Components, Scripts, Codes: ASP

Ad Management (78)
Affiliate Programs (25)
Articles (33)
Auction Software (20)
Blog Scripts (14)
Bookmark Management (5)
Books (108)
Browser Utilities (1)
Business & Enterprise (8)
Calculators (3)
Calendars (86)
Chat Scripts (66)
Classified Ads (71)
Click Tracking (10)
Clocks (1)
CMS Software (25)
Coders & Programmers (2)
Collections (7)
Communication Tools (16)
Content Management (216)
Counters (14)
Customer Support (41)
Database Tools (158)
Date and Time (21)
Development Tools (50)
Discussion Software (70)
Documents (16)
E-Commerce (156)
Editors (8)
Education (1)
Email Systems (128)
Error Handling (13)
Excel and ASP (1)
FAQ and Knowledge Base (40)
File Manipulation (168)
Financial Software (3)
Flash and ASP (1)
Form Processing (28)
Games and Entertainment (8)
Graphs and Charts (37)
Groupware Tools (4)
Guestbooks (44)
HTTP (1)
Image Manipulation (116)
Instant Messaging (12)
Internet Utilities (18)
Link Management (32)
Mailing List Managers (23)
Miscellaneous (204)
Modules or Libraries (3)
Multi-Level Marketing (2)
Multimedia (20)
Navigation (7)
Networking Tools (87)
News Publishing (18)
ODP Software (1)
Online Communities (86)
Open Directory Project (2)
Organizers (19)
Polls and Voting (14)
Portal Software (44)
Postcards (6)
Quote Display (6)
Recommendation Scripts (2)
Redirection (1)
References (141)
Searching (48)
Security Systems (42)
Server Management (39)
Site Navigation (46)
Software (101)
String & Variables (3)
Survey and Voting (55)
Tests and Quizzes (4)
Tips and Tutorials (1738)
Top Site Scripts (4)
URL Submitters (2)
User Management (117)
Vertical Markets (3)
Virtual Communities (2)
WAP and WML (5)
Web Hosting Tools (7)
Web Rings (1)
Web Traffic Analysis (75)
Website Promotion (1)
XML (7)

HBGary CEO Speaks Out On Anonymous Hack

Greg Hoglund, CEO of HBGary, admits that lackluster security at his company played a central role in the breach that led to the release of some 50,000 company emails, but also disputes common understanding and reported details of the hack and the group behind it, going so far as to say there was actually no hack at all.
In an interview with CSO Online’s Robert Lemos, Hoglund explains that Anonymous, the hacker-collective of online mischief makers that exposed the trove of HBGary emails, never entered the company’s network, and in fact may not have even been aware of its existence until long after the fact. Instead, Anonymous members used a stolen password to gain access to the companies email spool.
The email spool was hosted in Google’s cloud service. Hoglund reportedly spent the better part of Super Bowl Sunday trying to shut-down the HBGary site but only ended up getting the run-around from a Google service call center in India. As his company was in the process of getting “owned,” so to speak, Google’s call center set up elaborate hoops through which they expected Hoglund to jump in order to validate his identity. By the time he proved himself and was able to get technical support on the phone, the damage had already been done.
Hoglund warns CISOs considering cloud storage to make sure that they establish a contractual emergency service agreement with their provider and suggests setting up a local email retention policy so that a company’s entire email archive is not stored in one accessible location out in the cloud. He also recommends the use of two-factor log-in authentication, a relatively cheap service that Hoglund believes could have prevented the HBGary blunder altogether. And finally, Hoglund advises for the configuration of IP restrictions, so that there is only one administrator account that can only be accessed from one location.
As for Anonymous, Hoglund claims that leading up to the attack, they weren't even on his radar. He admits to not taking them seriously, and viewing the collective as “a bunch of kids who DDoS sites offline,” something most people see as little more than a virtual sit-in. Besides, he says, his company was focused primarily on securing their customers from advanced persistent threats (APTs) from China.
"That has been the bulk of our research for quite a while because most of our customers have suffered attacks from, what appears to be, state sponsored Chinese intelligence,” Hoglund tells CSO Online. “It's espionage stuff, so we were heads down on that.”
In the wake of the attack, Hoglund has focused his attention more intently on anonymous, and learned that they aren’t really what they claim to be.
“There aren't very many, first of all,” he says. “There are not thousands, they are not a legion,” which they claim to be. Hoglund contends these are intimidation tactics, the fruits of a pseudo-journalist fueled, media manipulating propaganda machine that Anonymous uses to instill fear in their opponents.
He goes on to tell Robert Lemos, that through his research he has learned that Anonymous essentially consists of a dozen or so of what he describes as "criminal hackers" engaged in a wide range of activities, including what Hoglund claims is the theft and publication of private company data.
“There have been cases where death threats have been left,” says Hoglund. “It's just ridiculous, and it's completely unacceptable. I had no idea about any of this before I was attacked.”
Hoglund says that the most relevant threat right now is malicious insiders with access to a worldwide audience. In that light, Anonymous and its nascent Anonleaks site is just one example of a larger trend that includes Wikileaks, and Crowdleaks, among others. All these groups are recruiting and monetizing insiders, he says.
He draws a line between Wikileaks, which he describes as an entity that at least functions similarly to journalism, keeping their sources anonymous, and the others, who engage in acts of cyber-thuggery by criminally hacking into computers and stealing data.
“Let's be clear here,” he says, “Anonymous is not protecting Wikileaks. Anonymous is a group that hacks criminally into systems, and we are talking about probably over five corporations that I know of right now in the United States that are being actively targeted by them. When they get access, they are going to steal the data off those systems, e-mail, files off the file system, they are going to do everything they can, and then they are going to leak it and manipulate it and create stories about it. Basically, that is their platform.”
Hoglund's recommendations and insights are especially timely in light of the recent high profile and sophisticated attack which targeted well-respected security company RSA and resulted in the theft of secrets related to its SecurID two-factor authentication product.

