Jump to content

waerth

Board Sponsors
  • Posts

    3847
  • Joined

  • Last visited

  • Days Won

    40

Everything posted by waerth

  1. Dear quality tourist. Waerths counseling is in front of Jewelry Trade Center. Not inside. And JTC these days has more fashion outlets than jewelry outlets. Also Waerths office sells hamburgers. regards, Waerth
  2. Dear BuBi, my counseling office for foreigners of the kind hearted kind is currently located on Silom in front of the Jewelry Trade Center (next to the Holiday Inn hotel). Office hours are from 11 to 19, but I recommend you come between 14.00 and 17.00 as there is more time for me to counsel you then. My office is at an orange truck called Orn The Road. And while counseling you can enjoy a burger! W
  3. Although they shut it down for now after it came out in the western press yesterday: http://www.5elafabook.com/
  4. And two more Arabs critical of the Arab mindset. Basically saying we are shit we should embrace western culture: 1: https://www.youtube.com/watch?v=0J4OZGyY20U 2: https://www.youtube.com/watch?v=aIMxuk3JbVM
  5. And for those of you that keep on saying that muslims themselves do not attack the radicals amongst them still after the first two videos .... a debate between a moderate intellectual and an extremist: https://www.youtube.com/watch?v=JGqs9gSnJho
  6. And some more clerics madness. I feel sorry for these women. They will be on extremists hitlists for sure :/ https://www.youtube.com/watch?v=z2rL6NDoyKg
  7. See topic title. Funny video. But also very sad. Here we have this very radical "sheikh" whom has asylum in the UK telling a woman it is beneath him to speak with her. She is in Lebanon. https://www.youtube.com/watch?v=bOlpK6Yj5a4
  8. One of the best Progressive House mixes I have heard in quite a while:
  9. I do not know where the temples around Asoke are, but all temples are open at 7 AM. I know the Huai Kwang temple has an airconditioned room where the monks receive their alms. I am fairly sure they would let you sit there. It is relatively close to the Huai Kwang MRT station. W
  10. The 12 o clock closing is city wide not just Lumphini.
  11. Wait until the islamists get a hold of Egypt. And then to think that the west has recently been returning Egyptian artifacts. This has been ongoing seens 2012 but came in the news again today: http://mawtani.al-shorfa.com/en_GB/articles/iii/features/2012/11/29/feature-01 Egyptian scholars, officials and tourism workers denounced a fatwa -- recently issued by Egyptian cleric Morgan Salem al-Gohari -- that calls on Egyptians to destroy the country's pyramids and the Sphinx. Al-Gohari, a member of a Salafi jihadist group, said he wants these antiquities demolished, just as Prophet Mohammed destroyed the idols he found upon his conquest of Mecca. During an interview that aired on Egyptian satellite channel Dream TV, al-Gohari likened the Egyptian landmarks to the Buddha statues that were demolished in Afghanistan. He also equated those who work in the tourism sector to those who work "in prostitution and debauchery" and demanded that the tourism ministry be abolished.
  12. They should only allow SINGLE Chinese Females, without children, between 18 and 25 out of China! Now that would give an image boost to Chinese tourists
  13. Maybe one of the girls thinks you are handsome and wants to meet you
  14. I personally almost never read Stickmans site. So I do not know about that. But still, he made something many many people enjoyed reading. He put time and more importantly effort into it and he was loyal to his audience! That is why I reacted the way I reacted. As to doom and gloom and yesteryear was better ..... that is a human thing. To people like Flash music from 60ties and 70ties is the best there is. Nowadays many people from my generation (I am 42) will tell you 80ties and 90ties music was the best there ever was. Even some younger people in their teens are complaining on youtube already their was no better music then the music from the nineties. Yesterday was always better than today. I always have to chuckle inside when someone goes into that. I try not to do it myself, but I am sure I have said it on occasions. As to your bar Mark. Congrats, hope you will be doing well for the coming 20 years! I never really go out anymore so I have only been there once, a years or so ago, so I have no opinion on your bar or the prices. But I wish you all the best!
