December 18, 2007

Tip #2150 – Letter Case Mania

Letter Case Mania

Ever find that you're constantly trying to change the capitalization of words or sentences? What do you do?

Maybe you highlight the word or phrase and retype it.

Maybe you're the type who only replaces the individual letters that need to be changed. What a headache!

Are you the person who found the Change Case feature on the Format menu? You know, where you get the choices of sentence case, all lowercase letters, all uppercase letters, all title case letters or to toggle all letters between upper and lowercase.

What I have for you today are a few shortcuts for all of this change case stuff. It's something even faster than the Change Case choice on the Format menu.

Let's start with the most versatile choice.

Once you highlight the text to change, use Shift + F3. You'll scroll between sentence case letters, all lowercase letters and all uppercase letters.

That's good! Looks great, but what if you know you want all caps and don't cialis review feel like toggling through your choices?

Is there a quicker way?

Yep, you bet. (Isn't that why I brought it up in the first place)?

If you know you want your text all caps, simply try Ctrl + Shift + A.

And… if that weren't enough, there's another option altogether. You can use small caps. That is all the letters in capital letter formation, but slightly smaller than the usual capital letter.

Ctrl + Shift + K will put you straight to small caps, which is a good "attention getter" without completely shouting at the reader.

That's it! Three keys and you're on your way to the formatting you need.

Permalink • Print • Comment

Tip #1153 – MS Excel Text Into Columns

MS Excel Text Into Columns

Have you ever found yourself wondering what in the world possessed the person who created your MS Excel file to put both first and last name in the same cell?

Now how are you supposed to sort that list alphabetically by last name when first name is listed first?

The answer is that you can't—you have to separate the first and last names—somehow…

But how?

You could spend your time retyping the last name into the next column. It works but it's not a great plan since it could take "forever" if your list is really long.

Or… maybe you have other text / data that really should be separated into different cells for easy sorting and editing.

Would you like a fast way to separate the data? (This works best with data that's pretty consistent and not too complicated.)

Most of us would say "yes". (Even if you don't have an immediate use for this one, it's one of those handy little pieces of information that may just get you out of a jam one day. 🙂

So let's get to that faster way…

The first thing you'll need to do is to highlight the data that needs to be separated.

Now go to the Data menu, Text into Columns choice.

A 3-step wizard will start to guide you through the process.

On step 1 check at the top that the data will be delimited.

Then click Next.

In step 2 you need to check the Space option in the Delimiters section. (Make sure all other choices are unchecked.) Basically what you're doing here is telling Excel what character separates your pieces of data—so that when it find a space it knows to stick the next piece of text in a new column.

Did you notice the preview of your data in the bottom window? See how the names are now divided into different columns?

cialis rebate

Click Next.

Step 3 will allow you to do some formatting and placement of your data—but for now, as beginners, just click the Finish button.

Poof!

Just like magic your first and last names are in two separate columns, ready to sort – no retyping necessary.

(Ok—maybe not magic but, if your list was long, you'll feel like it was when you realize how much time you just saved.)

Permalink • Print • Comment

Cracking open the cybercrime economy

By Tom Espiner, ZDNet (UK)
Published on ZDNet News: Dec 14, 2007

"Over the years, the criminal elements, the ones who are making money, making millions out of all this online crime, are just getting stronger and stronger. I don't think we are really winning this war."

As director of antivirus research for F-Secure, you might expect Mikko Hypponen to overplay the seriousness of the situation. But according to the Finnish company, during 2007 the number of samples of malicious code on its database doubled, having taken 20 years to reach the size it was at the beginning of this year.

There seems to be some serious evidence then for the idea of an evolution from hacking and virus writing for fun to creating malicious code for profit. Security experts are increasingly pointing to the existence of a "black" or "shadow" cybereconomy, where malware services are sold online using the same kinds of development methods and guarantees given by legitimate software vendors.

It is difficult to establish exactly how organized this malware economy is but, according to David Marcus, security research manager at McAfee Avert Labs, it's relatively straightforward to buy not only the modules to build malware, but also the support services that go with it.

"If it weren't for Storm, bots would be in significant recession. Some days we're seeing 1,000 different variants a day."

