MIXED THREATS Chapter 3 WHO OR WHAT IS SAN? IS THE WORM AUTHOR CONSTANTLY CREATING DIVERSIONS (PERHAPS TO COVERUP DECEIPTIONS AND DECEIT?), MIXING THREATS AND ISSUES? DOES THE WORM AUTHOR HAVE A BIG AGENDA WITH MANY RATIONALIZATIONS FOR HIS CRIMINAL ACTIVITY AND ATTEMPT TO RATIONALIZE THAT HIS ACTIVITIES ARE NOT CRIMINAL BUT JUSTIFIED AND SANE? HOWEVER, DOES IT REALLY SEEM THAT HIS MOTIVES ARE PERSONAL, ECONOMIC, POLITICAL, DANGEROUS AND DESPERATE?
“…LOVE YOU SAN!!”
"andy; I'm just doing my k[ill?] job”
THE INVISIBLE HAND OF EVIL:
"I'm trying to imagine some better answers, to break the spell and free them from the stone."
"his toddler daughter, a Wizard of Oz junkie"
"The Homebrew Computer Club"
"Odin alias Anon"
…"Sun is a hardware company leading a pack of children”
There have been a series of arsons, and possible sabotage to the grid and/or unusual backouts (Midwest, USA) around the time certain computer worms were active or power outages at critical times (San Francisco, California) or and/or denial of service caused by various threats, even bomb threats (especially at the San Francisco Seybold and Oracle World), AND MANY, MANY WORMS, TROJANS, VIRUS, which WHEN COMBINED MAY BE CALLED BLENDED THREATS; MIXED THREATS MAY BE A COMBINATION OF ALL TYPES OF CRIME, COMPUTER AND NONCOMPUTER CRIME. These crimes may suggest that a group is at work perhaps similar in their motivations as the characters in the movie “Fight Club”. In fact, a real “Fight Club” exists in Silicon Valley, and it is known due to emergency room admissions; the web site infiltration.org exists, which boasts it is “the zine about going places you are not supposed to go” (“Infiltration offers a mix of the practice and theory of urban exploration in areas not designed for public usage.”)
A wide variety of crimes seemed to be increasing in Silicon valley and may be related to the computer industry, the most obvious crimes in the computer industry were likely the viruses; The June 29, 1990 date of the L E P R O S Y 1 . 0 0 Virus predates the anti-trust lawsuit between Microsoft and Sun Microsystems; Federal Trade Commission begins investigating Microsoft's "tie-in" sales of applications and operating systems in 1990; The Department of Justice (DoJ) took over investigation in 1993.
L E P R O S Y is the name of a destructive system. L E P R O S Y 1 . 0 0, A Virus for MS-DOS Systems, was likely one of the first major viruses to target MS-DOS Systems and likely was created by an industry competitor for financial motives and outrageous malice in this author’s opinion and form there it might be easy to decide who likely had the biggest motive to create the virus and a large part of the L E P R O S Y 1 . 0 author’s comments are shown below:
L E P R O S Y 1 . 0 0
A Virus for MS-DOS Systems.
Copy-ya-right (c) June 29, 1990 by PCM2
LEPROSY is a virus which can influence PC and PC clone systems running MS-DOS or PC-DOS version 2.0 or later. It may be characterized as an overwriting, non-resident .COM and .EXE infecting virus, similar in operation to the AIDS Virus by Doctor Dissector and CPI; in fact, the AIDS Virus was actually the inspiration for this program, though Leprosy is in no way a re-write or mod of the AIDS Virus, it is an entirely new program.
The way both Leprosy and the AIDS Virus (and Number One, the ancestor of AIDS) work is fairly simple. Upon executing the virus program, the virus runs a search for executable files which it can affect. It does this by doing a general scan for all files with a .COM or .EXE extension, then, having found such a file, it loads in part of that file's code to compare it with the virus' own code, to make sure the file found hasn't already been infected. If it hasn't, the virus proceeds to write itself OVER the code of the executable file found. The executable file now ceases to perform its original function. When the unsuspecing user runs the file, he will instead be running another copy of the virus, which will seek out another executable file to infect, and so on. The executable files which are infected by the virus in this manner are permanently destroyed. While this is a primitive way to spread a virus, it is actually pretty effective, if you consider that by the time the user discovers a file which has been infected by the virus, it has already gone and zapped one or more other files, and by the time the user finds those files, they will have infected a few more, and on until the user figures out some way to detect and eradicate all the infected files.
While Leprosy is similar in operation to the AIDS Virus, it presents several important advantages over AIDS:
1. CARRIERS: The AIDS Virus will only infect .COM files. Leprosy is not limited in this way; it will infect both .COM files and the more common .EXE files, going for .EXE files first.
2. FILE SIZE: The AIDS Virus is written in Pascal, and is about 13K in size. Considering that any file that is infected which was originally smaller than the virus itself will expand to the size of the virus when it is infected, and that many .COM files will be smaller than 13K, quite often a file will show a noticeable change in size when infected by the AIDS Virus. Leprosy is only a mere 666 bytes in size; therefore, changes in file size will be much less frequent, and the disk access time it takes to infect a new file will be considerably shorter than when using the AIDS Virus.
3. DUMBSHIT FACTOR: When the AIDS Virus infects a file or fails to find any non-infected files, it just sits there or hangs up the system. Leprosy takes a more subtle approach, however. When Leprosy has infected some files successfully, it prints out the message "Program too big to fit in memory". This way, dumbshits might think there is something screwy with their RAMs or TSRs, and may end up running the same virus-infected file one or more times before they get a clue.
4. CONCEALMENT: To find out if a file has been infected by the AIDS Virus, all you need to do is run a hex editor on the file and look for the full screen reading "AIDS" in the code. Once again, Leprosy makes it more difficult on the dumbshit user. All the strings Leprosy outputs to the screen are encrypted in a simple way, enough to make it impossible to quickly spot suspicious phrases when running a hex editor on an infected file. What is more, Leprosy will not change the time/date stamp on the file when it infects it, unlike AIDS.
5. COMMUNICABILITY: When the AIDS Virus fails to locate any non-infected .COM file in the current directory, it can no longer spread itself. The only way an AIDS Virus can spread from one directory to another is to somehow make it into one of the directories in the current PATH, and be called by the user from a different directory. Leprosy gives itself one more shot. When it fails to find any more non-infected files in the current directory, it will step back into the parent directory, and try to find some files again there. While when the virus exits the current directory will have changed when Leprosy does this, hopefully the dumbshit won't catch on. The payback is that Leprosy might eventually creep up to the root directory and infect COMMAND.COM, and then the user will be fucked over.
6. RATE OF TRANSMISSION: The AIDS Virus will only infect one file at a time. Leprosy will infect up to four files each time it is run.
SETTING UP LEPROSY ON A SYSTEM
To install Leprosy onto an un-infected system, all you need do is run the provided file, LEPROSY.COM, somewhere on that system, preferably somewhere where it will have access to a lot of commonly used executables. Alternately, you could infect some program with an impressive-looking file length and documentation and send it to someone as a Trojan Horse type program. Just make sure it gets run.
To assemble the Leprosy .COM file, you will need Turbo C 2.0 and Turbo Assembler. MASM might work, just as long as the executable file turns out the appropriate length. If the .COM file doesn't come out to exactly 666 bytes long, then it might not work properly. C compilers other than Turbo C will probably not work, since the program makes extensive use of inline assembler, but versions other than 2.0 will probably be okay. Just remember -- watch the file length.
