Fri Apr 26 03:24:46 2024
EVENTS
 FREE
SOFTWARE
INSTITUTE

POLITICS
JOBS
MEMBERS'
CORNER

MAILING
LIST

NYLXS Mailing Lists and Archives
NYLXS Members have a lot to say and share but we don't keep many secrets. Join the Hangout Mailing List and say your peice.

DATE 2015-11-01

HANGOUT

2024-04-26 | 2024-03-26 | 2024-02-26 | 2024-01-26 | 2023-12-26 | 2023-11-26 | 2023-10-26 | 2023-09-26 | 2023-08-26 | 2023-07-26 | 2023-06-26 | 2023-05-26 | 2023-04-26 | 2023-03-26 | 2023-02-26 | 2023-01-26 | 2022-12-26 | 2022-11-26 | 2022-10-26 | 2022-09-26 | 2022-08-26 | 2022-07-26 | 2022-06-26 | 2022-05-26 | 2022-04-26 | 2022-03-26 | 2022-02-26 | 2022-01-26 | 2021-12-26 | 2021-11-26 | 2021-10-26 | 2021-09-26 | 2021-08-26 | 2021-07-26 | 2021-06-26 | 2021-05-26 | 2021-04-26 | 2021-03-26 | 2021-02-26 | 2021-01-26 | 2020-12-26 | 2020-11-26 | 2020-10-26 | 2020-09-26 | 2020-08-26 | 2020-07-26 | 2020-06-26 | 2020-05-26 | 2020-04-26 | 2020-03-26 | 2020-02-26 | 2020-01-26 | 2019-12-26 | 2019-11-26 | 2019-10-26 | 2019-09-26 | 2019-08-26 | 2019-07-26 | 2019-06-26 | 2019-05-26 | 2019-04-26 | 2019-03-26 | 2019-02-26 | 2019-01-26 | 2018-12-26 | 2018-11-26 | 2018-10-26 | 2018-09-26 | 2018-08-26 | 2018-07-26 | 2018-06-26 | 2018-05-26 | 2018-04-26 | 2018-03-26 | 2018-02-26 | 2018-01-26 | 2017-12-26 | 2017-11-26 | 2017-10-26 | 2017-09-26 | 2017-08-26 | 2017-07-26 | 2017-06-26 | 2017-05-26 | 2017-04-26 | 2017-03-26 | 2017-02-26 | 2017-01-26 | 2016-12-26 | 2016-11-26 | 2016-10-26 | 2016-09-26 | 2016-08-26 | 2016-07-26 | 2016-06-26 | 2016-05-26 | 2016-04-26 | 2016-03-26 | 2016-02-26 | 2016-01-26 | 2015-12-26 | 2015-11-26 | 2015-10-26 | 2015-09-26 | 2015-08-26 | 2015-07-26 | 2015-06-26 | 2015-05-26 | 2015-04-26 | 2015-03-26 | 2015-02-26 | 2015-01-26 | 2014-12-26 | 2014-11-26 | 2014-10-26 | 2014-09-26 | 2014-08-26 | 2014-07-26 | 2014-06-26 | 2014-05-26 | 2014-04-26 | 2014-03-26 | 2014-02-26 | 2014-01-26 | 2013-12-26 | 2013-11-26 | 2013-10-26 | 2013-09-26 | 2013-08-26 | 2013-07-26 | 2013-06-26 | 2013-05-26 | 2013-04-26 | 2013-03-26 | 2013-02-26 | 