Page 164 of 180

UN Secretary-General expresses concern about crises in Chad, Kenya, Sudan

Thursday, February 7, 2008

United Nations Secretary-General Ban Ki-moon has expressed concern about crises in Chad, Kenya, and the Sudan. The U.N. chief is recently back from Africa where he attended the African Union summit in Ethiopia and met with leaders in Kenya.

On rebel efforts to overthrow the government in Chad in recent days, the secretary-general welcomed an African Union initiative to have the leaders of Libya and the Democratic Republic of Congo mediate the crisis. He says the United Nations will do its utmost to help resolve the crisis, urging the Security Council to act swiftly to help bring an end to the violence.

“It has devastating consequences not only for the people of Chad and Darfurian refugees seeking shelter there, but also for Darfur itself,” said Ban.

Mr. Ban told reporters the situation in the neighboring Darfur region of Sudan is no less troubling. He says the deployment of the AU-U.N. peacekeeping force, known as UNAMID, must be sped up and urged member states to properly equip the troops.

“UNAMID still lacks required aviation and ground transportation – chiefly helicopters. Additional troops will not make up for this shortfall,” said Ban. “Those countries that called for intervention in Darfur are under special obligation to deliver on their promises.”

While at the AU summit, Mr. Ban says he discussed some of the outstanding issues affecting the deployment with Sudanese President Omar al-Bashir, and he expects the Status of Forces Agreement (SOFA) to be signed this week. But Mr. Ban remained vague on whether some of the agreement’s sticking points – such as night flights, land agreements, and advance notice of U.N. movements – had been settled.

On Kenya, Mr. Ban says he has been deeply engaged in the post-election crisis and told political leaders during his visit there that they bear particular responsibility for the future of Kenya.

“I stressed to all the Kenyan leaders the need to stop the unacceptable violence and killings, and to resolve their differences through dialogue and democratic process. I also appealed to all the political leaders to think beyond their individual interests or party lines and to look to the future of Kenya as one country,” he said.

Mr. Ban also met in Nairobi with his U.N. predecessor, Kofi Annan, who is leading the panel of eminent Africans trying to mediate the crisis, and said they discussed his roadmap for the talks.

Security of U.N. personnel in Africa and elsewhere has been high on the secretary-general’s agenda, especially in the wake of the December bombing in Algeria that killed 17 staff members. Mr. Ban announced that he is naming diplomat Lakhdar Brahimi to chair an independent panel on safety and security of U.N. personnel and premises. Brahimi is an Algerian, but Mr. Ban says he has no concerns about his fairness or objectivity in heading up the panel.

Leader of al-Qaeda in Iraq arrested

Thursday, May 8, 2008

An Iraqi Defense Ministry spokesman said that the leader of al-Qaeda in Iraq, Abu Ayyub al-Masri, was arrested Thursday. Al-Masri, also known as Abu Hamza al-Muhajir, was reportedly arrested in the northern city of Mosul, 225 miles northwest of Baghdad. File:Al-masri.jpg

There has been no official confirmation or comment from United States forces yet, but news of the arrest was reported on Iraq state television.

The Iraqi Defense Ministry spokesman, Mohammed al-Askari, told the Associated Press via telephone that, “The commander of Ninevah military operations informed me that Iraqi troops captured Abu Hamza al-Muhajir the leader of al Qaeda in Iraq.”

Al-Masri, an Egyptian-born militant, took control of Al Qaeda operations in Iraq after former leader Abu Musab al-Zarqawi was killed on June 7, 2006 in an airstrike northeast of Baghdad.

Major Gen. Abdul-Karim Khalaf, an Interior Ministry spokesman, said that police in Mosul “arrested one of al Qaeda’s leaders at midnight and during the primary investigations he admitted that he is Abu Hamza Al-Muhajir. Now a broader investigation of him is being conducted.”

