5:27
|
What is a Stem and Leaf Plot & How Does IT Organize Data? Math for Kids | English
A stem and leaf plot shows a large amount of data in a clear way by listing it in order of place value. A stem and leaf plot is generally used when data has multi-digit numbers. In this kind of...
A stem and leaf plot shows a large amount of data in a clear way by listing it in order of place value. A stem and leaf plot is generally used when data has multi-digit numbers. In this kind of plot, the ones digit of each number in the data is separated from the other digits.
The plot has two columns. The first column, called the “stem”, lists all of the digits in the tens place and beyond, in order. A vertical line divides the stem from the “leaves” (the second column). This second column shows the ones place of each number in the data, also in order. Every number in the leaf column represents a number from the data. Its ones place is in the leaf, and the tens place and beyond are in the stem.
SUBSCRIBE https://tinyurl.com/yckbu4r5
WATCH MORE https://tinyurl.com/3ksmu7d9
FREE EDUCATIONAL GAMES FOR KIDS! https://www.brainstar.com/
Turtle Diary (Brain Star) creates educational videos for children about math, science, reading, writing, social studies and more! We believe learning can be fun for kids and have made it our passion to design educational interactive games and Youtube videos to help kids get excited about learning, in and out of the classroom. School isn\'t the only place to learn and grow. From ABCs and 123s to the science of motion, Turtle Diary (Brain Star) has kids education covered!
More...
Description:
A stem and leaf plot shows a large amount of data in a clear way by listing it in order of place value. A stem and leaf plot is generally used when data has multi-digit numbers. In this kind of plot, the ones digit of each number in the data is separated from the other digits.
The plot has two columns. The first column, called the “stem”, lists all of the digits in the tens place and beyond, in order. A vertical line divides the stem from the “leaves” (the second column). This second column shows the ones place of each number in the data, also in order. Every number in the leaf column represents a number from the data. Its ones place is in the leaf, and the tens place and beyond are in the stem.
SUBSCRIBE https://tinyurl.com/yckbu4r5
WATCH MORE https://tinyurl.com/3ksmu7d9
FREE EDUCATIONAL GAMES FOR KIDS! https://www.brainstar.com/
Turtle Diary (Brain Star) creates educational videos for children about math, science, reading, writing, social studies and more! We believe learning can be fun for kids and have made it our passion to design educational interactive games and Youtube videos to help kids get excited about learning, in and out of the classroom. School isn\'t the only place to learn and grow. From ABCs and 123s to the science of motion, Turtle Diary (Brain Star) has kids education covered!
3:32
|
[06 Dec 2013] US constitution says govt can collect data of citizens without due process: Mark Mason - English
The US National Security Agency has justified tracking the data of millions of people, wherever they are in the world.
The NSA says its tracking of cell phones overseas is legally authorized...
The US National Security Agency has justified tracking the data of millions of people, wherever they are in the world.
The NSA says its tracking of cell phones overseas is legally authorized under a presidential order. The intelligence agency says it isn\'t tracking every foreign phone call, and it takes measures to limit how much US data is collected. It was revealed earlier this week that the NSA gathers up to five billion records every day on the location data for hundreds of millions of cell phones worldwide. Documents supplied by whistleblower Edward Snowden detail how the NSA is applying sophisticated mathematical techniques to map cell phone owners\' relationships.
More...
Description:
The US National Security Agency has justified tracking the data of millions of people, wherever they are in the world.
The NSA says its tracking of cell phones overseas is legally authorized under a presidential order. The intelligence agency says it isn\'t tracking every foreign phone call, and it takes measures to limit how much US data is collected. It was revealed earlier this week that the NSA gathers up to five billion records every day on the location data for hundreds of millions of cell phones worldwide. Documents supplied by whistleblower Edward Snowden detail how the NSA is applying sophisticated mathematical techniques to map cell phone owners\' relationships.
