Black Hat: 10 can't-miss hacks and presentations

Black Hat: 10 can't-miss hacks and presentations

Summary: The 2011 Black Hat security conference is promising a smorgasbord of (in)security fun. From vulnerabilities in PLCs (programmable logic controllers) to the security design of Apple's iOS and potential hacker attacks on medical implant devices, the range of presentations this year could be the best ever.

SHARE:
TOPICS: Software, Security
13

LAS VEGAS -- The 2011 Black Hat security conference is promising a smorgasbord of (in)security fun. From vulnerabilities in PLCs (programmable logic controllers) to the security design of Apple's iOS and potential hacker attacks on medical implant devices, the range of presentations this year could be the best ever.

Here's my list of this year's can't-miss presentations:

1. Exploiting Siemens Simatic S7 PLCs

Dillon Beresford (right), a security researcher at NSS Labs, has already courted controversy with this topic.  The talk was originally scheduled for the TakeDownCon security conference in May but was withdrawn after some bigwigs (including the Department of Homeland Security) got nervous about the pre-patch disclosure ramifications.

At Black Hat, Beresford is promising to cover newly discovered Siemens Simatic S7-1200 PLC vulnerabilities and to demonstrate how an attacker could impersonate the Siemens Step 7 PLC communication protocol using some PROFINET-FU over ISO-TSAP and take control.

Beresford is a brand-name security researcher in the SCADA world.  Earlier this year, he developed an exploit for one of the most popular high performance production SCADA/HMI software applications in China which is widely used in power, water conservancy, coal mine, environmental protection, defense and aerospace.

Because security holes in Siemens' PLCs played a key role in the success of the mysterious Stuxnet worm, Beresfords's Black Hat disclosures is sure to raise eyebrows.

2. Hacking Google Chrome OS

Google + the cloud + web applications is a recipe for a fun security cocktail.

In the last few months, two members of the WhiteHat Security's Threat Research Center -- Matt Johansen and Kyle Osborn -- hacked away at Google's Cr-48 prototype laptops and discovered a slew of serious and fundamental security design flaws.

Now, they are sharing their findings with the Black Hat audience, promising to discuss security holes that could expose users to the following types of attacks:follow Ryan Naraine on twitter

  • Exposing of all user email, contacts, and saved documents.
  • Conduct high speed scans their intranet work and revealing active host IP addresses.
  • Spoofing messaging in their Google Voice account.
  • Taking over their Google account by stealing session cookies, and in some case do the same on other visited domains.

Johansen and Osborn said Google was informed of the findings and has already fixed some vulnerabilities they plan to discuss many of the underlying Google Chrome OS weaknesses that remain -- including for evil extensions to be easily made available in the WebStore, the ability for payloads to go viral, and javascript malware survive reboot.

3. Apple iOS Security Evaluation: Vulnerability Analysis and Data Encryption

When Dino Dai Zovi speaks about Apple and security, you stop and listen.

Best known for his successful hijack of a MacBook at the CanSecWest hacker conference, Dai Zovi has now turned his attention to Apple's iOS, the smartphone platform that powers iPhones and iPads.

Dai Zovi performed a detailed audit of the security mechanisms and features of iOS 4 and will share his findings on things like Trusted Boot, Mandatory Code Signing, Code Signing Enforcement, Sandboxing, Device Encryption, Data Protection, and (as of iOS 4.3) Address Space Layout Randomization.

The security assessment focused on the concerns of an enterprise considering a deployment of iOS-based devices or allowing employees to store sensitive business data on their personal devices so we can expect to hear about the real-world implications of using iPhones and iPads in the enterprise.

Dai Zovi is promising to document the risks of a lost device or a remote iOS compromise through a malicious web page or e-mail and, based on the strengths and weaknesses identified, make concrete recommendations on what compensating measures an organization can and should take when deploying iOS-based devices for business use.

4. Exploiting the iOS Kernel

Stefan Esser is best known for his epic work around PHP security but if you've been following his Twitter stream lately, you'd notice the German researcher has taken a liking to Apple's iOS platform.

In this Black Hat session, Esser is promising a deep-dive discussion of kernel level exploitation of iPhones. It will include details on previously disclosed kernel vulnerabilities,  the exploitation of uninitialized kernel variables, kernel stack buffer overflows, out of bound writes and kernel heap buffer overflows.

