Tag Archive for: GREAT

The Chessboard for the Great Power Competition in the Indo Pacific


As structural change is happening with China’s ascending growth and Russia’s re-emergence, the scholarly community is worried about the result of such changes. US pre-eminence is now being increasingly challenged in the wider geopolitical structure, as countries like China, Russia and India are busy acquiring advanced military weapons, thus thickening their military might. This has led to power diffusion across the globe. Subsequently, as the relative power of China vis-à-vis the US is expanding, security analysts are predicting an intense security competition between the rising power and the falling giant. People are concerned about what steps the US should take to either contain or accommodate China? Since belligerency is the characteristic of Chinese behavior, US must sort to contain China by maintaining existing power gaps and technological advantages.

But, by and large, US failed to thwart the Chinese rise. The recent Indo-Pacific Deterrence Initiative highlights the worry caused by Chinese growth and its impact on the overall balance of power within the Western Pacific. The usage of words like “regaining” US advantages in the region reflects a broader opinion that the US has lost its prior superiority, and must focus on “balancing” China’s gains. This is broadly a result of recent changes in US foreign policy where decision-makers think that mere acquiring military “mass” won’t do any good unless some significant edge is not achieved in the “intelligence” domain. The thinking points to the fact that since intelligence is a requirement to achieve target destruction through means of weapons, budgetary investments must prioritize the acquisition of information technology alongside advanced weapons.

Why just gaining military mass is not enough?

Realistically speaking, if the military balance between the two powers is calculated then it seems that the US is much powerful than the Chinese. Since this reckoning is mostly based on absolute numbers of weapons a country possesses, a mere number-to-number analysis might mislead us. A more intelligent approach would be to observe how these weapons (acquired by both countries) behave in…

Source…

This Week In Security: Perl.com, The Great Suspender, And Google’s Solution


Perl has been stolen. Well, perl.com, at least. The perl.com domain was transferred to a different registrar on January 27, without the permission of the rightful owner. The first to notice the hack seems to have been [xtaran], who raised the alarm on a Reddit thread. The proper people quickly noticed, and started the process of getting control of the domain again. It seems that several other unrelated domains were also stolen in the same attack.

I’ve seen a couple of theories tossed around about how the domains were stolen. With multiple domains being moved, it initially seemed that the registrar had been compromised in some way. One of the other victims was told that a set of official looking documents had been supplied, “proving” that the attacker was the rightful owner of the domain. In any case, the damage is slowly being unwound. Perl.com is once again in the proper hands, evidenced by the proper SSL certificate issued back in December.

The Great Suspender, Suspended

I was greeted by a particularly nasty surprise on Thursday of this week. One of the Chrome extensions I’ve come to rely on was removed by Google for containing malware. The Great Suspender automatically hibernates unused tabs, saving ram and processor cycles that would otherwise be spent on those 150 open tabs that should really be bookmarks. What happened here?

I’ll point out that I’m extremely careful about installing extensions. It’s code written by a third party, often very difficult to inspect, and can view and modify the sites you visit. You can manage what sites an extension has access to, but for a tool like the Suspender, it essentially needs access to all of them. The solution is to use open source extensions, right? “Well yes, but actually no.” Suspender is open source, after all. The link above goes to the project’s Github page. In that repo you’ll find an announcement from last year, that the founding developer is finished with the project, and is selling the rights to an unknown third party, who took over maintainership. If this sounds familiar, there are echoes of the event-stream debacle.

It’s not clear exactly what malicious behavior Google found that led to the…

Source…

5 Great Tips to Hack Laptop Camera using IP Address


So, you want to hack someone’s laptop camera using their IP address? Now yes, doing that is possible. Someone might even have hacked yours and looked at what you are doing and ironically judging you on what a creep you are.

Well, before I judge you for even coming and reading this article, I will warn you very clearly that what you are about to do is very illegal. This article does not encourage hacking someone’s webcam for stalking and spying on them and it was written for the sole purpose of educating the masses and how to best look out and protect themselves from such vulnerabilities.

Now before going in for that webcam video, the first thing you need to get is access to your victims’ computer. Streaming the webcam is the easy part. So, here’s how to get access to your victim’s computer.

1. You can use Social Engineering

Social Engineering is a hacking tool that predates computers as well. By social engineering you trick someone through browser ads or other methods that show that their computer has been infected with a very dangerous virus or malware and they will have to contact you on the given number where the receiver poses as a Microsoft representative. Once the call has been established, you can very easily trick them into installing software that will enable remote access and with that a direct line to the webcam. This is a very fool proof way of getting access to a victim’s computer and you can even install other malwares which will eliminate the need for using the remote access software and directly stream their webcam.

2. You can use Remote Access Trojans

Normally used for nefarious and criminal purposes, remote access trojans are tools that trick your computer to provide administrator privileges to your victim’s computers. These programs can be installed using nefarious chrome extensions or websites and are practically invisible to your victims. If your victim likes to go on to pirate sites then you can very easily hook them there by bundling it with a piece of software or a game you know they will install.

3. Make the Victims PC a part of your Botnet

Botnets are basically a string or a network of PCs that can be…

Source…

Letter: The great pretenders – Opinion – Gaston Gazette


As I write this there is no president-elect. It doesn’t matter what The Associated Press says, or any other mainstream news broadcaster says.

For readers who don’t know, the press has no authority to call an election. Only each state’s election apparatus has that authority, and not one state so far has certified the election results.

Despite this, newspapers and television news shows are asserting that Joe Biden is the president-elect. And to make this theater even more bizarre, Joe Biden and his selected vice-president candidate, Kamala Harris, are pretending they have been elected.

Over the last several months we have witnessed Joe Biden behaving as though he has some mental impairment, probably dementia. I have to wonder who is convincing him that he has won this election when in fact, so far, he has not.

Does he really believe this? We know he is a plagiarist and spins tall tales about Corn Pop and such, so is this just another one of his fantasies?

Worse than that, who are those trying to fool the American people that the Biden/Harris ticket has been elected? There is an avalanche of disinformation distributed under the name of “news.” The credibility of mainstream media outlets is now at the bottom of the pits, it’s so bad.

This is not just sad, this is criminal.The FCC has rules against distorting the news, lying to the public. It’s against the law, especially if the distortion causes public harm.

When all of the Democrats are finally made aware that Biden/Harris have not been elected, what kind of reaction does anyone expect? Will there be public harm as the left has promised?

In a nutshell, there has been a three-pronged attack on our election. The first one I just described; disinformation.

The second one is the traditional method of election fraud that involves illegal ballot stuffing. Ballot stuffing this election is on steroids due to some 300 million unverifiable ballots mailed out by the DNC to anyone and everyone, including dead people and cats.

This particular election fraud also includes back-dating ballots, dumping thousands of ballots at 4 a.m., destroying ballots with the GOP choice indicated. There are now lawsuits in Wisconsin, Pennsylvania,…

Source…