–David Marcus, security research manager, McAfee Avert Labs

"From Trojan creation sites out of Germany and the Eastern bloc, you can purchase kits and support for malware in yearly contracts," said Marcus. "They present themselves as a cottage industry which sells tools or creation kits. It's hard to tell if it's a conspiracy or a bunch of autonomous individuals who are good at covering their tracks."

As well as kits and support, legions of compromised computers, or botnets, can be hired for nefarious purposes–usually for spam runs, or to perpetrate denial-of-service attacks. One of the most successful botnets of 2007 has been "Storm," so-called due to the hook-line used to trick victims into opening e-mails containing the Trojan horse. In January, the first malware was sent out with the tagline "230 dead as storm batters Europe."

The Storm botnet, estimated now to contain millions of compromised computers, has advanced defenses. The servers that control the botnet use so-called fast-flux Domain Name System (DNS) techniques to constantly change their location and names, making them difficult to locate and shut down. And security researchers who have attempted to find the command and control servers have suffered denial-of-service attacks launched by the controllers of the botnet.

"Storm has been exceptionally successful," said McAfee's Marcus. "It's used for spam runs, and researchers attempting to locate Storm command and control servers have come under attack. The hardest part is finding the key to those channels. They're not always easy to detect and find. Some of the communications are encrypted, while some are difficult to detect from a network point of view. I hate to use the word evolution, but they're certainly learning from their successes and failures. If it weren't for Storm, bots would be in significant recession. Some days we're seeing 1,000 different variants a day."

Weathering the Storm
Joe Telafici, director of operations at McAfee's Avert Labs, said Storm is continuing to evolve. "We've seen periodic activity from Storm indicating that it is still actively being maintained. They have actually ripped out core pieces of functionality to modify the obfuscation mechanisms that weren't working any more. Most people keep changing the wrapper until it gets by (security software)–these guys changed the functionality."

In the past year, the development of illegal malware has reached the point where it is almost as sophisticated as the traditional software-development and sales channel, according to Telafici.

"We've seen platform development, middleware, solutions sellers and hosting–all types of software and companies, with the same level of breakdown," said Telafici.

One indication of the maturity of the black economy, according to Telafici, was the recent case of a hacker who wrote a packer (software used to bypass antivirus protection) and who "threw in the towel recently as it wasn't profitable enough–there's too much competition. They opened the source code and walked away."

Security vendors seem to be powerless to take any action against the groups in control of botnet networks, especially those who use fast-flux techniques to move the location of command and control servers.

"With botnets, we are unlikely to make a dent unless we find the guy who controls the command and control server," said Telafici.

While law-enforcement agencies have a headstart in tracking cybercriminals, due to their experience of dealing with economic crimes such as fraud, many of the crimes are seemingly small, not warranting police attention.

"The majority of cybercriminals are small players for small dollars and short bursts of traffic," said Telafici. "On the flip side, you see the amount of effort and money spent protecting spam relays (as in Storm). If (security researchers) aren't careful they get DDoS-ed"–that is, hit by a distributed denial-of-service attack–"by a chunk of the spam network. That the guys are protecting their turf indicates that in aggregate the amount of money that is changing hands is significant."

Game theory, a branch of applied mathematics that models how adversaries maximize their gains through adapting to each other's strategies, features heavily in security assessments of the black economy. As one player becomes stronger, the other increases its efforts to gain the upper hand.

"I view it as we're locked in a Darwinian power struggle," said Telafici. "As we up the ante, the black economy adjusts to that, and it in turn ups the ante."

Anatomy of the 2007 black economy
Raimund Genes, chief technology officer of anti-malware for security company Trend Micro, said that malicious software via the affiliate model–in which someone pays others to infect users with spyware and Trojans–has become more prevalent in 2007.

The affiliate model was pioneered by the iframedollars.biz site in 2005, which paid Webmasters 6 cents per infected site. Since then, this has been extended to a "vast number of adware affiliates," said Genes. For example, one adware supplier pays 30 cents for each install in the U.S., 20 cents in Canada, 10 cents in the U.K., and 1 or 2 cents elsewhere.

"You wonder why anyone still bothers burgling houses when this is so much easier."

–Raimund Genes, CTO of anti-malware, Trend Micro

Hackers also piggyback malicious software on legitimate software. According to Trend Micro, versions of coolwebsearch co-install a mail zombie and a keystroke logger, while some peer-to-peer and file-sharing applications come with bundled adware and spyware.