The easiest way to re-create Leprosy is to just run MAKE, and the provided makefile will handle the rest. If you are compiling it by hand, you should use this makefile as your guidelines. An important note is that you should not link the program with the standard Turbo C startup code for the Tiny memory model; instead, always link it with the provided alternate startup code. This file, C0T.ASM, is a startup
sequence which gets rid of code to gather command line arguments and the like, allowing for programs which are essentially as small as their assembly language counterparts. Just remember, keep an eye on the executable file size.
WAYS TO SPOT THE VIRUS
There are several ways to notice the Leprosy virus on your system. If small .COM files are increasing in length to 666 bytes, that's your first hint. 666 bytes isn't a very likely file length, but it's funny, so I'm keeping it that way. Also, if the current directory changes when you run a program, or you notice strange "Program too big to fit in memory" errors, that should tip you off too. Leprosy can also be detected by CRC checking programs, because it directly modifies the contents of the files it infects. What is more, Leprosy causes a distinctive drive noise, sort of a "blickablickablickablicka" on my hard drive, because it is opening, reading from, writing to, and closing a number of files very quickly.
I'd like to thank some of the pirate boards in the (415) area code -- they know who they are.
What is more, I'd like to say that I used the December 26, 1989 issue of PC Magazine, and the book "The NEW Peter Norton Programmer's Guide to the IBM PC and PS/2" in the process of writing the Leprosy program. I just thought I'd mention that, since it kind of makes me laugh to wonder what Peter Norton and PC Magazine would think if they knew they were partly responsible for the creation of a virus. HAHA!
P.S. BTW, if Leprosy fails to find any .EXE or .COM files that aren't infected, but it locates more than 6 executable files that are already infected with Leprosy, it displays a message indicating that the system has been infected with Leprosy, and wishes the user luck. If it can't find any new files to infect, and only finds 6 or less infected files during its entire run, it just prints out the fake "Program too big to fit in memory" message again.
This file is part of the source code to the LEPROSY Virus 1.00 Copy-ya-right (c) 1990 by PCM2. This program can cause destruction of files; you're warned, the author assumes no responsibility for damage this program causes, incidental or otherwise. This program is not intended for general distribution – irresponsible users should not be allowed access to this program, or its accompanying files. (Unlike people like us, of course...)
anonymous anonymous at TheServerSide.com LIKELY
WAS Marc Fleury, CEO OF JBOSS, and former Sun Microsystems programmer, AND NOT
LIKELY A WORM AUTHOR, BUT SOMEWHAT REPRESENTATIVE OF THE INDUSTRY, SO HIS
RANTINGS MAY BE MUCH OR INFLUENTIAL THAN M0ST MIGHT EXPECT. The hacker
seems to read TheServerSide.com because the W32/Sobig.a@MM worm Discovered:
(SDF public access unix system .. est. 1987)
Here is part of his possible post:
Sheep run in fear
Posted by: anonymous anonymous on
July 16, 2002in response to Message #52948 0
replies in this thread
You sloppy second, hairy ass hungry cowards are to afraid to reply to my posts
"Sun is a hardware company leading a pack of children."
Some of the following evidence will help reveal the possible identities and/or REAL motivations of the worms and/or anti-worms authors. Word Pattern possibly similar to those used in blended threats are highlighted or marked below in bold, red and/or underline and emphasis. They may include “Odin alias Anon”, “shity”, “...”, “blah”, “NOTHING”, “sorry”, (prior words or patterns found in the Sober worm) “shitty app” (prior words found in MyDoom worm). See the links immediately below THAT SUGGEST THAT THERE IS A SIMILAR SYLE OF WRITING BY ONE very emotionally immature person perhaps going through some sort of breakup around December 2003 (Bill Joy may have been going through a divorce about this time):
"I said, I love you..,, and you said NOTHING. And now,,, Go Away From Me Here are my love-letter((s)) mock me mock me again and again . Enjoy it. blablabla GO!"…“Odin alias Anon”…“Odin_Worm.exe”…
hi its me i've found a shity virus on my pc.
check your pc, too” …
Re: Contact" "RE: Sex" "Sorry, I've become your mail"
Odin is a strange thing to fixate on mentioned in the above excerpts of the worms. “Thor (Old Norse: Þórr, Old English: Þunor, Old High German: Donar) is the red-haired and bearded nature god of thunder in Norse Mythology and more generally Germanic mythology. He is the son of Odin and Jord.” “Ása-Þórr, which is Thor of the Æsir, the most important Norse gods.” This suggests that the author also has an interest in electricity, ESPECAILLY LIGHTNING, in this authors opinion.
May 2004 seems to be the discovery date for the Cyclone worm, which is a destructive system, similar to a destructive weather system.
Win32.Cycle.a will drop a file called "cyclone.txt" into the Windows folder. The file will always have the same content:
My name is Cyclone and I live in
1.we can't speak freely about regime, we can't speak even a little bit against them!!! 2.I have to be a moslem otherwise they don't care about me! 3.we CAN'T even wear the clothes and styles that we wants! 4.women MUST wear a cloth that no one can even see their hair!!! 5.they do not allow our national celebrations to be held, they beat us!! 6.Many more...
B.The human rights is not implemented in
1.Lynch is very common in
C.Misery and poverty grows in
D.Misery and poverty cause vice to grow, you see many young people in
E.Islamic republic gave
The people of
With all of this conditions and injustices, european governments still support islamic republic, they say that they just care about their own country!and I want to show them our WRATH!All of the european people are my friends and I never want to harm them, just government and the Politicians!
If you protest against iraq war and say why there must be a war against iraq, and if you do this for humanity, please do anything that you can do for helping iranian people.at least make your country not to support islamic republic anymore, I'm deadly sure that if european countries do not support islamic republic. it will be destroyed after 3-6 months!so please help!
I don't want to damage, I just want my country to grow, to improve!!! I have no other way to tell this words to world, sorry!!
W32/Cone@MM seems to be by the same author as the Cyclone worm above, which was Discovered February 23, 2004 and also contains personal information, which may be a personal insult to Bill Gates’ wife Melinada:
see my gift for your birthday ;-)
call me and say what you think about it?
Win32.Cone.B creates the mutex "C-OnE" and has “Cyclone.pif” which again suggests the worm author is interested in tornados, and weather systems, and perhaps energy policy.
This author thinks it is unlikely that the following was written by Iranians or that they would also make the personal comment about a possible competitor’s wife (“MELINDA, SEE MY GIFT FOR YOUR BIRTHDAY”) IN THE W32/Cone@MM was Discovered 02/23/2004 SEEN ABOVE AND THAT THESE ARE INCONSISTENT MESSAGES.
Does the hacker, perhaps Bill Joy, remove his own worms? Mywife.C, Klez, Cone? swen?
http://www.pandasoftware.com/virus_info/encyclopedia/overview.aspx?lst=det&idvirus=51834 Mywife.C takes off worms perhaps done by joy? See the pattern from:
· Virus file icon resembles a text document just like the W32/Mydoom virus, however it is an application
· Creation of the file "c:\cyclop.bin" containing email addresses; this is similar to W32/Mimaul.U
Cycle.A is a network worm found on
cycle.exe ANTI-JEW? http://www.bitdefender.com/html/virusinfo.php?menu_id=1&v_id=263 www.irna.com (if reachable by TCP connection and in 97% of the other cases), otherwise www.bbc.com is targeted....
It creates the mutexes "Jobaka3", "JumpallsNlsTillt", "SkynetSasserVersionWithPingFast" in order to prevent some versions of the Sasser worm from running; it also attempts to stop the execution of processes called "msblast.exe", "avserve.exe", "avserve2.exe", "skynetave.exe" (belonging to the Blaster and Sasser worms).
