Freespeech » about 

This web page is last updated at 2019-9-13 around 23:05                                                                               by Priscilla Felicia Harmanus, 1993 from the Netherlands


 This speech is about the process towards freedom & how I do my computing(1993)¹, the
🎥Free Software movement² and Monitoring Bob's(1970) Autistic hobby³.

Bob(1970) is switching between multiple operating systems

 

Bob has setting up GNU Ubuntu/Linux on the ex-girlfriends computer,  However, Bob boots the computer that belongs to his mother witch whose model is a Pavilion G7 running Microsoft Windows 8 that has been released in the year of 2012. Windows 8 is a personal computer operating system that was produced by Microsoft as part of the Windows NT family of operating systems. In the year of 2016 while Bob's computer was doing an update while  I was there at Bob's place(old stuff new house), I've noticed on the computer screen during the update that it had detected Microsoft Windows XP Professional. 

Back then I did not know anything about OS and network computing. My parents and I had to grew up with windows you know just like you and your friends had to grew up with windows that if we went to the store and buy a computer you know... windows is pre-installed, windows is required that if we all want starting using a computer  we need to pay for the windows license and need to agree with the terms in order to could use the computer that we had to buy in the store.    ❞


While it seemed to be that windows is the only choice that we had to believe in,  it was and it was not because there is still an option to consider and that is to ☯  📚 build your own PC📚




²How I met Ubuntu/Linux ♣ Look and feel

³Due to security concerns, the person's name will be referred to as Bob in this report of investigation. Bob is a person with high-technical skills. Read more about BobAlso the person's username@email will be referred as "pob.bob@email". POB = Place Of Birth.


Bob hates windows updates and therefore loves lunix❞ 

🎥Full Podcast

Priscilla asks questions and Bob provides answers❞ 

🎧Full Podcast


eyerys.com - Gmail was launched as an invitation-only beta release on April 1, 2004 and it became available to the general public on February 7, 2007.¹

bob - 2007 May 4:  Subject: Download ubuntu iso(Gmail)📚¹

gplv3.fsf.org - 2007 June 29: GPLv3 and LGPLv3 have been released! - You can watch the video of Richard Stallman announcing the release and giving an overview of the major changes at the FSF's Boston office on June 29, 2007.

The History of Operating Systems & The Free Software Movement📚


 ¹to be continued


This risk assessment of the smart grid focuses on energy storage, which is essential but largely unaddressed by the current literature. This work concentrates on actions (such as decreasing or increasing power reserve and power dispatch, performing load curtailment or load shedding, or repair of nodes) the defender should take to meet power demand at minimum operating cost in the presence of cyber-physical attacks on the power and information infrastructure of the smart grid. In this paper, we formulate a Power Storage Protection (PSP) framework against a fixed opponent (adversary). We fix the strategy for the adversary and model the problem as a Partially Observable Markov Decision Process (POMDP) from the perspective of the defender (power utility) and solve it using POMDP solver. We provide a theoretical framework for formulating the above problem and provide experimental results to support our claim using a simplified PSP scenario in which optimal POMDP policy is computed efficiently.Server Growatt

PSP: A Framework to Allocate Resources to Power Storage Systems under Cyber- Physical Attacks

5th International Symposium for ICS & SCADA Cyber Security Research 2018 (ICS-CSR 2018)

29 - 30 August 2018, University of Hamburg, Germany.

PAPER FORMATS
PDF Version of this Paper 293(kb)

Bob had carved out a job running a recycling program, a gig that earned him nicknames like “The Garbage Man.” It was an apt description: Bob, the engineer, sometimes worked 14 hours straight and sorted, by his estimate, tens of thousands of pounds of trash over the years.

JUDY WOODRUFF: You buy a new smartphone or computer, and you take your old one to a local recycler. It’s the green thing to do, right. Well, it turns out a lot of those devices may not be getting recycled at all.

harde schijf+sterke magneet=??

 

 

Inmates Build Computers From Recycled Parts, Hide in Ceiling

 



This speech is about the process towards freedom & how I do my computing¹, the 
Free Software movement² and Monitoring Bob's Autistic hobby³.

