Wed Apr 24 08:31:23 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2014-02-01

HANGOUT

2024-04-24 | 2024-03-24 | 2024-02-24 | 2024-01-24 | 2023-12-24 | 2023-11-24 | 2023-10-24 | 2023-09-24 | 2023-08-24 | 2023-07-24 | 2023-06-24 | 2023-05-24 | 2023-04-24 | 2023-03-24 | 2023-02-24 | 2023-01-24 | 2022-12-24 | 2022-11-24 | 2022-10-24 | 2022-09-24 | 2022-08-24 | 2022-07-24 | 2022-06-24 | 2022-05-24 | 2022-04-24 | 2022-03-24 | 2022-02-24 | 2022-01-24 | 2021-12-24 | 2021-11-24 | 2021-10-24 | 2021-09-24 | 2021-08-24 | 2021-07-24 | 2021-06-24 | 2021-05-24 | 2021-04-24 | 2021-03-24 | 2021-02-24 | 2021-01-24 | 2020-12-24 | 2020-11-24 | 2020-10-24 | 2020-09-24 | 2020-08-24 | 2020-07-24 | 2020-06-24 | 2020-05-24 | 2020-04-24 | 2020-03-24 | 2020-02-24 | 2020-01-24 | 2019-12-24 | 2019-11-24 | 2019-10-24 | 2019-09-24 | 2019-08-24 | 2019-07-24 | 2019-06-24 | 2019-05-24 | 2019-04-24 | 2019-03-24 | 2019-02-24 | 2019-01-24 | 2018-12-24 | 2018-11-24 | 2018-10-24 | 2018-09-24 | 2018-08-24 | 2018-07-24 | 2018-06-24 | 2018-05-24 | 2018-04-24 | 2018-03-24 | 2018-02-24 | 2018-01-24 | 2017-12-24 | 2017-11-24 | 2017-10-24 | 2017-09-24 | 2017-08-24 | 2017-07-24 | 2017-06-24 | 2017-05-24 | 2017-04-24 | 2017-03-24 | 2017-02-24 | 2017-01-24 | 2016-12-24 | 2016-11-24 | 2016-10-24 | 2016-09-24 | 2016-08-24 | 2016-07-24 | 2016-06-24 | 2016-05-24 | 2016-04-24 | 2016-03-24 | 2016-02-24 | 2016-01-24 | 2015-12-24 | 2015-11-24 | 2015-10-24 | 2015-09-24 | 2015-08-24 | 2015-07-24 | 2015-06-24 | 2015-05-24 | 2015-04-24 | 2015-03-24 | 2015-02-24 | 2015-01-24 | 2014-12-24 | 2014-11-24 | 2014-10-24 | 2014-09-24 | 2014-08-24 | 2014-07-24 | 2014-06-24 | 2014-05-24 | 2014-04-24 | 2014-03-24 | 2014-02-24 | 2014-01-24 | 2013-12-24 | 2013-11-24 | 2013-10-24 | 2013-09-24 | 2013-08-24 | 2013-07-24 | 2013-06-24 | 2013-05-24 | 2013-04-24 | 2013-03-24 | 2013-02-24 | 2013-01-24 | 2012-12-24 | 2012-11-24 | 2012-10-24 | 2012-09-24 | 2012-08-24 | 2012-07-24 | 2012-06-24 | 2012-05-24 | 2012-04-24 | 2012-03-24 | 2012-02-24 | 2012-01-24 | 2011-12-24 | 2011-11-24 | 2011-10-24 | 2011-09-24 | 2011-08-24 | 2011-07-24 | 2011-06-24 | 2011-05-24 | 2011-04-24 | 2011-03-24 | 2011-02-24 | 2011-01-24 | 2010-12-24 | 2010-11-24 | 2010-10-24 | 2010-09-24 | 2010-08-24 | 2010-07-24 | 2010-06-24 | 2010-05-24 | 2010-04-24 | 2010-03-24 | 2010-02-24 | 2010-01-24 | 2009-12-24 | 2009-11-24 | 2009-10-24 | 2009-09-24 | 2009-08-24 | 2009-07-24 | 2009-06-24 | 2009-05-24 | 2009-04-24 | 2009-03-24 | 2009-02-24 | 2009-01-24 | 2008-12-24 | 2008-11-24 | 2008-10-24 | 2008-09-24 | 2008-08-24 | 2008-07-24 | 2008-06-24 | 2008-05-24 | 2008-04-24 | 2008-03-24 | 2008-02-24 | 2008-01-24 | 2007-12-24 | 2007-11-24 | 2007-10-24 | 2007-09-24 | 2007-08-24 | 2007-07-24 | 2007-06-24 | 2007-05-24 | 2007-04-24 | 2007-03-24 | 2007-02-24 | 2007-01-24 | 2006-12-24 | 2006-11-24 | 2006-10-24 | 2006-09-24 | 2006-08-24 | 2006-07-24 | 2006-06-24 | 2006-05-24 | 2006-04-24 | 2006-03-24 | 2006-02-24 | 2006-01-24 | 2005-12-24 | 2005-11-24 | 2005-10-24 | 2005-09-24 | 2005-08-24 | 2005-07-24 | 2005-06-24 | 2005-05-24 | 2005-04-24 | 2005-03-24 | 2005-02-24 | 2005-01-24 | 2004-12-24 | 2004-11-24 | 2004-10-24 | 2004-09-24 | 2004-08-24 | 2004-07-24 | 2004-06-24 | 2004-05-24 | 2004-04-24 | 2004-03-24 | 2004-02-24 | 2004-01-24 | 2003-12-24 | 2003-11-24 | 2003-10-24 | 2003-09-24 | 2003-08-24 | 2003-07-24 | 2003-06-24 | 2003-05-24 | 2003-04-24 | 2003-03-24 | 2003-02-24 | 2003-01-24 | 2002-12-24 | 2002-11-24 | 2002-10-24 | 2002-09-24 | 2002-08-24 | 2002-07-24 | 2002-06-24 | 2002-05-24 | 2002-04-24 | 2002-03-24 | 2002-02-24 | 2002-01-24 | 2001-12-24 | 2001-11-24 | 2001-10-24 | 2001-09-24 | 2001-08-24 | 2001-07-24 | 2001-06-24 | 2001-05-24 | 2001-04-24 | 2001-03-24 | 2001-02-24 | 2001-01-24 | 2000-12-24 | 2000-11-24 | 2000-10-24 | 2000-09-24 | 2000-08-24 | 2000-07-24 | 2000-06-24 | 2000-05-24 | 2000-04-24 | 2000-03-24 | 2000-02-24 | 2000-01-24 | 1999-12-24

