The vision of Obadiah.
Thus saith the Lord GOD concerning Edom; We have heard a rumour from the LORD, and an ambassador is sent among the heathen, Arise ye, and let us rise up against her in battle. Behold, I have made thee small among the heathen: thou art greatly despised. The pride of thine heart hath deceived thee, thou that dwellest in the clefts of the rock, whose habitation is high; that saith in his heart, Who shall bring me down to the ground? Though thou exalt thyself as the eagle, and though thou set thy nest among the stars, thence will I bring thee down, saith the LORD. If thieves came to thee, if robbers by night, how art thou cut off! would they not have stolen till they had enough? if the grapegatherers came to thee, would they not leave some grapes? How are the thingsof Esau searched out! how are his hidden things sought up!
All the men of thy confederacy have brought thee even to the border: the men that were at peace with thee have deceived thee, and prevailed against thee; they that eat thy bread have set an ambush for thee: there is none understanding in him.
Shall I not in that day, saith the LORD, even destroy the wise men out of Edom, and understanding out of the mount of Esau?
In millions of Windows, the perfect Storm is gathering
exerpt;
Schneier thinks Storm represents 'the future of malware' because of the technical virtuosity of its design. For example, it works rather like an ant colony, with separation of duties. Only a small fraction of infected hosts spread the worm. A much smaller fraction are command-and-control servers; the rest stand by to receive orders. By only allowing a small number of hosts to propagate the virus and act as command-and-control servers, Storm is resilient against attack because even if those hosts shut down, the network remains largely intact and other hosts can take over their duties.
More fiendishly, Storm doesn't have any noticeable performance impact on its hosts. Like a parasite, it needs the host to be intact and healthy for its own survival. This makes it harder to detect, because users and network administrators won't notice any abnormal behaviour most of the time.
And instead of having all hosts communicate with a central server or set of servers, Storm uses a peer-to-peer networking protocol for its command-and-control servers. This makes the botnet much harder to disable because there's no centralised control point to be identified and shut down.
It gets worse. Storm's delivery mechanism changes regularly. It began as PDF spam, then morphed into e-cards and YouTube invites. It then started posting blog-comment spam, again trying to trick viewers into clicking infected links. Similarly, the Storm email changes all the time, with new, topical subject lines and text. And last month Storm began attacking anti-spam sites focused on identifying it. It has also attacked the personal website of a malware expert who published an analysis of how it worked.
At the moment, nobody knows who's behind this. Is it a Russian mafia operation? An al-Qaeda scheme? The really creepy thing is that, to date, the controllers of Storm have used it for such relatively trivial purposes. The suspicion has to be that they are biding their time, waiting for the moment when, say, 100 million naive Windows users have clicked on an infected link and unwittingly added their machines to the botnet.
Only then will we know what a perfect storm in cyberspace is like.
http://observer.guardian.co.uk/business/story/0,,2195730,00.html
China makes US economy its hostage
exerpt:
Over the last 30 years, China’s economy has grown at an average annualized rate of nearly 10%. While this statistic alone is jaw-dropping, what is more impressive is the extent to which the nominally Communist country’s economy has become intertwined in the global economy. China now exerts enormous influence over the economies of virtually every country in the world, and a slight change in its domestic economic policy has the potential to send shockwaves rippling throughout the world. Nowhere is this more apparent-and frightening-then in China’s economic relationship with the United States, which is very much at the mercy of China when it comes to prices, wages, interest rates, most importantly, the value of the Dollar.
http://english.pravda.ru/business/finance/24-10-2007/99414-china_us_economy-0
1 comment:
Brethren,
I have been infected with the virus. AntiStorn I believe it to be called. I am computer savy & wife a guru, could not remove the bug. Had to get new hard drive. Without the strenght of the Lord, most are confused becuase of there trust in the shadow of Egypt. I encourage all to read the Word of God, He is the only anchor by which any will be able to weather this approaching storm!
Post a Comment