Bob(1970) is switching between multiple operating systems

This web page is last updated at 2019-9-13 around 23:05               by Priscilla Felicia Harmanus, 1993 from the Netherlands

en.wikipedia.orgThis article presents a timeline of events in the history of Microsoft Windows operating systems from 1985.

webopedia.com - The History Of Windows Operating Systems

https://uclouvain.be/en/research-institutes/icteam/research-directions.html

https://nl.wikipedia.org/wiki/Alice_en_Bob

http://web.mit.edu/jemorris/humor/alice-and-bob


gnu.org - Frequently Asked Questions about the GNU Licenses

fsf.org - Free Software Resources

doc.lagout.org - Hacking Into Computer Systems - A Beginners Guide 2018 by Rubin Heath (Author)

dicosmo.org - Hijacking the World: The Dark Side Of Microsoft 1999

academia.eu - Webserver Operating Systems may 7, 2013

doc.lagout.org - Programmable Controllers - Theory and Implementation 1988 - 1997

doc.lagout.org - Operating System Internals and Design Principles 





Asking the companies about the most typical way they will be compromised, most answer this that it will be an inside employee. 

When looking at the attacker that will be most likely to attack the ICS infrastructure the insider is one of the most likely attackers. Industrial spies will be next most likely followed by breaking into the system, denial of services and man in the middle attack. 

Results for “computers systems and operating systems used in your companies industrial control system (ICS) environment” 

Most used operating system is Windows XP followed by Windows 7. 27,27% of the respondents are using other operating systems than Windows. When different than Windows it is Linux. 63,64% uses normal desktop computers and 36,36% for the respondents also use industrial computer systems. In 50% of the cases there is an anti-virus package installed on the computer. In the ICS invironment are in 50% of the respondents also computer present that are not primary used for the ICS. 

Industrial Control System Security Awereness now-a-day and the role of law enforcement in it. “Are the bad guys already in?” 

In the world of cyber crime and high tech crime we usually think about things like internet and banking fraud, child pornography, cyber bullying 1, hacking 2 of computer systems, distributed denial of services 3 and defacing 4 .

security awareness

Denial of Engineering Operations Attacks in Industrial Control Systems


We present a new type of attack termed denial of engineering operations in which an attacker can interfere with the normal cycle of an engineering operation leading to a loss of situational awareness. Specifically, the attacker can deceive the engineering software during attempts to retrieve the ladder logic program from a programmable logic controller (PLC) by manipulating the ladder logic on the PLC, such that the software is unable to process it while the PLC continues to execute it successfully. This attack vector can provide sufficient cover for the attacker»s actual scenario to play out while the owner tries to understand the problem and reestablish positive operational control. To enable the forensic analysis and, eventually, eliminate the threat, we have developed the first decompiler for ladder logic programs.

Ladder logic is a graphical programming language for PLCs that control physical processes such as power grid, pipelines, and chemical plants; PLCs are a common target of malicious modifications leading to the compromise of the control behavior (and potentially serious consequences). Our decompiler, Laddis, transforms a low-level representation to its corresponding high-level original representation comprising of graphical symbols and connections. The evaluation of the accuracy of the decompiler on the program of varying complexity demonstrates perfect reconstruction of the original program. We present three new attack scenarios on PLC-deployed ladder logic and demonstrate the effectiveness of the decompiler on these scenarios.

Programmable logic controllers (PLCs) are embedded devices used in industrial control systems (ICS) to automate the control and monitoring of physical industrial and infrastructure processes such as gas pipelines, nuclear plants, power grids, and wastewater treat- ment facilities [11]. Thus, their safety, durability, and predictable response times are the primary design concerns. Unfortunately, they are not designed to be resilient against cyberattacks [10]. If a PLC is compromised, the physical process controlled by the PLC is also compromised which could lead to a catastrophic incident.

To compromise a PLC, an attacker in ltrates into an ICS network to communicate with the PLC, or gains physical access of the PLC to communicate using local USB or serial ports. The attacker may attempt to modify either the  rmware (or the operating system) of the PLC, or the control logic (typically written in the languages de ned by IEC 61131-3 such as Ladder Logic). The  rmware is hard to modify for the attacker because it has to be signed by the corresponding vendor’s private key [19]. The attacker may  nd and utilize any debugging/testing ports (such as JTAG/UART) at hardware level to compromise the  rmware [17]. However, this requires physical access, which makes it impractical as a remote attack.

The control logic de nes how a PLC controls a physical process. Unfortunately, it is vulnerable to malicious modi cations because PLCs either do not support digital signatures for control logic, or the ICS operators do not use/con gure them. The adversaries target the control logic to manipulate the control behavior of the PLC. For instance, Stuxnet targets Siemens S7-300 PLCs that are speci cally connected with variable frequency drives [15]. It infects the control logic of the PLCs to monitor the frequency of the attached motors, and only launches an attack if the frequency is within a certain nor- mal range (i.e. 807 Hz and 1,210 Hz). The attack involves disrupting the normal operation of the motors by changing their motor speed periodically from 1,410 Hz to 2 Hz to 1,064 Hz and then over again.