Esser also plans to look closely at the kernel patches applied by iPhone jailbreaks to provide an understanding of how certain security features are deactivated.  He also plans to release a tool that allows the selectively de-activation some of certain kernel patches for more realistic exploit tests.

* Image via Sebastian Bergmann (Flickr CC 2.0)

5. Hacking Androids for Profit

The growing popularity of smart phones has generated a predictable surge in security research around mobile platforms and this year's Black Hat agenda contains quite a few good presentations.

This talk, by Riley Hassell and Shane Macaulay, puts Android under the microscope with a promise to reveal new threats to Android Apps and discuss known and unknown weaknesses in the Android OS and Android Market.

The researchers will discuss the inner working of Android apps and the risks any user faces when installing and using apps from the marketplace.

Next -- SSL and authenticity, water meter vulnerabilities, hacking medical devices...

6. SSL And The Future Of Authenticity

Moxie Marlinspike has generated a reputation as privacy and anonymity advocate who goes beyond mere talk.  He has many free tools and utilities for both the Web and mobile systems and spends his time warning anyone who would listen about the dangers of web tracking software.

Widely considered a security research expert on protocols, cryptography, privacy, and anonymity, Marlinspike will focus on SSL (Secure Socket Layer) encryption at this year's Black Hat conference.

He is promising to provide an in-depth examination of the current problems with authenticity in SSL, discuss some of the recent high-profile SSL infrastructure attacks in detail, and cover some potential strategies for the future. Marlinspike's talk conclude with a software release that aims to definitively fix the disintegrating trust relationships at the core of this fundamental protocol.

As a side note, Marlinspike will be speaking at BSidesLV, providing "thoughts on LulzSec through the historical lens of Russian Nihilism and Motiveless Terrorism." That's another good one to put on the schedule. The BSidesLV talk has since been withdrawn. Bummer.

7. Vulnerabilities in Wireless Water Meter Networks

What if a hacker could tamper with your water meter to do dangerous things? It may sound far-fetched but, after Stuxnet, no one should doubt the ramifications of designer malware planted on critical systems.

This Black Hat talk is particularly interesting because the speaker, John McNabb of South Shore PC Services, spent 13 years managing a small water system and claims to have deep knowledge of how these things work.

McNabb says research into wireless water meters is crucial because they are a potential security hole in a critical infrastructure and can pose a wide range of problems.

In this talk, McNabb promises to present an overview of drinking water security, review reported water system security incidents and the state of drinking water security over the past year.  He will also provide a deep dive into the hardware, software, topology, and vulnerabilities of wireless water meter networks and how to sniff wireless water meter signals.

8. Battery Firmware Hacking

Clearly not satisfied with hacking into MacBooks and iPhones, Charlie Miller has his eyes on the chip that control your computer's battery.

Miller, a brand-name hacker who now works as Principal Research Consultant at Accuvant Labs, will use the Black Hat stage to discuss the embedded controller used in Lithium Ion and Lithium Polymer batteries.   In his research, he found that the controller is used in a large number of MacBook, MacBook Pro, and MacBook Air laptop computers.

Miller explains:

"In this talk, I will demonstrate how the embedded controller works. I will reverse engineer the firmware and the firmware flashing process for a particular smart battery controller. In particular, I will show how to completely reprogram the smart battery by modifying the firmware on it. Also, I will show how to disable the firmware checksum so you can make changes. I present a simple API that can be used to read values from the smart battery as well as reprogram the firmware. Being able to control the working smart battery and smart battery host may be enough to cause safety issues, such as overcharging or fire."

As reported by Andy Greenberg at Forbes.com, Miller found that the batteries’ chips are shipped with default passwords, such that anyone who discovers that password and learns to control the chips’ firmware can potentially hijack them to do anything the hacker wants.

9. Hacking Medical Devices for Fun and Insulin: Breaking the Human SCADA System

Theoretical research into the hacking of medical devices is nothing new but this talk by Jerome Radcliffe stands out because of the wide usage of the target -- insulin pumps to treat diabetes.

Radcliffe, who wears an insulin pump and continuous glucose monitor, said the devices can be considered a "Human SCADA system."