0:43
|
[29 Oct 2013] Latest market data show India has drastically increased oil imports from Iran - English
Latest market data show India has drastically increased oil imports from Iran-- in a clear proof of Iran\'s success in defying sanctions that have targeted its oil trade.
Figures show...
Latest market data show India has drastically increased oil imports from Iran-- in a clear proof of Iran\'s success in defying sanctions that have targeted its oil trade.
Figures show India imported about 200-thousand barrels per day of Iranian oil in September. This is roughly twice the figure for August. Earlier, similar market data showed that Iran had succeeded in becoming the top oil exporter to China in September after a series of slowdowns over the past months. Iran\'s Petroleum Minister Bijan Namdar Zanganeh had earlier said that serious plans were on agenda to boost the country\'s oil exports by four times. That would be in the face of illegal sanctions by the U-S and its allies that primarily target Iran\'s oil trade.
More...
Description:
Latest market data show India has drastically increased oil imports from Iran-- in a clear proof of Iran\'s success in defying sanctions that have targeted its oil trade.
Figures show India imported about 200-thousand barrels per day of Iranian oil in September. This is roughly twice the figure for August. Earlier, similar market data showed that Iran had succeeded in becoming the top oil exporter to China in September after a series of slowdowns over the past months. Iran\'s Petroleum Minister Bijan Namdar Zanganeh had earlier said that serious plans were on agenda to boost the country\'s oil exports by four times. That would be in the face of illegal sanctions by the U-S and its allies that primarily target Iran\'s oil trade.
3:32
|
[27 Jan 2014] NSA, GCHQ using smartphone apps to siphon users data - English
Newly leaked classified documents have revealed more about the spying activities of the US National Security Agency and its British counterpart, the GCHQ.
The latest revelations by whistleblower...
Newly leaked classified documents have revealed more about the spying activities of the US National Security Agency and its British counterpart, the GCHQ.
The latest revelations by whistleblower Edward Snowden show that the NSA and GCHQ have relied on data scooped up from the so-called leaky smartphone applications. according to a document published by The New York Times and The Guardian, the two intelligence agencies have been using applications such as Angry Birds games and Google Maps to collect swaths of personal data about users\' age, daily whereabouts, address books, and much more. It also exposed the fact that the mobile app initiative between the two spy agencies has been up and running since 2007. Previous reports have revealed the extent of the US and British governments\' mobile data collection, which has a global reach.
More...
Description:
Newly leaked classified documents have revealed more about the spying activities of the US National Security Agency and its British counterpart, the GCHQ.
The latest revelations by whistleblower Edward Snowden show that the NSA and GCHQ have relied on data scooped up from the so-called leaky smartphone applications. according to a document published by The New York Times and The Guardian, the two intelligence agencies have been using applications such as Angry Birds games and Google Maps to collect swaths of personal data about users\' age, daily whereabouts, address books, and much more. It also exposed the fact that the mobile app initiative between the two spy agencies has been up and running since 2007. Previous reports have revealed the extent of the US and British governments\' mobile data collection, which has a global reach.
6:34
|
What Are Line Plots & How Do They Organize Data? Math for Kids | English
What are line plots & how do they organize data? In this educational video for kids, you will learn how to use a line plot to organize and graph data & numbers. #numbers...
What are line plots & how do they organize data? In this educational video for kids, you will learn how to use a line plot to organize and graph data & numbers. #numbers #educationalvideosforkids #math
SUBSCRIBE https://tinyurl.com/yckbu4r5
WATCH MORE https://tinyurl.com/3ksmu7d9
FREE EDUCATIONAL GAMES FOR KIDS! https://www.brainstar.com/
Turtle Diary (Brain Star) creates educational videos for children about math, science, reading, writing, social studies and more! We believe learning can be fun for kids and have made it our passion to design educational interactive games and Youtube videos to help kids get excited about learning, in and out of the classroom. School isn\'t the only place to learn and grow. From ABCs and 123s to the science of motion, Turtle Diary (Brain Star) has kids education covered!
