Announcement

Collapse

Forum Rules (Everyone Must Read!!!)

1] What you CAN NOT post.

You agree, through your use of this service, that you will not use this forum to post any material which is:
- abusive
- vulgar
- hateful
- harassing
- personal attacks
- obscene

You also may not:
- post images that are too large (max is 500*500px)
- post any copyrighted material unless the copyright is owned by you or cited properly.
- post in UPPER CASE, which is considered yelling
- post messages which insult the Armenians, Armenian culture, traditions, etc
- post racist or other intentionally insensitive material that insults or attacks another culture (including Turks)

The Ankap thread is excluded from the strict rules because that place is more relaxed and you can vent and engage in light insults and humor. Notice it's not a blank ticket, but just a place to vent. If you go into the Ankap thread, you enter at your own risk of being clowned on.
What you PROBABLY SHOULD NOT post...
Do not post information that you will regret putting out in public. This site comes up on Google, is cached, and all of that, so be aware of that as you post. Do not ask the staff to go through and delete things that you regret making available on the web for all to see because we will not do it. Think before you post!


2] Use descriptive subject lines & research your post. This means use the SEARCH.

This reduces the chances of double-posting and it also makes it easier for people to see what they do/don't want to read. Using the search function will identify existing threads on the topic so we do not have multiple threads on the same topic.

3] Keep the focus.

Each forum has a focus on a certain topic. Questions outside the scope of a certain forum will either be moved to the appropriate forum, closed, or simply be deleted. Please post your topic in the most appropriate forum. Users that keep doing this will be warned, then banned.

4] Behave as you would in a public location.

This forum is no different than a public place. Behave yourself and act like a decent human being (i.e. be respectful). If you're unable to do so, you're not welcome here and will be made to leave.

5] Respect the authority of moderators/admins.

Public discussions of moderator/admin actions are not allowed on the forum. It is also prohibited to protest moderator actions in titles, avatars, and signatures. If you don't like something that a moderator did, PM or email the moderator and try your best to resolve the problem or difference in private.

6] Promotion of sites or products is not permitted.

Advertisements are not allowed in this venue. No blatant advertising or solicitations of or for business is prohibited.
This includes, but not limited to, personal resumes and links to products or
services with which the poster is affiliated, whether or not a fee is charged
for the product or service. Spamming, in which a user posts the same message repeatedly, is also prohibited.

7] We retain the right to remove any posts and/or Members for any reason, without prior notice.


- PLEASE READ -

Members are welcome to read posts and though we encourage your active participation in the forum, it is not required. If you do participate by posting, however, we expect that on the whole you contribute something to the forum. This means that the bulk of your posts should not be in "fun" threads (e.g. Ankap, Keep & Kill, This or That, etc.). Further, while occasionally it is appropriate to simply voice your agreement or approval, not all of your posts should be of this variety: "LOL Member213!" "I agree."
If it is evident that a member is simply posting for the sake of posting, they will be removed.


8] These Rules & Guidelines may be amended at any time. (last update September 17, 2009)

If you believe an individual is repeatedly breaking the rules, please report to admin/moderator.
See more
See less

Ankap - Angry at the Mayans for a false prediction? POST YOUR GRIEVANCES HERE!

Collapse
This is a sticky topic.
X
X
 
  • Filter
  • Time
  • Show
Clear All
new posts

  • Originally posted by karoaper
    I don't think I've ever been to an island period. My friend's wedding is in Hawaii next march so I might go. Good thing about Hawaii is that it's in US so I don't need a visa.
    Well, I am sure you'll enjoy Hawaii, which island is the wedding on? If you get time, make sure you visit other islands too

    Visas are not hard to get, don't most countries just stamp it in as you enter?

    Comment


    • Doogie Howser, M.D. was the first blogger.
      The test of a first-rate intelligence is the ability to hold two opposing ideas in mind at the same time and still retain the ability to function. -- F. Scott Fitzgerald

      Comment


      • Why do so many people think provocating is a word?
        The test of a first-rate intelligence is the ability to hold two opposing ideas in mind at the same time and still retain the ability to function. -- F. Scott Fitzgerald

        Comment


        • Originally posted by ckBejug
          Why do so many people think provocating is a word?
          People are stupid and say stupid things and don't want to learn irregardless of what is and is not correct.

          Comment


          • Originally posted by Crissy
            Well, I am sure you'll enjoy Hawaii, which island is the wedding on? If you get time, make sure you visit other islands too

            Visas are not hard to get, don't most countries just stamp it in as you enter?
            I ment I don't have a US visa, so coming back would be a potential nightmare.