Key: Value:

Key: Value:

MESSAGE
DATE 2014-02-22
FROM Ruben
SUBJECT Subject: [NYLXS - HANGOUT] Bounty Hunters
http://www.countercurrents.org/chatterjee060214.htm

The Invisible World Of Software Backdoors And Bounty Hunters

*By Pratap Chatterjee*

06 February, 2014
*TomDispatch.com*


Imagine that you could wander unseen through a city, sneaking into
houses and offices of your choosing at any time, day or night. Imagine
that, once inside, you could observe everything happening, unnoticed by
others -- from the combinations used to secure bank safes to the
clandestine rendezvous of lovers. Imagine also that you have the ability
to silently record everybody?s actions, whether they are at work or play
without leaving a trace. Such omniscience could, of course, make you
rich, but perhaps more important, it could make you very powerful.

That scenario out of some futuristic sci-fi novel is, in fact, almost
reality right now. After all, globalization and the Internet have
connected all our lives in a single, seamless virtual city where
everything is accessible at the tap of a finger. We store our money in
online vaults; we conduct most of our conversations and often get from
place to place with the help of our mobile devices. Almost everything
that we do in the digital realm is recorded and lives on forever in a
computer memory that, with the right software and the correct passwords,
can be accessed by others, whether you want them to or not.

Now -- one more moment of imagining -- what if every one of your
transactions in that world was infiltrated? What if the government had
paid developers to put trapdoors and secret passages into the structures
that are being built in this new digital world to connect all of us all
the time? What if they had locksmiths on call to help create master keys
for all the rooms? And what if they could pay bounty hunters to stalk us
and build profiles of our lives and secrets to use against us?

Well, check your imagination at the door, because this is indeed the
brave new dystopian world that the U.S. government is building,
according to the latest revelations from the treasure trove of documents
released by National Security Agency whistleblower Edward Snowden.

