Posts tagged "Open source"

Obama Administration Uses Pirated Code on Healthcare.gov

The new Obamacare website Healthcare.gov has had its fair share of problems over the past weeks, and the trouble continues.

As it turns out, the Government website uses the open source software DataTables, which is a plug-in for the jQuery Javascript library.

While using open-source software is fine, the makers of Healthcare.gov decided to blatantly remove all references to its owners or the original copyright license.

In other words, they simply took the open-source software and are passing it off as their own, a clear violation of the GPL v2 and BSD (3-point) licenses DataTables uses.

For a comparison, here is the original DataTables file and this is how it looks on Healthcare.gov.

Original DataTables

datatablesorig

 

Pirated DataTables

datahealth

 

SpryMedia, the company behind Data Tables told The Weekly Standard that they are  “extremely disappointed” with the rip off and they will follow the issue up with the Department of Health and Human Services, who run Healthcare.gov.

Perhaps they can also contact the Department of Homeland security who are known to seize domains that assist in copyright infringement…

The new Obamacare website Healthcare.gov has had its fair share of problems over the past weeks, and the trouble continues. As it turns out, the Government website uses the open…

This post is from the News Bits section of TorrentFreak where we present stories from around the web in a concise summary format. Full TorrentFreak articles can be found here. If you have a tip please let us know. News Bits have their very own RSS feed

Enhanced by Zemanta

Viewed 26069 times by 5487 viewers

Be the first to comment - What do you think?
Posted by plates55 - October 20, 2013 at 1:53 pm

Categories: Piracy   Tags: , , , , , , ,

File/Drive Wiping

Occasionally there is some discussion on computer forensic examinations and how good is the software and the examiners.  A majority of the computer forensic examiners are well-trained and have good experience.  The same can be said for the tools they use.  There are a variety of commercial and open source forensic tools.  Probably the best know computer/network forensic tool is EnCaseA single copy/license for EnCase runs over a couple thousand dollars.  This is a good tool – Bottom line.

If you have some interest in computer forensics, here is site to look at – Forensic Focus

The following Forensic Focus article was interesting – Is  Your Client An Attorney Be  Aware Of Possible Constraints On Your Investigation Part 2

Single Pass is Good

Saying that, EnCase and other forensic tools do have limits.  In years past, I have played with (and tested) a variety of software, to include data encryption and file/drive wiping. The following was true for all the open source wiping tools I tested on standard hard drives: WHEN PROPERLY USED, nothing was recoverable.  This was for single-pass write.  Many of the wiping tools also have multiple-pass write options.  Some up to 35 write passes!  *** Don’t try this on a large GB hard drive – It will take a LONG TIME!  I would suggest that you only use multi-passes on single files.

Note:  With Solid State Hard Drives (SSD) there were some previous problems with some SSD not being wiped as expected.  If you use them, I would suggest reviewing the reports, as well as verifying wipes on them with a Disk/Hex editor.    The following links are to the “Anti-Forensics” Web site; their 2009 article stating single-pass wiping is good enough.

Yes it is a bit geeky, but provides lots of good information.  The author also addresses the common belief that even if overwritten, data can be recovered.  What this belief is usually referring to is some sort of microscopic examination of the “physical” storage plates.  This process is extremely costly, time-consuming, and the chance of finding the smoking gun is doubtful at best.

The Problem with Wiping Files

The problem lies in most operating systems have various records, temp files, caches, file/folder pointers, and registry entries that a user doesn’t know or think about.  These residue items can show what was once on a system, even when the original data is long gone and unrecoverable.  It can paint a possible picture.  I assume that this was the case based on reading a recent Prenda case filing where there was some sort of forensic examinationCase 2:11-CV-03072, Boy Racer v. Named Doe.

Based on the document, I believe Prenda obtained some sort of consent from the owner for the analysis.  If the examiner had found the “smoking gun” on the hard drive we would have seen the Doe settle (Dismissed with Prejudice) or it would have likely gone to trial.  As all we see in the amended complaint is the weak circumstantial evidence, I don’t believe the examiner found any movie(s), just pointers of such movies.

26. In a recent examination of the Macintosh computer used by Defendant during the times of his infringements, an updated version of Vuze appears in the “Applications” folder.  Through further inspection of Defendant’s computer, Plaintiff’s agents found Mp4 converter, StreamMe, and ServeToMe software that could enable an individual to convert a full-length video to a mobile device-compatible format; Toast10, which allows an individual to burn DVDs on Mac computers from videos downloaded over the Internet; and OmniDiskSweeper, a Mac utility program that helps users quickly identify and delete potentially infringing videos on one’s Mac computer in furtherance of evading liability for copyright infringement.

Just A Tool

Now I know the Trolls will say I’m telling people to use these tools to destroy evidence – I’m not.  The post is an attempt to dispel some rumors and give people accurate information.  I laugh at the suggestion that because someone has these tools, they are up to no good and guilty of being a pirate, thief, etc.  These are tools – plain and simple.  The same as a hand gun – what you do with it determines if it is used for good or bad.  If you have ever donated or sold a computer, I hope and pray you did wipe the hard drive first.

Enhanced by Zemanta

Viewed 25617 times by 5047 viewers

Be the first to comment - What do you think?
Posted by plates55 - January 24, 2012 at 8:21 am

Categories: Gadget   Tags: , , , , , , ,

Follow

Get every new post delivered to your Inbox

Join other followers