            Comment


            • Originally posted by karoaper
              I ment I don't have a US visa, so coming back would be a potential nightmare.
              Ok, you mean green card/citizenship?? Do you guys have Immigration Detention Centres there too?

              Comment


              • What a lame day.
                Achkerov kute.

                Comment


                • Originally posted by Anonymouse
                  What a lame day.
                  I know, right?

                  Comment


                  • Kaaaanye!

                    Comment


                    • Security experts unveil defense against phishing

                      BY DAVID ORENSTEIN

                      It's an online con that is growing fast and stealing tens of millions of dollars. An e-mail seemingly from a financial institution instructs you to log on to a legitimate-looking website. Such "phishing" attacks exploit a universal weakness in online security: passwords.

                      "Phishing attacks fool users into sending their passwords, in the clear, to an unintended website," says Dan Boneh, an associate professor of computer science and electrical engineering. "Since Internet users often use the same password at many websites, a phishing attack on one site will expose their passwords at many other sites."

                      Boneh and computer science Professor John Mitchell say they can change all that. Their research group has developed an extension to popular web browsers that completely overhauls the security of passwords with only the slightest change in the daily web-surfing experience?one or two keystrokes before entering a password activates their software. Mitchell, Boneh and their students will debut the extension, named PwdHash (short for "Password Hash"), at the 14th Annual Usenix Security Symposium in Baltimore at the end of July. It is one of three tools the pair has devised to combat phishing.

                      The need for tools to defend against phishing is urgent because this con is growing fast. Between July 2004 and April 2005, the number of phishing sites grew at an average rate of 15 percent a month, according to the Anti-Phishing Working Group, an industry consortium.

                      Hashing out security

                      PwdHash works behind the scenes to irreversibly encrypt a user's password in a way that is unique for every website. "Hashing" a password means combining the typed password and the site's domain name in an algorithm that outputs a unique password that bears no traceable resemblance to the typed one. The hashed version produced by PwdHash for a phishing site therefore bears no resemblance or clues to the hashed version that is valid at the legitimate site. Meanwhile, the user simply has to remember the familiar typed password. When a potential phishing victim unwittingly enters his eBay password at a phony site posing as eBay, PwdHash generates a new password for the phisher's site, so the phisher ends up gathering something totally different than what is actually needed to log in at eBay.

                      To tell PwdHash to do the hashing, the user only has to type "@@" or the F2 key before typing the password. In five professionally conducted user tests, people had no problem remembering to enter @@, Mitchell says.

                      To get the benefit of PwdHash's protection, users will have to change their passwords using PwdHash at sites where they have accounts. But users can do this at their own pace, Mitchell says. Besides, changing passwords is something people should do anyway, say the computer scientists. "It's a good idea to change your password in case somebody discovers it," Mitchell says. "It is also part of making sure that you are using different passwords at different sites."

                      Boneh hopes that major technology companies?and the Stanford researchers have met with several?will adopt PwdHash and help distribute it broadly.

                      Of course, like all security software, PwdHash is not perfect. For example, it does not work for the AOL browser and cannot protect users who have unwittingly downloaded software that can read their keystrokes as soon as they type them. Some phishing sites trick users into downloading such software.

                      SpoofGuard and SpyBlock

                      But that's where other tools from Boneh and Mitchell can help. SpoofGuard, another browser extension, can recognize illegitimate pages and warn users when they visit them. After installing SpoofGuard, a user would only have to watch his or her screen to avoid many phishing sites. PwdHash would then be the second line of defense.

                      SpoofGuard uses several cues to determine whether a site is questionable. It will suspect pages with names similar but not identical to major ones (e.g., www.ebav.com or www.paypai.com), pages with numerical rather than text addresses, pages with images that are known in a database to be associated with other addresses (such as corporate logos) and pages that are not already in the user's history list. SpoofGuard will even warn users who are visiting pages already known to the anti-phishing community. Finally, it will "watch" as users type in passwords. If the password is being entered at a site different than the one it associates that password with, SpoofGuard will warn the user.

                      Another tool Boneh and Mitchell are currently developing, called SpyBlock, is meant to directly combat the keystroke reading software that phishers try to distribute.

                      Unfortunately, users always will have to be vigilant about Internet scams and how to protect themselves, Boneh says. "There is not going to be a silver bullet against phishing," he says. "It's going to be a collection of defense mechanisms that hopefully can work together to prevent the problem."

                      Further information and free, prototype versions of both PwdHash and SpoofGuard are online at http://crypto.stanford.edu/PwdHash/ and http://crypto.stanford.edu/SpoofGuard/.

                      David Orenstein is the communications and public relations manager at the Stanford School of Engineering.

                      Comment

                      Working...
                      X