It creates a TFTP server on UDP port 69; if another application is already acting as a server on that port, it is terminated (and the subroutine for terminating "msblast.exe", "avserve.exe", "avserve2.exe", "skynetave.exe" is called again). When a client connects to the server and requests a file, it is given a copy of the worm (this is used to upload the virus to the machines that it infects).
This version of the worm will try to locate and terminate processes that contain the words like 'Nimda', 'CodeRed', 'Code Red', 'CodeBlue', 'Code Blue'.
http://www.logiguard.com/listings/w/klez.htm (was this done by a pro? Joy?)
reminds me of witty, and may look like witty image. (can spell "Epiphany" but not does not use "There" correctly when it should be "their", which Bill Joy mentioned in an interview. That is, he doesn't know how to spell their correctly, or does he mean he doesn't know how to use it correctly?)
9. The worm contains the following text strings that are never displayed: Win32 Klez V2.0 & Win32 Elkern V1.1,(There nick name is Twin Virus*^__^*)
1.I will try my best to protect the user from some vicious virus,
Funlove,Sircam,Nimda,CodeRed and even include W32.Klez 1.X. (are these all done by Joy?)
2.Well paid jobs are wanted
3.Poor life should be unblessed
4.Don't accuse me.Please accuse the unfair sh*t world
4. The worm kills tasks of anti-virus and security software as well as tasks of several other worms - Nimda, Sircam, Funlove and CodeRed. The worm opens processes and looks for the specific text strings there. If a specific text string is found in a process, the worm terminates this process. The strings the worm looks for are:
WQKMM3878 (3 + 8 = 11 joy?)
Fun Loving Criminal…
http://www.logiguard.com/listings/g/swen.htm lists other worms he may have done? Bugbear
Bugbear (are these all done by Joy?) Bugbear.L
Bugbear is a tremendously dangerous parasite, which is always able to compromise the user's privacy and his or her system's stability. Bugbear Trojan is a versatile trojan, which is able to:
-Provide the hacker with a remote control over the system
-Disable antiviral programs, which are installed on the target PC
-Log user's keystrokes and send these logs to the hacker
Dear User ,
This is A very High Resk Virus Alert.
This email is sent to you because one or some of your friends has been infected
with The W32.BlackWorm.A@mm Virus.
And you could be infected too.This Virus has the ability to damage
the hard disk.This Virus infects computers using many new ways :
attempts to cause a denial of service on darkprofits.com (For resources and information on Best AntiVirus and Norton antivirus)
http://www.2-spyware.com/remove-blackworm.html ANTI-ARAB SEX?
3.92315089702606E02.UUE twins again? USE OF THIS SUGGESTS MATH AND JOY?
Blackworm is also known as Grew.a, Grew.b, Blackmal.e, Nyxem.e, Nyxem.d, Mywife.d, Tearec.a and CME-24.
LOVED" COMMENT MAY SUGGEST IS IS OUT OF
Msie7en.exe (similar to msblast?) Colas.Exe Blueworm references MyLife "Made by MyLife"
Nyxem.D," "MyWife.E," "Blackmal.E," Bloodhound.W32.VBWORM
ALIAS: Mywife, Hunchi, I-Worm.Nyxem
ALIAS: Blackmal, Blueworm, Blackworm
http://www2.lhric.org/virus/hunchi.html W32.Hunch.I@mm is a mass-mailing worm that modifies the Autoexec.bat file in an attempt to format drive C.
i-worm.mylife.exe (DELETES DRIVES) Subject: bill STRAGELY PERSONAL caricature http://www.viruslibrary.com/virusinfo/I-Worm.MyLife.b.htm
Blackmal.C (Nyxem.D) Additionally the worm can perform a Denial of Service (DoS) attack against this website: webstats.web.rcn.net http://start.rcn.com/ competing search engine?
Blackmal (Nyxem) The worm drops this file: \windows\system32\About_Blackworm.C.txt file.ext
new BlackWorm? with R-rated jpg
attached zip has an 8K R-rated jpg, and a 70K executable with no extension
lots of strange file names
Blackworm.C (Nyxem.D) http://www.logiguard.com/listings/b/nyxem.htm names worm in email
eight first physical drives and writes 64KiB Witty is a pure network worm, it does not spread through email.suggests that it has been hand-written in assembly programming language.
http://www.logiguard.com/listings/b/nyxem.htm Additionally the worm can perform
a Denial of Service (DoS) attack on the
http://www.trendmicro.com/vinfo/images/worm_cone_b_img1.gif Zero Sun is similar to setthesun
As its stealth mechanism, it uses a Real player file icon. The following text is found on the decrypted worm body:
OSSMTP.DLL DID BILL JOY DO THE FOLLOWING POEM?
wut to say
Possible From names/addresses:
The file, About_BlackWorm.C.txt, contains the following text strings:
my MS gay
i got a bill to pay
n i wonder wut to say
but ll i know is wut i know
billy bo! aint got no mo (billy was also used in msblaster!)
shyt to do
from this day
GoOd ByE MicroGates
Made by MyLife
The Moon: firstname.lastname@example.org Mywife.C ( Joy? takes off worms perhaps done by joy?)
http://www.f-secure.com/v-descs/nyxem_e.shtml It is similar to the 'Email-Worm.Win32.VB.bi' that was found a few days ago.
worm has the following text strings in its body:
http://www2.lhric.org/virus/hunchi.html W32.Hunch.I@mm is a mass-mailing worm that modifies the Autoexec.bat file in an attempt to format drive C.
i-worm.mylife.exe (DELETES DRIVES) Subject: bill STRAGELY PERSONAL caricature http://www.viruslibrary.com/virusinfo/I-Worm.MyLife.b.htm
This version was first discovered on 7th of March 2002.
message subject will be "my life ohhhhhhhhhhhhh", the body will be
How are youuuuuuuu?
look to the digital picture it's my love
vvvery verrrry ffffunny :-)
my life = my car
my car = my house "
This version was first discovered on 7th of March 2002.
Mylife.F worm was found in the wild on
How are youuuuuuuu?
look to the notepad it's vvvery verrrry ffffunny :-) :-)
i promise you will love it :-)
Notepad = list\
list = 37
· Virus file icon resembles a text document just like the W32/Mydoom virus, however it is an application
· Creation of the file "c:\cyclop.bin" containing email addresses; this is similar to W32/Mimaul.U
http://www.2-spyware.com/files.php GOOD DESCRIPTIONS
http://www.logiguard.com/listings/w/sober_b.htm oden alias anon suggests Joy hacked into Microsoft?
Odin is the Win32-API Implementation for OS/2?
similare.exe what language is this word?
Systems which identify W32/Elkern infections may also discover W32/Klez infections
10. The worm has a complex payload routine. It works as a separate thread and constantly checks system date. If the month number is odd (1, 3, 5, etc.) and the date is equal to 6 then the worm proceeds further. It then checks if the month number is equal to 7 (July) or 1 (January) and sets a special flag if it is. Then the main payload routine is activated. It looks for all files on all local and network drives. If the month is not 1 or 7, the routine only affects files with the following extensions:
http://www.logiguard.com/listings/k/klez.htm Terminating his own worms, and does this suggest he also did Sven or Swen?
On the 6th day of March, May, September and November the worm overwrites all files with the following extensions:
Whereas, on 6th of January and July Klez.E overwrites all files with zeroes.
The encrypted text inside the worm code reads:
“ & Win32 Foroux V1.0
Copyright 2002,made in
About Klez V2.01:
1,Main mission is to release the new baby PE virus,Win32 Foroux
2,No significant change.No bug fixed.No any payload.