After attending a DefCon presentation on hardware hacking of proprietary systems and wireless communication methods, Radcliffe said he was inspired to hack into the devices to see if the communication methods could be reverse engineered or whether a device can be created to perform injection attacks.

"Manipulation of a diabetic's insulin, directly or indirectly, could result in significant health risks and even death," he explained.   In this talk, Radcliffe plans to explain his discoveries around the propriety protocols and the hardware interfacing.

10. Playing In The Adobe Reader X Sandbox

Adobe's addition of a sandbox called 'Protected Mode' into Reader X has put a significant roadblock for malicious hackers.  However, it has set up a perfect cat-and-mouse game where attackers are working overtime to bypass the mitigations.

In this talk by Paul Sabanal and Mark Yason from IBM ISS's X-Force Advanced Research Team, Black Hat attendees will get a deep technical explanation of the implementation details of the Adobe Reader Protected Mode sandbox and the the results of reversing efforts to understand the mechanisms and data structures that make up the sandbox.

The researchers also plan to discuss the limitations and weaknesses of the sandbox and offer possible avenues to achieve privilege escalation. "We will demonstrate how an attacker could leverage the limitations and weaknesses of the Adobe Reader Protected Mode sandbox to carry out information theft or corporate espionage. We will be demonstrating a proof-of-concept information stealing exploit payload bootstrapped by exploiting a publicly known Adobe Reader X vulnerability," the researchers explained.

Topics: Software, Security

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.

Talkback

13 comments
Log in or register to join the discussion
  • You forgot Post Its with passwords tacked to the monitor!

    ;-)
    kd5auq
    • RE: Black Hat: 10 can't-miss hacks and presentations

      @kd5auq
      very good one.
      Ram U
  • RE: Black Hat: 10 can't-miss hacks and presentations

    Will these videos be streamed anywhere?
    Waffleboy
  • RE: Black Hat: 10 can't-miss hacks and presentations

    Don't worry!!!!!!!!!!!!
    EVERYTHING is computerized and NOTHING can go wrongggghhhhhh, wrongeeeecccchchh, wronggggggiiijjj.
    Remember to LIE on all filled out forms.
    trm1945
    • RE: Black Hat: 10 can't-miss hacks and presentations

      @trm1945
      Don't lie, just use Ryan's data ;)

      Hope they stream this :O
      rhonin
  • RE: Black Hat: 10 can't-miss hacks and presentations

    It is amazing to learn what things potentially can be hacked. But I think we should not loose focus on those items that we actually use and maintain ourself and where we could be confronted with the consequences of a hack.

    http://www.blackhat.com/html/bh-us-11/bh-us-11-schedule.html
    bezoeker
  • The Nerd Lounge

    The Nerd Lounge wants you! Come check us out and join in on the discussions! The Nerd Lounge is home to nerds like you and me.

    www.thenerdlounge.com
    NerdLounger
  • RE: Black Hat: 10 can't-miss hacks and presentations

    Android and Chrome OS can't enter the enterprise market if they are so insecure. CIO's should understand Linux, Windows and MacOSX have decades in security research and are now safe to install in large enterprises. The problem with Google is they lost 10 years since 2000 and only cared about the web search market, and now they want to enter the OS market, but I think they are too ambitious and won't be able to have success in the enterprise market until they proove their software is secure.
    Gabriel Hernandez
    • RE: Black Hat: 10 can't-miss hacks and presentations

      @Gabriel Hernandez
      Funny, I always thought that ChromeOS and Android (and OSX in a round abbout kind of way) were Linu based.....

      The techniques and methods for securing operating systems are well known. The reason security holes still exist / reoccur is pretty much
      * accidental errors in design / coding, which are either ignored or not picked up in testing, and
      * deliberate errors in design, usually in favour of 'ease of use'
      martin.english
  • RE: Black Hat: 10 can't-miss hacks and presentations