2013-01-26 | 2012-12-26 | 2012-11-26 | 2012-10-26 | 2012-09-26 | 2012-08-26 | 2012-07-26 | 2012-06-26 | 2012-05-26 | 2012-04-26 | 2012-03-26 | 2012-02-26 | 2012-01-26 | 2011-12-26 | 2011-11-26 | 2011-10-26 | 2011-09-26 | 2011-08-26 | 2011-07-26 | 2011-06-26 | 2011-05-26 | 2011-04-26 | 2011-03-26 | 2011-02-26 | 2011-01-26 | 2010-12-26 | 2010-11-26 | 2010-10-26 | 2010-09-26 | 2010-08-26 | 2010-07-26 | 2010-06-26 | 2010-05-26 | 2010-04-26 | 2010-03-26 | 2010-02-26 | 2010-01-26 | 2009-12-26 | 2009-11-26 | 2009-10-26 | 2009-09-26 | 2009-08-26 | 2009-07-26 | 2009-06-26 | 2009-05-26 | 2009-04-26 | 2009-03-26 | 2009-02-26 | 2009-01-26 | 2008-12-26 | 2008-11-26 | 2008-10-26 | 2008-09-26 | 2008-08-26 | 2008-07-26 | 2008-06-26 | 2008-05-26 | 2008-04-26 | 2008-03-26 | 2008-02-26 | 2008-01-26 | 2007-12-26 | 2007-11-26 | 2007-10-26 | 2007-09-26 | 2007-08-26 | 2007-07-26 | 2007-06-26 | 2007-05-26 | 2007-04-26 | 2007-03-26 | 2007-02-26 | 2007-01-26 | 2006-12-26 | 2006-11-26 | 2006-10-26 | 2006-09-26 | 2006-08-26 | 2006-07-26 | 2006-06-26 | 2006-05-26 | 2006-04-26 | 2006-03-26 | 2006-02-26 | 2006-01-26 | 2005-12-26 | 2005-11-26 | 2005-10-26 | 2005-09-26 | 2005-08-26 | 2005-07-26 | 2005-06-26 | 2005-05-26 | 2005-04-26 | 2005-03-26 | 2005-02-26 | 2005-01-26 | 2004-12-26 | 2004-11-26 | 2004-10-26 | 2004-09-26 | 2004-08-26 | 2004-07-26 | 2004-06-26 | 2004-05-26 | 2004-04-26 | 2004-03-26 | 2004-02-26 | 2004-01-26 | 2003-12-26 | 2003-11-26 | 2003-10-26 | 2003-09-26 | 2003-08-26 | 2003-07-26 | 2003-06-26 | 2003-05-26 | 2003-04-26 | 2003-03-26 | 2003-02-26 | 2003-01-26 | 2002-12-26 | 2002-11-26 | 2002-10-26 | 2002-09-26 | 2002-08-26 | 2002-07-26 | 2002-06-26 | 2002-05-26 | 2002-04-26 | 2002-03-26 | 2002-02-26 | 2002-01-26 | 2001-12-26 | 2001-11-26 | 2001-10-26 | 2001-09-26 | 2001-08-26 | 2001-07-26 | 2001-06-26 | 2001-05-26 | 2001-04-26 | 2001-03-26 | 2001-02-26 | 2001-01-26 | 2000-12-26 | 2000-11-26 | 2000-10-26 | 2000-09-26 | 2000-08-26 | 2000-07-26 | 2000-06-26 | 2000-05-26 | 2000-04-26 | 2000-03-26 | 2000-02-26 | 2000-01-26 | 1999-12-26