  15. From 2bangkok.com: http://2bangkok.com/why-are-the-killing-chatuchak-market.html Chatuchak Market has a relatively short history. Bangkok’s weekend market was originally located at Sanam Luang until the 1980s when vendors were gradually forced to relocate to the new location at present day Chatuchak Market. The new location is on land expropriated from farmers for a new, modern Bangkok train terminal (replacing Hualampong). However, the land somehow ended up in commercial hands as the site of commercial developments like Central Lat Prae and Chatuchak Market. The enduring uproar of expropriated land ending up benefiting wealthy families is reflected in the 1997 constitution when the use of expropriated land for commercial purposes was prohibited (this immediately generated more controversy when the subway authority attempted to develop their massive expropriations around Rama 9 Road into commercial buildings). Governments or agencies that can wrest valuable property from its intended use can reward cronies with the development. Chatuchak Market has long been seen as a prime candidate for this sort of scheme. During the Chavolit Yongjiyut government, PM Chavolit pushed a “preservation†of the beloved market that would have seen it all redeveloped into condominiums. In recent years, the tussle over the site between the Bangkok Metropolitan Administration (BMA, Bangkok’s city hall) and the State Railway of Thailand (SRT), along with the Central Lat Prae land, is part of this enduring dream to somehow find a way to close the market and redevelop it. The unusual point of the article below–that the Chatuchak Market landlord (SRT) would rather that shops sit idle because rents are too high rather than have them rented out at market rates–indicates the overall goal of killing the market. SRT has one goal with Chatuchak Market–manage it in a way that that kills its viability. Then they can justify the redevelopment of the area into a commercial/residential complex. Such redevelopment has already been eating at the edges of the market with multistory buildings replacing traditional shops. http://www.bangkokpost.com/news/special-reports/480498/chatuchak-vendors-sold-short-in-struggle-for-survival – Bangkok Post, February 22, 2015 …But, some 30 years after he first set foot inside the market, he’s scared members of the younger generation will not be afforded the same possibilities. “Walk into the middle zone of Chatuchak and you’ll see plenty of shops closing down,†he told Spectrum. “In the next couple of years, we could see the end of Chatuchak as we know it. It is a shame…â€
  16. Stickman created a great site and service for those interested. He should be commended for that. The criticasters well ...... it is easy to watch and criticise and not do it yourself
  17. Obviously not all agree with ISIS even in their territory. It is unknown where exactly this video came from. This granny is cursing at presumably ISIS fighters and curses them to hell using koran verses https://www.youtube.com/watch?v=q4_LtoLkWn8
  18. Especially developped to make our battle with virusses impossible to win .... it looks like a good idea at first sight, but hackers can also use it to make their worms and virusses undetectable and unremovable ... Flashermac will love this A Crypto Trick That Makes Software Nearly Impossible to Reverse-Engineer http://www.wired.com/2015/02/crypto-trick-makes-software-nearly-impossible-reverse-engineer/?utm_content=buffere4190&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer Software reverse engineering, the art of pulling programs apart to figure out how they work, is what makes it possible for sophisticated hackers to scour code for exploitable bugs. It’s also what allows those same hackers’ dangerous malware to be deconstructed and neutered. Now a new encryption trick could make both those tasks much, much harder. At the SyScan conference next month in Singapore, security researcher Jacob Torrey plans to present a new scheme he calls Hardened Anti-Reverse Engineering System, or HARES. Torrey’s method encrypts software code such that it’s only decrypted by the computer’s processor at the last possible moment before the code is executed. This prevents reverse engineering tools from reading the decrypted code as it’s being run. The result is tough-to-crack protection from any hacker who would pirate the software, suss out security flaws that could compromise users, and even in some cases understand its basic functions. “This makes an application completely opaque,†says Torrey, who works as a researcher for the New York State-based security firm Assured Information Security. “It protects software algorithms from reverse engineering, and it prevents software from being mined for vulnerabilities that can be turned into exploits.