Links:





Another reason to Save Windows-XP

Yet another reason For Micro$oft toContinue distributing Win-XP. If you would like to help Save Windows XP, see the Banner at the top of this Blogs homepage, or use this link- Save Windows XP

Vista SP1 prerequisite updates send some PCs into endless reboot

Last week's updates prompt support complaints; problem first reported in December

By Gregg Keizer

February 17, 2008 (Computerworld) Updates that Microsoft Corp. began feeding Windows Vista users last week to prep PCs for next month's release of Service Pack 1 (SP1) have crippled some machines, according to messages posted to the company's support site.

Last Tuesday, Microsoft started sending Vista users two final prerequisite updates that are required before SP1 can be installed in March. The updates to the operating system's install components were delivered via Windows Updates, which automatically downloaded and installed them on the majority of Vista machines.

Users quickly started squawking.

In most cases, they reported that the final update hung while displaying the message "Configuring Updates Step 3 of 3 - 0% Complete," which was followed by a reboot of the PC. Which was followed by another reboot, and another. "[It] reboots ad infinitum," said Frank Melk on the Microsoft support newsgroup. A smaller number reported a different problem: After the update, their computer refused to boot normally.

Trying to boot into Safe Mode did no good, users said; the reboot loop cranked up then as well. "I am unsure as to what to do, because entering Safe Mode gives the same screen," Melk said. "Furthermore, I have no restore points saved, so going back to a known previous good config is no good either!"

Full Article @: ComputerWorld.com


I won, and you may have too..........

And all they want is My Personal Information.............Oh, and my Bank Account Number, And a copy of my Identification. And since they want me to contact them, I will, Many, many times. Want to help? here is the address..mr_richardudoh@yahoo.com

What is sad is where it originated according to the IP. Scroll down and see the ARIN WHOIS IP result for yourself.

Yahoo! Mail
X-Apparently-To: MEXXXX@yahoo.com via; Fri, 08 Feb 2008 05:28:44 -0800
X-Originating-IP: []
Authentication-Results: mta109.mail.re4.yahoo.com from=lottery.com; domainkeys=neutral (no sig)
Received: from (EHLO mail.pipni.cz) ( by mta109.mail.re4.yahoo.com with SMTP; Fri, 08 Feb 2008 05:28:41 -0800
Received: from mail.pipni.cz ([] helo=inbox202.net) id 1JNTHL-0001cr-Po; Fri, 08 Feb 2008 14:28:33 +0100
Reply-to: mr_richardudoh@yahoo.com
Date: Fri, 8 Feb 2008 14:28:31 +0100
Message-Id: <20080208132831.M4416@lottery.com>
X-Mailer: OpenWebMail 2.52 20061019
X-OriginatingIP: (aus@inbox202.net)
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=OPENWEBMAIL_ATT_0.730357023692829"
Content-Length: 18796


Dear Lucky Winner,

We are pleased to inform you of the result of the just concluded annual final draws of AUSTRALIAN CASH-OUT LOTTO BV international Lottery programs. The online cyber lotto draws was conducted from an exclusive list of 21,000 e-mail addresses of individual and corporate bodies picked by an advanced automated random computer search from the internet, no tickets were sold. After this automated computer ballot, your e-mail address emerged as one of two winners in the category "A" with the following winning information:
Ref: ILP/HW 47509/02
Winning no: 11 13 26 34 44 48
Ticket number: 275-189-657-23-05 with Serial number 8756-05 drew the lucky numbers and bonus ball number
Ball number 11Ball number 13Ball number 26Ball number 34Ball number 44Ball number 48 Bonus Ball number 2
You as well as the other winners are therefore to receive a cash prize of $600,000 Dollars (Six Hundred Thousand Dollars Only) each from the total payout.

Your prize award has been insured with your e-mail address and will be transferred to you upon meeting our requirements, statutory obligations, verifications, validations and satisfactory report. To begin the claims processing of your prize winnings you are advised to contact our licensed and accredited claims agent for category "A" winners with the information below:

To file for your claim, please contact the processing agent;

Email address: mr_richardudoh@yahoo.com
Remember to quote your reference information in all correspondence. You are to keep all lotto information away from the general public especially your reference and ticket numbers. (This is important as a case of double claims will not be entertained). Anybody under the age of 17 and members of the affiliate agencies are automatically not allowed to participate in this program.

Please note; You are hereby advice to send the asigned fudiciray Agent details below for Processing of your Claims;

(1.) FULL NAME .....................................................
(2.) FULL ADDRESS ..................................................
(3).NATIONALITY. .....................................................
(4) AGE......................................................................
(5) OCCUPATION........................................................
(6)TELEPHONE NUMBER...........................................
(7) DATE OF WINNING NOTIFICATION........................
(8) SEX.......................................................................
(9) TOTAL AMOUNT WON..........................................
(10) MARITAL STATUS ...............................................
(11)EMAIL ADDRES.................................................
(12) YOUR BANK ACCOUNT NUMBER.........................
(13) ADDRESS OF THE BANK....................................

Scan a copy of your id or international passport and send together with this payment form to the claim agent that will enable him to processed your winning prize easy.

Contact to this confidential email account :

you are advice to contact to our claim agent with this EMAIL ADDRESS BELOW:
EMAIL: mr_richardudoh@yahoo.com



Congratulations once more from our members of staff and thank you for being part of our promotional program.
Yours in service,
Mrs. Basheera Abubakar
(australian Lottery Inc).

