Imprès des de Indymedia Barcelona : https://barcelona.indymedia.org/
Independent Media Center
Notícies :: indymedia : xarxa i llibertat
Diccionari de termes d'Internet: Màquina zombi .
24 gen 2006
Encara que sembli mentida, a Internet també hi ha zombis. I no ens referim als morts vivents que van popularitzar els films de George A. Romero, ni tan sols a aquest home que es fa el mort per guanyar diners, sinó a ordinadors. Són les anomenades màquines zombi, computadores que es dediquen a enviar virus i spam a tort i a dret sense que el seu propietari ho sàpiga. I, atenció, són els responsables de la majoria d’atacs a webs a tot el món. Si experimentes estranyes baixades en la velocitat de navegació, comença a malfiar.

http://www.imdb.com/title/tt0063350/
http://www.deadbodyguy.com/

Convertir els ordinadors en màquines zombi és una de les tècniques preferides pels programadors d’aplicacions víriques i propagadors de correu escombraries. Es tracta de fer servir els ordinadors infectats com a centres d’enviament de les seves aplicacions o de les seves propostes (no sol·licitades, per descomptat) d’allargament de penis, hipoteques o d’inversió en increïbles paradisos fiscals.

Això es fa, evidentment, d’esquenes al propietari de la màquina. Els programadors de virus i spammers saben que hi ha milions d’internautes a tot el món que no disposen d’uns mínims de seguretat en el seu ordinador. Aquest innocent i desprotegit internauta molt sovint no té antivirus; o no el té actualitzat; o disposa d’una versió antiga d’un vell sistema operatiu; o obre correus electrònics amb adjunts executables procedents d’adreces que no coneix. Tot això el fa candidat a ser víctima d’un atac informàtic.

http://www.hispasec.com/unaaldia/2647
http://www.technewsworld.com/story/48174.html


Arma per col·lapsar un web

El que probablement desconeix és que el virus que li ha entrat a l’ordinador, a més de ser una amenaça per a la seva seguretat, pot convertir la màquina en un centre de difusió d’aquest tipus de continguts. En altres paraules, pot convertir la seva computadora en una zombi, que és com s’anomenen les que envien e-mails de forma clandestina, d’esquenes al seu usuari habitual.

El generador d’escombraries informàtiques obté així el control de la màquina de l’usuari, cosa que vol dir que amb un sol clic li pot ordenar que enviï un correu infectat amb un virus, però també que amb la mateixa facilitat pot engegar un atac contra qualsevol web d’Internet.

És el que es coneix com a atac DoS, o Denial of Service (Denegació de Servei), que han patit nombrosos llocs de la Xarxa. Es tracta de col•lapsar un servidor enviant-li més demandes de descàrrega que les que pot gestionar. Posem-ne un exemple: imaginem que el servidor d’un web qualsevol pugui suportar, posem per cas, 10.000 usuaris entrant al mateix temps a la plana principal. Quan se supera aquesta xifra, ve el col·lapse.

http://stats.distributed.net/projects.php?project_id=8
http://www.boincsynergy.com/stats/country.php?project=sah


I com s’aconsegueix que 10.001 persones hi entrin alhora? Doncs controlant-les i donant-li l’ordre d’entrar alhora. Això causarà una penjada del web (a més d’una considerable baixada de la velocitat de navegació de l’usuari), un exemple d’utilització perversa de les possibilitats de treball col·laboratiu que obre Internet, com per exemple el conegut projecte Seti@Home.

http://www.hispasec.com/unaaldia/1444/


Planeta zombi

Els especialistes en seguretat informàtica alerten del fort augment de màquines zombi arreu d’Internet. Segons Hispasec, només en el mes de desembre van ser infectades ni més ni menys que 250.000 màquines arreu del món per alguna aplicació que pretenia obtenir-ne el control.