 This story has updates See US denies arrest of al-Masri, al-Qaeda in Iraq leader 

Australia/2005

Contents

  • 1 January
  • 2 February
  • 3 March
  • 4 April
  • 5 May
  • 6 June
  • 7 July
  • 8 August
  • 9 September
  • 10 October
  • 11 November
  • 12 December

[edit]

Wikinews interviews Peter Coti, eyewitness to north eastern US storm

Monday, March 15, 2010

Wikinews reporter Mike Morales interviews fellow Wikinews contributor Peter Coti, who is on the scene at a north eastern storm in the United States in New Jersey. Coti tells Wikinews what happened in the area of Ridgewood, New Jersey and provided pictures of the damage and area.

Predictable random number generator discovered in the Debian version of OpenSSL

Friday, May 16, 2008

A major security hole was discovered in the pseudo-random number generator (PRNG) of the Debian version of OpenSSL. OpenSSL is one of the most used cryptographic software, that allows the creation of secure network connections with the protocols called SSL and TLS. It is included in many popular computer programs, like the Mozilla Firefox web browser and the Apache web server. Debian is one of the most used GNU/Linux distributions, on which are based other distributions, like Ubuntu and Knoppix. The problem affects all the Debian-based distributions that were used to create cryptographic keys since the September 17, 2006. The bug was discovered by Luciano Bello, an argentine Debian package maintainer, and was announced on May 13, 2008.

This vulnerability was caused by the removal of two lines of code from the original version of the OpenSSL library. These lines were used to gather some entropy data by the library, needed to seed the PRNG used to create private keys, on which the secure connections are based. Without this entropy, the only dynamic data used was the PID of the software. Under Linux the PID can be a number between 1 and 32,768, that is a too small range of values if used to seed the PRNG and will cause the generation of predictable numbers. Therefore any key generated can be predictable, with only 32,767 possible keys for a given architecture and key length, and the secrecy of the network connections created with those keys is fully compromised.

These lines were removed as “suggested” by two audit tools (Valgrind and Purify) used to find vulnerabilities in the software distributed by Debian. These tools warned the Debian maintainers that some data was used before its initialization, that normally can lead to a security bug, but this time it was not the case, as the OpenSSL developers wrote on March 13, 2003. Anyway this change was erroneously applied on September 17, 2006, when the OpenSSL Debian version 0.9.8c-1 was released to the public.

Even though the Debian maintainer responsible for this software released a patch to fix this bug on May 8, 2008, the impact may be severe. In fact OpenSSL is commonly used in software to protect the passwords, to offer privacy and security. Any private key created with this version of OpenSSL is weak and must be replaced, included the session keys that are created and used only temporary. This means that any data encrypted with these keys can be decrypted without a big deal, even if these keys are used (but not created) with a version of the library not affected, like the ones included in other operating systems.

For example any web server running under any operating system may use a weak key created on a vulnerable Debian-based system. Any encrypted connection (HTTPS) to this web server established by any browser can be decrypted. This may be a serious problem for sites that requires a secure connection, like banks or private web sites. Also, if some encrypted connection was recorded in the past, it can be decrypted in the same way.

Another serious problem is for the network security software, like OpenSSH and OpenVPN, that are used to encrypt the traffic to protect passwords and grant the access to an administrative console or a private network protected by firewalls. This may allows hackers to gain unwanted access to private computers, networks or data traveled over the network, even if a not affected version of OpenSSL was used.

The same behavior can be applied to any software or protocol that use SSL, like POP3S, SSMTP, FTPS, if used with a weak key. This is the case of Tor, software used to offer strong anonymity on the TCP/IP, where about 300 of 1,500-2,000 nodes used a weak key. With 15-20% of weak Tor nodes, there is a probability of 0.34-0.8% circa to build a circuit that has all tree nodes weak, resulting in a full loss of anonymity. Also the case of only one weak node begin used may facilitate some types of attack to the anonymity. The Tor hidden services, a sort of anonymous public servers, are affected too. However the issue was speedly addressed on May 14, 2008.

The same problem also interested anonymous remailers like Mixmaster and Mixminion, that use OpenSSL to create the remailer keys for the servers and the nym keys for the clients. Although currently there is no official announcement, at least two remailer changed their keys because were weak.

When Do I Trim My Trees?}

When Do I Trim My Trees?

by

Andrew G Johnson

Trimming your trees has many advantages and it should be considered for all of the trees that you own. Tree trimming is an important, yet often overlooked, step in the tree growing process. By trimming your trees early on, you can control the shape of the crown. When you trim your trees properly, you avoid many common problems that many people experience with their trees. Disease, damage to the tree, damage to your property, and broken branches can all be avoided by trimming at the right time.

[youtube]http://www.youtube.com/watch?v=swsbvMk15l8[/youtube]

Tree trimming can make your trees aesthetically pleasing to look at, but it can also keep your trees healthy. Trimming promotes the growth of foliage, fruit and flowers. Plus, trimming keeps the branches from getting too long and fragile, so they can actually support the weight of the new growth. This helps you to avoid limb breakage, which opens up your tree to diseases.

You should trim your trees at specific times of the year. The timing is dependent on the type of tree that you own. You may want to contact a local professional tree trimmer or arborist to assess the best times to trim your trees. Some trees do best if they are trimmed in the spring or summer. Doing this can promote rapid growth and help your young trees develop to their full potential. Other trees do best if they are trimmed in the winter while they are in dormancy. However, trimming certain trees in cold weather could actually kill them.

A certified arborist will know exactly which limbs to trim and how to promote a balanced density throughout your tree. Starting early and working with a professional from the time that your trees are young can give you control over whether the trees end up narrow and tall or wide and short. How the limbs are cut influences the direction that they will grow. This can be very useful, especially if your trees could grow too close to your home, power lines, the street, or off of your property. Controlling the shape and the growth rate can also help you to create shade where you need it and balance with your other landscaping.

If you have broken, damaged, diseased or “out of control” trees on your property that you would like removed, please call an Austin tree removal service that is run by certified arborist. A professional will try everything to save a tree before removing it. Austin tree care professionals are not just workers that went out and purchased some equipment. They are highly trained in pest management, disease control, tree trimming, and much more. You can also call a professional for Austin stump removal or Austin tree trunk removal to prevent pests, like termites and roaches, from infesting your property. Be sure that you get real, honest advice when looking for Austin tree trimming services by calling a professional arborist for all of your Austin tree trimming or Austin tree removal needs.

About the Author: Andrew Johnson is the owner of Central Texas Tree Care, a leading tree service provider in Central Texas (Travis County and surrounding areas) offering services such as pruning and removals, cabling and bracing as well as arborist reports, diagnostics, pest management, fertilization and

Austin tree service

trusts. For more information please visit http://www.centraltexastreecare.com.

Article Source:

When Do I Trim My Trees?

}

Blizzard Entertainment’s victory over bnetd sealed in Appeals Court

Saturday, September 3, 2005

Blizzard Entertainment has won a federal ruling in the U.S. Court of Appeals against the programmers of bnetd, a software package that emulates Blizzard’s Battle.net service. The court reaffirmed the original judgement, given in October, that the Digital Millennium Copyright Act and click-through EULA‘s prohibited the reverse engineering of Blizzard’s software in order to improve their playability. This was the first real test of the DMCA’s applicability.

Bnetd, released under the GNU General Public License, was created to enable users to play multiplayer games, bypassing Blizzard’s freely accessible Battle.net servers, which have sometimes been unreliable or slow for gamers. The software also disabled the CD-Key check which is present in Battle.net to prevent users of pirated copies from being able to connect to Blizzard’s servers. Offers by bnetd developers to incorporate Blizzard’s CD-Check system were declined.

The CD-Check system itself has faced controversy, with some users complaining it borders on breaching privacy in the same way as adware and other malevolent software. This is not confined to Blizzard: controversy occurred when Sony Online Entertainment‘s EverQuest had a similar system which was later disabled due to complaints. Other games designed for network play are also known to have similar systems in place, the most prominent perhaps being Valve Software‘s Steam system developed for Half-Life 2.

Blizzard has produced many popular titles such as Starcraft, World of Warcraft and the Diablo series.

President Bush, Congress agree on economic stimulus package

Friday, January 25, 2008

U.S. President George W. Bush and Congressional leaders from both political parties have reached agreement on US$150 billion in tax relief in an effort to help stimulate the United States economy. VOA White House Correspondent Scott Stearns has the story.

The agreement includes provision to give up to US$600 in tax rebates to millions of wage earners and an additional US$300 refund for each child. It allows businesses to immediately write off 50 percent of capital equipment purchases.

President Bush says it is an effective, robust and temporary set of incentives that will boost the economy and create new jobs.

“This package has the right set of policies and is the right size,” he said. “The incentives in this package will lead to higher consumer spending and increased business investment this year.”

The incentives in this package will lead to higher consumer spending and increased business investment this year.

The president says he knows Americans are concerned about their economic future, with the challenges of higher energy prices and a falling housing market slowing growth.

President Bush is urging the House of Representatives and Senate to pass the agreement as soon as possible.

“We have an opportunity to come together and take the swift, decisive action our economy urgently needs,” he added.

Stock markets around the world dipped sharply early this week amid widespread fears of a U.S. recession and its potential to drag down foreign markets as well.

The stimulus deal was an unusual display of bipartisanship in Washington, with Democrats and Republicans in the House making concessions to get the deal done quickly.

Republicans dropped a provision that would have allowed businesses to reclaim taxes previously paid. Democrats dropped their demands for increases in food stamps and unemployment benefits.

This bipartisan package should be acted upon rapidly and can help alleviate the economic pain felt by millions of Americans.

House Speaker Democrat Nancy Pelosi says she is not totally pleased with the package, but knows it will help stimulate the economy.

“This bipartisan package should be acted upon rapidly and can help alleviate the economic pain felt by millions of Americans,” she said.

John Boehner is the leader of Republicans in the House of Representatives. He says it was not easy for Republicans and Democrats to agree on a plan, but he is confident it is in the best interests of the nation.

“This agreement is a big win for the American people,” he said. “It will stimulate our economy in the most direct and effective way possible by putting money in the hands of middle income American families and by giving businesses incentives to create and build new jobs in our country.”

Treasury Secretary Henry Paulson was the president’s lead negotiator with Congress.

“I know the work isn’t done yet,” he noted. “As the Speaker said, we’ve got more to do. And I am looking forward to working with the Senate and working with the House to get a package as soon as possible, because, again, speed is of the essence.”

Senate Majority Leader Democrat Harry Reid says he wants to get the plan to the president for signature by February 15. But changes in the Senate may slow passage of the package, as Reid says senators may consider restoring provisions to extend unemployment benefits.

‘Suspicious package’ causes closure of busy street in Buffalo, New York

Tuesday, May 6, 2008

Buffalo, New York — Early Cinco De Mayo celebrations were interrupted after a suspicious package caused the closure of a busy street in Buffalo, New York’s Allentown District. For nearly three hours on Monday May 5, 2008 a busy street, popular with bars and hotels, was shut down while authorities examined the package.

According to Buffalo Police spokesman Mike DeGeorge, workers in the offices on the 500 block of Delaware Avenue witnessed a suspicious person placing a suspicious package inside a United Parcel Service (UPS) drop box at around 4:30 p.m. EDT (UTC-4).

“It is my understanding that at about 4:30 this afternoon, a call went out for a suspicious person. Police responded and it appears there may have been a suspicious individual who was acting somewhat suspicious when he threw or tossed a package into a UPS box,” DeGeorge stated to reporters.

“The individual had a package under his jacket which tipped off the person as being suspicious. He dropped the package into the [box], and made his way out to Delaware Ave. towards Allen,” stated Buffalo Police Lt., K Szyszkowski.

When police arrived on scene, they evacuated the offices at 570 and the New York State Health Department building at 584 Delaware Avenue, while the Erie County Bomb Squad was called in to examine the drop box and the packages. The street between Allen and North was shut down to traffic while police secured the scene. When Wikinews freelance reporter Jason Safoutin arrived on scene, at least 20 people were standing outside the buildings, most of whom appeared to be office employees.