More...
Description:
What are line plots & how do they organize data? In this educational video for kids, you will learn how to use a line plot to organize and graph data & numbers. #numbers #educationalvideosforkids #math
SUBSCRIBE https://tinyurl.com/yckbu4r5
WATCH MORE https://tinyurl.com/3ksmu7d9
FREE EDUCATIONAL GAMES FOR KIDS! https://www.brainstar.com/
Turtle Diary (Brain Star) creates educational videos for children about math, science, reading, writing, social studies and more! We believe learning can be fun for kids and have made it our passion to design educational interactive games and Youtube videos to help kids get excited about learning, in and out of the classroom. School isn\'t the only place to learn and grow. From ABCs and 123s to the science of motion, Turtle Diary (Brain Star) has kids education covered!
2:59
|
3:43
|
ActionScript 3 - Load External Text File Data - Flash AS3 - English
Free Flash Source Files: http://www.developphp.com
In this free tutorial I demonstrate how you can connect to, parse, and display data from an external text file.
Free Flash Source Files: http://www.developphp.com
In this free tutorial I demonstrate how you can connect to, parse, and display data from an external text file.
3:33
|
5:39
|
10:52
|
Ajax Tutorial Post to PHP File XMLHttpRequest Object Return Data Javascript - English
earn to program the javascript XMLHttpRequest Object to easily send Ajax HTTP requests to your PHP parsing scripts, and get return data from submitted forms or any type of interaction that takes...
earn to program the javascript XMLHttpRequest Object to easily send Ajax HTTP requests to your PHP parsing scripts, and get return data from submitted forms or any type of interaction that takes place on your website
More...
Description:
earn to program the javascript XMLHttpRequest Object to easily send Ajax HTTP requests to your PHP parsing scripts, and get return data from submitted forms or any type of interaction that takes place on your website
2:46
|
2:10
|
1:40
|
5:23
|
How to manually back up your MySQL databases from PHPMyAdmin - [English]
http://www.developphp.com/PHP_tuts
There is nothing more precious than information on the internet. So why leave things to chance regarding your database data? You may have a database full of...
http://www.developphp.com/PHP_tuts
There is nothing more precious than information on the internet. So why leave things to chance regarding your database data? You may have a database full of members, or you render out all of your pages using a Custom Content Management System, which usually stores page data in a MySQL database. In this quick video tutorial Adam shows you how to go into your PHPMyAdmin MySQL database interface and back up or save your sensative database information.
There are a few ways that you could lose the data in your database, so creating backup insert files manually is an easy way for a webmaster to safeguard his or her data. First step in keeping your database secure is not allowing users to input harmful strings. Learn of strings that may harm your database and cancel them out in your form processing.
But I am assuming your scripts are secure and that you would like to backup your database just in case anything may happen out of the ordinary. You can easily replace any lost data in a few minutes using this manual methid with PHPMyAdmin.
Databases get created on your server either through your cpanel or if you are on GoDaddy or a host that has a custom control panel. Once made you have acces to PHPMyAdmin which is for interacting with your database from a not too technical online interface. So not only is it handy but it teaches you code to write scripts that can interact with your database at runtime.
HOT TIP: I have learned a lot of PHP-MySQL syntax from using PHPMyAdmin
More...
Description:
http://www.developphp.com/PHP_tuts
There is nothing more precious than information on the internet. So why leave things to chance regarding your database data? You may have a database full of members, or you render out all of your pages using a Custom Content Management System, which usually stores page data in a MySQL database. In this quick video tutorial Adam shows you how to go into your PHPMyAdmin MySQL database interface and back up or save your sensative database information.
There are a few ways that you could lose the data in your database, so creating backup insert files manually is an easy way for a webmaster to safeguard his or her data. First step in keeping your database secure is not allowing users to input harmful strings. Learn of strings that may harm your database and cancel them out in your form processing.