For the purposes of our discussion, we de ne engineering oper- ations as a continuous cycle of developing and updating the PLC control logic in response to changing operational requirements in ICS. A vendor-supplied programing software is used to create a control logic program and then to transfer it to/from a remote PLC over the network. In case of an incident, a forensic investigator (or a control operator) is likely to use the software to acquire the control logic from a suspicious PLC since the PLCs are often located at remote sites that may be di cult to get to.

We present three new attack scenarios, referred to as denial of engineering operations (DEO) attacks that subvert the capability of the programing software to acquire the actual control logic from an infected PLC. 


https://fhi.nl/app/uploads/sites/37/2014/09/politie3.pdf



https://www.researchgate.net/publication/283086676_Cyberspace_and_International_Politics

2007 June 29: GPLv3 and LGPLv3 have been released!

https://www.theverge.com/2017/10/10/16447264/prison-hacker-recycled-computer-fraud-ohio-marion-transkiy

https://theintercept.com/2015/11/11/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers-and-clients/

https://www.vice.com/en_us/article/bjem9m/prisons-want-cell-phone-jammers-to-stop-inmates-from-communicating-with-the-outside-world

https://theintercept.com/2019/01/30/prison-voice-prints-databases-securus/

http://theconversation.com/despite-public-outrage-web-access-for-prisoners-isnt-a-luxury-item-heres-why-88803

https://www.nbcnews.com/news/us-news/gps-under-attack-crooks-rogue-workers-wage-electronic-war-n618761


¹ to be continued

² to be continued

³ to be continued

This article presents a timeline of events in the history of Microsoft Windows operating systems from 1985.

This article is about the consumer operating system released in 1992. For the version of Windows NT released in 1993, see Windows NT 3.1.

Hack Computer System For Noobee

Door KISHOR SARKAR

https://fsfe.org/campaigns/pdfreaders/pdfreaders.html#translations

https://muspdf.cf/catupm/computers-and-internet

https://www.securityfocus.com/columnists/188

https://doc.lagout.org/security/

https://www.mail.com/email/

https://www.iusmentis.com/computerprogrammas/opensourcesoftware/gplv3/

http://smbp.uwaterloo.ca/2017/05/gmail-from-private-invitation-only-to-1-bln-users-worldwide/

Poort 3128 is de standaard poort voor de Squid proxy-server 

So much for first impressions. I just hope I was able to enlighten you and in some way to help you make the right choice. Whether it's protecting yourself from what could be a traumatic life altering experience, or compelling you to focus your computer skills on other avenues, it's important for you to know the program, the language, and the rules. See you in the movies Agent Steal 1997 

The social layer has two components: the personal component and the cyber-personal component. Of course, the personal and cyber-personal component do not apply only to individuals but also to organizations, with or without legal personality (public authorities, companies, associations, criminal groups, etc.). The personal component is made up of all the elements associated with an individual or organization in the network (e.g., e-mail address, IP address, account in a virtual store, home-banking account, etc.). The second component, the cyber-personal, is made up of all individuals or organizations that have access to the network. The problem arises when an individual or organization has multiplecyber identities, and this is a frequent occurrence. In other words, every person and/or organization frequently possesses one or more e-mail addresses, one or more devices (smartphones, laptops, tablets, etc.) connected to the network, and so on. At the same time it may happen that a cyber-person may represent several physical persons. An example is a company with a Facebook profile whose credentials (username and password) are known to many different individuals, for example, the employees of a company's Public Relations department.

Consider a car company. It might sell a dozen different types of cars with a dozen different software builds each year. Even assuming that the software gets updated only every two years and the company supports the cars for only two decades, the company needs to maintain the capability to update 20 to 30 different software versions. (For a company like Bosch that supplies automotive parts for many different manufacturers, the number would be more like 200.) The expense and warehouse size for the test vehicles and associated equipment would be enormous.

Alternatively, imagine if car companies announced that they would no longer support vehicles older than five, or ten, years. There would be serious environmental consequences.

We’re already seeing the effects of systems so old that the vendors stopped patching them, or went out of business altogether. Some of the organizations affected by WannaCry were still using Windows XP, an unpatchable 17-year-old operating system that Microsoft stopped supporting in 2014. About 140 million computers worldwide still run that operating system, including most ATMs. A popular shipboard satellite communications system once sold by Inmarsat Group is no longer patched, even though it contains critical security vulnerabilities. This is a big problem for industrial- control systems, because many of them run outdated software and operating systems, and upgrading them is prohibitively expensive because they’re very specialized. These systems can stay in operation for many years and often don’t have big IT budgets associated with them.


Freespeech » about 



 
trace my internet presence