White Hat PBJ Decompiling

Hello,
I just formatted my computer and now realized I didn't back up my Pixel Bender files.  I still have the pbj's on my web site but no pbk's .  I realize asking for a decompiler on an Adobe forum is rediculous, however, I had some awesome filters (distances maps, voronoi diagrams, colorspace trasfrorms, and more) and I am desperate to get them back.  Anyways I would be forever grateful to anyone that can help me out.
Thanks in advance,
Justin

Sorry if this sounds stupid, but there are a lot of tools to recover formatted hard disks. Unless you performed a low level formatting (I'm not an expert), chances are that you only erased an index or similar, and your files ar still there.
Of course, as soon as you start using your hard disk again, the data becomes corrupted or lost. But in your case, I would give it a try.
Just do some search at google for data recovery tools or something like recovering files from formatted HD.
Hope this helps
Enrique

Similar Messages

  • Looking for a white hat; iPhone 4 stolen while in Afghanistan

    For my 21st anniversary of military service my wife got me an iPhone 4 on the release date. Life was good! 6 weeks after getting my new toy I was on a plane for Afghanistan. Life wasn't so good. Anyway, who am I to complain since I raised my right hand. When I arrived at a major base awaiting my assignment I was given orders to a real **** hole. I'm not talking a normal Afghanistan hole but one of those places where when people in Afghanistan find out where you're going they tell you how sorry they are.
    After travelling to my hole which was going to be home for the next year we finally ended up on a major base for a day of rest. Let me tell you…8 days of travel without much rest, little food, and no showers isn’t conducive to good hygiene. No wonder I got so many dirty looks. Anyway, it was very warm when we arrived and the sewage pond was in full force. My buddy threw up 15 minutes after getting off the bird the smell was so bad. Since I have the stomach of a billy goat I was alright but I wasn't happy.
    We were told to get a few hours of rest since our flight was going to leave in 12 hours. The tent they put us in was B.O. city. There were a few hundred guys who stunk worse than me all crammed into this tent full of bunk beds. To top it off the air conditioner was busted in the middle of August. Great, at least it was just 12 hours as we passed through. When I laid down I realized my bed was something magicians would use as a torture test. The springs could have supported a tank as they pushed into my back. Somehow through all of that I managed to doze off for a bit before the first rocket hit. My buddies went for cover but I was so mad the Taliban had the audacity to shoot at me I just laid there and hoped they were bad shots. Luckily they had a terrible aim but they did manage to hit the poop pond. The sewage pond caught on fire due to the impact and the fact a few hundred gallons of diesel had managed to spill into the pond. Now my tent smelled like B.O., diesel, and burning crap. It couldn’t get any worse I thought.
    My aforementioned buddies who went shrieking like little girls after the first rocket were by now in the fetal position. One of the guys wasn’t so lucky though; when he took off for cover he tripped on a pair of boots and went headfirst into a bed frame. He was out cold. What a noob. Everyone acts different the first time they get shot at but come on, show some respect. Luckily a Navy Corpsman was in our tent and he stitched him up in a jiffy…just a gash on the forehead. Just FYI, the guy who hit his head is a d-bag and will probably morph the story into him chasing Bin Laden across the desert with nothing but a plastic spork while riding a uni-cycle. If you see a YouTube video of a guy who looks like Goober and talks like Snooki detailing his exploits while chasing 10,000 Taliban you’ll know it’s him.
    That’s when it happened. While I was taking care of my troop who was gunning for a Purple Heart someone decided to take my iPhone 4 out of my backpack (he will be referred to as d-bag #2 from here on out). D-bag #2 went past the dirty underwear and half eaten MRE cookie and snagged my phone. I’m guessing he watched me put it in there. I didn’t know it at the time because I was trying to get some rest. Here’s a tip for travelers: Always take a travel pillow and sheets wherever you go. My mattress was not only hard with springs out of a ’47 Edsel but it looked like it was used in 5000 **** movies. Every bodily fluid imaginable was present and clearly displayed. Somewhere Charlie Sheen is missing a mattress.
    We finally got on a plane out of there a few hours later and started our journey to hells half acre. I opened my backpack which had never left my side except while tending to the previously discussed d-bag #1 and found nothing in my iPhone case. I put it in that case just 6 hours previous. After a frantic search of my surroundings I realized it was gone.
    After another 4 days of travel with even less sleep and worse food I finally managed to make it to my little corner of ****. The first thing I did was call my wife to let her know I made it safe. When she picked up the phone she started crying, cussing, and yelling at me. The person who took my phone sent my wife a text message. The message appeared like it came from me and said I’d been shot and was dying. Now the first thing that should have gone through my mind was for me to console my wife. Sadly it wasn’t. Since I was in the middle of Afghanistan with NO cell coverage the only plausible way a text message could have been sent was by someone hitting a hotspot and using the text app I’d downloaded. I was more ****** he knew where a hotspot was and didn’t pass the info than anything else! After getting back on “husband track” I calmed her down and told her to call AT&T and report the phone stolen. This happened in August BTW which was before I was introduced to Mobile Me. Also, the only tracking apps I had were things the bad guy would have had to open up.
    Now I was really mad. My phone was stolen, my wife was afraid for my life and couldn’t get in touch with me, and I had no way to play Angry Birds. Afghanistan does have some cell service BTW and AT&T was gracious enough to unlock the phone three days prior to d-bag #2 relieving me of my possession. Let’s be honest here and admit we all need our phones. I’m different in that I really NEEDED my phone. I suffered a Traumatic Brain Injury 2 years earlier and needed the games designed to stimulate neural activity (no, we’re not talking Pac Man even though I do think Ms. Pac Man is really cute). No, I needed my phone because I had apps designed to help people with brain injuries.
    In order to fix the situation I tried to call Apple but they conveniently don’t list Steve Job’s phone number (or any other number for that matter). I even looked up the designers of the iPhone on Facebook and sent them messages. For some reason they never answered. Since I’m a little older I figured I’d try the old fashioned way and sent personal letters to half of Apple’s top management. They KNOW where my iPhone is. It would take a few seconds to look up my IMEI and serial number.
    Figuring I’d never get a response from Apple (figured correctly) I had my wife shell out $800 for another iPhone 4 and had her ship it to me. I even had her send it in an expensive Pelican case that cost me $100. Somewhere between the post office in my town and middle of nowhere Afghanistan the box with my new iPhone 4went missing. FML. I waited 3 months for it and it never found its way to me. I was working with USPS since my wife insured the box but that’s another story.
    Ok, here’s where I’m hoping someone can help. Since I am in the middle of nowhere Afghanistan I can’t get a police report. The police department in my hometown said they are too busy to help and even if they could they would need some kind of report from Afghanistan. I’m thinking the donuts are laced with weed in my hometown. The local Afghani’s tend their herds, grow huge amounts of pot, enjoy man love Thursday, and kill Americans (not necessarily in that order). They don’t do police reports for missing iPhones. Most have never even heard of a phone. The military can’t do anything because they’re too busy putting warheads on foreheads.
    I have in my possession a case without a phone. I also have an IMEI number and a serial number. I can also produce a screen shot of my iTunes showing my IMEI as well as a text file with all of the info proving it’s mine. I need a white hat or disgruntled AT&T employee to help me out. I just want to know where my phone is. I’m in Afghanistan for the next 8 months so I’m not going to hunt anyone down. I would just like someone to tell me what town it’s in. I’ll then call the police department of that town and coordinate further communications between everyone. I don’t want to press charges. I just want my phone case to be full again.