But I am assuming your scripts are secure and that you would like to backup your database just in case anything may happen out of the ordinary. You can easily replace any lost data in a few minutes using this manual methid with PHPMyAdmin.
Databases get created on your server either through your cpanel or if you are on GoDaddy or a host that has a custom control panel. Once made you have acces to PHPMyAdmin which is for interacting with your database from a not too technical online interface. So not only is it handy but it teaches you code to write scripts that can interact with your database at runtime.
HOT TIP: I have learned a lot of PHP-MySQL syntax from using PHPMyAdmin
11:25
|
2 Flat File.txt + PHP Database Tutorial - Allow user or client to change data CMS - English
Copy+Paste Source Available: http://www.developphp.com/view.php?tid=1155
In this lesson series Adam Khoury demonstrates using .txt Flat File Database systems as an alternative to MySQL, XML, or...
Copy+Paste Source Available: http://www.developphp.com/view.php?tid=1155
In this lesson series Adam Khoury demonstrates using .txt Flat File Database systems as an alternative to MySQL, XML, or other database systems. In part 2 you will learn how to allow a user or client to change the data from smart easy web forms. Many people do not have tech knowledge and do not like going on the server to alter a CMS file. You must make forms to alter the data.
More...
Description:
Copy+Paste Source Available: http://www.developphp.com/view.php?tid=1155
In this lesson series Adam Khoury demonstrates using .txt Flat File Database systems as an alternative to MySQL, XML, or other database systems. In part 2 you will learn how to allow a user or client to change the data from smart easy web forms. Many people do not have tech knowledge and do not like going on the server to alter a CMS file. You must make forms to alter the data.
4:00
|
[24 Oct 2013] Berlin accuses washington of monitoring Merkel cell phone - English
The European Union\'s Justice Commissioner says time is ripe for a QUOTE strong and united stand on data protection against US surveillance operations.
Viviane Reding called on European states...
The European Union\'s Justice Commissioner says time is ripe for a QUOTE strong and united stand on data protection against US surveillance operations.
Viviane Reding called on European states to adopt a data protection law for facing the US as a strong and united entity. This comes amid new reports that the US has been spying on its European allies. Germany has summoned the US ambassador to Berlin over reports that Washington had monitored German Chancellor Angela Merkel\'s cell phone. Merkel herself has called the U-S president to demand immediate clarification. She\'s also set to discuss Washington\'s snooping in Europe with French President Francois Hollande during a two-day EU summit in Brussels. The White House says Obama has assured Merkel that her cell is not being tapped.
More...
Description:
The European Union\'s Justice Commissioner says time is ripe for a QUOTE strong and united stand on data protection against US surveillance operations.
Viviane Reding called on European states to adopt a data protection law for facing the US as a strong and united entity. This comes amid new reports that the US has been spying on its European allies. Germany has summoned the US ambassador to Berlin over reports that Washington had monitored German Chancellor Angela Merkel\'s cell phone. Merkel herself has called the U-S president to demand immediate clarification. She\'s also set to discuss Washington\'s snooping in Europe with French President Francois Hollande during a two-day EU summit in Brussels. The White House says Obama has assured Merkel that her cell is not being tapped.
2:10
|
Video Tags:
Israel
,
Palestine
,
Muslims,
Gaza,
USA,
UK
,
Presstv,
News,
islamic,
jihad,jehad,islamicjedhad,islamicjihad,resistance,
muslims,
islam,
baitulmuqadas,
rights,
6:24
|
Two way Flash + PHP communication - Adobe Flash Tutorial AS3 - English
Free Flash Source Files: http://www.developphp.com
This tutorial file demonstrates two way flash actionscript + PHP communication. Send variables to php, process in PHP, send the data to display...
Free Flash Source Files: http://www.developphp.com
This tutorial file demonstrates two way flash actionscript + PHP communication. Send variables to php, process in PHP, send the data to display back in flash.