Dr. P. Swier, Mr. Gerald Goodman (Manager Foreign Operations), Mr. Franklyn Van Der Weijden (Manager Domestic Banking Operations), Dr. James Williams (Director International Credit Department), Mrs. Sandra Murphy (Executive), Mr. Michael Cole (Executive), Mr. Stephen Boer (Chairman).

Below are one of our winner,He won prize money release to him with award certifecate.
Past winners.

Search ARIN WHOIS for:

OrgName: RIPE Network Coordination Centre
Address: P.O. Box 10096
City: Amsterdam
PostalCode: 1001EB
Country: NL

ReferralServer: whois://whois.ripe.net:43

NetRange: -
NetName: 81-RIPE
NetHandle: NET-81-0-0-0-1
NetType: Allocated to RIPE NCC
NameServer: NS3.NIC.FR
NameServer: NS-EXT.ISC.ORG
NameServer: SEC1.APNIC.NET
NameServer: SEC3.APNIC.NET
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
Updated: 2005-07-27

# ARIN WHOIS database, last updated 2008-02-07 19:10

% This is the AfriNIC Whois server.

% Note: this output has been filtered.

% Information related to ' -'

inetnum: -
netname: NTIC-OPT
descr: Office des Postes et Telecommunications (OPT)
descr: Reseau Internet
country: BJ
admin-c: LA212-AFRINIC
tech-c: AG2749-AFRINIC
tech-c: FD331-AFRINIC
remarks: INFRA-AW
mnt-by: OPT-NTIC-MNT
mnt-lower: OPT-NTIC-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered
parent: -

person: Louis Agbaholou
address: Office des Postes et Telecommications (OPT)
address: Reseau Internet
address: B.P. 5959
address: Cotonou (Rep. du Benin)
phone: +229 31 4990
fax-no: +229 31 3843
e-mail: agbaholou@intnet.bj
e-mail: agbaholou@opt.bj
mnt-by: OPT-NTIC-MNT
nic-hdl: LA212-AFRINIC
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered

person: Adolphe Gbedissin
address: Office des Postes et Telecommications (OPT)
address: Reseau Internet
address: B.P. 5959
address: Cotonou (Rep. du Benin)
phone: +229 31 8888
fax-no: +229 31 3843
e-mail: gbedissin@intnet.bj
nic-hdl: AG2749-AFRINIC
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered

person: Franck Dossou
address: Office des Postes et Telecommications (OPT)
address: Reseau Internet
address: B.P. 5959
address: Cotonou (Rep. du Benin)
phone: +229 31 8888
fax-no: +229 31 3843
e-mail: dosfrk@intnet.bj
nic-hdl: FD331-AFRINIC
mnt-by: OPT-NTIC-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered


Search ARIN WHOIS for:

OrgName: RIPE Network Coordination Centre
Address: P.O. Box 10096
City: Amsterdam
PostalCode: 1001EB
Country: NL

ReferralServer: whois://whois.ripe.net:43

NetRange: -
NetHandle: NET-193-0-0-0-1
NetType: Allocated to RIPE NCC
NameServer: NS3.NIC.FR
NameServer: NS-EXT.ISC.ORG
NameServer: SEC1.APNIC.NET
NameServer: SEC3.APNIC.NET
Comment: These addresses have been further assigned to users in
Comment: the RIPE NCC region. Contact information can be found in
Comment: the RIPE database at http://www.ripe.net/whois
RegDate: 1992-08-12
Updated: 2005-08-03

# ARIN WHOIS database, last updated 2008-02-07 19:10


% This is the AfriNIC Whois server.

% Note: this output has been filtered.

% Information related to ' -'

inetnum: -
netname: IANA-BLK
descr: The whole IPv4 address space
country: EU # Country is really world wide
admin-c: IANA1-AFRINIC
remarks: The country is really worldwide.
remarks: This address space is assigned at various other places in
remarks: the world and might therefore not be in the RIPE database.
mnt-lower: AFRINIC-HM-MNT
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered

organisation: ORG-IANA1-AFRINIC
org-name: Internet Assigned Numbers Authority
org-type: IANA
country: EU # Country is really worldwide
address: see http://www.iana.org
remarks: The IANA allocates IP addresses and AS number blocks to RIRs
remarks: see http://www.iana.org/ipaddress/ip-addresses.htm
remarks: and http://www.iana.org/assignments/as-numbers
e-mail: bitbucket@ripe.net
admin-c: IANA1-AFRINIC
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
e-mail: bitbucket@ripe.net
admin-c: IANA1-AFRINIC
nic-hdl: IANA1-AFRINIC
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
remarks: data has been transferred from RIPE Whois Database 20050221
source: AFRINIC # Filtered


Search ARIN WHOIS for:

OrgName: Yahoo! Broadcast Services, Inc.
Address: 701 First Ave
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US

NetRange: -
NetHandle: NET-206-190-32-0-1
Parent: NET-206-0-0-0-0
NetType: Direct Allocation
NameServer: NS1.YAHOO.COM
NameServer: NS2.YAHOO.COM
NameServer: NS3.YAHOO.COM
NameServer: NS4.YAHOO.COM
NameServer: NS5.YAHOO.COM
RegDate: 1995-12-15
Updated: 2005-03-02