This work is in the public domain

Comentaris

Hacking del Internet: CIA, Venezuela, Maffia Russo ?
24 gen 2006
Computer y Internet Hacking de CIA, Venezuela, Argentina, Alemania y Maffia Russo ? Links por todo textos en Espaniol, Ingles y Aleman • http://www.petroleumworld.com.ve/cartas090205.htm • http://www.brazzilmag.com/content/view/1419/49/ • http://www.microperforation.com/spanish.html • http://www.microperforation.com/hacking-english.html • http://www.microperforation.com/hacking-german.html • http://www.deguodaguan.com/ipmwg/hacking-english.html • http://www.deguodaguan.com/ipmwg/hacking-german.html • http://www.qsl.net/dk3qv/spanish • http://www.qsl.net/dk3qv/hacking-english • http://www.qsl.net/dk3qv/hacking-german • http://board.protecus.de/t21413 • http://www.informationsarchiv.net/foren/beitrag-33906.html • http://www.trojaner-board.de/showthread.php?t=25633 • http://www.computerbase.de/forum/archive/index.php/f-41-p-29.html 100 links mas por foros en Latin, Sur America, Espania, Tailandia, Malaysia, Chino en final del pagina. Estimadas señoras, estimados señores, Por medio de la presente me dirijo a ustedes como medio de comunicación nacional en Venezuela y en Alemania, con el fin de que según mi punto de vista se transmita y publique información importante al público internacional que se refieren al Sr. Ali Rodriguez-Araque y su vida familiar, y que me afectan directa y personalmente. Texto en espaniola y ingles ............... de links. Yo he trabajado muy bien con numerosos abogados y procuradores de patentes en Alemania, los EE., UU. y en China, pero nunca antes había estado frente a esta manera tan atroz y tal desfachatez de trabajar. Naturalmente que esto regresará y repercutirá con toda la fuerza en contra de aquellos que lo causaron. Les agradezco cordialmente de antemano. Atentamente, Werner Grosse ---------------------------------------------------------------------------------------------------------------------------------------------------------------- Dear Madame and Sirs, We inform you in the international matter of China, Thailand, Malaysia, USA, Germany, Venezuela, Argentina and other countries because persists computer hackings since August 2005. Here the summary of hacker attacks to our computer systems: • Trojan threats during web server operation of http://www.microperforation.com and http://www.qsl.net/dk3qv. • Continuously hackings of our computer systems since August 2005 including in Germany from 28.11. to 8.12.2005 and as well in China, KL in Malaysia and Thailand. • Transfer and using of spy, remote control (firewall avoiding with direct data accesses to the ports) and other dirty programs as like: rpcaps.exe (http://winpcap.polito.it), extreme Trojan horse, RASmin Trojan horse, Black Trojan horse, Trojan Generic, Passwort Cracker, Password Finder 2.1, Bulla, Banzi Buddy, Link Grabber 99, Backdoor.Delf.is, Fake CD 99, System Spy, Lamers Death, Mid Addle, Zilla Bar, Bargain Buddy, Zango Search assistant.etc. in our computer systems. • Since 6-1-2006 they are looking still for the TELNET.EXE program which is a part of Windows-XP and eliminate from us. • Spying of passwords for our own domains and other international servers. • Tricky Active-X, Scripts, Applets for Winword, Outlook, Routing call up`s etc. • Control of Emails; we communicate in five different languages as like German, English, Spanish, Thai, Mandarin. • Sending ICMP packages bigger then 64 KB to block the IE6 or shut down operation systems. • Kick-off call-up`s of our domain on searching machines as Google and Yahoo. We apply our websites in hundred other searching machines with a focus in Asia. • Returns or refuses of solicited and business Emails with stupid comments by Yahoo and AOL. • LAN networks where getting off by hacking during my business time in China and Malaysia that other computer systems are not able to operate. • The hacker specialists and institutions are fit in MS, Windows-XP programming and as well in Networking. Some users are not stupid and can using their own IT recourses and knowledge. Since 6th January 2006 our computer systems are fully hacker attack protected, all in and our coming data streams are separate recorded, all logs monitored and several investigations are in operation to setup international lawsuits and a wide range of publications. In other words the hacking persons and institutions can read there dirty results in hundred of international forums, online media, magazines and newspapers from China, Malaysia, Thailand, Europe and as well in Spanish from Cuba down to Chile. The truth of invalid entrees in international documents of a political VIP person from Venezuela are not nice and pleasure to publish. But that fact gives nobody the rights for that filthy computer hacking and damages which appears everywhere I go. About myself: I working for the cigarette industry over the past 25 years, as entrepreneur since 1992, cooperating with big companies more then 10 years in China where the Yunann Government get me the Caiyun Award as foreign expert for technology transfer and good business cooperation. Below some direct links which committed my own international reputation. • http://www.mircroperforation.com/engpublication.htm • http://www.microperforation.com/germannews.html • http://www.microperforation.com/engpublication.htm • http://www.qsl.net/DK3QV/Internet-search This matter is NOT funny because our damage value coming up to USD 27,000.00 and furthermore five Chinese IT specialists are still busy with that matter since October 2005. Nobody can imagine a situation with permanent computer hackings, new Windows-XP installing, data storages, necessary daily Email exchanging to keep the business running for all that bullshit what they doing with. The investigation and IT support with our Chinese friends is very successful to analyse the hacking