About Win32 Foroux (plz keep the name,thanx)
1,Full compatible Win32 PE virus on Win9X/2K/NT/XP
2,With very interesting feature.Check it!
3,No any payload.No any optimization
4,Not bug free,because of a hurry work.No more than three weeks from having such idea to accomplishing coding and testing”
http://www.logiguard.com/listings/b/bugbear_b.htm Get 8 FREE issues - no risk!
iccyoa.dll, icoaco.dll, lgguqaa.dll, lgqagqz.dll, roomuaa.dll, rouaoup.dll, okkqsa.dat, ussiwa.dat, uguaac.dat
Jenna Jameson (also seen in mydoom?)
http://www.srnmicro.com/virusinfo/swen.htm (this suggests anthrax letters?
;Registry fix for Swen worm
The worm can also send 'congratulations' on one of the following holidays:
Also the worm can pretend to be a game, it can send itself (usually as SETUP.EXE or INSTALL.EXE) with the a message:
This is a special humour game
This game is my first work.
You're the first player.
I expect you would like it.
Sometimes the virus compares current date against a preset list of 10 different holiday dates. If the date matches, the worm will send an e-mail with a subject field such as "Happy Christmas", "Have a nice Christmas" or "Have a good Christmas". There are several variations on the exact subject field. …This only happens on one day per year for each of the holidays - for Christmas, Klez only tries to send these messages on 25th of December. Explanation for getting these messages before Christmas is simply that lots of people have their computers date set wrong. The holidays are:
New year (1st of January) Epiphany (6th of January) Candlemas (2nd of February) Saint Valentine's Day (14th of February)
Lady Day (25th of March) April Fools' Day (1st of April) Assumption (15th of August) Allhallowmas (31st of October)
All Souls'Day (2nd of November) Christmas (25th of December)
Yaha http://www.logiguard.com/listings/y/yaha_k.htm (might be joy? strangely political)
Klez.H is the most common world-wide spreading worm....
its really wonderfool...
The worm can change the default Internet Explorer startup page to point to one of these sites:
http://www.unixhideout.com http://www.hirosh.tk (REALLY SLEAZY)http://www.neworder.box.sk http://www.blacksun.box.sk http://www.coderz.net http://www.hackers.com/html/neohaven.html http://www.ankitfadia.com http://www.hrvg.tk http://www.hackersclub.up.to http://geocities.com/snak33y3s (A CRAZY THREAT MESSAGE)
The worm tries to create a DoS (Denial of Service) attack on the infopak.gov.pk website.
www.jamaat.org www.pak.gov.pk www.klc.org.pk www.ummah.org.uk www.piac.com.pk http://www.infopak.gov.pk/
Yaha arrives as an e-mail attachment, message subject will be "Melt the Heart of your Valentine with this beautiful Screen saver or Fw: Melt the Heart of your Valentine with this beautiful Screen saver". The attachment name will be "valentin.scr".
server used to send the emails is chosen either from the registry or from the
following list inside the worm body:
microimportservice.com Micro services all Japanese imports and domestic vehicles in
toad.com very political and US?
In August, a MyDoom variant used Google and other search engines to hunt for e-mail addresses.
The "From" email address domain is one of these -
@microsoft.at - used for
German format emails
@microsoft.de - used for German format emails
@microsoft.com - used for English format emails
An example of a created "From" address could be 'Info@microsoft.de'.
http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=viewVirusDetailsInfo&fid=831&locale= sober lists another virus, joy's style?
Subject: Microsoft Alert: Please Read!
New MyDoom Virus Variant Detected!
A new variant of the W32.Mydoom (W32.Novarg) worm spread rapidly through the Internet.
Anti-virus vendor Central Command claims that 1 in 45 e-mails contains the MyDoom virus.
The worm also has a backdoor Trojan capability.
By default, the Trojan component listens on port 13468.
seems to go on for 5 years
· Email will be sent in this format -
Subject: Fw: Melt the Heart of your Valentine with this
beautiful Screen saver
Check this screen saver
Happy Valentines day
· Virus may use one of several Asian-based
email servers in order to distribute itself - the server names are hard-coded
into the virus and include countries such as
· Virus contains the following text strings -
Happy Valentines Day enjoy!!!!
$ Author : No payloads,then what
hahha very simpile yaa $
Avoids sending email to addresses containing the following strings: gmail....java...sun.
The virus also seems to display a preference for Google as, according to security firm Sophos, MyDoom AO sends about 45% of its queries through Google, another 22.5% through Lycos, 20% through Yahoo, and only 12.5% via AltaVista.
Also known as MyDoom.bb, the worm may also download the backdoor Trojan BackDoor-CEB.f to the host system.
Infected machines will have a file called “JAVA.EXE” on them.
According to another security company, Panda Labs, MyDoom AO will only affect computers running Windows 2003, XP, 2000, or NT.
W32.Beagle.H@mm mutex named "imain_mutex." (seems to be the same mutex for all varients?) Bagle.D "iain_m2" W32/Bagle.G imain_mutex Bagle.FU Mutex "555"
i11r54n4.exe i1i5n1j4.exe go154o.exe
Win32/Mydoom.BB The mutex name is created using the hostname, replacing all non alpha-numeric characters with random alphabetic characters, and appending "root". For example, if the computer name was "Billy_22", the mutex might be "Billyz22root".
Mydoom.BB attempts to download and execute files from the following domain: www.imogenheap.co.uk this is a strange female recording artist
Mydoom.AU attempts to download and execute a file from the following domain: www.aoprojecteden.org av corp!
avoids gmail...This file is a backdoor detected as 'Backdoor.Win32.Surila.o'.
http://www.sophos.com/virusinfo/analyses/trojsurilap.html BackDoor-CEB.f BackDoor-CEB.b has many aliases
W32.Mydoom.Q@mm Creates a
mutex named "43jfds93872"
Mydoom.X, on the other hand creates the mutex LLLf54fxrDLLL
W32/MyDoom-Y will create a Mutex with the label hola_back_bitches
the marks above the a's may suggest it was done by a swed
0@ <1@ € msblast.exe I just want to say LOVE YOU SAN!! billy gates why do you make this possible ? Stop making money and fix your software!!
http://www.fortinet.com/VirusEncyclopedia/search/encyclopediaSearch.do?method=quickSearch&locale=&virusName=blaster compare comment to needing cats at pbs interview- I do not see MEOW in blaster image below, but see MEOW at freewebspace.net below.
I just want to say LOVE YOU SAN!!
billy gates why do you make this possible ?
Stop making money and fix your software!!
tries to contact the following IRC servers on port 6667
Bill Joy has lived near
Colorado Springs where Tesla did experiments regarding weather and electricity,
WHICH SUGGESTS BILL JOY HAS TRIED TO EMULATE TESLA, AND THE SERVER NAMES FOR
Bill Joy claims "his toddler daughter, a Wizard of Oz junkie" according to a Fortune interview. Wizard of Oz IS A MOVIE PARTLY ABOUT A TORNADO, WHICH IS A CYCLONE, USUALY INDUCED BY LIGHTING, OR CONDUCTIVE WIRL, OR EVEN SOMETIMES CALLED WHIRLWIND TYPE OF WEATHER SYSTEM.
Tesla came to think that when lightning struck the ground it set up powerful waves that moved from one side of the earth to the other. If the earth was indeed a great conductor, Tesla hypothesized that he could transmit unlimited amounts of power to any place on earth with virtually no loss. But to test this theory, he would have to become the first man to create electrical effects on the scale of lightning.