Key: Value:

Key: Value:

MESSAGE
DATE 2015-11-09
FROM Ruben
SUBJECT Subject: [Hangout-NYLXS] serious iphone/objectivec problems
https://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html


iBackDoor: High-Risk Code Hits iOS Apps

November 04, 2015 | By Zhaofeng Chen
,
Adrian Mettler
,
Peter Gilbert
,
Yong Kang
|
Mobile Threats
,
Threat Research


apple logo grey


Introduction

FireEye mobile researchers recently discovered potentially “backdoored”
versions of an ad library embedded in thousands of iOS apps originally
published in the Apple App Store. The affected versions of this library
embedded functionality in iOS apps that used the library to display ads,
allowing for potential malicious access to sensitive user data and
device functionality.

These potential backdoors could have been controlled remotely by loading
JavaScript code from a remote server to perform the following actions on
an iOS device:

* Capture audio and screenshots
* Monitor and upload device location
* Read/delete/create/modify files in the app’s data container
* Read/write/reset the app’s keychain (e.g., app password storage)
* Post encrypted data to remote servers
* Open URL schemes to identify and launch other apps installed on the
device
* “Side-load” non-App Store apps by prompting the user to click an
“Install” button

The offending ad library contained identifying data suggesting that it
is a version of the mobiSage SDK [1]. We found 17 distinct versions of
the potentially backdoored ad library: version codes 5.3.3 to 6.4.4.
However, in the latest mobiSage SDK publicly released by adSage [2] –
version 7.0.5 – the potential backdoors are not present. It is unclear
whether the potentially backdoored versions of the ad library were
released by adSage or if they were created and/or compromised by a
malicious third party.

As of November 4, we have identified 2,846 iOS apps containing the
potentially backdoored versions of mobiSage SDK. Among these, we
observed more than 900 attempts to contact an ad adSage server capable
of delivering JavaScript code to control the backdoors. We notified
Apple of the complete list of affected apps and technical details on
October 21, 2015.

While we have not observed the ad server deliver any malicious commands
intended to trigger the most sensitive capabilities such as recording
audio or stealing sensitive data, affected apps periodically contact the
server to check for new JavaScript code. In the wrong hands, malicious
JavaScript code that triggers the potential backdoors could be posted to
eventually be downloaded and executed by affected apps.


Technical Details

As shown in Figure 1, the affected mobiSage library included two key
components, separately implemented in Objective-C and JavaScript. The
Objective-C component, which we refer to as *msageCore*, implements the
underlying functionality of the potential backdoors and exposed
interfaces to the JavaScript context through a WebView. The JavaScript
component, which we refer to as *msageJS*, provides high-level execution
logic and can trigger the potential backdoors by invoking the interfaces
exposed by msageCore. Each component has its own separate version number.

Figure 1: Key components of backdoored mobiSage SDK

In the remainder of this section, we reveal internal details of
msageCore, including its communication channel and high-risk interfaces.
Then we describe how msageJS is launched and updated, and how it can
trigger the backdoors.


Backdoors in msageCore


*Communication channel*

MsageCore implements a general framework to communicate with msageJS via
the ad library’s WebView. Commands and parameters are passed via
specially crafted URLs in the format adsagejs://cmd¶meter. As shown
in the reconstructed code fragment in Figure 2, msageCore fetches the
command and parameters from the JavaScript context and inserts them in
its command queue.

Figure 2: Communication via URL loading in WebView

To process a command in its queue, msageCore dispatches the command,
along with its parameters, to a corresponding Objective-C class and
method. Figure 3 shows portions of the reconstructed command dispatching
code.

Figure 3: Command dispatch in msageCore

*At-risk interfaces*

Each dispatched command ultimately arrives at an Objective-C class in
msageCore. Table 1 shows a subset of msageCore classes and the
corresponding interfaces that they expose.

*msageCore Class Name*



*Interfaces *

MSageCoreUIManagerPlugin



- captureAudio:

- captureImage:

- openMail:

- openSMS:

- openApp:

- openInAppStore:

- openCamera:

- openImagePicker:

- ...

MSageCoreLocation



- start:

- stop:

- setTimer:

- returnLocationInfo:webViewId:

- ...

MSageCorePluginFileModule



- createDir

- deleteDir:

- deleteFile:

- createFile:

- getFileContent:

- ...

MSageCoreKeyChain



- writeKeyValue:

- readValueByKey:

- resetValueByKey:

MSageCorePluginNetWork



- sendHttpGet:

- sendHttpPost:

- sendHttpUpload:

- ...

MSageCoreEncryptPlugin



- MD5Encrypt:

- SHA1Encrypt:

- AESEncrypt:

- AESDecrypt:

- DESEncrypt:

- DESDecrypt:

- XOREncrypt:

- XORDecrypt:

- RC4Encrypt:

- RC4Decrypt

- ...

