0 Members and 1 Guest are viewing this topic.

The site came back. I can access all pages.  lolol/
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
"Tell the angels no... Heaven can wait"!

I wonder if we'll get an adequate answer as to what really happened. Thanks for the info that it's back up. Let's see how many posts are now missing...
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
I'm proud to be a child of God and a member of MJ's Army of L.O.V.E.
 
"Press coverage of my life is like [watching] a fictitious movie...like watching science fiction. It's not true." ~Michael Jackson (2005)

"You should not believe everything you read. You are missing the most important revelations". Craig Harvey 3-15-2012

Quote from: "voiceforthesilent"
I wonder if we'll get an adequate answer as to what really happened. Thanks for the info that it's back up. Let's see how many posts are now missing...

I aready gave you the adequate answer. There is also a longer backstory, research it, Sony's servers were hacked a while back and tons of files were stolen, among them a couple of unreleased Cascio tracks. Those tracks then leaked. Sony then took a very good look at MJ fan boards to see if people post links to the leaks for illegal download, one of those boards they looked at was MJJC. The admin has been trying to sort this out with Sony for a few months now, judging from his tweets yesterday he let them look at the server, but they didn't give it back as promised. So he gave them a call (to LA), and then they gave it back and it's back online now.

Front did not take down MJJC as a "sign".
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions

*

bec

Quote from: "willddoMJ"
Quote from: "MJmakesmespeechless"
Quote from: "_Anna_"
On MJJC twitter the administrator said

"Guys, the server is fine, the data is fine, all that is happened its been unplugged and taken somewhere "


What does it mean to have a server "unplugged" and "taken somewhere"?

I do not know....never heard this term!


I'd expect a server be like a computer, stores all data and backups regularly that separate from the other system, i could be wrong suspicious//

Yes, It's just like a PC tower, or well, a series of PC towers, so it means exactly that... someone unplugged it from the wall, picked it up, and took it away.

To clarify, I was kidding when I said that now Front can't sign in can he, it was a joke. I'm sorry it didn't come across properly but I was NOT suggesting that I thought there was a connection there.
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
Are you entertained?

*

MJonmind

I'm not entirely convinced the trouble had nothing to do with Michael, but since I don't have any saavy in these areas, I apologize for making too much of it :oops: and getting carried away. We don't totally know yet whose behind this "Anonymous" (V-like character) who is getting involved in mobilizing a movement of sorts. I posted about this article in my Macleans on another thread. Seeing the Guy Falkes masks in the magazine definately caught my attention, and it related to hacking Sony. The motives of a few hackers might be for laughs, but mostly they do it for making a LOT of money.

You are not allowed to view links. Register or Login
Quote
Hacker attack
A rash of high-profile thefts reveals just how unsafe the Internet we depend on has become

by Chris Sorensen on Friday, June 17, 2011 11:50am
Yoshikazu Tsuno/AFP/Getty Images

Visitors to the Conservative Party of Canada’s website last Tuesday were confronted with a shocking message: the Prime Minister had been rushed to hospital in Toronto after choking on a hash brown. Media outlets scrambled to unearth more details about the breakfast-hour emergency only to learn that it was all a big joke. The party’s website had been hacked.

It didn’t take long to find out who was behind the prank. A group calling itself LulzRaft claimed responsibility on Twitter, and later followed up by breaking into the party’s donor database and posting names and emails of more than 5,000 people online. Why did they do it? “The Conservative party was really just a hack of opportunity,” wrote someone purporting to be the hacker in an anonymous email to Maclean’s. “We noticed the vulnerability and realized we could easily create some lulz, and draw some media attention without hurting anyone.” For the uninitiated, “lulz” is Web-slang for laughs—derived from the abbreviation LOL, for “laugh out loud.”

But the Tories aren’t laughing. Nor should they be. It’s an embarrassing breach of security for a governing party that, just a few months earlier, assured Canadians that it had a cyber-security strategy in place. It’s also the latest in a string of brazen attacks on high-profile targets around the globe, ranging from Sony Corp. and Google Inc. to defence contractor Lockheed Martin and the International Monetary Fund. In addition to attention-seekers like LulzRaft, experts say many more hackers are quietly working on behalf of organized crime and even foreign governments—so much so that Washington is now talking about cyberattacks as a potential “act of war.”


“We have guys in their basements doing horrible things to these humongous companies and governments,” says Brad Haines, an Edmonton-based hacker and security consultant who goes by the online handle RenderMan. So just imagine, he says, what a dedicated criminal organization or well-funded foreign government could accomplish.