More...
Description:
Free Flash Source Files: http://www.developphp.com
This tutorial file demonstrates two way flash actionscript + PHP communication. Send variables to php, process in PHP, send the data to display back in flash.
5:07
|
Parse and Display external XML file data in Flash AS3 - English
Free Flash Source Files: http://www.developphp.com
In this Flash CS3 + CS4 lesson file we teach how to iterate through an XML file and display all of the nodes in a for each loop. ActionScript 3 -...
Free Flash Source Files: http://www.developphp.com
In this Flash CS3 + CS4 lesson file we teach how to iterate through an XML file and display all of the nodes in a for each loop. ActionScript 3 - AS3
More...
Description:
Free Flash Source Files: http://www.developphp.com
In this Flash CS3 + CS4 lesson file we teach how to iterate through an XML file and display all of the nodes in a for each loop. ActionScript 3 - AS3
3:44
|
XML Magic Pages Web Site Tutorial for ActionScript 3 - Flash CS3 + CS4 - [English]
Free Flash Source File: http://www.developphp.com
If you are interested in learning how to create complex dynamic Flash Content Management Systems, this is the lesson for you. Using the the xml...
Free Flash Source File: http://www.developphp.com
If you are interested in learning how to create complex dynamic Flash Content Management Systems, this is the lesson for you. Using the the xml file and the free fla source file you can gain a better understanding of how to work with external data in Flash at an expert level. Create cool content management systems for clients, render out complex pagination from database results, and much much more can be achieved with the right imagination and this foundation.
The XML file in the folder will fuel the whole system in a dynamic fashion, bringing in external images, text, and labels. You can also add more child nodes to the MenuItems in my XML file pretty easily if you understand XML just a little bit.
More...
Description:
Free Flash Source File: http://www.developphp.com
If you are interested in learning how to create complex dynamic Flash Content Management Systems, this is the lesson for you. Using the the xml file and the free fla source file you can gain a better understanding of how to work with external data in Flash at an expert level. Create cool content management systems for clients, render out complex pagination from database results, and much much more can be achieved with the right imagination and this foundation.
The XML file in the folder will fuel the whole system in a dynamic fashion, bringing in external images, text, and labels. You can also add more child nodes to the MenuItems in my XML file pretty easily if you understand XML just a little bit.
16:59
|
Flash PHP MySQL Tutorial Data Feed Loop Result HTML Rendering - English
Source Files - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=320
Learn how to code like the masters and think more dynamically using Flash AS3, PHP, and MySQL auto Data feeds.
Source Files - http://www.developphp.com/Flash_tutorials/show_tutorial.php?tid=320
Learn how to code like the masters and think more dynamically using Flash AS3, PHP, and MySQL auto Data feeds.
9:12
|
25:06
|
[07 June 2012] FBI systematically spreads fears threats - News Analysis - English
[07 June 2012] 'FBI systematically spreads fears threats' - News Analysis - English
Political activists labeled as terrorists, falsely identifying domestic terrorism threats. Nothing wrong with...
[07 June 2012] 'FBI systematically spreads fears threats' - News Analysis - English
Political activists labeled as terrorists, falsely identifying domestic terrorism threats. Nothing wrong with going after the bad guy, or threats: But to manufacture this, based on scant data: that's what the FBI is accused of, blurring the lines between reality and speculation, as revealed through their domestic terrorism training materials, which has a special focus on activists. In this edition of the News Analysis, we will look closer at how freedom is not what it used to be in the US. Our analysis will include ways the US security apparatus goes about scrutinizing different people and groups as being terrorist threats, including their activities and movements.
More...