RTechHandle: NA258-ARIN
RTechName: Netblock Admin
RTechPhone: +1-408-349-3300
RTechEmail: rauschen@yahoo-inc.com

OrgAbuseHandle: NETWO857-ARIN
OrgAbuseName: Network Abuse
OrgAbusePhone: +1-408-349-3300
OrgAbuseEmail: network-abuse@cc.yahoo-inc.com

OrgTechHandle: NA258-ARIN
OrgTechName: Netblock Admin
OrgTechPhone: +1-408-349-3300
OrgTechEmail: rauschen@yahoo-inc.com

# ARIN WHOIS database, last updated 2008-02-07 19:10


Russian Army Newspaper


A few days ago one guy has got his next issue of a Russian Army newspaper he is subscribed too. He was lazy looking through it until on one page, devoted to the department of Nuclear Defense he found a photo of one of the departments of Nuclear Defense Ministry. Look down what shocked him so much:

So maybe next time when the countries would decide to reduce there nuclear weapons potential they would call this process ‘neGOTHiations'.


Oil Barons reap Huge Profit.....again

I don't have a problem with a business or person making money.

But Damn............
When someone Works one week out of the Month just to Fill the Tank, thats ridiculous. And when that Tank of Gas only last Two weeks, thats two tanks a month Or working half a month for Gas, just to work the Whole month. Did that make sense? My Cranium Hurts.......

Exxon shatters profit records
Oil giant makes corporate history by booking $11.7 billion in quarterly profit; earns $1,300 a second in 2007.



Chevron 4th-Quarter Profit Rises on Record Oil Prices



Shell Rakes in $8.5 Billion in Three Months



EXploiting children

Yeah, I know; I'm no better than he is for posting this.

Like Trevor, sometimes you have to do things too make your point. Using kids for your Propaganda is wrong. Whether it be selling something on television, begging for aid, or in this case, Bush Bashing.

The parents of these children have no morals to let them be used in this way.
And some of the language/description used...........oh my!

Trevor talks to children!



Review #1 of QTRAX: A P2P Legal file sharing program

By:Ed Quinn
7:57 AM 1/31/2008

As with any program, or most, the download and install went smooth. Unlike Morpheus or Limewire, you do not have to Open any extra ports on your computer. Maybe because The SONGBIRD Browser part of this is basically a FireFox browser. It Does Listen On Ports 1573, 1575, 1577. Although a browser, remember it is a file sharing program able to Serve others request.

So I run the program and look around. The first thing I did was click on a link on the home page. I thought I was going to listen to a song. It didn't happen. What did happen was it loaded all 15 songs in to the songbird player. After it did this, it didn't and wont play them. So I tried again with the same results.

I wanted to try it out so I thought, maybe I have to register just to listen. So I click on register and proceed to do so. Unlike other P2P apps this is not required and I don;t know why it is here, unless some time in the future they want too prosecute you for Downloading songs. Anyway, short of your actual street address everything else is required. Full Name, user ID you select, password, Date of Birth, ZIP Code, Country, Email address. I don't know why they need all this info.

After filling out the required info I hit the submit button and waited. And Waited and waited and waited and, well you get the point. A couple of times during this submission process it returned a blank page. After it doing this a couple of times, I filled out the form again and re-submitted. And waited and ,.... get it. I don't know if my information was accepted or not.

As I thought might happen with this being a Browser and a P2P program bundled, it sucks as of this post. The only thing that does seem to work at this time are the Banner adds. From looking at the home page of this browser there are only 37,835 users online at this time, with 9,695,469 tracks available.

So I shut it down and reboot hoping this will have some affect, but I doubt it. So I type in my user name and password and hit enter. What do I get back, INVALID ID or password. So I guess it didn't take the first three time so I will now try again. It must work because there are now 38,308 users online. Up 203 from last look.

Success!!!! The registration went through.

I go to my email to retrieve the activation code. I click the link to activate and , NOTHING HAPPENS. The page wants to load as before when trying to create an account but doesn't. So I decide to go to my email on another box,One that is running Linux. I open the mail and click the link and It goes through. I do not understand this. None the less, my account is NOW activated. So now we will go back on the other box and try and log in. Success....we are able to log in. Now we shall see what we are allowed too do after going through all this, and providing them with more Information than I care to share. It better be worth it.

Well at this point everything I click on pops up a window that tells me, "DOWNLOADS COMING SOON". From the Home page of this program I see that the Most downloaded songs are from LED ZEPPELIN and BARBARA STREISAND, Neither of which I have ever cared for. At my age, most people I grew up with were in to Zeppelin. But I will see if I can DL some ZEP just to see.

I am NOT A HAPPY CAMPER AT THIS POINT......Everything I try to DL say the same thing, "DOWNLOADS COMING SOON". Well I am going to play with it some more, but I don't think It will get any better.

I have used other P2P programs with MUCH better luck, and more users online than this. I also noticed that my clock has been reset. It has been moved 3 hrs back. I Don't know why this would happen unless it installed some spyware/malware or some other hack. We will find out shortly. They do tell you that it does not contain any on their website. How many times have you heard that before. This is why it is always best to run these type and any other programs you want to try, on a TEST BOX if you are lucky to have more than one.