The sobering reality is that, as more of our lives and livelihoods are moved online, the more tantalizing the targets become for cybercrooks. At the same time, security experts say many of our defences are still stuck in the 1990s, if they exist at all. For those with short memories, that was a time when viruses like Melissa and Michelangelo merely threatened to clog our networks, not steal from us. And if we can’t even stop the glory-seeking “hacktivists,” who announce their every move, how are we supposed to protect ourselves from those with more sinister intentions? “There’s an old joke about how we are losing the war on drugs,” says Haines, who figures the Harper hack was made possible by something as mundane as out-of-date software or a weak password. “It means that we are losing the war to people on drugs. I mean, how bad can we get?”

To get a sense of what kind of damage a few angry computer geeks can do, consider the cyberflogging that Sony—a computer and electronics company, no less—has endured over the past few months. The firm’s troubles appear to have originated from a series of skirmishes with customers who wanted to modify their PS3 game consoles to run a Linux operating system. It ultimately resulted in Sony taking one hacker to court.

It didn’t take long before
hackers operating under the name Anonymous [/color] decided to retaliate. The loose-knit group has also taken responsibility for attacks against the Church of Scientology, the controversial Westboro Baptist church and, most notably, PayPal, Visa and Mastercard in response to those firms’ decision to stop enabling financial contributions to WikiLeaks. With apparently little effort, hackers managed to steal personal data from 77 million Sony PlayStation Network customers, forcing Sony to temporarily shut down the popular online game-playing network in April.
It didn’t end there. A hacker group calling itself LulzSec taunted Sony in a May 31 post on Twitter: “Hey @Sony, you know we’re making off with a bunch of your internal stuff right now and you haven’t even noticed? Slow and steady, guys.” LulzSec, whose Twitter page is called “The Lulz Boat” (which explains the name of the smaller, copycat LulzRaft group that targeted Harper), also released what it claimed was source code for the Sony Computer Entertainment Development Network on June 6. Later that week, Sony acknowledged an attack on its Sony Pictures website, and that 37,500 visitors to the site had passwords, emails, and other potentially identifying details stolen.

The people behind LulzSec have also claimed responsibility for several other prominent hacks in recent months. They include: broadcaster PBS, whose website was hacked to post a story claiming that dead rapper Tupac Shakur was still alive;
an Atlanta-based FBI contractor called InfraGard, which resulted in data about its user base being posted on the Web; and Nintendo, although LulzSec stressed via Twitter it wasn’t upset with the Japanese game-maker: “We like the N64 too much¬—we sincerely hope Nintendo plugs the gap.”

Suffice it to say, Sony’s new-found status as the Internet’s favourite whipping boy has been a public relations nightmare, costing it an estimated US$173 million. Its stock is down about 10 per cent since the beginning of the month. And while the Japanese company is working with law enforcement to capture the culprits—three hackers were arrested in Spain just last week—most security experts say that apprehending a couple of computer nerds is unlikely to solve the problem (Anonymous is believed to have hundreds of members all over the world). “Yes, it’s criminal and it’s wrong, but there are much larger issues out there,” says Haines. “We have to give our information to these companies and they’re not protecting it properly.”

As it turns out, however, even the companies whose raison d’être is network security are struggling. Earlier this year, a firm called RSA, a subsidiary of EMC Corp., was the victim of what it referred to as an “extremely sophisticated cyberattack” that compromised some 40 million of the company’s SecurID tokens. The tokens generate authentication codes every 30 or so seconds and are given to employees of client companies so they can log in to secure networks with an extra level of security. It’s believed that the compromised tokens were later used in an attack against Lockheed Martin, although the defence contractor said in May that it stopped the attack before any data was stolen.

Such well-planned, multi-stage attacks suggest these hackers are interested in more than just bragging rights. It raises the possibility of a systematic campaign on behalf of a government or some other politically motivated group. “Why would you breach Lockheed Martin? Because you’re after a country’s defence technology secrets,” says Anup Ghosh, the founder and CEO of browser security company Invincea and a former program manager at the U.S. Defense Advanced Research Projects Agency, or DARPA.

Google, too, has found itself in the crosshairs of a sophisticated hacker campaign, apparently emanating from China. The search giant says passwords and emails from hundreds of Gmail accounts were stolen by Chinese hackers in a bid to target senior U.S. government officials, activists and others.