Table 1: Selected interfaces exposed by msageCore

The selected interfaces reveal some of the key capabilities exposed by
the potential backdoors in the library. They expose the potential
ability to capture audio and screenshots while the affected app is in
use, identify and launch other apps installed on the device,
periodically monitor location, read and write files in the app’s data
container, and read/write/reset “secure” keychain items stored by the
app. Additionally, any data collected via these interfaces can be
encrypted with various encryption schemes and uploaded to a remote server.

Beyond the selected interfaces, the ad library potentially exposed users
to additional risks by including logic to promote and install “enpublic”
apps as shown in Figure 4. As we have highlighted in previous blogs
[footnotes 3, 4, 5, 6, 7], enpublic apps can introduce additional
security risks by using private APIs in certain versions of iOS. These
private APIs potentially allow for background monitoring of SMS or phone
calls, breaking the app sandbox, stealing email messages, and
demolishing arbitrary app installations. Apple has addressed a number of
issues related to enpublic apps that we have brought to their attention.

Figure 4: Installing “enpublic” apps to bypass Apple App Store review

We can see how this ad library functions by examining the
implementations of some of the selected interfaces. Figure 5 shows
reconstructed code snippets for capturing audio. Before storing recorded
audio to a file audio_xxx.wav, the code retrieves two parameters from
the command for recording duration and threshold.

Figure 5: Capturing audio with duration and threshold

Figure 6 shows a code snippet for initializing the app’s keychain before
reading. The accessed keychain is in the kSecClassGenericPassword class,
which is widely used by apps for storing secret credentials such as
passwords.

Figure 6: Reading the keychain in the kSecClassGenericPassword class


Remote control in msageJS

msageJS contains JavaScript code for communicating with a remote server
and submitting commands to msageCore. The file layout of msageJS is
shown in Figure 7. Inside sdkjs.js, we find a wrapper object called
adsage and the JavaScript interface for command execution.

Figure 7: The file layout of msageJS

The command execution interface is constructed as follows:

*/adsage.exec(className, methodName, argsList, onSuccess, onFailure);/*

The className and methodName parameters correspond to classes and
methods in msageCore. The argsList parameter can be either a list or
dict, and the exact types and values can be determined by reversing the
methods in msageCore. The final two parameters are function callbacks
invoked when the method exits. For example, the following invocation
starts audio capture:

*/adsage.exec("MSageCoreUIManager", "captureAudio", ["Hey", 10, 40],
onSuccess, onFailure);/*

Note that the files comprising msageJS cannot be found by simply listing
the files in an affected app’s IPA. The files themselves are zipped and
encoded in Base64 in the data section of the ad library binary. After an
affected app is launched, msageCore first decodes the string and
extracts msageJS to the app’s data container, setting index.html shown
in Figure 7 as the landing page in the ad library WebView to launch msageJS.

Figure 8: Base64 encoded JavaScript component in Zip format

When msageJS is launched, it sends a POST request to
hxxp://entry.adsage.com/d/ to check for updates. The server responds
with information about the latest msageJS version, including a download
URL, as shown in Figure 9.

Figure 9: Server response to msageJS update request via HTTP POST


*Enterprise Protection*

To ensure the protection of our customers, FireEye has deployed
detection rules in its Network Security (NX)
and
Mobile Threat Prevention (MTP)

products to identify the affected apps and their network activities.

For FireEye NX customers, alerts will be generated if an employee uses
an infected app while their iOS device is connected to the corporate
network. FireEye MTP management
customers
have full visibility into high-risk apps installed on mobile devices in
their deployment base. End users will receive on-device notifications of
the risky app and IT administrators receive email alerts.


Conclusion

In this blog, we described an ad library that affected thousands of iOS
apps with potential backdoor functionality. We revealed the internals of
backdoors which could be used to trigger audio recording, capture
screenshots, prompt the user to side-load other high-risk apps, and read
sensitive data from the app’s keychain, among other dubious
capabilities. We also showed how these potential backdoors in ad
libraries could be controlled remotely by JavaScript code should their
ad servers fall under malicious actors’ control.