“Method and apparatus for Protecting against Tornadoes” suggests that anti-tornado devices will soon exist.
wire movement through the magnetic field produces a magnetic whirl
If a paper with filings is put flat upon the ring and the current turned on suddenly; the existence of a magnetic whirl may be easily observed.
The Electric Whirl or Electric Fly is made of a number of brass wires, with rearward-facing sharp points, joined at a hub. This is pivoted atop an insulated shaft. One terminal of an electrostatic machine is connected to the whirl and the other is grounded. As the charge builds up on the metallic parts of the whirl, the equipotential lines are bunched together at the sharp points, creating a large electric field there. Eventually the field becomes large enough to ionize the air molecules and create a space charge that is of the same sign as the point. The mutual repulsion between the space charge and the point causes the wheel to spin.
Inserting paramagnetic rods into the solenoids should do nothing while the ferromagnetic rod should increase the field.
This Anti-tornado concept is the technology that Bill Joy may be fixating on and may have been misused in Nepal and that may be the motive for Sun Microsystems’ Nepal location server names of lukla and Patan. He may go to any lengths to control this technology.
THERE MAY BE A CHANCE THAT A MISSILE COULD BE CAPTURED AND EXPLODED IN A TORNADO-TYPE-SOLENIOD. improved RENEWABLE POWERSOURCE CONCEPT? Reduces the need for the GRID, damns, etc. (7 MORE THINGS TO DO?)
1. Suspect True , BUT HE HAS FAILED TO MENTION THAT THE PARAMAGNETIC PROPERTIES OF OXYEN WHEN STRUCK BY LIGNTNING LIKELY CAUSES MAGNETIC WIRL AROUND THE LIGHTNING AND THUS THE TORNADO: "solenoid being disposed so as to create a magnetic field in a direction opposed to the magnetic field of the earth"....
Intuitively, we can expect the most efficient shape of conductive movement in a magnetic field would be in the shape of a tornado, and there have been witnesses who claim inside a tornado or hurricane is lightning.
Induction (electricity), in electricity, the creation of an electric current in a conductor moving across a magnetic field. http://22.214.171.124/search/cache?p=conductor+moving+magnetic+field+voltage&ei=UTF-8&fr=ush1-mail&vm=r&x=wrt&u=library.thinkquest.org/C001429/electricity/electricity24.htm&w=conductor+moving+magnetic+field+fields+voltage&d=bO_KxRIeORxC&icp=1&.intl=us
WE NOW HAVE PLASTIC MAGNETICS THAT CAN BE SHAPED INTO A CONE WITH A HOLE AT THE BOTTOM SIMILAR TO A TORNADO IN SHAPE. We instead will choose to have the shape of our cone to be at about a 45 degree angle with a hole at the bottom in the center. Our conductors will be foil (aluminum, zinc, silver alloy?) shaped into various sizes of balls (filled with power of the same metal alloys, and/or also crystals and electrets,
which resembles the concept of getting the conduction to pass in the middle of a wire conductor by not having a rounded outside edge as done with certain conductive wires?), but we will use a Faraday cage to separate the sizes so as to place the largest sizes of balls where the magnetic field would be the most dense. Outside the largest cage would be a concave mirror to focus reflected light where the magnetic field would be most dense. It may be best to have a foil that would consist of an alloy of zinc, silver, and aluminum. We want a light foil, least
likely to melt and least toxic. We want most durable foil. THE COMMON BELIEF IS THE BEST WAY TO ELIMINATE THE GRID IS BY PROVIDING THE MOST FUNCTIONAL POWERSOURCE WOULD BE BY ALSO INCLUDING An Air CHEMICAL BATTERY IN THIS MIX, AND IT WOULD BE BEST TO HAVE IT REACT WITH THE AIR, OXYGEN; likely it can consist of zinc, aluminum, silver (or any oxidizer?), A light find foil, turbine, weather vane is needed to be perhaps put on the top and bottom to circulate air into the faraday cage; This seems entirely possible because at both the top and bottom of my above mentioned concept should be conical shaped type of windmills of possibly light plastic or a durable conductive material (similar to solar panels), this could be the new type of triple layer photoelectric cells to capture different photons of various light in the light spectrum and make into various spiral type wind capture forms that funnel electrons to the more central device and more metallic conductors.
Perhaps create the faraday cage out of springs. http://en.wikipedia.org/wiki/Faraday_cage
http://www.polymet.com/springs.htm input form might not have worked. Might also need conductive balls, partly made of foil rolled into balls with podwered metal (Nano zinc oxide?) OR Pyroelectric crystals and/or also containing electrets (which might partly act as a capacitor or dialetric) http://www.lycos.com/info/capacitor--dielectric.html. What do you think would be best?
Or put crystals within the balled foil? http://en.wikipedia.org/wiki/Piezoelectricity
http://en.wikipedia.org/wiki/Electret rosin, resin, tree sap? Something more durable and less likely to melt similar to teflon? Should be sticky and light? Similar to ceramic? sand? Silica? nano bismuth? http://bcc.ecnext.com/comsite5/bin/comsite5.pl?page=description&purchase_type=ITM&item_id=0279-143730&referid=3371
Are ALL electrets Diamagnetic? http://en.wikipedia.org/wiki/Diamagnetic Materials that are said to be diamagnetic are those which are usually considered by non-physicists as "non magnetic", and include water, DNA, most organic compounds such as oil and plastic, and many metals such as mercury, gold and bismuth
Definition: Polymeric materials which have been electrically polarized so that one side has a positive charge and the other side a negative charge, much like permanent magnets.
http://www.polymet.com/springs.htm input form might not have worked. Might also need conductive balls, partly made of foil, and partly made of powered metal. What do you think would be best?
HARD MAGNETIC SHEETING IN CONE SUPPLIER
which can be found in the following link: http://www.magnummagnetics.com/magnetic_sheeting.htm
I think I need to work on my materials. Perhaps include titanium foil for wind capture.
http://www.daystartech.com/lightfoil.cfm can be molded into shapes
http://www.nanosolar.com/products.htm Nanosolar SolarPly?.
Might also add:
1st layer of upper part in plastic to be balled similar to aluminum
foil-gallium indium phosphide
(HIGH band-gap energy-ULTRAVIOLET TO
2nd or lower part of plastic gallium arsenide
(MEDIUM band-gap energy-RED PHOTONS),
ABOVE MIGHT BE USED AS WIND FOILS. ALSO, BALLED IN MAGNETIC FLIED CREATED BY OUTSIDE, AND INSIDE, CONICAL HARD MAGNETIC SHEETING germanium may or may not be needed, but picks of low band-gap energy-INFRARED PART OF THE SPECTRUM, which can be found in the following link:
This is a reallly hard project and would perhaps need to put other industries out of biz. They may want to murder me!
1) DO SPECIALLY MADE RARE EARTH TORNADO SHAPED MAGNETS NEED TO BE MADE (PLASTIC MAGNETS MIGHT MELT);
2) PERHAPS A SPECIALLY MADE SOLAR CELL FOIL FOR THE WIND TURBINE,
POSSIBLE SPECIALLY MADE AIR
3) PERHAPS A SPECIALLY MADE CONDUCTIVE METAL, ALSO SHAPED INTO VARIOUS SIZED SPRINGS FOR THE FARADAY CAGE AND SEPARATION OF THE DIFFERENT SIZES OF CONDUCTIVE BALLS WITHIN THE FARADAY CAGE.
4) SPECIAL MIRROR OR REFLEXTIVE CONCAVE SURFACE TO REFLECT LIGHT AND HEAT INTO THE FARADAY CAGE.