It’s not only the private sector that’s at risk. Late last week the IMF acknowledged a breach of its systems, while earlier this year the CBC reported that two Canadian government departments and one agency—Finance, the Treasury Board and Defence Research and Development Canada—were targeted. Ottawa eventually confirmed an “unauthorized attempt” to access the Treasury Board’s network, but said there were “no indications that any data relating to Canadians was compromised.” The U.S. government has also been a target, and said recently that cyberattacks could be considered an “act of war,” forcing a conventional response. “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” an unnamed military official was recently quoted as saying in the Wall Street Journal. On the other hand, the U.S. and Israel are believed to be behind a worm called Stuxnet that targeted Iran’s nuclear capabilities.

Equally likely, however, is that hackers are seeking government information that can be used for financial gain. Briefing notes about trade policy. Emails discussing a pending corporate merger. Drug approvals. The possibilities are endless. “It’s a wholesale theft of a nation going on right now,” says Ghosh, adding that many breaches likely go unreported—particularly among U.S. government agencies where there is little upside to going public. “These networks are getting compromised: federal, civilian, DOD [U.S. Department of Defense]. They are in our networks stealing terabytes of data every day. On a national level, it’s the loss of economic competitiveness with other countries.” Ghosh claims that, although none will admit it, most government departments buy the exact same off-the-shelf security systems that everyone else uses—much of which he says were originally developed in the 1990s. “The threat has radically evolved since then, but our defences have not,” he says. “It’s time for us to realize we are fighting the current war with the tools of the last war.” This could be one reason why instances of hacking appear to be on the rise, with some experts predicting a banner year for data breaches in 2011.

It’s not only state secrets that can yield big returns for cybercrooks. A 2010 report by the University of Toronto’s Munk School of Global Affairs explored one St. Petersburg gang that earned about $2 million a year with a simple but effective scheme called Koobface (an anagram for Facebook). It involved setting up fake social networking accounts and then sending links to unwitting “friends,” promising a video of the recipient captured naked by a hidden webcam. “One click leads down a Kafka-esque rabbit hole of viruses and Trojan horses,” according to the report. How did the gang make money? The compromised computers engaged in thousands of micro-transactions in multiple countries around the globe, often for less than a penny each. The transactions included things like clicking on online ads or downloading fake anti-virus software packages, with each hit generating a small cut for the gang.

A similar approach could also yield big returns in stock or currency trading schemes, according to Rafal Rohozinski, a principal at the Ottawa-based security firm the SecDev Group, which was involved in the Koobface report. Hackers could also team up with white-collar crooks looking to make money off of stock price movements—selling shares short after a major data breach has been revealed and the stock price plummets, only to buy them again before the shares recover. “It’s a perfect example of how cybercrime is much bigger and more commonplace than a pimply-faced teenager in the basement eating pizza,” says Rohozinski.

While hackers leave digital tracks, the sheer volume of attacks means that most operate with near-impunity because law enforcement agencies simply don’t have the resources to go after them. The Munk study, for example, said that Bell Canada records in the order of 80,000 new attacks per day on computers on its network. Nor does it help that most hackers, like those behind Koobface, tend to operate in foreign countries where local law enforcement has other priorities, creating an environment where computer crimes are viewed as a relatively risk-free endeavour. “If you look at the people involved in hacking, the centre of gravity is not in places like North America, it’s in places like Russia or, increasingly, places like Nigeria,” Rohozinski says. “For them, stealing or bilking a bank account owner in Toronto of his earnings is a hell of a lot safer than engaging in a knife fight over a fistful of rubles in a back alley in Russia.”

In 1994, the New York Times described the Internet as “a new Wild West” when it came to security. It’s still very much that way. Only now it’s littered with steamer trunks containing our most important valuables—many of them with their locks rusted or missing.
You are not allowed to view links. Register or Login
You are not allowed to view links. Register or Login
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions

*

_Anna_

Looking on MJJC twitter, they have a discussion with someone about a campaigh to promote Invincible (I don't know much about it but ut seems that some believers started it or it's supported by believers mostly; I don't know), and the administrator is against it just because believers are involved. I haven't seen so much prejudice among people who are supposed to love Michael. It's outrageous to see the discrimination so blatantly being thrown in our face. I think Jermaine's twitts against us were the ones and only who stuck in non-believers heads. His purpose was reached. "He would never so cruelly hoax the fans" is their idea of this all.