Sad, but at this point the ONLY thing they are serving are Multiple Banner adds, trying to sell you something. I will continue and post an update sometime later. Until then remember, If it sounds to good to be true, It usually is! In this case, It doesn't sound at all. You cant even play the damn songs. All you can do is look at the pages. So I end this review with giving it 1 out of 10 stars. 1 because it looks good.

If you want too try your luck, heres the link: http://www.qtrax.com/


Where do they come from

If you don't watch this, you may miss the best Laugh of your day.



World's Most Powerful Rail Gun Delivered to Navy

For true sci-fi fans, any mention of a real-world rail gun will draw an instant, slightly audible gasp. Instead of relying on chemical propellants -- such as gunpowder -- a rail gun uses magnetic "rails" to launch a solid, nonexplosive projectile at incredible speed. Theoretically, rail guns would be able to precisely strike targets at extreme ranges, and would negate the risks associated with carrying around tons of explosive ammo. More to the point, they're cool-sounding, just like lasers.

Which is why the news that BAE Systems has delivered a functional, 32-megajoule Electro-Magnetic Laboratory Rail Gun (32-MJ LRG) to the U.S. Naval Surface Warfare Center in Dahlgren, Va., is exciting. Installation of the laboratory launcher is currently under way, and according to BAE, this is the first step toward the Navy's goal of developing a tactical 64-megajoule ship-mounted weapon.

The lab version doesn't look particularly menacing -- more like a long, belt-fed airport screening device than like a futuristic cannon -- but the system will fire rounds at up to Mach 8, drawing on tremendous amounts of electricity to generate the current for each test shot. That, of course, is the problem with rail guns: Like lasers, they're out of step with modern-day generators and capacitors. Eight and 9-megajoule rail guns have been fired before, but providing 3 million amps of power per shot has been a limitation. At 32 megajoules, this new system appears to be the most powerful rail gun ever built, and the Office of Naval Research is installing additional capacitors at the Dahlgren facility to support it. The planned 64-megajoule weapon, if it's ever built, could require even more power -- a staggering 6 million amps.

Full Report Here- www.military.com

Also see - How Rail Guns Work There is a cool graphic that lets you fire the Rail Gun, on the second page. [I think it's Cool, your opinion may vary.]


Better Integrated Spy Chip ???

Method of reliably electroless-plating integrated circuit die


The present invention is a reliable method of electroless-plating integrated circuit die that achieves high yield. Die are attached to a holder using a polyimide adhesive to eliminate voltage differences on bond pads which would otherwise interfere with the plating. The die are aggressively cleaned using multiple cleaning solutions, one heated to a user-defined temperature. Each cleaning is followed by an aggressive rinse in de-ionized water. Die are immersed into multiple metal solutions at user-definable temperatures. Each immersion is followed by an aggressive rinse in de-ionized water, one with heated de-ionized water.

Inventors: Pal; Rathindra N. (Beltsville, MD), Berlin; Kingsley R. (Odenton, MD)
Assignee: The United States of America as represented by the National Security Agency (Washington, DC)
N/A (
Appl. No.: 11/253,879
Filed: October 19, 2005



Call-jacking VOIP / More Worms for Cellphones

New VOIP 'Call-Jacking' Hack Unleashed

JANUARY 22, 2008 Dark Reading

Now there's a way for attackers to hijack a user's voice-over-IP service: "call-jacking" could let the bad guys launch sophisticated phishing attacks as well as perpetrate lucrative toll fraud.

Researchers from the hacker group GNUCitizen have released a proof-of-concept for call-jacking via a BT Home Hub user's router. The attack exploits cross-site request forgery (CSRF) and authentication bypass vulnerabilities in the router that were previously discovered by the researchers. The attack works even if the default password in the router has been changed.

"We believe that this technique, which we coined as 'call jacking,' is completely new. There is nothing like this in the public domain as far as we know," says Adrian Pastor, a senior IT security consultant for an unnamed penetrating testing firm in London. "The beauty of the attack is that the victim user thinks he/she is receiving a phone call, but in fact he/she is making the phone call and paying for it. We find this quite innovative and unique, hence the need for coining a new term."

The exploit could be used in a phishing attack, where the victim would get a phone call from his "bank" after clicking a link in a phishing email. Phishers typically don't know their victims' phone numbers, he says, so the phone call would help the attacker appear legitimate and gain the victim's trust.

Another attack scenario involves toll fraud, where the victim's router would be forced to dial a toll number. "Premium numbers are very expensive, and allow the identity who registered them -- in this case, the attackers -- make money every time someone dials them," Pastor says.


Malicious MMS worm hits Nokia handsets

January 22, 2008 (TechWorld.com)

-- Security vendor Fortinet has uncovered a malicious SymbianOS Worm that is actively spreading on mobile phone networks.

Fortinet's threat response team warned on Monday that the worm, identified as SymbOS/Beselo.A!worm, is able to run on several Symbian S60 enabled devices. These include the Nokia 6600, 6630, 6680, 7610, N70 and N72 handsets.

The malware is disguised as a multimedia file (MMS) with an evocative name: either Beauty.jpg, Sex.mp3 or Love.rm. Fortinet warned this is deceiving users into unknowingly installing the malicious software onto their phones.

Unlike Microsoft Windows, SymbianOS types files based on their contents and not their extensions, so it is worth noting that recipients of infected MMS would still be presented with an installation dialogue upon "clicking" on the attachment. "Therefore, users could easily be deceived by the extension and unknowingly install the malicious piece of software," warned Fortinet.