5) THEN INNOVATIONS IN THE MANUFACTURING PROCESS! (It might be somewhat easy to contain the balls within springs by putting them in cloth and pulling the cloth out of the springs when they are tied together around the balls).
6) MAY BE NEEDED OR WANTED AT SOME POINT ARE specially shaped WIND TURBINES
7) MAY BE NEEDED OR WANTED AT SOME POINT ARE SPECIALLLY CREATED SOLAR CELLS.
COMPLEX BUT ORIGINAL. THIS IS ABOUT THE MOST EFFICIENT DESIGN.
THEN THERE MAY BE VARIOUS GRADES OF QUALITY FOR DIFFERENT APPLICATIONS OF THIS POSSIBLE POWERSOURCE. THEN IT NEEDS TO BE TESTED UNDER DIFFERENT CONDITIONS (IF ALL OF MY THEORY IS CORRECT).
http://en.wikipedia.org/wiki/Resin Mix resin with honey for the Dielectric in the balls? Examples of resin acids are abietic acid (sylvic acid), C20H30O2, plicatic acid contained in cedar, and pimaric acid, C20H35O2, a constituent of gallipot resin
compare to resin sugar molecule, which is similar to honey
Could the wind turbine (should the petals be specially sprayed to capture different bandwiths closer to the center of the petals as photoelectric cells or be layered or sprayed as layers? Would this increase the efficency beyond 30%?) be shaped similar to an iris (not sure if bottom petals are needed, even with style (flexable) , umbrella (half moon shape pointing down TO BRING WIND INTO THE CENTER) and stigma that further funnel wind into the center of the wind turbine http://www.daviswiki.org/Iris
http://en.wikipedia.org/wiki/Flower umbrella and stigma
I do not like iodine in lightfoil. Aluminum foil-gallium indium phosphide? Can something else be used? Could it be sprayed in layers to pick up
(HIGH band-gap energy-ULTRAVIOLET TO
2nd or lower part of plastic gallium arsenide
(MEDIUM band-gap energy-RED PHOTONS).
THIS MAKES ME THINK THE GRID IS NOT NEEDED,
BUT I DOUBT WE ARE READY TO DECOMMISSION ALL DAMNS, INCLUDING
Note to Editor, agent, reader and/or investigators: The flamings and rantings of anonymous anonymous (I cross compared using a search engine and I show at the end of this rant by anonymous anonymous Theserverside.com where I found in the virus authors work: shity, blah, NOTHING, sorry, shitty app, ... which may match Odin alias Anon , shity, ..., , NOTHING, sorry, (prior words or patterns found in the Sober worm) shitty app (prior word pattern found in MyDoom worm) blah (prior word pattern found in Virus.Boot-DOS.Blah.3385).
The following are notes for the agent, fact checker, Editor:
NOTICE "Kung Fu sage" AND calling himself as a "unique House blend of the Scarecrow from Wizard of Oz" IN LINK BELOW and that Joy may have used both the terms "Wizard of Oz" in reference to his daughter and "Kung Fu" if he is anonymous anonymous at TheServerSide.com.
I did a cross search on various strange patterns the hacker has used and it matched the flamings and rantings of anonymous anonymous at TheServerSide.com. You can cross search
"Kung Fu" AND TheServerSide.com and/or read the below:
... blame the product, or design but it always comes down to the kung fu skill of the programmer ... Welcome to the reviews section on TheServerSide.com!
Compare “shitty app” below with “shitty app” in the link immediately below:
Viruslist.com - I-Worm.Mydoom.g
Whole site. Viruses. Malware Description Search. I-Worm.Mydoom.g. ... they may be called skynets, but not your shitty app. Installation ... Kaspersky Lab. All rights reserved. Email: email@example.com ...
Compare “sorry” below with “sorry” in the link immediately below:
Viruslist.com - I-Worm.Sober.a
Whole site. Viruses. Malware Description Search. I-Worm.Sober.a. Other versions: .c, .e, .f, .g, .i. ... Email: firstname.lastname@example.org ...
See flamings and rantings of anonymous anonymous at TheServerSide.com that the of that match patterns of the hacker after the anonymous anonymous at TheServerSide.com listing immediately below (enjoy seeing how persons in the computer industry communicate complete with strange slang and spelling):
The messages in the worms are often sexist, immature, personal, political, and/or aimed toward business rivals and may only match the agenda of Bill Joy, including, skills, motivation, opportunity, and suggests his true self and real lifelong motivation, which is common in the industry (spying due to personal problems and for personal gain which will be covered in greater detail in Chapter 5).
The messages tend to contain slang or language common to persons who were situated where Bill Joy was situated and match the time line of problems Bill Joy was having or complaining about, especially in his personal and/or professional life. This should be more stylistic in its comparisons rather than Chapter 4 which may be more of an agenda, and geared to knowing that is public domain comparisons.
EDITOR: PERHAPS Chapters 3 and 4 should be combined. Bill Joy I suspect was standing outside
The Santy, Lovesan, Bagle, MyDoom, and Code Red worms may be both personal and economic in their targeting.
PLEASE COMPARE '"santy" LINK BELOW WITH "Lovesan" MESSAGES SECOND LINK BELOW:
“This site is defaced!!!
This site is defaced!!!
NeverEverNoSanity WebWorm generation”
"I just want to say LOVE YOU SAN!!
billy gates why do you make this possible? Stop making money and fix your software!!"
WHO or what IS SAN? Could it be short for “Sanity”
"Bagle.z does not send copies to addresses containing the text strings below:
....noone@" Notice noone@ from Bagle.z is similar to the MyDoom virus. Bad poetry suggesting lovesickness and concerns about survival issue in both poems are found twice in the bagle worm, the first poem is partly from a Joni Mitchell song (President Clinton's Daughter is named after a Mitchell song) and the second seems to be original work. The quote of Joni Mitchell song BIG YELLOW TAXI in this color text below:
“When The Trust is Gone So Is The Love That Fades Like the Rain Washing Away All The Sorrows Of Yesterday Why I Ask Myself Must It End Like This Tomorrow, I Tell Myself, I'll Be Okay For Now, I'll Just Live In The Memories Of Our Life Together You don't know what you've got till it's gone *You hurt me more than I deserve, how can you be so cruel? I love you more than you deserve, how can I be such a fool?”
In a nameless time
I want to survive
will be mine
-- Bagle Author,, 29.04.04,
Sober and Bagle are similar did he (Bill Joy?) do all the major socially engineered blended threats, especially fixated on lovesickness that target Microsoft's operating system, including sobig and loveletter?
“Two new Bagle variants have been spotted today. Both are 36352 bytes in size and are very similar in operation. Actually, the second one looks like a repack of the first variant in order to avoid detection. Both work through a downloader component, which connects to a set of websites and attempts to fetch a file. Just as it usually happens with Sober, the author may choose to upload a trojan with unexepected effects at the "update" URLs. We are currently monitoring them for any changes…
It's two years to the day since the email worm Sobig.c caused a major epidemic.
In 2003, worms from the Sobig family were the most widespread malicious programs on the Internet. Sobig's family tree dates back to January 2003, when Sobig.a was first detected. Sobig.a was a piece of malware using many techniques which would be exploited by other virus writers in the future.
Firstly, something that Sobig.c clearly demonstrated was that spamming malware can create an epidemic. The virus sent itself to millions of addresses around the world in a matter of hours, and spammer technology made this possible. Such techniques are now used by almost every virus writer and Trojan author to distribute their creations. Essentially, the criminal alliance between virus writers and spammers came into being with Sobig.c
Secondly, worms from the Sobig family had a limited life span - they were designed to function for two or three weeks, and then a new version would be released to take its place. Mydoom and Sober worms also use this approach.
