You may have heard people talking/blogging/twittering about SOPA — the Stop Online Piracy Act.
Many people don’t truly understand what can go very, very wrong with this proposed Online Act. Please take a moment to watch this video and find out more about SOPA / PIPA Acts – Get Educated!
You may have heard people talking/blogging/twittering about SOPA — the Stop Online Piracy Act.
“Sites such as Wikipedia and Reddit are going “dark” this Wednesday, Jan. 18, to protest the Stop Online Piracy Act (SOPA) which, critics contend, would compromise the ability of any site that includes outside links to carry on current operations.
Feeling left out? A simple piece of code is helping the entire web (from major sites to even the humblest of Tumblrs) go dark in solidarity. The code, called STOP SOPA, replaces any site’s landing page with a black screen. Using your mouse a flashlight uncovers a message explaining the need to kill SOPA and a link to anti-SOPA site AmericanCensorship.org.”
On the Street: Do You Understand SOPA? [VIDEO]
One of my blogs was hit today (Happy Halloween) by this new strain of WordPress Blog attacks. The Sucuri Team was able to tackle the infection without issue and has posted some good information on the latest version attacking (at this point) Godaddy servers. Read more below:
“Just a quick update to this blog post: More Attacks – insomniaboldinfocom.com.
We posted a few days ago that attackers were using insomniaboldinfocom.com to spread malware to multiple web sites. Today, they changed domains and are targeting GoDaddy sites usinginsomniaboldinfoorg.com.
The following domains/IP addresses are being used to spread the attack:
All the sites we’ve seen so far have the following code added to all PHP files:
Which is basically just the eval(base64_decode encoded. What is interesting is that this site is hosted at 188.8.131.52, which was used on previous attacks by the “Hilary Kneber” group, so we think they are all related:
The following script should clean up any infected site: http://blog.sucuri.net/2010/05/simple-cleanup-solution-for-latest.html ”
Click this link for more info on Sucuri’s Security Services!
As proclaimed on the equinoxestudios site,
“Evolution (8-Bit Girl) is a collection of love songs to the 8-bit generation, a reminder why we fell in love with all those loading screens, tracker tunes and the demoscene many years ago.
The album contains eight tracks of post modern electronic dance music, recorded using a variety of classic machines and synthesisers including: Commodore 64, Commodore 64C, Commodore Amiga running OctaMED, Nintendo NES, Korg MS-20, Korg Polysix, MicroKORG, Emulator II, iPhone and Fairlight CMI”
With tracks such as “1984” and “ConsciousNES” the album is bound to stimulate our geeky senses. You can stop by and listen to a few tracks at SoundCloud.com to get a feel for what they are all about.
With numerous mentions and reviews from notable online sources (Geek Girls Network wrote a great post to check out) Evolution (8-Bit Girl) has definitely tapped a pulse within the Geek Tribe.
Ok.. so regardless of whether you’re a fan of Katy Perry and her latest tune, “California Girls“, this fine parody from the peeps over at ScreenTeamShow is a must watch. Their team did a great job on the video and it looks like they had a boat-load of fun doing it.
Personally, I like Katy’s song so this parody (“Comic Con Girls“) for all the she-geeks of the world is just icing on the cake!
If you like it.. spread it, share it, pass it on! Girl Geeks rule!
Oh, and tell Angie I sent ya! :0)
Many of you over the past few months have experienced the onslaught of WordPress attacks which has plagued site owners – and loyal fans, alike. I maintain multiple WordPress blogs in addition to our beloved She-geeks.com site, as well as my clients’ WordPress blogs. While refraining from too much detail, I had the unfortunate duty of ridding two such WordPress websites of these WordPress attacks. While both of the blogs I’m referring to maintained updated software (plugins and core files), they still fell victim to these attacks. The attacks I am referring to primarily affected PHP pages, which would mean that A LOT of sites out there on the internet had the potential for infection. The code would essentially insert itself into each PHP page on your site and/or WordPress blog and add strings of code which contained “eval(base64_decode“ in some way, shape or form. This script is generally found at the very top of the page’s code – I assume so it hits first.
I spent hours upon hours working to isolate the issues and hand-remove the malicious code only to have it reappear a week later. I ultimately had to bring on the “big dogs” in WordPress blog security, Sucuri.net. David and the rest of the Sucuri Crew were able to solve all site issues within 30 minutes. It was a beautiful thing. You see, although I managed to remove most of the “malicious eval code” during these attacks myself, there appeared to be a snippet of code eluding my capture. This code, also referred to as a backdoor by many, was hiding in the shadows of unending lines of code. Its really too much code to parse through with the naked eye…nevermind the fact that manual removal like that is likely not the most efficient method when time (and money) is of the essence. What can I say, I was stubborn. Needless to say, the Sucuri Crew was very efficient and truly a life saver on that day.