Over the last eight months, journalists have dug deep into these
documents to reveal that the world of NSA mass surveillance involves
close partnerships with a series of companies most of us have never
heard of that design or probe the software we all take for granted to
help keep our digital lives humming along.

There are three broad ways that these software companies collaborate
with the state: a National Security Agency program called ?Bullrun?
through which that agency is alleged to pay off developers like RSA, a
software security firm, to build ?backdoors? into our computers; the use
of ?bounty hunters? like Endgame and Vupen that find exploitable flaws
in existing software like Microsoft Office and our smartphones; and
finally the use of data brokers like Millennial Media to harvest
personal data on everybody on the Internet, especially when they go
shopping or play games like Angry Birds, Farmville, or Call of Duty.

Of course, that?s just a start when it comes to enumerating the ways the
government is trying to watch us all, as I explained in a previous
TomDispatch piece, ?Big Bro is Watching You.? For example, the FBI uses
hackers to break into individual computers and turn on computer cameras
and microphones, while the NSA collects bulk cell phone records and
tries to harvest all the data traveling over fiber-optic cables. In
December 2013, computer researcher and hacker Jacob Appelbaum revealed
that the NSA has also built hardware with names like Bulldozer,
Cottonmouth, Firewalk, Howlermonkey, and Godsurge that can be inserted
into computers to transmit data to U.S. spooks even when they are not
connected to the Internet.

?Today, [the NSA is] conducting instant, total invasion of privacy with
limited effort,? Paul Kocher, the chief scientist of Cryptography
Research, Inc. which designs security systems, told the New York Times.
?This is the golden age of spying.?

*Building Backdoors*

Back in the 1990s, the Clinton administration promoted a special piece
of NSA-designed hardware that it wanted installed in computers and
telecommunication devices. Called the Clipper Chip, it was intended to
help scramble data to protect it from unauthorized access -- but with a
twist. It also transmitted a "Law Enforcement Access Field" signal with
a key that the government could use if it wanted to access the same data.

Activists and even software companies fought against the Clipper Chip in
a series of political skirmishes that are often referred to as the
Crypto Wars. One of the most active companies was RSA from California.
It even printed posters with a call to ?Sink Clipper.? By 1995, the
proposal was dead in the water, defeated with the help of such unlikely
allies as broadcaster Rush Limbaugh and Senators John Ashcroft and John
Kerry.

But the NSA proved more tenacious than its opponents imagined. It never
gave up on the idea of embedding secret decryption keys inside computer
hardware -- a point Snowden has emphasized (with the documents to prove it).

A decade after the Crypto Wars, RSA, now a subsidiary of EMC, a
Massachusetts company, had changed sides. According to an investigative
report by Joseph Menn of Reuters, it allegedly took $10 million from the
National Security Agency in exchange for embedding an NSA-designed
mathematical formula called the Dual Elliptic Curve Deterministic Random
Bit Generator inside its Bsafe software products as the default
encryption method.

The Dual Elliptic Curve has a ?flaw? that allows it to be hacked, as
even RSA now admits. Unfortunately for the rest of us, Bsafe is built
into a number of popular personal computer products and most people
would have no way of figuring out how to turn it off.

According to the Snowden documents, the RSA deal was just one of several
struck under the NSA?s Bullrun program that has cost taxpayers over $800
million to date and opened every computer and mobile user around the
world to the prying eyes of the surveillance state.

?The deeply pernicious nature of this campaign -- undermining national
standards and sabotaging hardware and software -- as well as the amount
of overt private sector cooperation are both shocking,? wrote Dan
Auerbach and Kurt Opsahl of the Electronic Frontier Foundation, a San
Francisco-based activist group that has led the fight against government
surveillance. ?Back doors fundamentally undermine everybody's security,
not just that of bad guys.?

*Bounty Hunters*

For the bargain basement price of $5,000, hackers offered for sale a
software flaw in Adobe Acrobat that allows you to take over the computer
of any unsuspecting victim who downloads a document from you. At the
opposite end of the price range, Endgame Systems of Atlanta, Georgia,
offered for sale a package named Maui for $2.5 million that can attack
targets all over the world based on flaws discovered in the computer
software that they use. For example, some years ago, Endgame offered for
sale targets in Russia including an oil refinery in Achinsk, the
National Reserve Bank, and the Novovoronezh nuclear power plant. (The
list was revealed by Anonymous, the online network of activist hackers.)