Thirdly, Sobig.c infected millions of computers throughout the world, creating an enormous botnet, which was then used to launch new versions of the worm. One of these, Sobig.f was the first case in virus history where a price was placed on the author's head - Microsoft offered half a million dollars for information leading to arrest of Sobig.f and Lovesan's authors. The money remains unclaimed to this day…
Social engineering, a non-technical breach of security that relies heavily on human interaction and tricks users into breaking normal security measures, remains popular among virus writers.
Five years ago today LoveLetter was detected. The worm first appeared in the far east and quickly reached epidemic proportions.
LoveLetter was one of the first, and most notable, examples of social engineering. It arrived as an attachment to an innocent looking e-mail containing the subject line 'I LOVE YOU' (and who doesn't like to receive a love letter?) and the body text 'Kindly check the attached LOVELETTER coming from me'.
In an effort to put unsuspecting users further off their guard, the attachment had a double extension, LOVE-LETTER-FOR-YOU.TXT.vbs. Since Windows Explorer doesn't show extensions by default, it was not obvious that the attachment was anything more than a plain text file. For good measure, LoveLetter also used mIRC to spread and downloaded a password stealing Trojan to the infected machine.
Successful threats (from the author's point of view, that is) typically spawn further variants. LoveLetter's success, together with the fact that the VBS source code for the worm was easily accessible, led to a large number of variants in the months following its release.
Loveletter showed how useful social engineering can be in spreading malware. So it's not surprising that it continues to be widely used. Sober.p, which has caused outbreaks in various western European countries, owes some of its success to social engineering. It arrives as an attachment to infected messages which use a range of subject headers, messages and attachment names in both English and German. Some of the messages appear to promise tickets to the World Cup in 2006 - and who wouldn't want World Cup tickets?”
Birthday seems to be mentioned and
fixated on by the possible hacker(s?) in both mydoom.a “Happy Birthday” and
cone.b “Birthday” and (IN CHAPTER 6 WE WILL SEE I was going to transfer tech to
Bill Joy on his Birthday about
Economic motive is indicated often in the worms, security threats or thefts below:
"Hey, Netsky...don't ruine (sp) our bussiness (sp), wanna start a war?" reads a message in the Bagle.J worm's code, according to Sophos.
A message found in Netsky.F reads: "Skynet AntiVirus -- Bagle - you are a looser (sp)!!!!," and the recent Mydoom.G virus also includes hidden comments critical of the Netsky worm claims F-Secure.
The back and forth between virus authors started in January when Netsky began removing the Mydoom and Bagle viruses from machines it infected according to Al Huger, senior director of engineering for security response at Symantec. The Bagle author may have been the more emotionally mature worm author, yet he was only a youth, and it is often the case in the worm wars. At worst, the worm authors know who each other are and both may be industry insiders both involved in enterprise software, but worm coding may not actually be high level computer programming. Most of the large worms are eventually removed by another worm author! Therefore, the anti-worm is common.
1. The U.S. Government must list all messages in viruses, worms, Trojans an/or blended threats that would likely help others solve the crime about who authored the worm, and they must contact the victims of worms about possible victimization and/or long term theft of property, especially if it has happened for more than a year and/or more than once, including the message containing both words and symbols the Sobig worm (secret 8-byte code), Code Red I and II, and these messages:
THE below IS FROM http://www.viruslist.com/en/viruses/encyclopedia?virusid=61627:
Lucky's Av's ;P~. Sasser author gets IT security job and we will work with Mydoom , P2P worms and exploit codes .Also we will attack f-secure,symantec,trendmicro,mcafee , etc. The 11th of march is the skynet day lol . When the beagle and mydoom loose, we wanna stop our activity <== so Where is the Skynet now? lol.
THE below IS FROM Mydoom.b (The worm contains this message, which is never displayed) which I think is about a kill job, and not a signal 9, 11, or 15 that could be considered less violent communication):
(sync-1.01; andy; I'm just doing my job, nothing personal, sorry)
THE below IS FROM W32/Mydoom.G@mm:
"to netsky's creator(s): imho, skynet is a decentralizedpeer-to-peer neural network. we have seen P2P inSlapper in Sinit only. they may be called skynets,but not your shitty app."
"Hey,NetSky, f*** off you bitch, don't ruine our bussiness, wanna start a war?"
“Panda Software's analysis of the P2Load.a
worm showed that after compromising a PC, it modifies the Windows HOSTS file so
all attempts to reach google.com -- and even mistyped addresses, such as
"googel.com" are redirected to a site actually served from
Quoting PR Newswire:
"The creator of this worm has taken advantage of the importance of a company appearing among the first few links in the search results of an Internet browser," explains Luis Corrons, director of PandaLabs. "Its aims are none other than to increase visits to the pages linked by the creator of this malware or earn an income from companies that want to appear in the first few results in computer where the identity of Google has been spoofed: in both cases, the motivation of the author of this malware is purely financial".
Google had been compromised about the time of its IPO. Futhermore, according to Hypponen, director of anti-virus research at F-Secure (likely the best researcher around who also suggested that the worm author intended to cause power blackouts with his worms in the United States of America, but this is disputed by others), the "Bagle" also know as “Beagle” also attempts to download an unknown program from about 30 Web sites, most of which are hosted in Germany and Russia; the worm author seems to want others to think he is from Germany, but that could be a diversion, and persons can log onto the Internet anonymously.
unusual quote from Client Server News about
“What OS was CardSystems' using?”
This may suggest that they would wonder if backdoors or security problems exist with various operating systems.
(NOTE TO EDITOR: Cone.b images (Melinda and Iran), SANTY image, WITH "SAN" COMPARED WITH "SAN" IN Blaster message Please show the smiley faces and how it looks on the screen if possible), Beagle (Part of a Joni Mitchell quote from BIG YELLOW TAXI with the words in it "Paved Paradise… You don't know what you've got till it's gone”), Code Red I and II worms, and any other worms that seems to fit the pattern of unsolved cases that may go back 20 years (intentionally unsolved cases for political and/or economic reasons?).
The likely politically and economically motivated Code Red I and Code Red I worms claim to be "Hacked by Chinese" yet they targeted Microsoft Windows 2000 servers and the United States Whitehouse during the Bush administration(attempts to connect to an IP address 'www.whitehouse.gov', and tries to flood it with connection attempts.) Therefore, it likely would be an competitor of Microsoft’s and NOT the Chinese who would hack the Bush Administration Whitehouse, and Bill Joy was very comfortable with the previous administration, was a Tech Advisor to that administration and likely a key witness in their case against Microsoft. Joy had an important role in the Democratic political process during the Clinton Whitehouse Administration (could he even have done hacking for the Clinton Whitehouse?); he has connections with much of the Silicon Computer Industry Valley Group; and a role in the antitrust case against Microsoft, which ironically was considered more important than the merger of General Electric with Honeywell (denied by the European Union for antitrust reasons); and the amount of money Joy wanted the government to spend Billion of on Research and Development (RD), which Joy would likely personally benefit from economically; whereas Microsoft tends to spend massive amounts on RD.
See quote below from the link below perhaps suggesting the targeting of sensitive foreign regions usually with Denial of Service:
"The worm randomly selects an alphanumeric character from a list and sends it to www.irna.com 98305 times. It repeats this every 20 seconds"
The possible sensitive site of irna.com seems to be an Iranian news service, which the US could perhaps control, have an interest in, or have CIA agents in place LIKELY SHOULDN’T BE TAMPERED WITH BY A HACKER.