While standard commercial software vendors sell software as a service, malicious-software vendors sell malware as a service, which is advertised and distributed like standard software. Communicating via Internet relay chat (IRC) and forums, hackers advertise Iframe exploits, pop-unders, click fraud, posting and spam. "If you don't have it, you can rent it here," boasts cialis reactions one post, which also offers online video tutorials. Prices for services vary by as much as 100 percent to 200 percent across sites, while prices for non-Russian sites are often higher: "If you want the discount rate, buy via Russian sites," said Genes.

In March the price quoted on malware sites for the Gozi Trojan, which steals data and sends it to hackers in an encrypted form, was between $1,000 and $2,000 for the basic version. Buyers could purchase add-on services at varying prices starting at $20.

In the 2007 black economy, everything can be outsourced, according to Trend Micro. A scammer can buy hosts for a phishing site, buy spam services to lure victims, buy drops to send the money to, and pay a cashier to cash out the accounts. "You wonder why anyone still bothers burgling houses when this is so much easier," said Genes.

Antidetection vendors sell services to malicious-software and botnet vendors, who sell stolen credit card data to middlemen. Those middlemen then sell that information to fraudsters who deal in stolen credit card data and pay a premium for verifiably active accounts. "The money seems to be in the middlemen," said Genes.

One example of this is the Gozi Trojan. According to reports, the malware was available this summer as a service from iFrameBiz and stat482.com, who bought the Trojan from the HangUp team, a group of Russian hackers. The Trojan server was managed by 76service.com, and hosted by the Russian Business Network, which security vendors allege offered "bullet-proof" hosting for phishing sites and other illicit operations.

According to Trend Micro, there are many independent malicious-software developers selling their wares online. Private releases can be tailored to individual clients, while vendors offer support services, often bundling antidetection. For example, the private edition of Hav-rat version 1.2, a Trojan written by hacker Havalito, is advertised as being completely undetectable by antivirus companies. If it does get detected then it will be replaced with a new copy that again is supposedly undetectable.

Hackers can buy denial-of-service attacks for $100 per day, while spammers can buy CDs with harvested e-mail addresses. Spammers can also send mail via spam brokers, handled via online forums such as specialham.com and spamforum.biz. In this environment, $1 buys 1,000 to 5,000 credits, while $1,000 buys 10,000 compromised PCs. Credit is deducted when the spam is accepted by the target mail server. The brokers handle spam distribution via open proxies, relays and compromised PCs, while the sending is usually done from the client's PC using broker-provided software and control information.

"This is a completely standard commercial business. The spammers even have their own trade associations."

–Raimund Genes, CTO of anti-malware, Trend Micro

"This is a completely standard commercial business," said Genes. "The spammers even have their own trade associations."

Ready-made tools for creating phishing e-mails, such as fake requests for bank details, are fairly easy to buy, with many independent vendors selling them. Bulletproof hosting is also easily available, while phishers engage spam services to lure users to their sites.

Carders, who mainly deal in stolen credit card details, openly publish prices, or engage in private negotiations to decide the price, with some sources giving bulk discounts for larger purchases. The rate for credit card details is approximately $1 for all the details down to the Card Verification Value (CVV); $10 for details with CVV linked to a Social Security number; and $50 for a full bank account.

Scammers use a variety of ways to launder cash. Compromised bank accounts can be used to launder funds, or struggling companies can be bribed to turn the money into ready cash. Scammers can find businesses with a debt of $10,000, and agree to pay them $20,000 if they agree to cash out 50 percent of the funds. Dedicated cashiers, also known as "money mules," can also take up to 50 percent of the funds to move the money via transfer services.

Money can also be laundered by buying and selling merchandise on the wider black market. Shipper rings can ship PCs to scammers via intermediaries, which can then be resold.

Cost to legitimate business
As the malicious-software economy grows in sophistication, so do the losses sustained by legitimate businesses. According to the 2007 Computer Security Institute computer crime and security survey, these losses have seen a sharp increase this year.

Robert Richardson, director of the CSI, said the average annual loss among U.S. businesses due to cybercrime has shot up to $350,424, from $168,000 in 2006. "Not since the 2004 report have average losses been this high," said Richardson.