[1] http://www.adsage.com/mobisage
[2] http://www.adsage.cn/
[3]
https://www.fireeye.com/blog/threat-research/2015/08/ios_masque_attackwe.html
[4]
https://www.fireeye.com/blog/threat-research/2015/02/ios_masque_attackre.html
[5]
https://www.fireeye.com/blog/threat-research/2014/11/masque-attack-all-your-ios-apps-belong-to-us.html
[6]
https://www.fireeye.com/blog/threat-research/2015/06/three_new_masqueatt.html
[7]
https://www.virusbtn.com/virusbulletin/archive/2014/11/vb201411-Apple-without-shell

This entry was posted on Wed Nov 04 13:00:00 EST 2015 and filed under
Adrian Mettler
,
Apple
,
Backdoor
,
Blog
,
Latest Blog Posts
,
Mobile Threats
,
Peter Gilbert
,
Threat Research
,
Yong Kang
,
Zhaofeng Chen

and application security
.


spear phishing attacks- how to stop them



FireEye Alerts

Be the first to receive information on major cyber attacks from the
industry leader!



*



_______________________________________________
hangout mailing list
hangout-at-nylxs.com
http://www.nylxs.com/

  1. 2015-11-01 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] [dha-at-panix.com: [MEETING] November Social]
  2. 2015-11-02 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Aviva's new baby
  3. 2015-11-02 einker <eminker-at-gmail.com> Re: [Hangout-NYLXS] Aviva's new baby
  4. 2015-11-02 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] IBM Linux mainframes
  5. 2015-11-02 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] the dangers of lip reading
  6. 2015-11-03 ruben safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Fwd: JEWISH PROFESSOR HOUNDED AT CALIFORNIA
  7. 2015-11-03 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Fwd: JEWISH PROFESSOR HOUNDED AT CALIFORNIA
  8. 2015-11-03 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] make a small killing in the market?
  9. 2015-11-03 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Israel Tech Jobs
  10. 2015-11-03 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] more jobs
  11. 2015-11-03 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] UML software development and the team effort..
  12. 2015-11-03 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Israel Tech Jobs
  13. 2015-11-03 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] New TV Set for sale
  14. 2015-11-04 ruben safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] openrc tips
  15. 2015-11-04 Ruben <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] AI work in NYC and the torch Project
  16. 2015-11-04 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  17. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: [Mailman-Users] 64 bit encoding
  18. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  19. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  20. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  21. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  22. 2015-11-05 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  23. 2015-11-05 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] tip from craigslist
  24. 2015-11-05 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Microsoft Linux with systemd is on the way
  25. 2015-11-05 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Fun with FUN in the largest Washington Post Article
  26. 2015-11-05 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] UML
  27. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  28. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  29. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  30. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  31. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  32. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  33. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  34. 2015-11-06 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Fwd: Re: [Mailman-Users] 64 bit encoding
  35. 2015-11-06 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] mets mets mets
  36. 2015-11-06 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] This is not Van Gogh,
  37. 2015-11-07 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Fun with FUN in the largest Washington Post
  38. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Movie of the week
  39. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] ransomware - attacking apache
  40. 2015-11-08 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  41. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Who is paying for what drugs
  42. 2015-11-08 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  43. 2015-11-08 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  44. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  45. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  46. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  47. 2015-11-08 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Cruise to Albany up the Hudson
  48. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  49. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  50. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  51. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  52. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  53. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Libreplanet in Boston Next Year
  54. 2015-11-08 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  55. 2015-11-08 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Open for Comments
