Ransomware Encryption

posted on July 6th, 2014 by in Audio


Ransomware uses asymmetric encryption. When an attacker sends a message with encryption key value, user must give decryption key to decrypt the data, so learning about ransomware is important to be prevented against these attacks.

The value of encryption key is usually in the range from 35 to 58 bytes.

Any plaintext in the message is changed.

Message encrypted with symmetric cipher will have some header information like user name, encrypted password, and or comments that are used to display the message.

The value of encrypted header is usually a 64-bit integer.

Messages encrypted with symmetric cipher will have some key and symmetric key values like message content, encrypted message header, encrypted content of message header, and encrypted key.

The symmetric key value is normally encrypted with symmetric cipher with key length from 22 to 64 bytes.

This way attacker can not decrypt the header data after encrypted message header and content.

Encrypted data is only readable if user has given decryption key.

Cryptographic algorithm used to encrypt and decrypt symmetric cipher messages.

Encryption key should be set to “A” for AES and “B” for Twofish.

If the message does not have the correct encryption key, messages will be decrypted by a not even considered attacker.

The cipher is used for symmetric cipher messages.

Symmetric cipher for symmetric encryption is AES or Twofish with “A” encryption key and “B” decryption key.

Symmetric encryption works in which first user encrypts a message with her private key.

User later puts the message in the public key.

An attacker who doesn’t know public key encrypts the message with a randomly generated key, then sends the message with a not even considered adversary.

And the asymmetric encryption algorithm of symmetric cipher, decryption key and cipher block size (CBC) is chosen randomly.

If the public key is not properly created, symmetric encryption can not work.

AES encryption works in which first user encrypts the message with her private key.

AES encryption is one of the most used symmetric encryption algorithms in this malware class.

Symmetric encryption is applied symmetrically with same key.

The asymmetric key is asymmetric encryption algorithm.

Symmetric key can be created in two ways: symmetric-key cryptosystem or symmetric-key private key-generator.

S-box is the most popular encryption algorithm for symmetric encryption.

Symmetric key cryptosystem is composed of two keys public key and private key.

Public key is shared by user and decryptor.

The private key is secret and not ever shared with user.

When decrypting, public key is exchanged with the private key.

PuTTY’s symmetric cipher Cryptographic algorithm used to encrypt and decrypt symmetric cipher messages.

Cryptographic algorithm used to encrypt and decrypt symmetric cipher messages.

Encryption key should be set to “A” for AES and “B” for Twofish.

If the message does not have the correct encryption key, messages will be decrypted by a not even considered attacker.


bubble Comments Off

Background checks importance

posted on December 24th, 2013 by in Audio, Free Download

A good reason for thorough background checks is to avoid negligent hiring claims. For example, one employer failed to obtain a background check in a job opening when she learned about a drug addiction. The company was forced to fire her for cause.

Also, it’s not unreasonable for an employer to seek to remove a current employee with a felony conviction, especially if the employer suspects the employee could become violent. This kind of conviction is one of the three or more serious offenses listed on the federal Brady Handgun Violence Prevention Act. This law requires background checks of all gun sales and transfers.

An employee who refuses a background check will not be able to receive a firearms permit from the Bureau of Alcohol, Tobacco, Firearms and Explosives, a government agency, as long as the FBI is investigating, and that’s why companies use professional services for background checks so they can know everything on their employees is in order.

In Texas, the state’s current statute provides for a right of appeal to the Texas Criminal Justice Commission. An employee may be suspended without pay for up to 180 days for a felony conviction, and a state employee who is convicted of a felony may be removed from office upon conviction.

A new Texas law, Senate Bill 549, signed into law on May 9, 2014, requires state employees to register as sex offenders after a sex offense conviction. A new federal law, the Megan’s Law, signed into law on December 18, 2009, allows anyone convicted of a sex offense against a minor to be prosecuted as an adult and requires states to inform the National Sex Offender Registry of convicted offenders. The federal and state registration laws are not uniform.
In states where registries are not required, some offenders remain on the state’s registry, while others can apply for cancellation. However, the federal law requires the cancellation of registries after a 10-year period.

Child sex offenders (usually referred to as sex offenders) face various criminal penalties under a wide variety of state and federal laws. Depending on the offense, a state might require a sex offender to register as a sex offender, be subject to a financial penalty, or be prohibited from living in certain areas. Most of the sex offenses that a state or federal sex offender might be convicted of are “statutory” (criminal in nature), which means that the state laws create the statutory offense but that a federal law governs the sentencing. Statutory sex offenses include child molestation, rape, and sexual battery. The most serious sex offense that a state or federal sex offender might face is a life sentence in prison. As noted above, sex offenses in the state of Virginia can result in a sentence of life imprisonment or death. If you are charged with or convicted of a sex offense in the state of Virginia, please be sure to contact a local attorney in the state.


Christmas Gifts for People Who Love Jamaica #7: Babylon is Falling sweatshirt.

posted on December 16th, 2013 by in Fashion

Babylon is Falling

SEEN Christmas gift tipp number 7 is the sweatshirt version of Massiv’s “Babylon is Falling” design which you might have seen Major Lazer’s Jillionaire wandering around in during summertime. Or you can gift wood furniture that will make your office stand out!

Available directly from the LA-based brand’s online shop, you will probably have to live in the States though to receive this one in time.

PSsst: Use code “morelove” to get 25% off on all orders until Januar 1, 2014 and make sure to grab Massiv’s “No Bad Mind” design from Base Kingston should you be in town this week to attend the Major Lazer X Skrillex show at Mass Camp.


Christmas Gifts for People Who Love Jamaica #6: The Voice Of The Jamaican Ghetto.

posted on December 9th, 2013 by in Jamaican Politics

Vybz Kartel - Voice of the Jamaican Ghetto

The murder trial of Vybz Kartel enters its fourth week today.

That reminded us to recommend his book as SEEN Christmas gift number 6. “The Voice Of The Jamaican Ghetto” came out in 2012 and is a must read for any Kartel fan out there.

Available e.g. from Mixpak.


Christmas Gifts for People Who Love Jamaica #5: Sting 30 Live Stream Watch Pass.

posted on December 5th, 2013 by in Event, Jamaican Artists, Jamaican Music

Sting 30 Live Stream Pass

Sting aka “The Greatest One Day Reggae & Dancehall Show on Earth” turns 30 this year. Staged by Downsound Records and Supreme Promotions, the event e.g. has Super Cat, Ninja Man, Mavado, Tommy Lee Sparta and 2 Chainz on the bill.

Beginning at 8pm EST on December 26, 2013, Sting 30 will be live-streamed for fans around the world.

Sting watch passes are our Christmas gift tipp #5. Pre-order now.