    <p>Mainly because products are rattling straight forward, locomotion, to see our own elements connected with <a href="http://www.coachfactoryoutletcenter.com" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>???? you can actually just make an effort to accomplish without this.The reputation of the coach outlet with the good old bag, was actually the original inspiration came from a softball glove, Cheap replica Coach Handbags features soft.<a href="http://www.coachfactoryoutletcenter.com" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>???? is actually a stylish Coach online store to sell high quality and discount Coach handbags, Coach bags, Coach wallets etc. If you love Coach, you will like to get the best price on it.<a href="http://www.coachfactoryoutletcenter.com" title="coach factory outlet store"><span style="color:green"><h1><strong>coach factory outlet store</strong></h1></span></a>???? comes from the prestigious American which has constantly introduced its classic series of works by their innovation.</p><p>For your consideration is the Cheap <a href="http://www.coach--purses.com" title="coach purses"><span style="color:green"><h1><strong>coach purses</strong></h1></span></a>???? which is made in USA . It is crafted in traditional monogram canvas and has natural cowhide leather.Though handbags are basically an accessory item of girls, there are many modern handbags and wallets for males too as it has become the ultimate fashion accessory at <a href="http://www.coach--purses.com" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>????.<a href="http://www.coach--purses.com" title="coach outlet online"><span style="color:green"><h1><strong>coach outlet online</strong></h1></span></a>???? is the eldest, voice of reason, and authority of the Left 4 Dead 2 team, playing a similar role to Bill in Left 4 Dead.<a href="http://www.coach--purses.com" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>???? can provide the coach exactly the same is expected in a retail store. It can help you find bags of various colors, shapes and designs, which prove once again that the coach is actually a selection for the housekeeper.</p><p>Are you still worrying about where to buy yourself a Coach? Then <a href="http://www.coachbagsoutletsstore.org" title="coach bags"><span style="color:green"><h1><strong>coach bags</strong></h1></span></a>???? Online offering top-quality goods and first-class service can be your way-out.He went rapidly up the stairs, walked into his unlocked <a href="http://www.coachbagsoutletsstore.org" title="coach handbags"><span style="color:green"><h1><strong>coach handbags</strong></h1></span></a>???? room and at once fastened the latch. It's for you to obey, trembling creation, and not to have desires, for that's not for you!Almost everyone has identified effectively about this, below, among the best to make sure you will get much more information about <a href="http://www.coachbagsoutletsstore.org" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>????.I received the Coach purse I ordered at the <a href="http://www.coachbagsoutletsstore.org" title="coach outlet store"><span style="color:green"><h1><strong>coach outlet store</strong></h1></span></a>???? yesterday.I like its fashionable style as well as fine workmanship very much.</p><p><a href="http://www.coachoutletonlinesstores.net" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>???? has become a popular shopping experience for consumers around the world, and a desirable distribution channel for manufacturer's and retailers.There certainly are a amount of methods to acquire affordable coach products at <a href="http://www.coachoutletonlinesstores.net" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>????,it could possibly the most effective options.the most vital cause may be the reality that you simply can purchase genuine coach products at there.Coach handbags from the <a href="http://www.coachoutletonlinesstores.net" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>???? are popular now because of the colorful fabric. It is fashionable and beautiful. You can see the opening of the bag like wave, which is its special design.Coach bags of <a href="http://www.coachoutletonlinesstores.net" title="coach factory store online"><span style="color:green"><h1><strong>coach factory store online</strong></h1></span></a>???? successfully conbine modernity and classicality and are quite suitable for fashionable young girls and ladies.