Description:
[07 June 2012] 'FBI systematically spreads fears threats' - News Analysis - English
Political activists labeled as terrorists, falsely identifying domestic terrorism threats. Nothing wrong with going after the bad guy, or threats: But to manufacture this, based on scant data: that's what the FBI is accused of, blurring the lines between reality and speculation, as revealed through their domestic terrorism training materials, which has a special focus on activists. In this edition of the News Analysis, we will look closer at how freedom is not what it used to be in the US. Our analysis will include ways the US security apparatus goes about scrutinizing different people and groups as being terrorist threats, including their activities and movements.
63:00
|
[17 Feb 2013] MWM Political Workshop - Political Data Collection - Br. Abdullah Mutahhari - Karachi - Urdu
Political workshop Organized by Majlis Wahdat Muslimeen Pakistan
Karachi Division,
Presentation by Brother Abdullah Mutahhari
Secretory Political affairs MWM Sindh Province
Date : 17 February...
Political workshop Organized by Majlis Wahdat Muslimeen Pakistan
Karachi Division,
Presentation by Brother Abdullah Mutahhari
Secretory Political affairs MWM Sindh Province
Date : 17 February 2013
Venue : Al-Mohsin Hall Karachi
More...
Description:
Political workshop Organized by Majlis Wahdat Muslimeen Pakistan
Karachi Division,
Presentation by Brother Abdullah Mutahhari
Secretory Political affairs MWM Sindh Province
Date : 17 February 2013
Venue : Al-Mohsin Hall Karachi
2:16
|
[10 July 13] Chinese trade data shrinks in June - English
China has reported an unexpected fall in its exports, putting pressure on the government as it pushes through a re-balancing of the economy.
According to the General Administration of Customs,...
China has reported an unexpected fall in its exports, putting pressure on the government as it pushes through a re-balancing of the economy.
According to the General Administration of Customs, exports fell 3.1 percent in June from a year earlier. The weak overseas demand for Chinese goods came as a surprise to analysts, many of whom had predicted an increase of around 4 percent. Imports over the same period fell by 0.7 percent, pointing to subdued domestic demand. The overall assessment was downbeat.
More...
Description:
China has reported an unexpected fall in its exports, putting pressure on the government as it pushes through a re-balancing of the economy.
According to the General Administration of Customs, exports fell 3.1 percent in June from a year earlier. The weak overseas demand for Chinese goods came as a surprise to analysts, many of whom had predicted an increase of around 4 percent. Imports over the same period fell by 0.7 percent, pointing to subdued domestic demand. The overall assessment was downbeat.
5:24
|
10:40
|
Cracking Stuxnet - A 21st-century cyber weapon against Iran - Ralph Langner - English
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and...
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
More...
Description:
When first discovered in 2010, the Stuxnet computer worm posed a baffling puzzle. Beyond its unusually high level of sophistication loomed a more troubling mystery: its purpose. Ralph Langner and team helped crack the code that revealed this digital warhead's final target -- and its covert origins. In a fascinating look inside cyber-forensics, he explains how.
The idea behind the Stuxnet computer worm is actually quite simple. We don't want Iran to get the Bomb. Their major asset for developing nuclear weapons is the Natanz uranium enrichment facility. The gray boxes that you see, these are real-time control systems. Now if we manage to compromise these systems that control drive speeds and valves, we can actually cause a lot of problems with the centrifuge. The gray boxes don't run Windows software; they are a completely different technology. But if we manage to place a good Windows virus on a notebook that is used by a maintenance engineer to configure this gray box, then we are in business. And this is the plot behind Stuxnet.
So we start with a Windows dropper. The payload goes onto the gray box, damages the centrifuge, and the Iranian nuclear program is delayed -- mission accomplished. That's easy, huh? I want to tell you how we found that out. When we started our research on Stuxnet six months ago, it was completely unknown what the purpose of this thing was. The only thing that was known is very, very complex on the Windows part, the dropper part, used multiple zero-day vulnerabilities. And it seemed to want to do something with these gray boxes, these real-time control systems. So that got our attention, and we started a lab project where we infected our environment with Stuxnet and checked this thing out. And then some very funny things happened. Stuxnet behaved like a lab rat that didn't like our cheese -- sniffed, but didn't want to eat. Didn't make sense to me. And after we experimented with different flavors of cheese, I realized, well, this is a directed attack. It's completely directed. The dropper is prowling actively on the gray box if a specific configuration is found, and even if the actual program that it's trying to infect is actually running on that target. And if not, Stuxnet does nothing.