  56. 2015-11-09 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Fun with FUD in the largest Washington Post
  57. 2015-11-09 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] The race is on to replace your linux toolkit
  58. 2015-11-09 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  59. 2015-11-09 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  60. 2015-11-09 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Decent Linux Podcast this week
  61. 2015-11-09 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] True Love
  62. 2015-11-09 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Browser security and EFF
  63. 2015-11-09 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  64. 2015-11-09 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  65. 2015-11-09 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  66. 2015-11-09 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  67. 2015-11-09 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  68. 2015-11-09 Ruben <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  69. 2015-11-09 Ruben <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] serious iphone/objectivec problems
  70. 2015-11-09 Ruben <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] serious iphone/objectivec problems
  71. 2015-11-09 Ruben <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] serious iphone/objectivec problems
  72. 2015-11-09 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  73. 2015-11-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] The Technology of Wishing
  74. 2015-11-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] another time and place
  75. 2015-11-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] The importance and moral obligation to archive
  76. 2015-11-10 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] message from Jesus
  77. 2015-11-10 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] everything in the story has to be exactly on time
  78. 2015-11-13 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] RMS on Education
  79. 2015-11-14 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] situation worsens
  80. 2015-11-14 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Who snoops on Who
  81. 2015-11-14 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Salman Rushdie
  82. 2015-11-14 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout-NYLXS] Ayaan Hirsi Ali on Islam
  83. 2015-11-15 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] [jkeen-at-verizon.net: ny.pm technical meeting on
  84. 2015-11-15 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Quick Cruise up the Hudson with the Smithsonian
  85. 2015-11-15 From: "ballantrae101 ." <ronny.coder-at-gmail.com> Re: [Hangout-NYLXS] Quick Cruise up the Hudson with the Smithsonian
  86. 2015-11-15 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Movie of the Week
  87. 2015-11-15 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] FWIW for Michael et al
  88. 2015-11-16 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] jobs
  89. 2015-11-16 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] jobs followup
  90. 2015-11-16 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  91. 2015-11-16 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] windows 3.1
  92. 2015-11-16 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] ransomware - attacking apache
  93. 2015-11-16 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] windows 3.1
  94. 2015-11-16 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] windows 3.1
  95. 2015-11-17 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] windows 3.1
  96. 2015-11-17 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] [conspire] CIA chief Brennan hints new gov't
  97. 2015-11-17 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] could be done better if it was planned
  98. 2015-11-17 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Bad Debt Collectors and Their Prey
  99. 2015-11-18 Paul Robert Marino <prmarino1-at-gmail.com> Subject: [Hangout-NYLXS] permissions in Debian packages?
  100. 2015-11-18 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] permissions in Debian packages?
  101. 2015-11-19 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] ms linux continues
  102. 2015-11-19 prmarino1-at-gmail.com Re: [Hangout-NYLXS] ms linux continues
  103. 2015-11-19 Chris Knadle <Chris.Knadle-at-coredump.us> Re: [Hangout-NYLXS] permissions in Debian packages?
  104. 2015-11-19 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] ms linux continues
  105. 2015-11-19 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Clips Notes
  106. 2015-11-19 prmarino1-at-gmail.com Re: [Hangout-NYLXS] permissions in Debian packages?
  107. 2015-11-19 prmarino1-at-gmail.com Re: [Hangout-NYLXS] permissions in Debian packages?
  108. 2015-11-20 Chris Knadle <Chris.Knadle-at-coredump.us> Re: [Hangout-NYLXS] permissions in Debian packages?
  109. 2015-11-20 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout-NYLXS] Fwd: Re: Handling dates and Time
  110. 2015-11-20 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout-NYLXS] Fwd: Re: Handling dates and Time
  111. 2015-11-20 Elfen Magix <elfen_magix-at-yahoo.com> Subject: [Hangout-NYLXS] Could NYLXS, CCNY. LIU,
  112. 2015-11-20 Ruben <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Could NYLXS, CCNY. LIU,