After installation, the worm harvests all the phone numbers located in the phone's contact lists and targets them with a viral MMS carrying a SIS-packed (Symbian Installation Source) version of the worm. In addition to harvesting these numbers, the malware also sends itself to generated numbers as well.


Final UPDATE: Storm of the Century - 2008 ?

This is an update to a previous post. You can read it HERE.

Further UPDATEs will be added to This POST.

As soon as the Rain/Sleet changes to SNOW, I will post Pictures and Video.

Yes, it is a BIG DEAL when it snows this far South.

Bummer.....In my area we 'Did NOT' get any Snow. We Didn't even get any Flurries. All we got was a little Sleet and Not very much of that, So I have No pictures of snow for my area. I look forward to seeing what the rest of the Winter season holds for my area as we usually have our Snow in Late February through Mid March.

Final UPDATE: Snowfall Amounts- January 19, 2008

On January 19, 2008 A low pressure system over the northwest Gulf of Mexico spread abundant moisture over a cold airmass to produce widespread snow across northern Georgia. The precipitation began in the form of rain in the hours around daybreak...but quickly changed to mostly snow between midmorning and the noon hour. Since the ground was relatively warm...and temperatures during the event were generally slightly above freezing...some of the snow that fell melted. This resulted in snowfall accumulations that were fairly light.

Reports from individual counties...



National Weather Service Forecast Office
Peachtree City, Georgia

Heavy Snow Warning

406 AM EST SAT JAN 19 2008




The NWS has canceled the 'Heavy Snow Warning' for my area, but still say we are to get 2"- 4" of Snow. It hasn't made it to my area yet but it's coming.

In the meantime , here are some images of Snow in the Atlanta area pulled from the Department of Transportation Cameras.
The cameras can be found on this site, http://www.georgia-navigator.com/


Save Windows-XP

You may have NOTICED the banner at the top of the Home page asking you to help Save Windows-Xp. Why Save Windows-XP, you might be asking yourself. Because there are some of us out here that still use it, and will continue too use it. But Why you ask, Don't you want VISTA? Well sure some of us want Vista. We just can't afford it.

I have 3 boxes running Xp-pro and it would cost me a pretty penny to replace them with ones that could run Vista.

They say you would be able to buy a NEW Computer with XP installed for awhile, you just wont be able to go and buy the OS as a stand alone. I have gone to ALL of the stores in my area and it is NO where to be found.I have ask the sales people at these stores if they could Order me a copy and the Answer was NO.

My other reason besides the one above is- 'If it ain't Broke, why fix it'.

There are many more reasons and you can find them HERE

They walk among us........

Jon sends: Subject: Priceless

A man was being tailgated by a stressed out woman on a busy
boulevard. Suddenly, the light turned yellow, just in front of
him. He did the right thing, stopping at the crosswalk, even
though he could have beaten the red light by accelerating through
the intersection.

The tailgating woman was furious and honked her horn, screaming
in frustration, as she missed her chance to get through the
intersection, dropping her cell phone and makeup.

As she was still in mid-rant, she heard a tap on her window and
looked up into the face of a very serious police officer. The
officer ordered her to exit her car with her hands up.

He took her to the police station where she was searched,
fingerprinted, photographed, and placed in a holding cell. After
a couple of hours, a policeman approached the cell and opened the
door. She was escorted back to the booking desk where the
arresting officer was waiting with her personal effects.
He said, "I'm very sorry for this mistake. You see, I pulled up
behind your car while you were blowing your horn, flipping off
the guy in front of you, and cussing a blue streak at him." I
noticed the 'What Would Jesus Do' bumper sticker, the 'Choose
Life' license plate holder, the 'Follow Me to Sunday-School'
bumper sticker, and the chrome-plated Christian fish emblem on
the trunk; naturally ... I assumed you had stolen the car."

Priceless. --


Internet billing based on usage

I guess this is the Wave of the future, like most European countries.

So, Time Warner Cable Inc said on Wednesday it is planning a trial to bill high-speed Internet subscribers based on their amount of usage rather than a flat fee.

I don't have Time Warner as my ISP. If I did And they Jacked My Bill they would more than likely Lose a customer.

My Provider from what I have been able to find Charges one of the Highest Rates in the country for high-speed Internet. I don't have a package deal or Bundle where you have Cable TV, Phone and Internet for one LARGE price. I don't watch much of the BOOB-TUBE, nor do I make long distance or international calls. I only have high-speed Internet and Pay $60.95 a Month. If, in the Near future my provider follows suit, I would hope my bill would decrease. If it doesn't decrease and stays the same I will continue my service. If it goes Up, I will cancel my service because I feel what I already pay is extreme.
So what if I have multiple boxes in my network. It is very rare that all are on at the same time. I don't DL videos or large files. I do run Limewire once in awhile, but even then I don't DL any videos or MP3's. [Yes, there are other types of Files out there that do contain information.]

I have family that Has high-speed Internet with a different ISP than myself. Their Monthly rates are anywhere from $24.95 / $42.00. I wish I could Change my ISP but that is part of how they screw you. You would think I could as we Live within a Mile of each other, yet the services offered seem to Stop on the Property lines. Go figure. I guess it really doesn't matter though, as we all have a different ISP by name, They are ALL Operated By AT&T.