So that really got my attention, and we started to work on this nearly around the clock, because I thought, well, we don't know what the target is. It could be, let's say for example, a U.S. power plant, or a chemical plant in Germany. So we better find out what the target is soon. So we extracted and decompiled the attack code, and we discovered that it's structured in two digital bombs -- a smaller one and a bigger one. And we also saw that they are very professionally engineered by people who obviously had all insider information. They knew all the bits and bites that they had to attack. They probably even know the shoe size of the operator. So they know everything.
And if you have heard that the dropper of Stuxnet is complex and high-tech, let me tell you this: the payload is rocket science. It's way above everything that we have ever seen before. Here you see a sample of this actual attack code. We are talking about -- round about 15,000 lines of code. Looks pretty much like old-style assembly language. And I want to tell you how we were able to make sense out of this code. So what we were looking for is first of all is system function calls, because we know what they do.
And then we were looking for timers and data structures and trying to relate them to the real world -- to potential real world targets. So we do need target theories that we can prove or disprove. In order to get target theories, we remember that it's definitely hardcore sabotage, it must be a high-value target, and it is most likely located in Iran, because that's where most of the infections had been reported. Now you don't find several thousand targets in that area. It basically boils down to the Bushehr nuclear power plant and to the Natanz fuel enrichment plant.
So I told my assistant, "Get me a list of all centrifuge and power plant experts from our client base." And I phoned them up and picked their brain in an effort to match their expertise with what we found in code and data. And that worked pretty well. So we were able to associate the small digital warhead with the rotor control. The rotor is that moving part within the centrifuge, that black object that you see. And if you manipulate the speed of this rotor, you are actually able to crack the rotor and eventually even have the centrifuge explode. What we also saw is that the goal of the attack was really to do it slowly and creepy -- obviously in an effort to drive maintenance engineers crazy, that they would not be able to figure this out quickly.
The big digital warhead -- we had a shot at this by looking very closely at data and data structures. So for example, the number 164 really stands out in that code; you can't overlook it. I started to research scientific literature on how these centrifuges are actually built in Natanz and found they are structured in what is called a cascade, and each cascade holds 164 centrifuges. So that made sense, it was a match.
And it even got better. These centrifuges in Iran are subdivided into 15, what is called, stages. And guess what we found in the attack code? An almost identical structure. So again, that was a real good match. And this gave us very high confidence for what we were looking at. Now don't get me wrong here, it didn't go like this. These results have been obtained over several weeks of really hard labor. And we often went into just a dead-end and had to recover.
Anyway, so we figured out that both digital warheads were actually aiming at one and the same target, but from different angles. The small warhead is taking one cascade, and spinning up the rotors and slowing them down, and the big warhead is talking to six cascades and manipulating valves. So in all, we are very confident that we have actually determined what the target is. It is Natanz, and it is only Natanz. So we don't have to worry that other targets might be hit by Stuxnet.
Here's some very cool stuff that we saw -- really knocked my socks off. Down there is the gray box, and on the top you see the centrifuges. Now what this thing does is it intercepts the input values from sensors -- so for example, from pressure sensors and vibration sensors -- and it provides legitimate code, which is still running during the attack, with fake input data. And as a matter of fact, this fake input data is actually prerecorded by Stuxnet. So it's just like from the Hollywood movies where during the heist, the observation camera is fed with prerecorded video. That's cool, huh?
