Tuesday, March 29, 2011

…and then, 5 minutes before midnight…

…think about what you want to do, what you really want to do, in the coming new year. About what you want to change in your life. Don’t say “I’ll try it” – say “I’ll do it”.

But if you say…

I will stop smoking…
I will stop insulting my neighbor…
I will stop speaking blasphemy…
I will stop drinking too much…


You know, this will never happen.

Go out of yourself and give for the homeless, give for the research against cancer, against leucemia…go and take a godfathership for a child in Asia, Africa, South America….

…..go and spend the half of money of last year in fireworks….and next year the half of this year…

soure: http://boxset.ru/and-then-5-minutes-before-midnight/
thanks

Sunday, March 13, 2011

CHẢY ĐI SÔNG ƠI



Ơi con sông hiền hòa, chở đầy nước ngọt phù sa
Ơi con sông thiết tha, ấp ôm bến bờ xứ sở
Sông mấy ngàn năm tuổi, miệt mài chảy mãi khôn nguôi
Chuyện bao đời sông biết cả
Mà sao vẫn trẻ mãi không già

Chảy đi sông ơi, chảy đi sông ơi
Ơi con sông trôi suốt muôn đời
Hãy cho ta gửi lời thương nhớ
Nhắn giùm ta về nơi góc biển
Rằng phía đầu nguồn ta vẫn ngóng trông
Chảy đi sông ơi, chảy đi sông ơi
Ơi con sông tiêng hát muôn đời
Hãy cho ta nói lời cay đắng
Nhắn về ai ở nơi góc biển
Rằng nỗi muộn sầu đang ngày đêm chan chứa
Ơ....
Ơi con sông hiền hòa, dịu dàng an ủi lòng ta
Ơi con sông thiết tha, chứa chan chung tình sâu nặng
Sông vỗ về đôi bờ, thì thầm ngày tháng khôn nguôi
Sông hiến mình tất cả, đời sông không hề tiếc với đầy

Chảy đi sông ơi, chảy đi sông ơi
Ơi con sông trôi suốt muôn đời
Hãy cho ta gửi lời thương nhớ
Nhắn giùm ta về nơi góc biển
Rằng phía đầu nguồn ta vẫn ngóng trông
Chảy đi sông ơi, chảy đi sông ơi
Ơi con sông tiêng hát muôn đời
Hãy cho ta nói lời cay đắng
Nhắn về ai ở nơi góc biển
Rằng nỗi muộn sầu đang ngày đêm chan chứa

Này đây những chiếc lá ta thả trôi sông
Hãy mang theo nỗi lòng ta xuôi theo dòng
Này đây những chiêc lá như nụ hôn ta
Hay trôi đi trôi về nơi xa ấy
Chảy đi sông ơi, chảy đi kìa sông ơi.


Thursday, March 10, 2011

March 2011 Microsoft Super Tuesday


February has a fairly heft drop. It includes fixes for a number of publicly disclosed vulnerabilities that have public exploits. Following is a look at the bulletins that address these issues.

* MS11-003: Cumulative Security Update for Internet Explorer 

Two of the four vulnerabilities patched in Internet Explorer were publicly released. CVE-2010-3971 covers a vulnerability in multiple recursive import statements within a CSS file. This use after free bug can lead to remote code execution and has public exploits readily available. IBM customers have had protection available in the previously released CSS_Import_Corruption signature. The other vulnerability listed as publicly disclosed is CVE-2011-0038. This is a dll hijacking vulnerability in IE 8 when opening .html files. The two privately disclosed vulnerabilities are both critical memory corruption vulnerabilities that can lead to remote code execution.

* MS11-004: IIS FTP Service Heap Buffer Overrun Vulnerability

The IIS FTP service has a publicly disclosed vulnerability in the handling of IAC commands. Due to the limited control an attacker could exert on the data written past the heap buffer, this vulnerability was initially classified as a denial of service. Subsequent research showed that even with limited control an attacker could potentially gain remote code execution. The known public exploits at the time of this writing are denial of services against the FTP service. IBM customers have had protection available from this via the previously released FTP_IIS_IAC_Overflow signature.

* MS11-008: Windows Shell Graphics Processing Overflow Vulnerability

This bulletin covers a vulnerability in the rendering of a malformed thumbnail in meta-data embedded within certain file formats such as Microsoft Word .doc files that can lead to remote code execution. Public exploits of this vulnerability are readily available. The exploit occurs when Windows Explorer attempts to render the malicious file in preview mode. An attacker could attach a malicious file to an email and wait for the victim to browse to it or entice the victim to open a share containing a malicious document. IBM customers have had protection available from this via the previously released CompoundFile_Windows_Thumbnail_Overflow signature. X-Force member Jon Larimer recently blogged about his presentations on this class of vulnerabilities in shell extensions.

Source: http://blogs.iss.net/archive/2011_02_MSFT_Super_T.html

what integrity ...!!