While such ?products,? known in hacker circles as ?zero day exploits,?
may sound like sales pitches from the sorts of crooks any government
would want to put behind bars, the hackers and companies who make it
their job to discover flaws in popular software are, in fact, courted
assiduously by spy agencies like the NSA who want to use them in
cyberwarfare against potential enemies.

Take Vupen, a French company that offers a regularly updated catalogue
of global computer vulnerabilities for an annual subscription of
$100,000. If you see something that you like, you pay extra to get the
details that would allow you to hack into it. A Vupen brochure released
by Wikileaks in 2011 assured potential clients that the company aims ?to
deliver exclusive exploit codes for undisclosed vulnerabilities? for
?covertly attacking and gaining access to remote computer systems.?

At a Google sponsored event in Vancouver in 2012, Vupen hackers
demonstrated that they could hijack a computer via Google?s Chrome web
browser. But they refused to hand over details to the company, mocking
Google publicly. ?We wouldn?t share this with Google for even $1
million,? Chaouki Bekrar of Vupen boasted to Forbes magazine. ?We don?t
want to give them any knowledge that can help them in fixing this
exploit or other similar exploits. We want to keep this for our customers.?

In addition to Endgame and Vupen, other players in this field include
Exodus Intelligence in Texas, Netragard in Massachussetts, and ReVuln in
Malta.

Their best customer? The NSA, which spent at least $25 million in 2013
buying up dozens of such ?exploits.? In December, Appelbaum and his
colleagues reported in Der Spiegel that agency staff crowed about their
ability to penetrate any computer running Windows at the moment that
machine sends messages to Microsoft. So, for example, when your computer
crashes and helpfully offers to report the problem to the company,
clicking yes could open you up for attack.

The federal government is already alleged to have used such exploits
(including one in Microsoft Windows) -- most famously when the Stuxnet
virus was deployed to destroy Iran?s nuclear centrifuges.

?This is the militarization of the Internet,? Appelbaum told the Chaos
Computer Congress in Hamburg. ?This strategy is undermining the Internet
in a direct attempt to keep it insecure. We are under a kind of martial
law.?

*Harvesting your Data*

Among the Snowden documents was a 20-page 2012 report from the
Government Communications Headquarters -- the British equivalent of the
NSA -- that listed a Baltimore-based ad company, Millennial Media.
According to the spy agency, it can provide ?intrusive? profiles of
users of smartphone applications and games. The New York Times has noted
that the company offers data like whether individuals are single,
married, divorced, engaged, or ?swinger,? as well as their sexual
orientation (?straight, gay, bisexuall, and ?not sure??).

How does Millennial Media get this data? Simple. It happens to gather
data from some of the most popular video game manufacturers in the
world. That includes Activision in California which makes Call of Duty,
a military war game that has sold over 100 million copies; Rovio of
Finland, which has given away 1.7 billion copies of a game called Angry
Birds that allows users to fire birds from a catapult at laughing pigs;
and Zynga -- also from California -- which makes Farmville, a farming
game with 240 million active monthly users.

In other words, we?re talking about what is undoubtedly a significant
percentage of the connected world unknowingly handing over personal
data, including their location and search interests, when they download
?free? apps after clicking on a licensing agreement that legally allows
the manufacturer to capture and resell their personal information. Few
bother to read the fine print or think twice about the actual purpose of
the agreement.

The apps pay for themselves via a new business model called ?real-time
bidding? in which advertisers like Target and Walmart send you coupons
and special offers for whatever branch of their store is closest to you.
They do this by analyzing the personal data sent to them by the ?free?
apps to discover both where you are and what you might be in the market for.

When, for instance, you walk into a mall, your phone broadcasts your
location and within a millisecond a data broker sets up a virtual
auction to sell your data to the highest bidder. This rich and detailed
data stream allows advertisers to tailor their ads to each individual
customer. As a result, based on their personal histories, two people
walking hand in hand down a street might get very different
advertisements, even if they live in the same house.

This also has immense value to any organization that can match up the
data from a device with an actual name and identity -- such as the
federal government. Indeed, the Guardian has highlighted an NSA document
from 2010 in which the agency boasts that it can ?collect almost every
key detail of a user's life: including home country, current location
(through geolocation), age, gender, zip code, marital status? income,
ethnicity, sexual orientation, education level, and number of children.?