systematic, their program impacts, protections, IP address and network using from certain persons and institutions which includes the E-PLANNING.NET in Argentina (see Firewall log events) what hit their well reputation. In other words: now we have the solid evidence, detail information and knowledge of the persons, institutions and their hacking systematic – who hacking us and has the fully responsibility for all impacts, further actions and forced publications: the CIA, Venezuela, Germany, Argentina or Russia ? – to setup international legal actions. But it`s well known that legal actions and suing procedures for that kind of international IT manners are quiet difficult and on the end not very successful. If the hacking procedures going continuously ahead or not – what they will obtain and know more from us ? – the world-wide publishing with delicate details going supported ahead. Only that way works in the international community: who wants to control and specified who is good and wrong in which cases. But contacting and communication with the target persons are equal zero. Thanks for your attention. Kind regards, Werner Grosse ---------------------------------------------------------------------------------------------------------------------------------------------------------------- By website visits of Latin, South American newspapers, magazines and forums of Venezuela and Argentina as well for any Internet connection with our computer systems certain persons and IT institutions hacking, penetrate our and other LAN/PC systems in Germany, Thailand, Malaysia and China continuously. Thousands of these dirty events as few examples are listed on the below IP data table. The persist hacking attacks began in 08-2005 and going still ahead which includes former transfer, lock`s in, embedding and using of spy, snoop, key logger, remote control programs for Email exchanges, browser activities and as well Trojan threats during web services. Since 6-1-2006 our computer systems are fully cleaned and protect against all their attacks. It confirms that certain persons and institutions have an immense interest to blocking information publishing, based of opinion freedoms, real facts in order of international law and rules. We do not send messages without any identification, no spam, no unsolicited Emails, no untrue information, no personal insults, all texts are documented with evidences, no international political promotions, no political or social registered propaganda, no rubbish texts, no data abuse, no other promotions or banner, non virus infected Mails, etc. We as a honest company and my selves with a well reputation and honorary in China informing all the time there net operators and others that they could contact us in a normal and professional way by Email, phone or fax, to request what they really want from us. They hacking our and other computer systems how and when the want – try it NOW - kick us off by Yahoo, AOL and Google and talking about a Internet community. We DO NOT accept that condition further, finished the large investigation of all IP and Firewall logs, data etc. with Chinese IT specialists, have NOW the SOLID evidences and know the persons, institutions, locations and their background, international legal actions are being filed and a wide range of qualified publications are in operation. The data abuse and IT departments of the Chinese, Malaysian, Thai and German Government are already involved in that dirty subject to request what going on and who has the fully responsibility for that underground manner. ------------------------------------------------------------------------------------------------------------------ Examples of firewall recorded IP addresses - thousands with the same IP-Address • 2005/10/14 - 17:56:07 - 66.35.229.209 - Ping – IPNOC • 2005/10/17 - 12:16:44 - 66.35.229.209 - IPNOC • 2005/10/18 - 18:26:04 - 66.151.244.126 - 122.2o7.net • 2005/10/19 - 17:39:47 - 70.84.143.147 - us.img.E-PLANNING.NET – Dallas - TX – USA 100 times • 2005/10/22 - 17:56:31 - 213.244.183.210 – Amsterdam – NL – Broomfied CL - USA • 2005/11/04 - 12:04:31 - 213.244.183.210 - Ping – from Amsterdam – NL • 2005/11/08 - 10:53:19 - 213.244.183.210 - Ping – from Amsterdam – NL • 2005-12-25 - 10:49:43 - 203.147.0.2 (3) – blocked – via Nonthaburi com. centre in Thailand • 2005-12-27 - 18:37:47 - ns.ji-net.com - 203.147.0.3 – Thailand - fully blocked • 2005-12-31 - 18:41:02 - www.ripe.net - 193.0.0.214 • 217.72.200.153 – img.web.de – divert from web.de – via Milton - Australien • 203.147.56.231 ( 232 ) – eur.a1.yimg.com - us.i1. – Amsterdam – NL • 62.26.220.2 – as1.falk.de – Moers - Germany • 203.147.0.2 ( 03 ) ( 48 ) – ns.ji-net.com – via Nonthaburi – com. centre in Thailand • 224.0.02 – ji-net.com - Thailand • 62.26.121.2 – red.as1.falkag.de – Ratingen - Germany • 217.73.179.5 – Frankfurt/Oder – Germany • 194.6.208.100 – Amsterdam – NL • 213.83.55.1 – Amsterdam – NL • 193.0.0.214 – Amsterdam – NL – system access • 85.42.124.220 – Marine Del Ray CA – USA • 70.84.143.160 – ads.us.e-planning.net – divert from E-PLANNING.NET – server in US • 206.204.32.26 – Santa Clara – CA – USA • 68.86.119.34 – New York – USA - 30 times Firewall blockings • 169.254.146.146 – Marina del Ray – CA – USA - FTP blocking – Trojaner threat at 25-12-2005 • 224.0.0.2 - 8-1-2006 as MCAST.net – Multicast Backbones, MBone, addresses etc. • 195.227.96.178 – 8-1-2006 - 17.59 - backdoor routing – Koeln – Germany • 213.55.94.55 – 8-1-2006 - divert to Amsterdam – NL • 192.168.0.64 and 192.168.0.7 – since 14-1-2006 – private IP addresses ? All details as followed during hacking as others to find by Internet.
Mira també:
http://www.microperforation.com/hacking/english.html
http://www.microperforation.com/spanish.html
Seguridad - hacking - sabotaje - Venezuela ?
04 abr 2006
suroriental aquí la izquierda substancial :