@KingMikeJ @clearmjsname2 guys you need to understand MJJC's situation should it support a campaign that is said to be a believers campaign.
about 9 hours ago via web in reply to KingMikeJ
 
Reply Retweet .   @clearmjsname2 so you are saying truthfully this has nothing to do with believers, there are all fans supporting this.
about 9 hours ago via web in reply to clearmjsname2
 
Reply Retweet .   @KingMikeJ @clearmjsname2 that is not what they said, they said its a believers campaign, so which is it.
about 9 hours ago via web in reply to KingMikeJ
 
Reply Retweet .   @clearmjsname2 Then you will find your efforts will gain more ground and support.
about 9 hours ago via web in reply to clearmjsname2
 
Reply Retweet .   @clearmjsname2 neither are connected, so I urge you in your quest to success to separate the two. for Michael and the fans
about 9 hours ago via web in reply to clearmjsname2
 
Reply Retweet .   @clearmjsname2 but as said, good luck, its a shame you can not just do this for Michael rather than to say its a believers campaign
about 9 hours ago via web in reply to clearmjsname2
 
Reply Retweet .   @Ben_971 yes babes, not befitting our policy of love and respect to all,
about 9 hours ago via web in reply to Ben_971
 
Reply Retweet .   @clearmjsname2 however we wish you well in your efforts to do what Sony failed so in 2001.
about 9 hours ago via web in reply to clearmjsname2
 
Reply Retweet .   @CannellaGirl Michael would never knowingly put his fans through June 25th, NEVER,
about 9 hours ago via web in reply to CannellaGirl
 
Reply Retweet .   @clearmjsname2 well in this case if you are saying its a believer campaign, we wish you well but will not be assisting in the promotion
about 9 hours ago via web in reply to clearmjsname2
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions

Quote from: "bec"
To clarify, I was kidding when I said that now Front can't sign in can he, it was a joke. I'm sorry it didn't come across properly but I was NOT suggesting that I thought there was a connection there.

I know you were joking, but others took it seriously. But on the bright side, you gave Front another story, so don't be surprised if he comes back now posting something cryptic that seems to suggest he actually took MJJC down. :lol:

P.S. Where did the edit button go? I need it, I type like a monkey.
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions

Quote from: "Sarah31"
Quote from: "bec"
To clarify, I was kidding when I said that now Front can't sign in can he, it was a joke. I'm sorry it didn't come across properly but I was NOT suggesting that I thought there was a connection there.

I know you were joking, but others took it seriously. But on the bright side, you gave Front another story, so don't be surprised if he comes back now posting something cryptic that seems to suggest he actually took MJJC down. :lol:

P.S. Where did the edit button go? I need it, I type like a monkey.

edit only appears for limited time after your post has been made
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
<a href="You are not allowed to view links. Register or Login"><img src="You are not allowed to view links. Register or Login" alt="Subscribe to me on YouTube"/></a>

a comeback is far more greater when the odds are impossible

*

bec

Quote from: "Sarah31"
But on the bright side, you gave Front another story, so don't be surprised if he comes back now posting something cryptic that seems to suggest he actually took MJJC down. :lol:

ahaha :lol:  oy  :|

Quote from: "Sarah31"
P.S. Where did the edit button go? I need it, I type like a monkey.
Don't worry, you are not alone (lol) we all type like monkeys now that the edit button is disabled after 10 min.
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
Are you entertained?

Quote from: "bec"
Quote from: "Sarah31"
But on the bright side, you gave Front another story, so don't be surprised if he comes back now posting something cryptic that seems to suggest he actually took MJJC down. :lol:

ahaha :lol:  oy  :|

 :lol: He must be sitting there laughing thinking "this crap just writes itself".  albino/

Quote from: "bec"
Don't worry, you are not alone (lol) we all type like monkeys now that the edit button is disabled after 10 min.

Thanks, willddoMJ. And bec, what, now I have to find all my typos within 10 minutes? That's impossible.
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions

*

bec

Quote from: "Sarah31"
Quote from: "bec"
Quote from: "Sarah31"
But on the bright side, you gave Front another story, so don't be surprised if he comes back now posting something cryptic that seems to suggest he actually took MJJC down. :lol:

ahaha :lol:  oy  :|

 :lol: He must be sitting there laughing thinking "this crap just writes itself".  albino/

Dude you are kiiiiiiiiiiling me here.
 :lol:  :lol:
Last Edit: December 31, 1969, 06:00:00 PM by Guest
friendly
0
funny
0
informative
0
agree
0
disagree
0
pwnt
0
like
0
dislike
0
late
0
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
No reactions
Are you entertained?

 

SimplePortal 2.3.6 © 2008-2014, SimplePortal