*In Denial *

It?s increasingly clear that the online world is, for both government
surveillance types and corporate sellers, a new Wild West where anything
goes. This is especially true when it comes to spying on you and
gathering every imaginable version of your ?data.?

Software companies, for their part, have denied helping the NSA and
reacted with anger to the Snowden disclosures. ?Our fans? trust is the
most important thing for us and we take privacy extremely seriously,?
commented Mikael Hed, CEO of Rovio Entertainment, in a public statement.
?We do not collaborate, collude, or share data with spy agencies
anywhere in the world.?

RSA has tried to deny that there are any flaws in its products. "We have
never entered into any contract or engaged in any project with the
intention of weakening RSA?s products, or introducing potential
?backdoors? into our products for anyone?s use,? the company said in a
statement on its website. ?We categorically deny this allegation."
(Nonetheless RSA has recently started advising clients to stop using the
Dual Elliptical Curve.)

Other vendors like Endgame and Millennial Media have maintained a stoic
silence. Vupen is one of the few that boasts about its ability to
uncover software vulnerabilities.

And the NSA has issued a Pravda-like statement that neither confirms nor
denies the revelations. "The communications of people who are not valid
foreign intelligence targets are not of interest to the National
Security Agency," an NSA spokeswoman told the Guardian. "Any implication
that NSA's foreign intelligence collection is focused on the smartphone
or social media communications of everyday Americans is not true.?

The NSA has not, however, denied the existence of its Office of Tailored
Access Operations (TAO), which Der Spiegel describes as ?a squad of
[high-tech] plumbers that can be called in when normal access to a
target is blocked.?

The Snowden documents indicate that TAO has a sophisticated set of tools
at its disposal -- that the NSA calls ?Quantum Theory? -- made up of
backdoors and bugs that allow its software engineers to plant spy
software on a target computer. One powerful and hard to detect example
of this is TAO?s ability to be notified when a target?s computer visits
certain websites like LinkedIn and to redirect it to an NSA server named
?Foxacid? where the agency can upload spy software in a fraction of a
second.

*Which Way Out of the Walled Garden?*

The simple truth of the matter is that most individuals are easy targets
for both the government and corporations. They either pay for software
products like Pages and Office from well known manufacturers like Apple
and Microsoft or download them for free from game companies like
Activision, Rovio, and Zynga for use inside ?reputable? mobile devices
like Blackberries and iPhones.

These manufacturers jealously guard access to the software that they
make available, saying that they need to have quality control. Some go
even further with what is known as the ?walled garden? approach, only
allowing pre-approved programs on their devices. Apple?s iTunes,
Amazon?s Kindle, and Nintendo?s Wii are examples of this.

But as the Snowden revelations have helped make clear, such devices and
software are vulnerable both to manufacturer?s mistakes, which open
exploitable backdoors into their products, and to secret deals with the NSA.

So in a world where, increasingly, nothing is private, nothing is simply
yours, what is an Internet user to do? As a start, there is an
alternative to most major software programs for word processing,
spreadsheets, and layout and design -- the use of free and open source
software like Linux and Open Office, where the underlying code is freely
available to be examined for hacks and flaws. (Think of it this way: if
the NSA cut a deal with Apple to copy everything on your iPhone, you
would never know. If you bought an open-source phone -- not an easy
thing to do -- that sort of thing would be quickly spotted.) You can
also use encrypted browsers like Tor and search engines like Duck Duck
Go that don?t store your data.

Next, if you own and use a mobile device on a regular basis, you owe it
yourself to turn off as many of the location settings and data-sharing
options as you can. And last but hardly least, don?t play Farmville, go
out and do the real thing. As for Angry Birds and Call of Duty,
honestly, instead of shooting pigs and people, it might be time to think
about finding better ways to entertain yourself. Pick up a paintbrush,
perhaps? Or join an activist group like the Electronic Frontier
Foundation and fight back against Big Brother.

*Pratap Chatterjee,* a TomDispatch regular, is executive director of
CorpWatch and a board member of Amnesty International USA. He is the
author of *Halliburton?s Army*
and
Iraq, Inc.