    Really sorry to hear about this, particularly when you're putting your life on the line. But Apple cannot track your iPhone in any way unless you had set up Find My iPhone prior to it being lifted.
    It's possible that AT&T might be able to do something, but it's probably that they cannot track it, or will not without a request from an authorized law enforcement agency, but rather would only disable the device. You'll have to try and find a way to contact AT&T directly and ask if they can do anything to help you; the chances of any AT&T employee in a position to help you spotting this thread it pretty small.
    Good luck, stay safe, and come home soon.
    Regards.

  • Web browsing doesn't work

    Hi all.
    I have a problem with my MacBook. Sometimes I can not browse internet. Internet is connected, skype, lync, outlook, everything is ok except web browsing. Chrome and Safari browsers do not work - it looks like there is no internet conectivity.
    I have a windows based PC connected to the same router and everything including web browsing is ok there. Only mac has problems.
    I am really confused from it. Can you help me?
    Thanks a lot.

    I have a windows based PC connected to the same router and everything including web browsing is ok there.
    Only the Mac has problems. Chrome and Safari browsers do not work.
    Internet is connected, skype, lync, outlook, everything is ok except web browsing
    And I couldn't reach admin page of my router from os X.
    If you have room on the Mac's boot drive, create another Admin account and log into it and try Safari and Chrome there.
    If it works, install Firefox right away as it's a non-Webkit browser, which Safari, Chrome (and now Opera) are and suspectible to the same exploits that Apple just released a huge patch for. So also hit Software Update until clear.
    Run through this user tips
    ..Step by Step to fix your Mac
    Diagnosing network issues
    Mac maintenance steps
    Try the Mac in both accounts at other Internet locations, also bypass the router and connect to the modem (power off/on) directly to see if your router is the cause (compromised or outdated) by the Windows PC.
    A white hat hacker just released publically a proof of concept code for a Windows vulnerability without first notifying Microsoft

  • RE: Is it possible to sort tags?

    This is a continuation of the Support Forum question titled: “Is it possible to sort tags?” located at:
    https://support.mozilla.org/en-US/questions/963133?esab=a&as=s&r=2&page=1
    If this new topic has to be posed as a new question the following applies.
    If you visit the above link you will learn how convoluted were the solutions provided to non-programmers.
    I CERTAINLY EXPECTED THAT BY NOW there would have been an effort to address the Tag sorting issue, since there have been a number of upgrades since this question was first posted. Tag sorting provides a much more robust browser many more would choose to use. It would also attract more users concerned about the control on our liberties if supplied with a browser that truly has more powerful capabilities to garner and access information.
    One of the points the Firefox Team uses to attract more to use it is the protection it gives from snoops. You’ve got to ask yourself how much protection that might be if developers can’t do something simple (for talented programmers) like provide tag sorting. That comment is from, basically, a non-programmer, so I have no idea how much code would have to be written to bring this about. I suspect they don’t either and possibly fear the effort might turn out to be much greater than it really is.
    It’s been a LONG time since I used Internet Explorer by Microsoft. What brought me to Firefox was their mission statement to provide access free of its own brand of commercialism and free usage of the Internet, which also implied an effort to protect privacy. For the same reasoning I would not use Google, after reports of their cooperation with government heads in China. Reports have also surfaced that Microsoft has provided a back-door to the NSA for their Internet Search engine, all of this in total disregard to the US Constitution’s 4th Amendment requiring a warrant from a court to prevent unreasonable searches and seizures. I would, however, wish that Firefox would OPENLY adhere to the Bill of Rights in their Privacy Policy, which is not stated in so many words. Many would say, “I don’t have anything to hide, so I don’t care.” Apparently they are unaware how dirty politics and politicians can be. This is the reason why a viable alternative, such as Firefox, is so important.
    If you wish to learn more about just one individual who has dedicated his life in service to this country in terms of providing liberty to the widest possible number along with a promise to use the wealth he has built throughout his life (except for the necessity of living in exile), visit the following:
    http://wantarevelations.com/wanta-black-swan-white-hat/
    This is just one of the links that would be a lot easier to access, were it possible to sort Tags.
    Is this off-topic? Not really.

    HI MozillaFirefoxNewbie,
    Thank you for your question, even though this is not off topic, the points made would have a better audience in a feature proposal in Bugzilla. Please check out the features and description here:
    [https://bugzilla.mozilla.org/enter_bug.cgi?product=Firefox&component=Bookmarks%20%26%20History]
    As mentioned in the previously posted thread, there was a work around provided by [https://support.mozilla.org/en-US/questions/963133#answer-462676 jscher] that sounded functional.
    However if there is no extension desired, I encourage to proved the steps and objective of the feature.
    If you open up the Bookmark Library however and click the drop down of 'Tags', they are in alphabetical order.
    Have you tried this built into Firefox?
    Cheers

  • My website is not listed anywhere in Google? Why?

    Apologies if this is not appropriate in here.
    I was wondering why my website is not listed in the top 20 pages of google.
    I stopped clicking on next page after the results were off topic.
    I have three keywords I exp4ct people to use and whilst I know the competition is fierce I would expect something to appear before entries that do not have any of the search keywords used.
    I'm going to look on Google also for help but I don't think they have a forum.
    My site only has four pages.
    I have another site up which is used to promote the City Of Hull which used to get a reasonable placement before I had to move it to another address because I forgot to renew the domain name and someone else sneaked in (really quick I have to say!)
    That currently comes up with the old link and I wonder how long it takes google to expire dead links.
    If anyone has any suggestions on where I am going wrong or where else to ask then I'd be pleased to hear.
    Thank you in advance for any feedback
    Terry

    Hello Terry,
    since some months I use "Dublin Core Metadata". Here the link: http://www.metatags.info/dublin_core_metadata_element_set
    On the other hand – what concerns your “I was wondering why my website is not listed in the top 20 pages of google“ there was a very interesting thread here in the forum about SEO, which I remember and so I don't think DW should have a feature in it.
    1) Fully understand your markup language.
    2) Work first BEFORE anything on CONTENT not on black hat "tricks" and or on white hat inbound links.
    3) Expand the content so that you become an authority on the subject of the keyword phrases you wish to appear well ranked for.
    4a) Avoid the error of going all over the internet looking for the "ONE WAY TO SUCCESS" posts. There is NO such thing. Google does not rank all sites and blogs by the same values. Some are simply in the top ten for middle to complex keywords and keyword phrases because of their AGE and the AUTHORITY factor (that they contain original content with good outbound links WHILE OTHER BLOGS AND SITES are listed in the top ten ON REGIONAL search because of inbound links (example: You are better ranked on Google.FR if you have FRENCH blogs from FRENCH servers linking to you as well as being yourself hosted on a FRENCH dot fr domain or a in France hosted dot com). And there are certain pages which are ranked simply by the volume of search requests for that page. And then there are others which appear and remain in the top ten because they are rated by Google with what is called PageRank .... and on and on.
    In other words before you end up getting depressed and giving in to purchasing Adwords (sponsored links) try the following:
    4b) Set a routine. Make this routine involve an hour at least per day to UPDATING and EXPANDING your content. Use PDF files (learn how to optimize meta tags and onpage PDF alt text and Accessibility). Expand with images which have BEFORE YOU UPLOAD THEM been right clicked to add (on your computer) meta information to the image files. Make sure to name your image info TRUTHFULLY (Google can read the content of images) so do not call it PARIS HILTON and ME unless it is a photo of you and Paris. Use the "+" sign between keywords. Per example if indeed it is a picture of you with Paris Hilton in Saint Tropez in the summer of 2008 then you might wish to name the image: YourFullnameInOneword+ParisHilton+SaintTropez+France+2008.jpg - note that some image formats do not allow for meta tags. Also be aware that as soon as you start tagging your images these keywords will be READ BY THE ROBOTS as they crawl your markup - so DO NOT SPAM your image titles and have DIFFERENT image tittles. Also place your images in a 2 deep folder system on your server AND ALWAYS LINK TO THE IMAGE WITH THE FULL URI / URL.
    4c) Next spend a few hours reading a good BOOK about SEO. There are several. The best I have found is by DAVID VINEY and called "Get to the Top on Google" (Published by Nicholas Brealey Publishing - London, Boston). This book will give you tips and techniques to get your site to the of the search engine rankings and stay there. Also read the archives of Vanessa Fox's Blog - www.ninebyblue.com/blog/ (HGD now > http://www.ninebyblue.com/blog/seo/).
    5) Set your objective to 3 keywords or keyword phrases per page.
    6) Start to NAME YOUR PAGES with your keywords and name your folders as well - but try to do this ALL in small letters with dashes between words.
    7) Install Google Webmaster Tools.
    8) Make and add a XML sitemap and update this on Google Webmaster Tools. (And get Google Analytics)
    9) Start to seek IN THE TEXT BODY PageRank 5 and higher "follow links"
    (see here info about NOFOLLOW links on Wikipedia: http://en.wikipedia.org/wiki/Nofollow).
    10) Take a break and start again - the key to success is WORK. Nothing else will give you lasting success as honest effort.
    11) ... and as Nancy O. said: only a short time ago: patience!
    I quote Nancy:
    Up 'til now, modern browsers have been very tolerant of poorly coded web sites.  With each new release, browsers are becoming more strict about web standards and less forgiving of code errors. So while your site may be OK for today, tomorrow's updates could bring a different story.
    Hans-Günter

  • My Wish List Disappeared

    I was reviewing audio books on my wish list and the list just became empty.  I have stopped and restarted iTunes and I have manually re-logged into my apple account but the list keeps coming up empty.  I have tried both the shortcut on the top right and from the drop down on the top left but nothing.  Is this a temporary issue with Apple, is my list gone for good or is there a way to recover it?
    I'm on a Mac running OS10.9.4 and iTunes 11.3.1
    Thanks.

    Hi Tom,
    Glad to hear that you were reviewing audio books. I wouldn't worry about your wish list - for now at least. And the reason is that Apple's servers have recently been virtually besieged by glitches. You can read in the mainstream media circus about how some celebrities supposedly had their personal pictures "hacked" from Apple's iCloud servers. Personally, I don't believe that is anything other than a publicity stunt. The reason being that (apparently) no ransom demands went along with the supposed hacks.
    Tom, I hate to be the one who tells you this, but the USA and our corporations large & small are currently under cyber-attack. Brian Krebs is a security 'white hat' - if you will. If you navigate to his website you can read the proof about which countries are currently playing host to numerous, devious, cyber-criminals & hackers.
    This has been going on for some time now, but since the USA is leading the way, so to speak, using economic sanctions against certain foreign "entities", the backlash is currently like a digital tsunami. In other words, Apple... along with all kinds of companies (high-tech or otherwise), government agencies, etc... are in an ongoing process of tightening mutilayered security protocols.
    Hang in there Tom... give Apple some time to make things right... history reveals that they always do.
    BTW, I just signed into iTunes & my wish is fine. Perhaps yours is too.
    Sometimes by checking out the following link, it reveals if there are current problems http://www.apple.com/support/systemstatus/
    note: click the arrows on that page to bring the graph to Sept. 2nd for an example of "iTunes Store - Some users were affected".
    Best Regards,
    mm

  • Menus popping and keeping me from clicking/Safari wants login all the time

    I bought this iMac in Jan. I suffered through viruses and hacking with four XP's. I bought a Mac so as to never be in that **** again. Well I've been reading sysprofile logs and watching the records of apps I've never used. Today I saw fax verifications when I've never sent nor received one. My folders and files change all the time. For example, right now my desktop is covered in all the logs I saved and filed in my documents files. When I open them, presto magic, the info I saved has changed to something else. Sometimes as many as 30 files pop open one by one on the desktop while iTunes plays the song Crazy. I am not making this up. Since I am new to iMac I didn't even recognize that someone had used Grab to put a picture of "share folders" with a "start" button in the middle of my desktop and it cannot be deleted. I know you think it's because I'm a novice, but, believe me, I got enough ed with those XP's to work for Microsoft. I called Apple and told them that I either need a white hat hacker or a priest to fix this baby. I mean I don't even know how to begin to tell someone over the phone all the things this crazy machine does. But for now, since I am trying to continue my online biz, I only ask that someone please, for the love of God, tell me 1) how to stop the pop-up menus that keep me from clicking anywhere--the menus don't even make sense or even remotely apply to what I'm doing. It's a pointer fight at every click. I have gone over sys prefs a hundred times. And, 2) how to keep Safari from popping a menu down every few minutes asking for a new kind of named login no matter how I change the keychain. Yes, everything is locked up tight. No one shares or has access to my computer, and yet Big Bang is saying "Goodnight" to me and I've never played it or even knew I had it. I read a lot of pages in this forum and read a lot of familiar sounding stuff. I feel so overwhelmed, disappointed and depressed. Thank you.
    iMac   Mac OS X (10.4.9)   I'm sorry this is long. I feel desperate because you should see the notebooks I already have.

    Andropov14-
    Try unplugging your WiFi router for a few seconds.
    Fred

  • RSS Vulnerability in Safari - Can we please get a patch for this

    Disclosure of information vulnerability in Safari
    Posted on Sun, 11 Jan 2009
    Last edited Wed, 14 Jan 2009
    Note: The original version of this page contained a simple workaround for this issue which I believed would protect users against this problem. I have since discovered (on 13 January 2009) that changing the default RSS feed reader application in Safari does not correctly disassociate Safari from all RSS feed URLs. The workaround section of this post has been updated with additional information. I regret that what initially appeared to be a simple workaround is now substantially more complicated and requires the installation of third-party software to perform.
    I have discovered that Apple's Safari browser is vulnerable to an attack that allows a malicious web site to read files on a user's hard drive without user intervention. This can be used to gain access to sensitive information stored on the user's computer, such as emails, passwords, or cookies that could be used to gain access to the user's accounts on some web sites. The vulnerability has been acknowledged by Apple.
    All users of Mac OS X 10.5 Leopard who have not performed the workaround steps listed below are affected, regardless of whether they use any RSS feeds. Users of previous versions of Mac OS X are not affected.
    Users of Firefox, Camino, and Opera on Mac OS X are substantially better protected against exploitation by a malicious web page than users of Safari or OmniWeb. If users of these browsers are asked to open a link in Safari, they should not allow the request and close the page which triggered the request immediately. All users of Mac OS X may still be affected by clicking on a malicious link from their email client, instant messaging program, or another application, and should perform the workaround steps given below.
    Users of Safari on Windows are also affected. Users who have Safari for Windows installed but do not use it for browsing are not affected.
    The details of this vulnerability have not been made public to the best of my knowledge, but secrecy is no guarantee against a sufficiently motivated attacker.
    To work around this issue until a fix is released by Apple, users should perform the following steps:
    Download and install the RCDefaultApp preference pane, following the included instructions.
    Open System Preferences and choose the Default Applications option.
    Select the "URLs" tab in the window that appears.
    Choose the "feed" URL type from the column on the left, and choose a different application or the "<disabled>" option.
    Repeat the previous step for the "feeds" and "feedsearch" URL types.
    The only workaround available for users of Safari on Windows is to use a different web browser.
    Apple has not made information available on when a fix for this issue will be released. Users with questions or concerns should contact Apple as I have no additional information about this vulnerability which can be shared at this time.
    For the curious, security issues in Mac OS X which I previously reported to Apple were fixed in Security Updates 2008-001, 2008-002, 2008-003, and 2008-004.
    Reference: http://brian.mastenbrook.net/display/27

    cromdubh wrote:
    How come the entire Apple community isn't going APE about this issue?
    What exactly do you want? Worldwide demonstrations? The Mac community to lay siege to Infinite Loop? Vulnerabilities crop up quite regularly on any OS, and fortunately less commonly on Mac OS X. Apple take security threats very seriously. I'm sure that Apple's script-smiths have been sweating 24/7 over a fix for this ever since it was brought to their attention, in the meantime FLUIDNYC has posted Brian Mastenbrook's workaround. And be grateful that there are White Hats such as B.Mastenbrook Esq who search out vulnerabilities and bring them to our attention.
    Have fun,
    Adrian

  • Authenticate using a token

    in this F LASH M EDIA SERV ER 4.0 DEVELOPER’S GUIDE document,
    The control flow is as follows:
    1The client SWF requests an authentication token from a third party.
    2The third party returns the token to the client.
    3The client sends the token with its connection request.
    4Flash Media Server verifies the token with the third party system.
    5Flash Media Server accepts the connection.
    but not clear ,now ,i have token client script and  token server script, next how to do?

    well the PHP Login Sessions  and swfObject controls whether or not the html page that the SWF is embedded in is allowed to embed no PHP login session no access to the embed page. Usually I also have an array of allowed users on the FMS serverside script this list is updated with loadVars or XML or manually I just described the core concept above. The details of how you use it or structure it all depends on your app and security analysis. Feel free to disagree with me I've never had an actual security  assement done on it by say a white hat.

  • Meta tags or descriptions

    Are Meta tags or descriptions the best way for your website to get picked up by Google, Bing, & Yahoo?  Or do you have to pay them for better results?  Thanks!

    Since some months I use "Dublin Core Metadata".
    Here the link: http://www.metatags.info/dublin_core_metadata_element_set
    On the other hand – what concerns "Olde Worlde Lace's “that neither it nor this forum  say much about“ there was a very interesting thread here in the forum about SEO, which I remember.
    1) Fully understand your markup language.
    2) Work first BEFORE anything on CONTENT not on black hat "tricks" and or on white hat inbound links.
    3) Expand the content so that you become an authority on the subject of the keyword phrases you wish to appear well ranked for.
    4a) Avoid the error of going all over the internet looking for the "ONE WAY TO SUCCESS" posts. There is NO such thing. Google does not rank all sites and blogs by the same values. Some are simply in the top ten for middle to complex keywords and keyword phrases because of their AGE and the AUTHORITY factor (that they contain original content with good outbound links WHILE OTHER BLOGS AND SITES are listed in the top ten ON REGIONAL search because of inbound links (example: You are better ranked on Google.FR if you have FRENCH blogs from FRENCH servers linking to you as well as being yourself hosted on a FRENCH dot fr domain or a in France hosted dot com). And there are certain pages which are ranked simply by the volume of search requests for that page. And then there are others which appear and remain in the top ten because they are rated by Google with what is called PageRank .... and on and on.
    In other words before you end up getting depressed and giving in to purchasing Adwords (sponsored links) try the following:
    4b) Set a routine. Make this routine involve an hour at least per day to UPDATING and EXPANDING your content. Use PDF files (learn how to optimize meta tags and onpage PDF alt text and Accessibility). Expand with images which have BEFORE YOU UPLOAD THEM been right clicked to add (on your computer) meta information to the image files. Make sure to name your image info TRUTHFULLY (Google can read the content of images) so do not call it PARIS HILTON and ME unless it is a photo of you and Paris. Use the "+" sign between keywords. Per example if indeed it is a picture of you with Paris Hilton in Saint Tropez in the summer of 2008 then you might wish to name the image: YourFullnameInOneword+ParisHilton+SaintTropez+France+2008.jpg - note that some image formats do not allow for meta tags. Also be aware that as soon as you start tagging your images these keywords will be READ BY THE ROBOTS as they crawl your markup - so DO NOT SPAM your image titles and have DIFFERENT image tittles. Also place your images in a 2 deep folder system on your server AND ALWAYS LINK TO THE IMAGE WITH THE FULL URI / URL.
    4c) Next spend a few hours reading a good BOOK about SEO. There are several. The best I have found is by DAVID VINEY and called "Get to the Top on Google" (Published by Nicholas Brealey Publishing - London, Boston). This book will give you tips and techniques to get your site to the of the search engine rankings and stay there. Also read the archives of Vanessa Fox's Blog - www.ninebyblue.com/blog/ (HGD now > http://www.ninebyblue.com/blog/seo/).
    5) Set your objective to 3 keywords or keyword phrases per page.
    6) Start to NAME YOUR PAGES with your keywords and name your folders as well - but try to do this ALL in small letters with dashes between words.
    7) Install Google Webmaster Tools.
    8) Make and add a XML sitemap and update this on Google Webmaster Tools. (And get Google Analytics)
    9) Start to seek IN THE TEXT BODY PageRank 5 and higher "follow links"
    (see here info about NOFOLLOW links on Wikipedia: http://en.wikipedia.org/wiki/Nofollow).
    10) Take a break and start again - the key to success is WORK. Nothing else will give you lasting success as honest effort.
    11) ... and as Nancy O. said: only a short time ago: patience!
    Hans-Günter

  • Latency leads to full system Failure in Exchange 2010 - Resolved in 2013?

    My work encountered a bug - and for no lack of trying - I could not find any bug submission for Ex2010 anymore.  Since Most programming relies on the foundation of the past - if replication service was implemented the same in 2013 than it could leave
    to a full system failure.
    The issue is something happened in REPLICATION service in such a fashion that it accepted a connection, and in the programming it set a variable to a LARGE NUMBER (fail closed) to replace for "Copy Queue
    length" in the ball park of 922 quadrillion.
    The service never updates this value because of its quasi-state and some timeout occurs and now the GOOD servers think their copy is ludicrously behind.  This causes the GOOD servers to attempt to fail-over - as they believe their copy from the BAD
    server has failed or perhaps another check fails...
    [6 DAG pieces on 3 servers, 4 pieces per server]
    In my scenario Server 3 holds:  
    1 part of server 2  <= Tells server 2 you're bad - don't fail over
    1 part of server 1. <= Tells server 1 you're bad - don't fail over
    2 parts its own <= "good" - though dead replication service
    As I do not know if this exploitable by simply placing a listener in place of replication service to accept and do not respond to connections - I do not know.  However, there is a "bug" or flaw in my opinion to allow 1 bad server to superceed
    two good servers based on a partial service crash.  Simply stopping replication service on Server 3 allowed Server 1 / 2 to take over with out issue - I then restarted replication service and no issue since. 
    Since i wasted an hour looking where to submit this - this forum will hopefully do - I am very much a white hat - but I am dislike the non-simple way before me to disclose said information to the creator.  I want my hour back for their non-intuitive
    process, or maybe the simply don't care about Exchange 2010.
    - Dan

    Please note "LATENCY" in my topic is not network but inter-process on a single host, and is used as saying a timeout occurs without value.

  • Dyman & Associates Risk Management Projects: 10M Passwords Publicized For Research

    We've all heard of this before: a hacker releasing a certain number of passwords and usernames, presumably just for the lulz. But this time, we're talking about 10 million records posted by no less than a security specialist himself.
    Security expert Mark Burnett has published 10 million sets of usernames and passwords online in an effort to equip the security sector with more information, while also getting himself potentially tagged as a criminal.
    He clarified that his release of the username-password list is solely for white-hat purposes -- to aid research in making login authentications more effective and fraud-proof. Burnett insisted that he does not intend to help facilitate any illegal activity
    or defraud people by his actions.
    "I could have released this data anonymously like everyone else does but why should I have to? I clearly have no criminal intent here. It is beyond all reason that any researcher, student, or journalist have to be afraid of law enforcement agencies that
    are supposed to be protecting us instead of trying to find ways to use the laws against us," he said in his post.
    Leaking a massive amount of user data into the wild certainly does not sound like great help for most people but for security professionals, it's an important tool for research. For instance, how else would they know that online users are generally bad at choosing
    passwords? 
    In his post, he shared that he would often get requests for his password data from researchers but he would just decline them before. But since he also know its importance, he decided to publish a clean data set for the public. 
    "A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So I built a data set of ten million usernames and passwords that I am releasing to the public domain."
    To be fair, Dyman & Associates Risk Management Projects confirms that analyzing a username-password set seems to be more helpful for the security researchers.
    According to him, it was by no means an easy decision but he eventually posted it after weighing down a number of factors. And though Burnett said he believes most of the data are already expired and unused, the domain part of the logins and any keyword that
    could link it to a certain site were still  removed to make it difficult for those with criminal intent. 
    Besides, Dyman & Associates Risk Management Projects experts agreed with him in saying that if a hacker would need such a list in order to attack someone, he's not going to be much of a threat.
    Burnett has previously helped in collecting the recent list of worst passwords to alarm people into adopting better practices when it comes to their login credentials.
    Lastly, he imparted the following warning for complacent users: "Be aware that if your password is not on this list that means nothing. This is a random sampling of thousands of dumps consisting of upwards to a billion passwords."

  • Adobe reader 9 security problem?

    Yes, i recently read about this security problem with the PDF.  I would like to know what if anything has/is being done about it and does it affect all computers or just the corporate ones?  I also read there was a patch coming out about this and I would like to know where and how to get it if it is necessary.

    Well, don't let this scare you ... ... but a lot of software vulnerability information is out there if you just know where to look.
    Probably the most definitive source is the US CERT Vulnerabilities Database which is searchable at http://www.kb.cert.org/vuls/html/search.
    This database is maintained by the "United States Computer Emergency Readiness Team (CERT)" at Carnegie-Mellon University.  It's not the only database out there, but it's one of the best.
    Another thing to bear in mind is that Adobe has many large government contracts ... a huge amount of government documentation (e.g. IRS forms) are produced using PDF.  Therefore, you know that Adobe is informed when a vulnerability is discovered, and it has a positive-duty to participate in looking for them as well as resolving them.  If you keep your systems up-to-date you can expect that patches for them will be timely included.  (I am not, of course, saying that these expectations will invariably be met!)  Software development organizations do maintain, although they do not routinely externally publish, problem/resolution databases that are integrated into their version-control systems.
    Digging just a little bit deeper, I see that Adobe maintains "security advisories" among its support-page options.  (I see that the CERT advisories refer to these URLs.)  So, the information you are looking for is out there, and I'm sure that Adobe Support (note: I do not work for them...) can help answer specific questions ... especially if you have something like a CERT Advisory Number to refer to.
    Many folks imagine that software companies try to conceal their vulnerabilities, when in fact the exact opposite is true:  there is no such thing as "security by obscurity."  White-hat people work very studiously to "get the word out."  It is an international effort.
    It can be a bit disconcerting at first to see literally thousands of reports (some open, some closed) concerning a well-established product that you use every day.  Any exploit or vulnerability, realized or imagined, practical or theoretical, goes into that database:  "Knowledge is Power."