Here’s A Guy Hacking A Times Square Jumbotron For Real


A few days ago, the internet freaked out over a viral video of a guy who hacked Times Square video screens with a live feed from an iPhone. It was a fake viral marketing stunt for the new movie Limitless. But now a guy has done it for real – sort of.
Adi Isakovic, a 27-year-old entrepreneur, tested out his new product, TubeMote, and used it to broadcast a video of his dog on a Times Square Jumbotron.

Man charged with hacking into wife's e-mail headed to trial

A Rochester Hills man will go on trial as planned, charged with a computer-hacking felony for reading his wife’s e-mail, despite a plea by his attorney to adjourn the trial while state legislators consider an amendment to exempt spouses from such prosecutions.
Leon Walker will stand trial April 11. He faces five years in prison for reading the e-mail of his then-wife Clara Walker in the Rochester Hills home they shared in 2009. He was arrested in 2010, charged with fraudulent access to a computer. The couple, who have a daughter, have since divorced. Today, his attorney, Leon Weiss, asked Oakland County Circuit Judge Martha Anderson to adjourn the trial while Michigan lawmakers consider an amendment, introduced in January by state Rep. Tom McMillen, R-Rochester Hills, that would exempt spouses and parents from prosecution under the hacking law.
“I want this case adjourned because the Legislature is going to speak to the lack of clarity in this law,” Weiss told Anderson. “It behooves us for the sake of judicial economy to adjourn this.” Weiss has argued that the law was intended to prevent corporate hacking of confidential business data and to prevent identity theft.
But the judge ruled the trial would proceed.
“This court has no idea how long it will take the Legislature to act,” Anderson said.
Assistant Prosecutor Jeff Hall also sought to adjourn the trial to allow for additional investigation, but Anderson denied his request, too.
The case has attracted international attention.
Walker, 33, a computer technician with Oakland County, was Clara Walker’s third husband. In 2009 he suspected she was having an affair with her second husband, a man who had been arrested for beating her in front of a child she had with her first husband.
Using her password, Walker read the e-mail on a computer in the family home and confirmed the affair. He then notified her first husband, who attached the e-mails to an emergency motion he filed in court to change custody of the child he shared with Clara Walker. When Clara Walker learned that Leon Walker had been reading her e-mail, she filed a complaint with the Oakland County Sheriff’s Office.
Leon Walker, who has no criminal record, remains free on bond.
Walker subsequently filed a Freedom of Information Act letter seeking law enforcement records in Oakland County, detailing similar arrests and found none. In a 2010 case out of Springfield Township, an ex-spouse complained that her former husband was reading her e-mail. Records show the case was deemed a civil matter and did not proceed to prosecution