This year's survey results are based on the responses of 494 computer security practitioners in U.S. corporations, government agencies, financial institutions, medical institutions, and universities.

Almost one-fifth of those respondents who suffered one or more kinds of security incidents said they had suffered a targeted attack aimed exclusively at their organization, or organizations within a small subset. Khalid Kark, a principal security analyst at Forrester, said targeted attacks against companies and institutions are becoming more common.

"As banks and companies have increased security levels, the hacker community is casting a much wider net," said Khalid. "Instead of hacking into something right away, now it's low and slow. They're determining attack avenues, taking their sweet time to find holes, and then using stealth (to steal data)."

Financial services companies are being attacked more and more, said the analyst, while the attacks are increasing in number and complexity.

But while the black cybereconomy is maturing, at the moment its main practitioners seem to be individuals or small groups acting within a loose web of affiliations that can be quickly established and broken to evade detection.

F-Secure's Hypponen blames a lack of international co-operation and political and social problems for the current situation. "In many cases these are people with skills but without opportunities," said Hypponen. "What if you are born with IT skills in rural China, or in the middle of Siberia? There is no legal way of making use of the skills they have."

While law enforcement co-operation with government and the IT community is paramount in addressing the problem in the short term, longer-term solutions must be found. One way to address the issue of the growth of the "black cybereconomy" in the long term is to harness the IT talent in developing countries that otherwise might be co-opted into illegal activity, say security experts.

"We have to make it more attractive to be in the white economy than in the black–when that happens we will turn a corner. We're starting to see that happen as companies look to less expensive economies as places to put people. In Eastern Europe and Asia there are highly skilled people where there are less opportunities–this is where the black economy is fueled now," said McAfee's Telafici.

Tom Espiner of ZDNet UK reported from London.

Permalink • Print • Comment

Is the boom in kiddie porn a Net effect or is ‘victimless’ behavior unduly punished?

December 17th, 2007

Posted by Richard Koman

The Internet was one termed a “cult machine” and that may appear to be the case with child pornography. It was almost snuffed out in the domain of mail order and adult book shops but with the Internet it is a huge, sprawling blight on society, seemingly ever-growing. According to the Washington Post:

The National Center for Missing and Exploited Children’s CyberTipline received about 4,500 reports of children being victimized it its first year, 1998. This year the center, which works closely with law enforcement officials, has collected nearly 100,000 reports, more than 75 percent for online child pornography.

Child Porn site from TV News

And it’s not just sheer numbers but also the extremity, the severity of the imagery.

“You can’t wrap your brain around what we’re talking about here,” said Bonnie S. Greenberg, a prosecutor in the U.S. attorney’s office in Maryland. “We’re not talking about a 16-year-old who looks like she could be 19. We’re seeing prepubescent children who are being raped, babies, toddlers being tied up.”

It’s not just that the Internet has fed an appetite for child pornography; it’s also that the images have become a larger and larger focus for law enforcement. And some are questioning whether consumption of images without action — or even proof that viewing kiddie porn leads people to child abuse should even be a crime.

“Sending people to prison for five or 10 or 15 years for looking at pictures is killing an ant with a sledgehammer,” said Peter Greenspun, who defended Charles Rust-Tierney, the former ACLU head sentenced to seven years in prison for downloading hundreds of images. “These people are being put on sex-offender registries, they are being ostracized from the community, for looking at pictures.”

Just what is the connection? The Postal Inspection Service found only a third of people convicted of kidde porn charges had also committed child abuse. But a much smaller study of inmates in North Carolina found 85% overlap between the two groups.

“There are a large group of individuals whose lives and families are absolutely being devastated because they looked at these images,” said Fred Berlin, a psychiatrist who runs the National Institute for the Study, cialis purchase Prevention and Treatment of Sexual Trauma, affiliated with Johns Hopkins University. “They had absolutely no idea how severe the consequences would be and had no interest in doing anything other than viewing images.” (emphasis added)

I am really split on this: I think kiddie porn is NOT victimless, because children clearly have been victimized and the thought of people stroking to images of kids, knowing they’ve been victimized and not caring, is upsetting. On the other hand, the involvement of the person being prosecuted is really indirect and the consequences are so harsh. Isn’t this a case of people being punished for “thinking bad thoughts”? With law enforcement focused on child porn, there might be an allure-of-forbidden-fruit going on, too. Finally, I’m not sure that the prosecutions are drying up the market; perhaps resources are better spent nailing the people who actually are harming the kids, rather than the demand-side?