I don't look forward to going back to Dial-up service, but it may come to this.

Anyway, this is my rant.


Malware Quietly Reaching 'Epidemic' Levels

New reports say malware increased by a factor of five to 10 in 2007

JANUARY 16, 2008 | 5:40 PM
By Tim Wilson
Site Editor, Dark Reading

Everybody knew it was bad, but few knew it was this bad.

In separate studies released yesterday, two research firms now say that malware increased between 500 percent and 1,000 percent in 2007, and it shows no signs of slowing down.

"The number of new strains of malware that appeared in 2007 increased tenfold with respect to the previous year," said PandaLabs, Panda Security's research arm, in a report issued yesterday. "Over the last year, PandaLabs has received an average of more than 3,000 new strains of malware every day. This represents a malware epidemic which -- although silent, with little media coverage and no widespread alerts -- is nevertheless dangerous."

The results indicate that signature-based defenses for malware are no longer effective, the research firm said. Some 72 percent of networks with more than 100 workstations -- and 23 percent of home users -- are currently infected with malware, despite having operative antivirus or other signature-based tools in place, PandaLabs said.

Experts at AV-Test, an independent testing organization, also reported skyrocketing incidence of malware yesterday. After a detailed count, the organization said it identified nearly 5.5 million different malware files in 2007 -- more than five times as many as in 2006.

AV-Test counted the number of files with different MD5 hashes, sometimes called "fingerprints." This includes malware which is packed using a different run-time packer or is differently encrypted, the testing organization said.

In 2007, AV-Test found almost 5.5 million such files, up from about 973,000 in 2006 and 333,000 in 2005, the report said. And the trend is accelerating: The group already has identified more than 118,000 different malware files in the first two weeks of January.

The results drove AV-Test to concur with PandaLabs's assessment. "The figures clearly demonstrate that the signature-based approach of current anti-virus software is no longer appropriate," the report said.


Storm of the Century - 2008 ?

[Disclaimer: I am NOT a Meteorologist.]

With that being said, If you are in the Southeast I would get your Supplies NOW!

I have been watching this take shape for about 5 days now. I had Just mentioned this to My Family this past Sunday.I told them the indications that I see reminded me of the 'Super Storm of 1993', or the 'Storm of the Century', as it was Called.

As we know, Meteorology is a Science based on gathering information and making a Forecast/Speculation. Even the PRO"S are wrong 30% of the time. So on with my Speculation....er, Forecast....

First a little History of 'The Storm of the Century' from 1993-

On March 12, 1993, a newly formed cyclone moved into a low level baroclinic zone already in place over the Gulf of Mexico and began to rapidly intensify. The deepening cyclone turned northeastward and the center of low pressure made landfall in northwestern Florida during the early hours of March 13.

Photobucket - Video and Image Hosting

Photobucket - Video and Image Hosting

As you can see from this CURRENT[as of this post] image the Low Will be about in the SAME position as was in 1993, if not a little further south as compared to the above Storm Track image.

Photobucket - Video and Image Hosting

These next images Show the Forecasted development of this system.

Photobucket - Video and Image Hosting

Photobucket - Video and Image Hosting

Photobucket - Video and Image Hosting

Photobucket - Video and Image Hosting

In this image you can see the projected path of this current storm through Thursday January 17,2008.

Photobucket - Video and Image Hosting

In this Image you can see where the Storm in 1993 made landfall in Florida.

Photobucket - Video and Image Hosting

The area for land fall is similar, as are the conditions in the rest of the US, meaning the COLD temperatures.
This is the Loop of the 'Storm of the Century' from 1993.

Satellite Loop.

When all was said and done, 270 people were dead and total property damage estimates exceeded $3 billion. According to the National Disaster Survey Report (NDSR 1994), twenty-six states were affected, impacting the lives of nearly 100 million people, approximately half the nation's population. More than a foot of snow fell from Alabama into Maine, combined with record cold in the storm's aftermath. Seventy record lows were set on March 14, with an additional 75 that following morning.



Micro$oft or MicroShaft

I reformatted my Laptop back in December to a Dual-Boot running WinXP-Pro and Linux-Kubuntu. I didn't update winXP until this morning. I have another box running Win-XP pro and Another Dual-Boot running the same as the Laptop,so I had plenty too play with. Anyway............After I downloaded the updates on the laptop I went to install them. I always Choose the custom install as I don't require all the BS Micro$oft wants to install, such as the Malicious Software Removal Tool. After My first experience with running it some time ago, when it would detect some of my NON-Microsoft programs and wanted me to let it 'FIX MY PROBLEM'.......Well you get the point.

So after removing the CHECK by the updates I didn't want and installing the updates, I also check Do not show these un-installed updates again. The prompt says It will Not Show them Again,so I reboot. After doing this 4 times and doing the same as stated above, I decide I would Capture what was going on. PAY Attention to the Video especially if you like many others don't really pay attention to the Prompt when Installing updates in the custom mode.

The catch when doing it the custom way is, when it is complete the Next Prompt should be to restart your computer so I pretty much just click the next or restart button Without Paying Attention. I know those of you out there know what I'm talking about. Anyway Long story short, Watch the Screen capture Below. It isn't the Best Quality.

If you want a FREE open-source Screen Capture Program, this is the one I used.



Nationwide alert is issued for missing Lancaster oil truck

Have you seen me?

January 9, 2008

DENVER, Pa. (AP) — A nationwide alert is out for a fuel truck that was stolen from Leffler Oil Company in Lancaster County.

The 1992 truck has Leffler markings on the doors but not on the tank.

The truck was last seen parked at a fuel station on North Sixth Street in Denver, Pa.

The alert went out on Monday when a driver noticed the truck was missing. The truck was carrying about $3,500 worth of a low-sulfur fuel.

The truck is valued at $25,000.



Commet DC admin:

Notice how they try to SCARE you with the remark "low-sulfur fuel". Do you know why? Because this is the same type of Fuel used in the OKC bombing that was mixed with fertilizer[ammonium nitrate].

What is low-sulfur fuel?

In simple speak, it is #2 Diesel fuel or as some in areas where they use it to HEAT their homes call it, 'Heating Oil'.
The low-sulfur part is about Vehicles that use Diesel such as the Very Truck used to transport it and Many other Big rigs on the road today which emits less pollution. High-Sulfur #1 fuel is used in Farm equipment or Off road equipment and is DYED RED.


I can almost bet this FUEL was stolen because people that use it for Heating can not AFFORD it, and if the person responsible sells it for Half price he'll make a pretty penny and make the buyer nice and warm. If he doesn't get caught.

However, We can not RULE out a Truck Bomb. So have you seen this truck, or one like it? If so Contact your local Law Enforcement. Oh yeah, It will probably have NO NAME [Leffler Oil Company] on the DOOR's any more.


Hackers from China force Pennsylvania to shut down state government's Web site

Could all the recent hacks from China just be a way of covering up domestic hacking? I say this because if you the General American Public knew this was happening from within your own country, you would 5hit even more.

"Administration spokeswoman Mia DeVane said there was no reason to think anyone's personal data had been compromised."

Would they really tell you if it was?

I also wonder if this is another attempt to sway the Vote in the upcoming election. Pennsylvania with 21 electoral votes is a large state and could be in the running again this year as the swing state.


HARRISBURG, Pennsylvania (AP) - Hackers from China infiltrated the Web site of the Pennsylvania state government, but officials said they found no evidence of damage.

Four state departments had security problems with their Web pages, leading to a decision to take down nearly all of the state's Internet site on Friday morning.

Office of Administration spokeswoman Mia DeVane said there was no reason to think anyone's personal data had been compromised or that any damage occurred when a hacker "got into what we would say is a back door.''

By late afternoon, nearly all of the state's site had been put back online. "It was more that we needed to take down those sites to make sure a virus couldn't spread,'' she said.

The problems arose at pages of the departments of Labor and Industry, Education, and Military and Veterans Affairs, as well as the Pennsylvania Lottery's page.

Investigators tracked the source to a domain registered in China, she said.
Wow, they traced it to China. There are many different ways I could make you think I hacked you from another place than from where I am actually at.

It is not unusual for the state's computer system to be the target of hackers, but having problems at four separate branches of state government prompted the decision to take down nearly the entire system, she said.

DeVane said Pennsylvania's information technology officers learned during a conference call held by the Multi-State Information Sharing and Analysis Center that four other states and one state university had been attacked in a similar manner.


Digital photo frame contains Virus/Malware part2

In a previous post HERE
we learned of people either buying or receiving NEW hardware loaded with a virus or malware. While the reports speculate that this is not widespread, or in the wild, this can not by any means be the end of this. Since most,'not unlike myself' do not suspect a NEW device to contain a virus, we don't even think of looking/scanning for it on said device. This being the case, I am sure there are many others out there in the world that have become infected in this manner and don't even realize it.

In my previous post on this subject I said:
"Well the who seems fairly easy. Correct me if I'm wrong. The who is China. I say this due to the fact most of these types of electronics and damn near everything else comes from them. Under the Direction of whom is all together another Question."
This appears to have been somewhat CONFIRMED in this latest post from SANS Internet Storm Center where a reader reports, "Google-ing the name of the virus executable turns up three Chinese-language links."

What makes this all the worse is that some have an autorun.exe file. For those that don't know/understand what this is I'll try and simply explain. You know when you put a music CD or a movie DVD in and it starts Automatically, that's what autorun does. If this is the case, there is NO WAY to SCAN the device to detect the infection before it runs.

As I stated before this is BIG, and NO telling how many devices are infected without people realizing it.


Digital Hitchhikers Part Two
Published: 2008-01-04,
Last Updated: 2008-01-04 02:51:08 UTC
by Marcus Sachs (Version: 1)

Several days ago David Goldsmith posted a diary concerning a digital photo frame that came with a value added feature. Since then, two more readers have sent us notes concerning malware on digital photo frames that were purchased or received as Christmas presents last week. We've been in contact with the security team of the retail store chain where they were purchased as well as the product vendor and both swear that no malware is on the units they are selling.

So, dear readers, here is your first project for the New Year. If you either purchased or were given a digital photo frame, GPS unit for your car, external hard drive, or any other device that connects to your computer via a USB cable and
appears to your operating system as one or more mounted drives, please let us know via our contact form if you experienced any suspicious behavior that smells like malware.

To give you an idea of what we are talking about, here are edited excerpts from the three notes we have received so far:

First notification.