</p><p><a href="http://www.coachoutletonlinestore1.org" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>???? can provide the coach exactly the same is expected in a retail store. It can help you find bags of various colors, shapes and designs, which prove once again that the coach is actually a selection for the housekeeper.If you want to have the latest Coach arrivals, <a href="http://www.coachoutletonlinestore1.org" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>???? may be a good choice. It provides its members with actually beneficial?prices?and high quality services.<a href="http://www.coachoutletonlinestore1.org" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>???? can design new and original products that are also functional. The stylish appearance of products, sophisticated workmanship, superior quality and highly competitive prices have won the customer's trust and love from consumers at home and abroad. So you can rest assured that purchase.<a href="http://www.coachoutletonlinestore1.org" title="coach factory store online"><span style="color:green"><h1><strong>coach factory store online</strong></h1></span></a>???? is sensible for female for you personally to elect to possess the bigger purses and handbags compared to scaled-down types.</p><p>The most incredible knack about the coach bag of <a href="http://www.coachoutletonlinecool.com" title="coach outlet online"><span style="color:green"><h1><strong>coach outlet online</strong></h1></span></a>???? is that it would excellently please your minds beyond your mind's eye. For example, if you want to become the Angelina Julie, you will immediately need to wear the coach handbag around your shoulder.In terms of the quality and superior design that make more and more customers are satisfied to <a href="http://www.coachoutletonlinecool.com" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>????.Welcome!Coach is a leading American designer and maker of luxury lifestyle handbags and accessories.There is no doubt that here <a href="http://www.coachoutletonlinecool.com" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>???? is the exact place you should visit.<a href="http://www.coachoutletonlinecool.com" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>???? has a zippered closure and buckles for extra security. Shiny brass hardware, rounded leather handle, and an interior pocket. It also includes a limited edition Hawaii luggage tag and lock.</p><p>No one can deny the shopping at the <a href="http://www.coachhoutlett.net" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>???? is satisfactory. For the low prices and good quality.Bright colors, exquisite workmanship, durable material and up-to-date style all lead to the great fame of the goods in <a href="http://www.coachhoutlett.net" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>????.<a href="http://www.coachhoutlett.net" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>???? is one of the most popular and successful leather brands in the U.S. market.Coach stands for the most-admired innovative style and conventions in American fashion.<a href="http://www.coachhoutlett.net" title="coach factory"><span style="color:green"><h1><strong>coach factory</strong></h1></span></a>???? is the premier source to review all new Coach and other stylish brands of Handbags, Purses, and accessories to capture fabulous styles at even more fabulous prices.</p><p>If you want to have the latest Coach arrivals, <a href="http://www.coachoutletfactoryss.net" title="coach factory outlet online"><span style="color:green"><h1><strong>coach factory outlet online</strong></h1></span></a>???? may be a good choice. It provides its members with actually beneficial?prices?and high quality services.With the safe door to door shipping, the <a href="http://www.coachoutletfactoryss.net" title="coach outlet"><span style="color:green"><h1><strong>coach outlet</strong></h1></span></a>???? will send the products to your hands, which are of top quality and at competitive factory prices.That experts claim <a href="http://www.coachoutletfactoryss.net" title="coach factory outlet"><span style="color:green"><h1><strong>coach factory outlet</strong></h1></span></a>???? shopping is in the changes they are available in, which can make it well suited for benefit from to be a'luggage'bag.Highest classic, modern design and best quality are the goals of <a href="http://www.coachoutletfactoryss.net" title="coach factory store"><span style="color:green"><h1><strong>coach factory store</strong></h1></span></a>????.It's distinctly that these Coach Crossbody with distinct design and style.</p>
    erica55
  • RE: Black Hat: 10 can't-miss hacks and presentations