There’s a net addiction aspect here, too. There’s no way that guy would have collected 1.5 million images in the offline world: the Net makes it possible to just keep going and going. But the mental health world ignores the syndrome and addictive behavior goes untreated, kids continue to be victimized and relatively harmless offenders are harshly punished.

Permalink • Print • Comment

Microsoft to relax XP activation rules with SP3

December 16th, 2007

Posted by Ed Bott

17-Dec 9:00AM PST: Post updated with more details about behavior after grace period expires. 

Last week Microsoft released a whitepaper outlining the changes in Windows XP Service Pack 3, which was just released for MSDN and TechNet subscribers and should be ready for final release in the first half of 2008. The introduction is low-key:

Windows XP Service Pack 3 (SP3) includes all previously released updates for the operating system. This update also includes a small number of new functionalities, which do not significantly change customers’ experience with the operating system. This white paper summarizes what is new in Windows XP SP3.

Sounds innocuous enough, right?

But the very last item in the “New and Enhanced Functionality” section, buried in a box on page 9 of the 11-page PDF document, represents a pretty dramatic change:

As in Windows Server 2003 SP2 and Windows Vista, users can now complete operating cialis professional vs cialis system installation without providing a product key during a full, integrated installation of Windows XP SP3. The operating system will prompt the user for a product key later as part of Genuine Advantage. As with previous service packs, no product key is requested or required when installing Windows XP SP3 using the update package available through Microsoft Update.

This change allows you to install Windows XP with Service Pack 3 on any PC without entering a product key and use it in trial mode until the 30-day activation grace period expires. That’s the same way that Windows Vista and Windows Server 2003 now work. After the 30 days are up, you’ll have to enter a valid product key and activate the system before you can log on (see the end of this post for more details). put up with some nagging, but you should be able to continue using the system. By contrast, you can’t even complete an installation of current XP builds (SP2 and earlier) without entering a product key that at least looks valid.

The biggest caveat is that this change requires XP installation media that incorporate a “slipstreamed” copy of SP3. The MSDN downloads directory contains only a standalone updater (in .exe format) for the SP3 RC. Fortunately, the well-publicized hacks widely used to create slipstreamed XP SP2 media work just as well for SP3.

I’ve just made one of those slipstream disks and used it to install a clean copy of Windows XP Professional. During the portion of setup where I normally am asked to enter a product key, I see this dialog box instead:

xp_sp3_product_key_dialog.jpg

A closer look reveals that the text reflects the same wording as that found in its Vista counterpart, with the product key listed as “optional.” I’ve highlighted the relevant text below:

New wording in the Windows XP SP3 dialog box confirms that entering a product key is now optional during setup.

And sure enough, when I left the box blank and continued with Setup, I was given this one final warning:

If you choose not to enter a product key, you can use XP for 30 days without activating it

Once you’re past that, it’s (relatively) smooth sailing. At first boot, a taskbar notification reminded me I had 30 days to activate Windows. Ignoring the message allowed me to continue.

Combine this news with the recent announcement of major changes to activation and validation in Vista’s forthcoming SP1, and it appears that Microsoft has decided to dial back on WGA across the board. I’ll monitor this installation over the next 30 days and see what happens as the end of the grace period approaches.

Update: I simulated the expiration of the 30-day grace period by resetting the clock on my test system and diabling Internet time sync. At the end of the grace period, the Welcome screen displays this dialog box over the list of user names:

You’re forced to activate XP SP3 when the grace period expires

If you click No, you’re returned to to the logon screen. Click yes and you go to a desktop where your only option is to enter a product key. If you click Remind Me Later in that box, you’ll also be sent back to the logon screen. And unlike Windows Vista, there’s apparently no rearm option to extend the grace period by an additional 30 days.

It’s worth noting that this option applies only to systems that have never been activated. After the initial activation completes, any WGA failure results in notifications, without affecting the ability to log on or use the system.

Permalink • Print • Comment
Next Page »
Made with WordPress and the Semiologic theme and CMS • Sky Gold skin by Denis de Bernardy