At approximately 6:10 p.m., the bomb squad arrived along with a K-9 unit. The commander of the bomb squad, Daniel Walczak entered the area between the buildings where the drop box was at about 7:15. He then opened the box and examined several packages with an X-ray machine, but found nothing to indicate an explosive device was present. After about 15 minutes, Walczak exited the area with the suspect packages.

“It was a regular envelope, a UPS container about 18 inches by a foot and a half. As of right now, I am not going to get into anything about the package weight until we go through a thorough investigation,” stated Walczak to reporters. All of the packages will be sent to a laboratory for further analysis. Police would not say what might have been inside the packages.

Police do not have a suspect, but are reviewing security camera footage from the buildings. Szyszkowski states that witnesses say the suspect is a “white male, about 40-years-old [with a] green jacket and black pants.”

The street later reopened just before 8:00 p.m..

Allentown is home to two major hotels and over a dozen bars, but is no stranger to suspicious activity. In November of 2007, at least 12 fire bombs were found inside a building at 15 Allen, just a few blocks away from Monday’s incident.

Tips For Design On A Budget}

Tips for Design on a Budget

by

Jordan Rocksmith

Spring is right around the corner, and that means it is time to start sprucing up your space. While you are taking care of spring cleaning, you might as well take care of a few design projects you have been meaning to complete around your home as well. No matter your income, everyone gets tired of the design in a home eventually. If money is tight, however, you may have neglected to change things up and refresh your space. The good news is that there are a lot of projects you can complete around your home that make a big impact on your design, but not on your wallet. The following article outlines a few tips for design on a budget to help you get a fresh look for your home’s interior. Once you are ready to get started, check out a few Florida home interior stores today for ideas and inspiration.

Tips for Design on a Budget

Great design is for anyone, regardless of budget limitations. Those with smaller budgets are no less deserving or capable of great design, but projects must be more carefully planned in order to get what you want while working with budget constraints. Never fear, as the following list can help you out with a few tips for great design on a budget:

[youtube]http://www.youtube.com/watch?v=hc7x79kJ1S0[/youtube]

Refresh and rejuvenate with a fresh coat of paint: A fresh coat of paint is probably the most effective yet inexpensive way to dramatically change your space and give it the energy boost it needs. You can paint any room in your house for less than $60, and it is a very simple and easy project for all DIYers.

Invest in furniture, go cheap on accents: Furniture is a big investment for anyone, and you want your furniture to be timeless and durable. Accent pieces such as pillows, wall hangings, and other knickknacks should be changed out often in order to keep your space looking fresh, so it is okay to go cheap on these items by purchasing slightly damaged accents and clearance or discount items collected over time.

Use what you already have: Sure, it would be great to purchase a whole new set of furniture for your living room every few years, but most people do not have the budget for that. When working with a tight budget, get creative about utilizing all of the resources available to you. Can you repurpose that old piece of furniture by sanding it down and refinishing it, reupholstering it, or painting it? Do you have a piece hanging out in one room that you could spruce up a bit and give a new look and purpose in a different room? Thinking creatively and looking at an old piece with a fresh eye can save you a lot of money and give you the design resources you need.

Sew your own window treatments: Window treatments frequently become dated, and if you want to save some money on this great way to refresh and update your space, you can very easily sew your own window treatments.

Find it for less: One of the biggest drains on any budget (large or small) is a DIY designer not knowing what he or she wants for the design. You can waste a lot of money buying furniture and accents without a clear vision in mind. Take some time looking at websites, at blogs, and in Florida home interior stores until you know what you want for the design in your own space. Once you have compiled a few inspiration ideas, start looking on websites and in stores until you can find your inspiration pieces (or something very similar) at the lowest price possible.

Heritage House Home Interiors is your premier

Florida Home Interior Stores

and quality home goods.Visit our page on

hhhinteriors.com/

to see our page!

Article Source:

Tips for Design on a Budget }

« Older posts Newer posts »

© 2026 maagoogle.com

Theme by Anders NorenUp ↑