Below I’ve outlined some of what I found online pertaining to the malicious attacks as well as some portions from my personal experience with the nefarious code.
Some of the malicious strings of code which were present:
“http://holasionweb dot com/oo dot php”
There are a few mentions of solutions you can try but, in the end, the only solution which seemed to work in my case was enlisting Sucuri’s help. However, I’ll list a few better known solutions for this type of WordPress attack:
- completely deleting your WordPress install and reinstalling on your hosting account (note: not fun)
- logging into your hosting provider and accessing an CLEAN archive version of your website. (note: you’d need to know an archived date in which your blog was completely clean and free of the bad code)
- Sucuri offers a free “cleaning” script which you can run yourself and seems to have helped quite a few people resolve their issues
Additional documented information which may prove useful for others is shown below. You may see some similarities. If you’ve collected any additional information or have a similar story to share, we’re all ears.
More information on Sucuri Security:
“Sucuri Security is the leading provider of web-based integrity monitoring and malware detection solutions – delivered as a service. Sucuri solutions are deployed remotely in a matter of minutes anywhere in the world, allowing our customers to immediately detect web-based malware and monitor their internet presence. Sucuri’s web monitoring solution is used today by more than 8,000 sites worldwide. Sucuri was founded in 2008.
In simple terms, we clean up the mess. If your site got hacked, blacklisted or infected with malware, we fix it for you. If your site is clean, we monitor it to let you know if a problem ever happens. We work fast, we are affordable and we get things done.”
Followers gone – don’t panic ;0)
It appears a bug has popped up on Twitter today. Apparently this bug “allows users to make anyone follow them“. I’m sure you can see how this could be a bit of an issue for Twitter and it’s loyal clan. Some of the details on this snafu are: “writing “[tweet] accept [username]” then the [username] immediately starts following you.”
Want to know more, check out some of these sources:
Lets hope those Twitter Follow stats bounce back soon!
4Square Day 2010 is approaching and the buzz around the social networks is really starting to pick up. Interestingly, though, its not just about “social”. This morning I noticed tweet after tweet from local businesses offering discounts and deals for the nationwide 4Square event.
If you surf over to their website, you’ll find a listing of the “Top Participating Cities” such as:
(big props to FL & GIT Tampa! ;P )
There are also currently some “4square swarm parties” scheduled:
There are a few other sources for information such as:
(hashtags: #4SQDay, #4sqday
For more information on the 4Square Day events in your area, visit: http://4sqday.com/
:: swytch ::
Through Mercy Corp, Geeks With Heart has a fundraising goal of $2500 and there is no minimum for donations. If you can spare just one special cup of coffee, an iTunes download, or a crispy chicken sandwich, donate to Haiti instead. Show Haiti why geeks have heart!
As extra incentive, and not that you need any, once Geeks With Heart reaches $2500, all who donated will have the chance to win a prize from an amazing grab bag of geek prizes!
Geeks With Heart: http://www.mercycorps.org/fundraising/geekgirls
Check out the Geeks With Heart Haiti Video !!
01.27.09 by:: swytch
I’m sure many of you have encountered this devlish BSOD (blue screen of death) at least once in your lifetime.
In my line of work, people tend to come to me in utter anguish praying they haven’t lost their files. Most of the time I can get the user up and running again within a short period of time but there are those times…. well, I’ll just re-emphasize the need to BACK UP YOUR DATA. :0)
Here are a few steps which I used to get my laptop back in shape. (steps below reference Windows XP but can be help troubleshooting other operating systems)
Step 1 – Located my Windows XP operating system disk. With my XP disk in the CD-rom drive, I powered up the computer. When prompted, I booted to the CD drive and not the internal hard drive. At that point I began to see XP starting its boot and restore process.
Step 2 – When prompted, select “R” to repair the current XP installation. You will then be brought to the Windows System Repair prompt shown below.
Step 3 – I resolved the situation using both the FIXBOOT and FIXMBR commands.
original photo: http://www.windowsnetworking.com
I ran the FIXBOOT command first, then rebooted the machine to see if it solved the problem. It didn’t so I proceeded with the FIXMBR command and tested again.
Step 4 – I returned to the Windows Recovery Console and ran the chkdsk command with a ” /r ” for recover.
After I completed the steps above, I performed a full shutdown.
I booted the laptop and we were back in action! These are the steps that I took but know that there are many more commands you can use in the Windows Recovery Console.
Check out some of these sources for additional information: