Amerikai Magyar Hírlap, 2008 (20. évfolyam, 3-51. szám)

2008-09-12 / 37. szám

Excerpts from John McCain’s Acceptance Speech My heartfelt thanks to all of you who helped me win this nomination and stood by me when the odds were long. I won’t let you down. I won’t let you down. I won’t let you down. (Cheers, applause, chants of “John McCain! John McCain! ”.) To Americans who have yet to decide who to vote for, thank you for your consideration and the oppor­tunity to win your trust. I intend to earn it. (Cheers, applause.) And finally, a word to Senator Obama and his supporters. We’ll go at it - we’ll go at it over the next two months. You know that’s the nature of this business, .and there are big differences between us. But you have my respect and my admiration. Despite our differences — (applause) - much more unites us than divides us. We are fellow Americans, and that’s an association that means more to me than any other. (Cheers, applause.) We’re dedicated to the proposition that all people are created equal and endowed by our creator with inalienable rights. No country - no country ever had a greater cause than that. And I wouldn’t be an Ameri­can worthy of the name if I didn’t honor Senator Obama and his supporters for their achievement. But let there be no doubt, my friends: We’re going to win this election. (Cheers, applause.) We’re going to win this election. (Cheers, applause continue.) AUDIENCE: (Chanting.) Yes, we will! Yes, we will! Yes, we will! SEN. MCCAIN: And after - and after we’ve won, we’re going to reach out our hand to any willing patriot, make this government start working for you again and get this country back on the road to prosperity and peace. (Cheers, applause.) Hi sfc >1« My friends, if you find faults with our country, make it a better one. If you’re disappointed with the mistakes of government, join its ranks and work to correct them. Enlist - (cheers, applause) - enlist in our armed forces. Become a teacher. Enter the min­istry. Run for public office. Feed a hungry child. Teach an - an illiterate adult to read. Comfort the afflicted. Defend the rights of the oppressed. Our country will be the better and you will be the happier because nothing brings greater happi­ness in life than to serve a cause greater than your­self. (Cheers, applause, chants of “USA! USA!”) I’m going to fight for my cause every day as your president. I’m going to fight to make sure every Ameri­can has every reason to thank God as I thank him: that I’m an American, a proud citizen of the greatest country on Earth, and with hard work - with hard work, strong faith and a little courage, great things are always within our reach. Fight with me. Fight with me. (Cheers, applause.) Fight for what’s right for our country. Fight for the ideals and character of a free people. (Cheers, applause continue.) Fight for our children’s future. Fight for justice and opportunity for all. (Cheers, applause continue.) Stand up to defend our country from its enemies. Stand up for each other; for beautiful, blessed, bounti­ful America. (Cheers, applause continue.) Stand up, stand up, stand up and fight. Nothing is inevitable here. (Cheers, applause continue.) We’re Americans, and we never give up. We never quit. (Cheers, applause continue.) We never hide from history. We make history. (Cheers, applause continue.) Thank you, and God bless you and God bless America. (Cheers, applause.) "Forgot Your Password" Links The Easy Way In For Hackers Never mind creating a pass­word with at least eight charac­ters, two of which are numbers, one of which is a capital letter, and one of which is a symbol like (*&A%$). The easiest way for a hacker to weasel into your account is likely the “Forgot your password?” link. “Forgot your password?” features are older than the Inter­net, providing businesses and site owners a simple way to let a user reset a forgotten password, provided he can verily his cre­dentials by asking a few personal questions that only the rightful user should know. For years the archetypical question was, of course, the “Mother’s maiden name” chal­lenge. In recent years, additional challenges have emerged, such as asking the street you grew up on, your favorite pet, and grandpar­ents’ first names. Is all of this stuff really secure ? More than one researcher is sounding the alarm over these tools, noting that while this data may have been private á decade ago, in an era of personal blogs, online resumes, and rampant HERBERT H. THOMPSON social networking services, “per­sonal” information drawn from your past is now widely available for public consumption. Accord­ing to a researcher at PARC, you can even buy black market directories of personal informa­tion “like dog’s names,” for about $15 per batch. It’s certainly a lot easier than guessing passwords like AHFplug41*. Think this doesn’t happen? There aren’t any statistics avail­able, but these hacks are widely suspected in myriad cases where accounts have been compro­mised. (Even Paris Hilton is said to have fallen prey to the “what is your dog’s name?” password reset hack. It doesn’t help to have one of the most infamous dogs in America...) But if you need more proof, check out this “how I did it” step by step guide to hack­ing a password from one writer at Scientific American. In about an hour, it seems, our researcher managed to compromise one (willing) victim’s life entirely through password reset links. MSNBC has an exhaustive amount of additional information on the issue, but the takeaway is clear: If you provide informa­tion for password reset systems, don’t use data (like other people’s names and addresses) that can be easily discovered or guessed. Better yet, consider creating a second tier of passwords you use for questions like these, and keep them written down and locked in a safe if you must. In other words: Your mother’s maiden name may really be Jones, but that you can’t pretend it wasn’t Mxlpxlxl!7631. How I Stole Someone’s Identity By Herbert H. Thompson The author asked some of his acquaintances for permission to break into their online banking accounts. The goal was simple: get into their online accounts using the information about them, Szeptember 12,2008 Q) In this July 14, 1961, photo, John McCain, left, and his parents, Roberta and Rear Admiral John S. McCain Jr., par-ticipate in the ceremony to commission McCain Field - the Navy training base in Mississippi named after Admiral John S. McCain, pictured. John McCain has said that “quick tempers, adventurous spirits, and love for the country’s uniform” run in his family. Cindy McCain: “America needs some­one of unusual strength and character to lead. Someone exactly like my husband” McCain served in Wash­ington without becoming a Washington insider, she says. Photo: Cindy McCain speaking at the Convention their families and acquaintances that is freely available online. Report: Technology’s Toll on Privacy and Security As a professor, a software developer and an author I’ve spent a career in software security. I decided to conduct an experiment to see how vulnerable people’s accounts are to mining the Web for information. I asked some of my acquaintances, people I know only casually, if with their permission and under their super­vision I could break into their online banking accounts. After a few uncomfortable pauses, some agreed. The goal was simple: get into their online banking account by using information about them, their hobbies, their families and their lives freely available online. To be clear, this isn’t hacking or exploiting vulnerabilities, instead it’s mining the Internet for nug­gets of personal data. Here’s one case. I share it here because it represents some of the common pitfalls and illustrates a pretty serious weakness that most of us have online. Setup: This is the case of one subject whom I’ll call “Kim.” She’s a friend of my wife, so just from previous conversations I already knew her name, what state she was from, where she worked, and about how old she was. But that’s about all I knew. She then told me which bank she used (although there are some pretty easy ways to find that out) and what her user name was. (It turns out it was fairly predictable: her first initial + last name.) Based on this information, my task was to gain access to her account. Step 1: Reconnaissance: Using her name and where she worked, I found two things with a quick Google search: a blog and an old resume. Her blog was a goldmine: information about grandparents, pets, hometown, etcetera (although it turns out I didn’t need to use most of this). From the resume I got her old col­lege e-mail address and from her blog I got her G-mail address. TO BE CONTINUED DUNA Travel 8530 Holloway Dr. #102 W. Hollywood, CA 90069 Spa, Hotel foglalások, Kocsi bérlés Kedvezményes repülőjegy árak LAX-BUD-LAX $531 .-tői +Tax +Fee szeptember 10-től Információért hívják ZSUZSÁT TEL: (310) 652-5294 FAX: (310) 652-5287 1-888-532-0168 AMERIKAI lifagyar Hírlap

Next

/
Oldalképek
Tartalom