Copyright 2014 Pratap Chatterjee



  1. 2014-02-04 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] video programs
  2. 2014-02-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Hiring a Linux SysAdmin or Jr.
  3. 2014-02-05 Contrarian <adrba-at-nyct.net> Subject: [NYLXS - HANGOUT] SUSE glitches
  4. 2014-02-05 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] SUSE glitches
  5. 2014-02-05 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] SUSE glitches
  6. 2014-02-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] not physically possible
  7. 2014-02-05 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] not physically possible
  8. 2014-02-05 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] not physically possible
  9. 2014-02-06 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] not physically possible
  10. 2014-02-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] ironman linux
  11. 2014-02-06 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] ironman linux
  12. 2014-02-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Laptop Deals
  13. 2014-02-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Kiner is dead
  14. 2014-02-06 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Kiner is dead
  15. 2014-02-06 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] ironman linux
  16. 2014-02-06 From: "Paul Robert Marino" <prmarino1-at-gmail.com> Re: [NYLXS - HANGOUT] ironman linux
  17. 2014-02-12 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] aging and work
  18. 2014-02-12 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] aging and work
  19. 2014-02-12 Contrarian <adrba-at-nyct.net> Snow (Was: Re: [NYLXS - HANGOUT] SUSE glitches)
  20. 2014-02-13 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Suse 13.1
  21. 2014-02-13 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Suse 13.1
  22. 2014-02-13 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Suse 13.1
  23. 2014-02-13 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Suse 13.1
  24. 2014-02-13 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] The Limits of Free Speach
  25. 2014-02-14 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Focus on Robots
  26. 2014-02-14 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] Focus on Robots
  27. 2014-02-14 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Focus on Robots
  28. 2014-02-14 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Focus on Robots
  29. 2014-02-14 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] Focus on Robots
  30. 2014-02-16 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [announce-at-lists.isoc-ny.org: [isoc-ny] VIDEO: Bruce Schneier - NSA
  31. 2014-02-16 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Math Class
  32. 2014-02-17 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] combining text files
  33. 2014-02-18 Contrarian <adrba-at-nyct.net> Re: [NYLXS - HANGOUT] combining text files
  34. 2014-02-18 Kevin Mark <kevin.mark-at-verizon.net> Re: [NYLXS - HANGOUT] combining text files
  35. 2014-02-18 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [uri-at-bruck.co.il: [Israel.pm] Perl position in Petakh Tiqwah]
  36. 2014-02-20 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] linux terminals
  37. 2014-02-20 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] linux laptops
  38. 2014-02-21 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] combining text files
  39. 2014-02-21 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] combining text files
  40. 2014-02-21 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] combining text files
  41. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] I'm mad as hell, and I'm not going to take it anymore
  42. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] farm animals and extermination camps
  43. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Privacy, what privacy
  44. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Bounty Hunters
  45. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Robot Wars
  46. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Government regulation of Privacy
  47. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Snowden
  48. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Monday and the spying is good
  49. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] jobs
  50. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] jobs
  51. 2014-02-22 Ruben <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] Fwd: [Israel.pm] F5 Networks is hiring
  52. 2014-02-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] The internet as you know is on its last leg
  53. 2014-02-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] [list-at-nysun.com: Mr. X Returns ? And Makes a Confession]
  54. 2014-02-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] affordable healthcare scam
  55. 2014-02-27 From: "Redpill" <red.pill-at-verizon.net> RE: [NYLXS - HANGOUT] affordable healthcare scam
  56. 2014-02-27 From: "Redpill" <red.pill-at-verizon.net> RE: [NYLXS - HANGOUT] affordable healthcare scam
  57. 2014-02-27 Ruben Safir <mrbrklyn-at-panix.com> Subject: [NYLXS - HANGOUT] max size of tar
  58. 2014-02-27 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] max size of tar
  59. 2014-02-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar
  60. 2014-02-27 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] max size of tar
  61. 2014-02-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar
  62. 2014-02-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar
  63. 2014-02-27 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] max size of tar
  64. 2014-02-27 Ron Guerin <ron-at-vnetworx.net> Re: [NYLXS - HANGOUT] max size of tar
  65. 2014-02-28 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar
  66. 2014-02-28 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar
  67. 2014-02-28 Ruben Safir <mrbrklyn-at-panix.com> Re: [NYLXS - HANGOUT] max size of tar

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!