  113. 2015-11-20 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout-NYLXS] Fwd: Re: eudyptula challenge,
  114. 2015-11-20 Elfen Magix <elfen_magix-at-yahoo.com> Re: [Hangout-NYLXS] Could NYLXS, CCNY. LIU,
  115. 2015-11-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Wastson on SuSE
  116. 2015-11-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Wastson on SuSE
  117. 2015-11-21 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] Movie of the Week
  118. 2015-11-21 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] Movie of the Week
  119. 2015-11-21 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Artificial Intelligence and Forward Chaining
  120. 2015-11-22 Ruben Safir <ruben.safir-at-my.liu.edu> Subject: [Hangout-NYLXS] Linux Job
  121. 2015-11-22 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] another job
  122. 2015-11-22 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] PHP
  123. 2015-11-23 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] this is the funiest thing Robin Williams never said
  124. 2015-11-24 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] this is the funiest thing Robin Williams never
  125. 2015-11-24 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Letters of Recommendation
  126. 2015-11-24 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] [noreply-at-comsoc.org: New Course on Big Data 5-6
  127. 2015-11-24 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Firefox marketing on Flatbush Avenue
  128. 2015-11-24 Ruben Safir <mrbrklyn-at-panix.com> Subject: [Hangout-NYLXS] Cheapbytes has been slacking
  129. 2015-11-24 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Cheapbytes has been slacking
  130. 2015-11-24 Ruben Safir <ruben.safir-at-my.liu.edu> Re: [Hangout-NYLXS] Cheapbytes has been slacking
  131. 2015-11-24 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] in memorial
  132. 2015-11-25 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] security and tracking in the land of terrorism
  133. 2015-11-25 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] just a plug for our friend Amy
  134. 2015-11-25 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] private reusable rocket is a success
  135. 2015-11-25 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] Cheapbytes has been slacking
  136. 2015-11-25 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] [conspire] CIA chief Brennan hints new gov't
  137. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Middle east Analysis
  138. 2015-11-26 Ruben Safir <ruben.safir-at-my.liu.edu> Re: [Hangout-NYLXS] [conspire] CIA chief Brennan hints new gov't
  139. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Thanksgiving Present
  140. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] [conspire] CIA chief Brennan hints new gov't
  141. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] A message for Thanksgiving
  142. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Eight bucks, no kidding!
  143. 2015-11-26 Rick Moen <rick-at-linuxmafia.com> Subject: [Hangout-NYLXS] Five bucks, no kidding!
  144. 2015-11-26 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Compiler Theory Class
  145. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Nice Jewish Girl
  146. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Larry Wall on Haskell and Java
  147. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Apollo
  148. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Sil;licon Valley Republicans
  149. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] new way to get interviews only through skype ??
  150. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] The New Linux Journal in an app happy world
  151. 2015-11-27 Paul Robert Marino <prmarino1-at-gmail.com> Re: [Hangout-NYLXS] Cheapbytes has been slacking
  152. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] Five bucks, no kidding!
  153. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Fwd: Re: Systems Administrator Position
  154. 2015-11-27 Ruben Safir <mrbrklyn-at-panix.com> Re: [Hangout-NYLXS] Cheapbytes has been slacking
  155. 2015-11-27 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] losing the internet
  156. 2015-11-27 prmarino1-at-gmail.com Re: [Hangout-NYLXS] Cheapbytes has been slacking
  157. 2015-11-27 Elfen Magix <elfen_magix-at-yahoo.com> Re: [Hangout-NYLXS] Five bucks, no kidding!
  158. 2015-11-28 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] The New Linux Journal in an app happy world
  159. 2015-11-28 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] The New Linux Journal in an app happy world
  160. 2015-11-28 Rick Moen <rick-at-linuxmafia.com> Re: [Hangout-NYLXS] losing the internet
  161. 2015-11-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Decent Vorbis Radio
  162. 2015-11-28 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Movie of the week
  163. 2015-11-29 Ruben Safir <ruben-at-mrbrklyn.com> Re: [Hangout-NYLXS] 30 thousand bucks, no kidding!
  164. 2015-11-30 From: "Mancini, Sabin (DFS)" <Sabin.Mancini-at-dfs.ny.gov> Subject: [Hangout-NYLXS] ???? = question ? So what is the question (s) ?
  165. 2015-11-30 Ruben Safir <ruben-at-mrbrklyn.com> Subject: [Hangout-NYLXS] Domination

NYLXS are Do'ers and the first step of Doing is Joining! Join NYLXS and make a difference in your community today!