Behavior after attaching the USB digital photo frame to the PC:

1. MSCONFIG would not run - it would briefly open and then terminate

2. Blue screen when starting in safe mode

3. Many antivirus websites would result in browser terminating

4. Various popups for random name.exe "not valid image messages"

Using the CA AV2008 product, a new aggressive virus named Win/32Mocmex.AM was found on the photo frame (filename: kwjkpww.exe ). No detailed info on it is listed yet in their database. (More information was later available at http://www.prevx.com/filenames/394470622808329496-0/KAWDHZY.DLL.html.)

Second notification.

The attached file is from a digital picture frame. This file was originally named "autorun.inf", was marked as a hidden, system file, and was located along-side the sample pictures shipped with the picture frame. The program file launched by this autorun was deleted, but is a variant of the trojan Win32/Agent virus. This file was also marked as hidden.

It did appear all seals were intact and the product was carefully wrapped when it was unpacked. However, I can't say for sure that this frame was not a victim of a prior connection.

The virus scanner I'm using tagged the virus .exe file "cfhskjn.exe" as shown in this log entry:

Threat Name:Trojan:Win32/Agent

Detection Date and Time:1/1/2008 4:23 PM

File Name:G:\kwjkpww.exe

Threat Severity:Severe

Threat Category:Trojan

Threat found by On Demand Scan:(ANTIVIRUS_ONDEMAND)

Threat Status:Removed

so I'm thinking it was not the autorun.inf worm or "silly worm" as described in this link. Although I've not dug into this particular .exe code that was found on this frame, the classification as a Win32/Agent threat tells me it is not of a worm (self-propagating) type and behaves more as a Trojan threat.

Google-ing the name of the virus executable turns up three Chinese-language links. Using the Google-translate function, you get this web page from the first link:


which tells me this virus has been in circulation since at least Oct 30 of 2007.

Third notification.

I too connected a digital picture frame to my computer and received the nastiest virus that I've ever encounterd in my 20 plus year I/T career. The product vendor tells me it's not true however I know exactly what, how and when. The virus absolutely came from the frame. Is there any way to cooberate this?

This virus was indeed on the frame. It propagates to any connected device by copying a script, a com file and an autorun file. It hides all systems files and itself while completely eliminating the user admin ability to show hidden files. It creates processes that negate any attempt to go to anti virus and anti spam web sites. It prevents the remote installation of any anti virus components. I was able to remove it by using the attrib command to unhide then delete the files, then run Symantec anti virus. I also manually deleted the files from my USB drive and and flash drive that I used to back up my data. I then had to long format and rebuild my computer because I had no trust that it was safe.

I was using my computer the morning that it crashed without any troubles at all. I web mailed, VPN connected to my business network which is FDA regulatory compliant and very secure. When I completed my work I then connected the picture frame and my system immediately went crazy. After this happened I ceased to use my system and went to a second computer here I your publication that re-enforced my immediate conclusion.

By the way, I also received a digital photo frame for Christmas but have not had any problems with it other than the resolution totally sucks. But that's a subject of another diary some day. The GPS unit I bought in November mounts as a drive letter in Windows but it too had no malware on it. We are pretty certain that this is not a wide-spread problem but we need to know if others have experienced anything like this. Please use our contact form to report any observed malware-like behavior in any of these external devices you recently purchased or received as gifts. Please be sure to include information about the model name, where you bought it, and if you've been in contact with the store or product vendor. We'll provide a summary in a few days with details on what was reported.

Many thanks to readers Edd, Larry, and Rick for bringing this issue to our attention.

Marcus H. Sachs
Director, SANS Internet Storm Center


Military Issues Warning on Chinese Hackers

I have known about China hacking various nations for awhile. They[meaning you know who] try and keep things like this from making the snooze in the USA. Hell, I'll go as far to say that 85% of all hacks come from China. At least thats what my Smoothie tells me.

Military Issues Warning on Chinese Hackers

By Jung Sung-ki
Staff Reporter

The South Korean military has issued a warning that computer systems of soldiers and defense institutes have become the victims of presumed Chinese hacking activities, a military source said Tuesday.

The source said hackers, believed to be Chinese nationals, penetrated computers of soldiers by sending e-mail involving hacking programs falsely titled ``the situation on North Korea's arms power.''

``We are now investigating several cyber hacking cases believed to be conducted by Chinese nationals based on evidence that the hackers stole information stored in soldiers' computers,'' the source said, asking not to be named.

The hackers appeared to have penetrated Web sites of military units and retired soldiers to steal e-mail adresses of individuals registered to the sites, he said.

The Defense Security Command recently distributed up-to-date vaccine programs to service members as a precautionary measure, he added.

Cyber attacks from China have become frequent and aggressive in recent years, according to reports.

The Chinese military created a cyber-hacking unit named ``NET Force'' in 2000 operated by about 1 million hackers, the reports said.

In 2004, the state-funded Korea Institute for Defense Analyses was hacked by a Chinese person.

Reports said last year Chinese military hackers were preparing a detailed plan to disable America's aircraft carrier fleet as part of an aggressive push by Beijing to achieve ``electronic dominance'' over each of its global rivals by 2050, particularly the United States, Britain, Russia and South Korea.

The U.S. Department of Defense said China's military regards offensive computer operations as ``critical to seize the initiative'' in the first stages of a war.

Of course you do know who pretty much controls the South Korean government;.........don't you? Of course you do.......