The idea here is obviously not only to fool the operators in the control room. It actually is much more dangerous and aggressive. The idea is to circumvent a digital safety system. We need digital safety systems where a human operator could not act quick enough. So for example, in a power plant, when your big steam turbine gets too over speed, you must open relief valves within a millisecond. Obviously, this cannot be done by a human operator. So this is where we need digital safety systems. And when they are compromised, then real bad things can happen. Your plant can blow up. And neither your operators nor your safety system will notice it. That's scary.
But it gets worse. And this is very important, what I'm going to say. Think about this. This attack is generic. It doesn't have anything to do, in specifics, with centrifuges, with uranium enrichment. So it would work as well, for example, in a power plant or in an automobile factory. It is generic. And you don't have -- as an attacker -- you don't have to deliver this payload by a USB stick, as we saw it in the case of Stuxnet. You could also use conventional worm technology for spreading. Just spread it as wide as possible. And if you do that, what you end up with is a cyber weapon of mass destruction. That's the consequence that we have to face. So unfortunately, the biggest number of targets for such attacks are not in the Middle East. They're in the United States and Europe and in Japan. So all of the green areas, these are your target-rich environments. We have to face the consequences, and we better start to prepare right now.
Thanks.
(Applause)
Chris Anderson: I've got a question. Ralph, it's been quite widely reported that people assume that Mossad is the main entity behind this. Is that your opinion?
Ralph Langner: Okay, you really want to hear that? Yeah. Okay. My opinion is that the Mossad is involved, but that the leading force is not Israel. So the leading force behind that is the cyber superpower. There is only one, and that's the United States -- fortunately, fortunately. Because otherwise, our problems would even be bigger.
CA: Thank you for scaring the living daylights out of us. Thank you Ralph.
(Applause)
0:41
|
Ahmadinejad Message from Space - Persian
Iran has placed a domestic research satellite into orbit for the first time, ushering in an era of independence in its space program.
Press TV has received confirmation that the first domestic...
Iran has placed a domestic research satellite into orbit for the first time, ushering in an era of independence in its space program.
Press TV has received confirmation that the first domestic Iranian satellite has been placed into orbit via two carrier rockets. Omid (meaning 'Hope' in Persian) was sent into space by the Iranian-produced satellite carrier Safir 2 early on Tuesday, Press TV correspondent Saman Kojouri reported from the launching site. Safir 2 is an upgraded model of carrier Safir 1.
Equipped with two frequency bands and eight antennae, Omid will transmit information to and from earth while orbiting the planet 15 times per day.
The lightweight telecommunications satellite is equipped with remote sensing, satellite telemetry and geographic information system technology as well as remote and ground station data processing.
Omid is a research satellite that has been designed for gathering information and testing equipment. After orbiting for one to three months, Omid will return to earth, returning with data that will help Iranian experts send an operational satellite into space.
Omid carries experimental satellite control devices, communications equipment and power supply systems to a distance of 250 to 350 kilometers from the earth's atmosphere
More...
Description:
Iran has placed a domestic research satellite into orbit for the first time, ushering in an era of independence in its space program.
Press TV has received confirmation that the first domestic Iranian satellite has been placed into orbit via two carrier rockets. Omid (meaning 'Hope' in Persian) was sent into space by the Iranian-produced satellite carrier Safir 2 early on Tuesday, Press TV correspondent Saman Kojouri reported from the launching site. Safir 2 is an upgraded model of carrier Safir 1.
Equipped with two frequency bands and eight antennae, Omid will transmit information to and from earth while orbiting the planet 15 times per day.
The lightweight telecommunications satellite is equipped with remote sensing, satellite telemetry and geographic information system technology as well as remote and ground station data processing.
Omid is a research satellite that has been designed for gathering information and testing equipment. After orbiting for one to three months, Omid will return to earth, returning with data that will help Iranian experts send an operational satellite into space.
Omid carries experimental satellite control devices, communications equipment and power supply systems to a distance of 250 to 350 kilometers from the earth's atmosphere