  • Meta name="keywords"

    Hello,
    I am degsigning a new website and all went well until I cut and pasted the <meta name="keyword" contents=blah! blah! blah! blah! blah! blah! blah!. /> from the old site and performed a Clean up Word html but html 5 threw it's toys out of the pram and deleted it compeltely.
    Does this mean Keywords are now obsolete? if so what do we use for Key Word assuming they are still used but under another guise? Obviously each page has it's own title and below that I have the Description which is a brief sentance about the webpage.
    I am now confused
    Lee

    Hello Lee,
    may I put in my five cents too relating to the chapter "meta names"? there had been very interesting threads here in the forum about SEO, which I remember. Please have a look here e.g.:
    http://forums.adobe.com/message/4853435#4853435 (esp. consecutive number 3).
    In my library I found this detailed description from 2009, BUT still up-to-date in my eyes:
    1) Fully understand your markup language.
    2) Work first BEFORE anything on CONTENT not on black hat "tricks" and or on white hat inbound links.
    3) Expand the content so that you become an authority on the subject of the keyword phrases you wish to appear well ranked for.
    4) Avoid the error of going all over the internet looking for the "ONE WAY TO SUCCESS" posts. There is NO such thing. Google does not rank all sites and blogs by the same values. Some are simply in the top ten for middle to complex keywords and keyword phrases because of their AGE and the AUTHORITY factor (that they contain original content with good outbound links WHILE OTHER BLOGS AND SITES are listed in the top ten ON REGIONAL search because of inbound links (example: You are better ranked on Google.FR if you have FRENCH blogs from FRENCH servers linking to you as well as being yourself hosted on a FRENCH dot fr domain or a in France hosted dot com). And there are certain pages which are ranked simply by the volume of search requests for that page. And then there are others which appear and remain in the top ten because they are rated by Google with what is called PageRank .... and on and on.
    In other words before you end up getting depressed and giving in to purchasing Adwords (sponsored links) try the following:
    4b) Set a routine. Make this routine involve an hour at least per day to UPDATING and EXPANDING your content. Use PDF files (learn how to optimize meta tags and onpage PDF alt text and Accessibility). Expand with images which have BEFORE YOU UPLOAD THEM been right clicked to add (on your computer) meta information to the image files. Make sure to name your image info TRUTHFULLY (Google can read the content of images) so do not call it PARIS HILTON and ME unless it is a photo of you and Paris. Use the "+" sign between keywords. Per example if indeed it is a picture of you with Paris Hilton in Saint Tropez in the summer of 2008 then you might wish to name the image: YourFullnameInOneword+ParisHilton+SaintTropez+France+2008.jpg - note that some image formats do not allow for meta tags. Also be aware that as soon as you start tagging your images these keywords will be READ BY THE ROBOTS as they crawl your markup - so DO NOT SPAM your image titles and have DIFFERENT image tittles. Also place your images in a 2 deep folder system on your server. Example: /images/KEYWORD/YourFullnameInOneword+ParisHilton+SaintTropez+France+ 2008.jpg AND ALWAYS LINK TO THE IMAGE WITH THE FULL URI / URL.
    4c) Next spend a few hours reading a good BOOK about SEO. There are several. The best I have found is by DAVID VINEY and called "Get to the Top on Google" (Published by Nicholas Brealey Publishing - London, Boston). This book will give you tips and techniques to get your site to the of the search engine rankings and stay there. Also read the archives of Vanessa Fox's Blog - www.ninebyblue.com/blog/ (corrected by HGD now > http://www.ninebyblue.com/blog/seo/).
    5) Set your objective to 3 keywords or keyword phrases per page.
    6) Start to NAME YOUR PAGES with your keywords and name your folders as well - but try to do this ALL in small letters with dashes between words.
    7) Install Google Webmaster Tools.
    8) Make and add a XML sitemap and update this on Google Webmaster Tools. (And get Google Analytics)
    9) Start to seek IN THE TEXT BODY PageRank 5 and higher "follow links"
    (see here info about NOFOLLOW links on Wikipedia: http://en.wikipedia.org/wiki/Nofollow).
    10) Take a break and start again - the key to success is WORK. Nothing else will give you lasting success as honest effort.
    On the other hand you can expedite a bit by using "Dublin Core Metadata". Here the link:
    http://www.metatags.info/dublin_core_metadata_element_set
    ... and as Nancy O. said - only a short time ago - be patient!
    Good luck!
    Hans-Günter

  • Windows 10 WSUS

    We have an 2008 RDS Gatway that works fine with Win7 but for some reason Windows 10 says can't connect to the remote computer because the Remote Desktop Gateway Server is temporarily unavailable.
    Same Remote Desktop Settings on both but Windows 10 gets that error.
    Any suggestions or solutions?
    Thank you
    Matt

    Black Hat USA is next week, and with it will come some of the biggest hacker news of the year. From cars to mobile devices, all the way to the hotel HVAC, nothing is really out of the reach of the teams of white hat and black hat security researchers that are about to make their way to this conference. With that though will be the thousands of attendees outside those main groups looking to still get a bit of work done while at the conference. Well, we don’t want to encourage you avoiding it all together, but want to give you some tips to survive the event even with all your devices that you need. So below you will find 10 tips to survive Black Hat 2015. You are welcome to reuse them and share them with your team going, or even as reminders of the digital landscape and threats around.

Maybe you are looking for