http://www.dk3qv.de/spanish.html

http://www.dk3qv.de/hacking-english.html

http://dk3qv.de/internet-log-1.html

http://www.opendemocracy.net/forums/thread.jspa?

forumID=87&threadID=46305&start=30&tstart=0
http://groups.google.de/group/soc.culture.chile/browse_thread/thread/261

Seguridad – hacking - el sabotaje - VIP`s - Venezuela de maneras típicamente alemanas es mis observaciones detalladas a la tajada del Internet de la computadora y a los blockings útiles de la comunicación en diversos foros como molino que hace girar, la ilusión de Trollerei y de la búsqueda y o la lata de la basura cambiada de puesto, despedido.

De causa actual traigo esencialmente haber justificado, para impermeabilizar asunto prominente otra vez en memoria.

Estamos en diverso respeto avanzado bien e igualmente nos manifestamos en el cual los finches de la suciedad (naturalmente fuera de Venezuela) de los mismos motivos de tratar directo de VIP`s, político no publicaciones del genehmer y expresión libre de la opinión - documentos internacionales y los hechos apropiados de la verdad - y sobre Venezuela que el hacker substancial ataca también para que otros hombres del compañero lancen y esto sucederá también en el futuro.

Hacemos de todos modos mucho para documentar y para evaluar para prevenir esto en el futuro para derramar la información cualificada lo más lejos posible preventivo los ataques siguientes con irse grande contra el reloj y cada pico a nuestro cortafuego.

El hecho de que las autoridades del gobierno están implicadas en China, Malasia, Tailandia y el Alemania en la cosa y emplean sus propias investigaciones con siempre posteriormente entregados datos es ya varias veces mencionadas y publicadas.

Lea el artículo y mire ustedes mismos usted los cuadros impresionantes bajo fondo boliviano del periodista canadiense, con las experiencias absolutamente idénticas del hacker y del sabotaje:

http://www.vheadline.com/readnews.asp?id=47155

http://www.williambowles.info/venezuela/2005/raging_bull.html

se entiende alguna vez, a que aquí realmente se refiere.
Sindicato Sindicat