Samy (computer Worm)
   HOME
*





Samy (computer Worm)
Samy (also known as JS.Spacehero) is a cross-site scripting worm (XSS worm) that was designed to propagate across the social networking site MySpace by Samy Kamkar. Within just 20 hours of its October 4, 2005 release, over one million users had run the payload making Samy the fastest-spreading virus of all time. The worm itself was relatively harmless; it carried a payload that would display the string "but most of all, samy is my hero" on a victim's MySpace profile page as well as send Samy a friend request. When a user viewed that profile page, the payload would then be replicated and planted on their own profile page continuing the distribution of the worm. MySpace has since secured its site against the vulnerability. Samy Kamkar, the author of the worm, was raided by the United States Secret Service and Electronic Crimes Task Force in 2006 for releasing the worm. He entered a plea agreement on January 31, 2007 to a felony charge. The action resulted in Kamkar being sentenc ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Cross-site Scripting
Cross-site scripting (XSS) is a type of security vulnerability that can be found in some web applications. XSS attacks enable attackers to inject client-side scripts into web pages viewed by other users. A cross-site scripting vulnerability may be used by attackers to bypass access controls such as the same-origin policy. Cross-site scripting carried out on websites accounted for roughly 84% of all security vulnerabilities documented by Symantec up until 2007.During the second half of 2007, 11,253 site-specific cross-site vulnerabilities were documented by XSSed, compared to 2,134 "traditional" vulnerabilities documented by Symantec, in XSS effects vary in range from petty nuisance to significant security risk, depending on the sensitivity of the data handled by the vulnerable site and the nature of any security mitigation implemented by the site's owner network. Background Security on the web depends on a variety of mechanisms, including an underlying concept of trust know ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Plea Bargain
A plea bargain (also plea agreement or plea deal) is an agreement in criminal law proceedings, whereby the prosecutor provides a concession to the defendant in exchange for a plea of guilt or '' nolo contendere.'' This may mean that the defendant will plead guilty to a less serious charge, or to one of the several charges, in return for the dismissal of other charges; or it may mean that the defendant will plead guilty to the original criminal charge in return for a more lenient sentence. A plea bargain allows both parties to avoid a lengthy criminal trial and may allow criminal defendants to avoid the risk of conviction at trial on a more serious charge. For example, in the legal system of the United States, a criminal defendant charged with a felony theft charge, the conviction of which would require imprisonment in state prison, may be offered the opportunity to plead guilty to a misdemeanor theft charge, which may not carry a custodial sentence. In cases such as an automobil ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Worms
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as t ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