†A company like Adobe or Autodesk might use HARES as a sophisticated new form of DRM to protect their pricey software from being illegally copied. On the other hand, it could also mean the start of a new era of well-armored criminal or espionage malware that resists any attempt to determine its purpose, figure out who wrote it, or develop protections against it. As notable hacker the Grugq wrote on twitter when Torrey’s abstract was posted to SyScan’s schedule, HARES could mean the “end of easy malware analysis. †To keep reverse engineering tools in the dark, HARES uses a hardware trick that’s possible with Intel and AMD chips called a Translation Lookaside Buffer (or TLB) Split. That TLB Split segregates the portion of a computer’s memory where a program stores its data from the portion where it stores its own code’s instructions. HARES keeps everything in that “instructions†portion of memory encrypted such that it can only be decrypted with a key that resides in the computer’s processor. (That means even sophisticated tricks like a “cold boot attack,†which literally freezes the data in a computer’s RAM, can’t pull the key out of memory.) When a common reverse engineering tool like IDA Pro reads the computer’s memory to find the program’s instructions, that TLB split redirects the reverse engineering tool to the section of memory that’s filled with encrypted, unreadable commands. “You can specifically say that encrypted memory shall not be accessed from other regions that aren’t encrypted,†says Don Andrew Bailey, a well-known security researcher for Lab Mouse Security, who has reviewed Torrey’s work. Many hackers begin their reverse engineering process with a technique called “fuzzing.†Fuzzing means they enter random data into the program in the hopes of causing it to crash, then analyze those crashes to locate more serious exploitable vulnerabilities. But Torrey says that fuzzing a program encrypted with HARES would render those crashes completely unexplainable. “You could fuzz a program, but even if you got a crash, you wouldn’t know what was causing it,†he says. “It would be like doing it blindfolded and drunk.†“Imagine trying to figure out what Stuxnet did if you couldn’t look at it.†Torrey says he intends HARES to be used for protection against hacking—not for creating mysterious malware that can’t be dissected. But he admits that if HARES works, it will be adopted for offensive hacking purposes, too. “Imagine trying to figure out what Stuxnet did if you couldn’t look at it,†he says. “I think this will change how [nation-state] level malware can be reacted to.†HARES’s protections aren’t quite invincible. Any program that wants to use its crypto trick needs to somehow place a decryption key in a computer’s CPU when the application is installed. In some cases, a super-sophisticated reverse engineer could intercept that key and use it to read the program’s hidden commands. But snagging the key would require him or her to plan ahead, with software that’s ready to look for it. And in some cases where software comes pre-installed on a computer, the key could be planted in the CPU ahead of time by an operating system maker like Apple or Microsoft to prevent its being compromised. “There are some concerns with this from a technical point of view,†says Bailey. “But it’s way better than anything we have out there now.†Another way to crack HARES’ encryption, says Torrey, would be to take advantage of a debugging feature in some chips. That feature allows a hardware device between the chip and the motherboard to read every command the processor executes. But taking advantage of that feature requires a five-figure-priced JTAG debugger, not a device most reverse engineers tend to have lying around. “It’s pretty high level stuff,†he says. “Obviously nation states will have these things, but probably not very many others.†Torrey notes that it may someday be possible to encrypt a program’s code in a way that its instructions can run without ever being decrypted—making software that’s truly unhackable. But such a system, known as “fully homomorphic encryption,†is still largely theoretical. It currently makes computer processes take millions of times longer than they would without encryption. HARES slows down the programs it protects by only about 2 percent. “Fully homomorphic encryption is the holy grail, but it’s an academic math problem,†Torrey says. “This is something you can stick on your existing computer to protect your existing software.†Torrey developed HARES’s TLB split trick with funding in 2013 from Darpa’s Cyber Fast Track program. He plans to release the project’s code not at March’s SyScan conference, but possibly the next month at the Infiltrate security conference in Miami. Torrey says that he wouldn’t be surprised, however, if coders determine from his March talk how to use HARES’s tricks and begin writing malware that’s far harder to decode. Give hackers an unencrypted hint or two, and they have a way of figuring out your secrets.
  19. Because she looks a lot more symphatetic then her brother does. Damsel in distress .......
×
×
  • Create New...