    <p>LV handbags adopt special patterns in the appearance. The modelling of each type of handbags have their own unique flavor. To get one LV handbag, <a href="http://www.ilouisvuittonoutlet.org" title="louis vuitton online"><span style="color:red"><h1><strong>louis vuitton online</strong></h1></span></a>???? is a nice option.As we show below, <a href="http://www.ilouisvuittonoutlet.org" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>???? have a number of Louis Vuitton Earrings, louis vuitton replica handbags, in different styles for your selection.If you feel more and more online shopping department store thinned Market,then do a local version of their own. When the gradual opening of <a href="http://www.ilouisvuittonoutlet.org" title="louis vuitton outlet online"><span style="color:red"><h1><strong>louis vuitton outlet online</strong></h1></span></a>????. Public will be increasingly in popularity.They also have put their <a href="http://www.ilouisvuittonoutlet.org" title="louis vuitton sale"><span style="color:red"><h1><strong>louis vuitton sale</strong></h1></span></a>???? to make it more convenient and economical for their customers to buy their goods.</p><p>Have you ever dreamed of being as charming as Madonna? Have you ever thought of becoming an envy of all your friends? If so, come to <a href="http://www.ilouisvuittonoutlet.net" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>????.The <a href="http://www.ilouisvuittonoutlet.net" title="louis vuitton outlet online"><span style="color:red"><h1><strong>louis vuitton outlet online</strong></h1></span></a>???? is so colorful.Its products, both for the female and the male, touch upon all walks of life.Have you ever dreamed of being as charming as Madonna? Have you ever thought of becoming an envy of all your friends? If so, come to <a href="http://www.ilouisvuittonoutlet.net" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>????.</p><p>The handbags at the <a href="http://www.louisvuittonoutletonlinee.com" title="louis vuitton online"><span style="color:red"><h1><strong>louis vuitton online</strong></h1></span></a>???? come in refreshing Monogram Multicolore canvas. They Features the LV signature in 33 different colours for a bright yet sophisticated look.If you feel more and more online shopping department store thinned Market,then do a local version of their own. When the gradual opening of <a href="http://www.louisvuittonoutletonlinee.com" title="louis vuitton outlet online"><span style="color:red"><h1><strong>louis vuitton outlet online</strong></h1></span></a>????. Public will be increasingly in popularity.In the web times, even if you are a noble person on <a href="http://www.louisvuittonoutletonlinee.com" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>????, or to real action to prove himself, has been integrated into a new era.If in a foreign country to join the twitter, it is best to join army of micro-Bo;</p><p>Successfully buying products from the <a href="http://www.louisvuitton-outletsales.com" title="louis vuitton sale"><span style="color:red"><h1><strong>louis vuitton sale</strong></h1></span></a>???? online now, people can even have handbags as gifts. Time is limited. Just seize the chance.<a href="http://www.louisvuitton-outletsales.com" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>???? leads you to bags collection of wide, such as LV bags and LV handbag etc. They are main name in luxury and style. It is excellent quality, fine Italian technology and extraordinary beauty.When you hold a Louis Vuitton handbags, you can see and feel the quality. If it were for the fact that fashions change so often, <a href="http://www.louisvuitton-outletsales.com" title="louis vuitton outlet sale"><span style="color:red"><h1><strong>louis vuitton outlet sale</strong></h1></span></a>???? will be your good choice for a lifetime.People need a complete range of bags from the <a href="http://www.louisvuitton-outletsales.com" title="louis vuitton sale"><span style="color:red"><h1><strong>louis vuitton sale</strong></h1></span></a>???? to suit different occasions, formal or casual. Of course, we need at least one patent leather bag in decent color for formal occasion to match our profession.</p><p>If you want to catch up to the latest vogue, having <a href="http://www.louisvuitton-bagsoutlets.com" title="louis vuitton bags outlet"><span style="color:red"><h1><strong>louis vuitton bags outlet</strong></h1></span></a>???? of the latest styles can absolutely satisfy you.<a href="http://www.louisvuitton-bagsoutlets.com" title="louis vuitton bags"><span style="color:red"><h1><strong>louis vuitton bags</strong></h1></span></a>???? using the most exclusive materials and state-of-the-art workmanship. The skilled artistry that goes into creating each product guarantees impeccable quality.As we show below, <a href="http://www.louisvuitton-bagsoutlets.com" title="louis vuitton outlet"><span style="color:red"><h1><strong>louis vuitton outlet</strong></h1></span></a>???? have a number of Louis Vuitton Earrings, louis vuitton replica handbags, in different styles for your selection.<a href="http://www.louisvuitton-bagsoutlets.com" title="louis vuitton outlet online"><span style="color:red"><h1><strong>louis vuitton outlet online</strong></h1></span></a>???? will not solely store and build pertaining to your entire necessities,and makes it possible for you to create a typical appearance.Lots of women like these bags.</p>
    erica55
  • RE: Black Hat: 10 can't-miss hacks and presentations

    The problem with Google is they lost 10 years since 2000 and only cared about the web search market, and now they want to enter the OS market, but I think they are too ambitious <a href="http://e-stavkovekancelarie.com">stavky</a>and won't be able to have success in the enterprise market until they proove their software is secure.
    matt datt
  • RE: Black Hat: 10 can't-miss hacks and presentations

    Android and Chrome OS can't enter the enterprise market if they are <a href="http://www.sazkove.cz/unibet">unibet</a>so insecure. CIO's should understand Linux, Windows and MacOSX have decades in security research and are now safe to install in large enterprises. The problem with Google is they lost 10 years since 2000 and only cared about the web search market, and now they want to enter the OS market, but I think they are too ambitious and won't be able to have success in the enterprise market until they proove their software is secure. It is amazing to learn what things potentially can be hacked. But I think we should not loose focus on those items that we actually use and maintain ourself and where we <a href="http://e-sazkovekancelare.com">sazkove kancelare</a>could be confronted with the consequences of a hack.
    sazkove