Vice (magazine)
''Vice'' (stylized in all caps) is a Canadian-American magazine focused on lifestyle, arts, culture, and news/politics. Founded in 1994 in Montreal as an alternative punk magazine, the founders later launched the youth media company Vice Media, which consists of divisions including the printed magazine as well as a website, broadcast news unit, a film production company, a record label, and a publishing imprint. As of February 2015, the magazine's editor-in-chief is Ellis Jones. History Founded by Suroosh Alvi, Gavin McInnes, and Shane Smith (the latter two being childhood friends), the magazine was launched in 1994 as the ''Voice of Montreal'' with government funding. The intention of the founders was to provide work and a community service. When the editors later sought to dissolve their commitments with the original publisher, Alix Laurent, they bought him out and changed the name to ''Vice'' in 1996. Richard Szalwinski, a Canadian software millionaire, acquired the magazi ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Vice Media
Vice Media Group LLC is an American-Canadian digital media and broadcasting company. , the Vice Media Group included five main business areas: VICE.com (digital content); VICE STUDIOS (film and TV production) VICE TV (also known as VICELAND); VICE News; and VIRTUE (an agency offering creative services). It was cited as the largest independent youth media company in the world, with 35 offices. Developing from ''Vice'' magazine, originally based in Montreal and co-founded by Suroosh Alvi, Shane Smith, and Gavin McInnes, Vice expanded primarily into youth and young adult–focused digital media. This included online content verticals and related web series, the news division Vice News, a film production studio, and a record label among other properties. Vice re-located to New York City in 2001. Vice Media originally broadcast their news programs on HBO, which broadcast the Emmy-winning weekly documentary series ''Vice'', which premiered in April 2013. ''Vice'' features segment ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Community Service
Community service is unpaid work performed by a person or group of people for the benefit and betterment of their community without any form of compensation. Community service can be distinct from volunteering, since it is not always performed on a voluntary basis and may be compulsory. While individual benefits may be realized, they may be performed for a variety of reasons, including citizenship requirements, alternatives to criminal justice sanctions, school or class requirements, and requisites to obtain certain benefits. Background Community service is a non-paying job performed by one person or a group of people for the benefit of their community or its institutions. Community service is distinct from volunteering, since it is not always performed on a voluntary basis. It may be performed for a variety of reasons. * It may be required by a government as a part of citizenship requirements, like the mandatory "Hand and hitch-up services" for some municipalities in German ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Probation
Probation in criminal law is a period of supervision over an offender, ordered by the court often in lieu of incarceration. In some jurisdictions, the term ''probation'' applies only to community sentences (alternatives to incarceration), such as suspended sentences. In others, probation also includes supervision of those conditionally released from prison on parole. An offender on probation is ordered to follow certain conditions set forth by the court, often under the supervision of a probation officer. During the period of probation, an offender faces the threat of being incarcerated if found breaking the rules set by the court or probation officer. Offenders are ordinarily required to maintain law-abiding behavior, and may be ordered to refrain from possession of firearms, remain employed, participate in an educational program, abide a curfew, live at a directed place, obey the orders of the probation officer, or not leave the jurisdiction. The probationer might be ordere ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Felony
A felony is traditionally considered a crime of high seriousness, whereas a misdemeanor is regarded as less serious. The term "felony" originated from English common law (from the French medieval word "félonie") to describe an offense that resulted in the confiscation of a convicted person's land and goods, to which additional punishments including capital punishment could be added; other crimes were called misdemeanors. Following conviction of a felony in a court of law, a person may be described as a felon or a convicted felon. Some common law countries and jurisdictions no longer classify crimes as felonies or misdemeanors and instead use other distinctions, such as by classifying serious crimes as indictable offences and less serious crimes as summary offences. In the United States, where the felony/misdemeanor distinction is still widely applied, the federal government defines a felony as a crime punishable by death or imprisonment in excess of one year. If punishable by e ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

United States Secret Service
The United States Secret Service (USSS or Secret Service) is a federal law enforcement agency under the Department of Homeland Security charged with conducting criminal investigations and protecting U.S. political leaders, their families, and visiting heads of state or government. Until 2003, the Secret Service was part of the Department of the Treasury, as the agency was founded in 1865 to combat the then-widespread counterfeiting of U.S. currency. Primary missions The Secret Service is mandated by Congress with two distinct and critical national security missions: protecting the nation's leaders and safeguarding the financial and critical infrastructure of the United States. Protective mission The Secret Service is tasked with ensuring the safety of the president of the United States, the vice president of the United States, the president-elect of the United States, the vice president-elect of the United States, and their immediate families; former presidents, their sp ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Computer Worm
A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. It often uses a computer network to spread itself, relying on security failures on the target computer to access it. It will use this machine as a host to scan and infect other computers. When these new worm-invaded computers are controlled, the worm will continue to scan and infect other computers using these computers as hosts, and this behaviour will continue. Computer worms use recursive methods to copy themselves without host programs and distribute themselves based on the law of exponential growth, thus controlling and infecting more and more computers in a short time. Worms almost always cause at least some harm to the network, even if only by consuming bandwidth, whereas viruses almost always corrupt or modify files on a targeted computer. Many worms are designed only to spread, and do not attempt to change the systems they pass through. However, as th ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Payload (computing)
In computing and telecommunications, the payload is the part of transmitted data that is the actual intended message. Headers and metadata are sent only to enable payload delivery. In the context of a computer virus or worm, the payload is the portion of the malware which performs malicious action. The term is borrowed from transportation, where ''payload'' refers to the part of the load that ''pays'' for transportation. Networking In computer networking, data to be transmitted is the payload. It is almost always encapsulated in some type of frame format, composed of framing bits and a frame check sequence. Examples are Ethernet frames, Point-to-Point Protocol (PPP) frames, Fibre Channel frames, and V.42 modem frames. Programming In computer programming, the most common usage of the term is in the context of message protocols, to differentiate the protocol overhead from the actual data. For example, a JSON web service response might be: The string ''Hello, world!'' ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]