AGAIN, Political, economic and personal motives by the hacker may be seen in mydoom.a and cone.b Birthday seems to be mentioned and fixated on by the possible hacker(s?) in mydoom.a “Happy Birthday” is used and cone.b “Birthday” and (IN CHAPTER 6 WE WILL SEE I was going to transfer tech to Bill Joy on his Birthday about 11-8-2001). (See Images below from links):
MIXED THREATS Chapter 4 COMPARING the messages in the worms or with anonymous anonymous at TheServerSide.com, past interviews with Bill Joy his agenda Bill Joy: “...just jam...just doodle... Just because…just forget”
“Having just spotted the twister
bearing down on her
The hackers mind set might be compared with the mind set ("I am Oz, the Great and Terrible. Why do you seek me?" "My dear friends," said Oz, "I pray you not to speak of these little things…
Think of me, and the terrible
trouble I'm in at being found out."
Odin alias Anon, shity, blah, NOTHING, sorry, shitty app, ...,
Often doesn't include commas after If
Viruslist.com - I-Worm.Sober.a
... .com Privat.exe AntiTrojan.exe Mausi.scr NackiDei.com Anti ...
Odin alias Anon Odin_Worm.exe. Copyright © 1996 - 2004
Compare “shity” below with “shity” in the link immediately below:
Viruslist.com - I-Worm.Sober.f
Whole site. Viruses. Malware Description Search. I-Worm.Sober.f. Other versions: . ...
hi its me i've found a shity virus on my pc. check your pc, too ... Kaspersky Lab.
All rights reserved. Email: email@example.com ...
Joy may have a pattern of diverting attention from important issues (seems to change his stance regard free code or proprietary code when it is convenient for him personally) and this may compare to the possible Pattern of Diversions (sometimes known as redirection web used on the web), both symbolic (and satanic?) that we see in various crimes, even noncomputer, that we see in the region. We can think of the hacking, blended threats (trojan, virus, worms), mixed threats as diversions (from real competition issues with competators) with many motives and targets. The way the targets match the targets and agenda of Bill Joy suggests they are done by Bill Joy. He almost signs his name to them when he signs Cone.b with Bill when referring to Melinda and birthday. The threats evolve and become increasingly bold, dangerous and then tend to expose the identity of their author because they are similar in style.
We can consider the pattern of the blended threats as resembling threats, often unique that become woven as unique cloth. The cloth builds on other threats and perhaps the threats of others, but is mostly containing the unique skills and agenda of one author. This cloth has a big agenda and could be used to coverup almost anything in the entire planet and many hide under the cloth because it empowers many others, often to allow them to also commit crimes. In fact, the author of the threats may have given out code so that others can also commit crimes and/or hack. What is given out for free may mostly be done to protect the wealth of the author of the so-called free code that may have proprietary code built on free code. For example: "Nimda looks for backdoors left by previous IIS worms: Code Red II [IN-2001-09] and sadmind/IIS worm [CA-2001-11]." as stated by CERT® Advisory CA-2001-26 Nimda Worm. It can be compared to a piece of cloth that has a similar unique special threat although the cloth, but with many other unique threats also inclued in the cloth.
There are a lot of things which sound like "Star Trek" or science fiction, and some of them will actually happen.
NOTICE JUST in image BELOW:
http://www.f-secure.com/v-descs/santy_a.shtml image below from prior link:
“just want" with "andy; I'm just doing my k[ill?] job" from the following link and further explained in :
Below are links of interviews with Bill Joy with HEAVY USE OF THE WORD "JUST" !
"just couldn't ...just destroy... Just because... just not... just get ...just jam ...just generally ...just huge"
"just their...just a...just being... Just think...Just as ...just at just e-mail"
"ed just...Just putting...just documented...just dozens...just don't...just went...just threw... just spent...just look... just doesn't...just doodle...just say...just forget...just horrible...just finished "
NOTICE THE JUST PATTERN IN
VARIOUS IMAGES BELOW AND IN THE
http://www.f-secure.com/v-descs/santy_a.shtml image below from prior link:
The word “just” is often used by the hacker “just want" with "andy; I'm just doing my k[ill?] job" from the following link and further explained in:http://126.96.36.199/search?q=cache:l1_NuKmOkKIJ:lists.netsys.com/pipermail/full-disclosure/2004-January/016498.html++%22andy%3B+I%27m+just+doing+my+job,+nothing+personal%22&
Bagle-W worm: "I just
need a friend", Sophos reports as virus poses as a pot...
Bagle-W worm: "I just need a friend", Sophos reports as virus poses as a potential hot date...
http://www.sophos.com/virusinfo/articles/baglew.htmlThe above is quoted from the following link and the link above about BILL JOY has Bill Joy on the Board of an AV industry TYPE company ("automate security processes for software development and security teams") AND MY SUGGEST PROFIT FROM PERHAPS CREATING WORMS:
MyDoom.u, MyDoom.v, and MyDoom.w, said Sophos and F-Secure, include an embedded text string that reads "We searching 4 work in AV industry."
The above is quoted from the following link:
Also from the above link, which suggests Joy doesn’t use spell check and anonymous anonymous at TheServerSide.com is full of spelling errors:
“JOY: I don't spell things wrong. Except t-h-i-e-r….. I don't need double or spell either.” (note to the editor: t-h-i-e-r and other misspelling exist in many worms?)
Joy seems to act similar to a poet in an interview.
notice that you have source code.
not that you can't get this through disassembly,
and that there are restrictions on what you can do with
the source code, but you certainly can look at it.
It's the restrictions that keep Java from moving forward independently of Sun.
Netscape has done something brave. Trusting the outside world to be kind to Navigator. Sun could do the same with Java. Not saying you should, but it might be very good for Java.
java is object oriented.
you can extend java without modifying the source
by understanding the source and writing appropriate subclasses.
the interfaces are public
you can see the source
you can write the code easily.
we have everything available.
if people don't percieve this is the case
then its because they aren't fully appreciating the
power of object-oriented programming.
limiting yourself to writing subclasses is very powerful
because the class hierarchy promotes compatibility
you extend what the classes can do etc.
hope this helps
Java is going to remain a world unto itself as long as you go this route.
We wanted Java code to run beautifully in our environment. Can't do that by adding new objects to your environment.
That's OK, you can do what you want with it since it's your product.
We believe we have the best environment for running this kind of code. We'll do it without your language.
who is "we"?
UserLand Software and the developer community we've built around our scripting environment called Frontier.
Many of our most accomplished users have tried Java, and come back, because of our object database, tools, verb set, website framework, editors.
Frontier is a high level environment, and Java would have been a very nice addition, people want it, but... See my previous message.
if you need to modify/adapt to java
not license it?
I tried to ask that question, in every way I know how to. I couldn't even get a look at the license agreement. After the agreement became public, I could see a lot of problems. It's a very restrictive agreement. We do joint development with a lot of individuals and other corporations. We'd spend all our time with lawyers trying to figure out how to work together.
I had a clue that the problems were there even when we couldn't see the agreement. We tried to do some work with one of the licensees, and their lawyer told us that to pull it off we'd have to merge with the company. It wasn't worth it, not a good enough reason to do it.
Also, the MS lawsuit, and the disconnect over WORA, make me think we wouldn't do any better with Sun than MS has. We would want to connect Java intimately into our environment, I believe for the betterment of Java. But you would probably sue us, and we can't afford that.
100+ companies have licensed it.
if java is valuable to you, you should also.
the contract mainly forces compatibility.
thats important for everyone.
Instead we'll wire up to Microsoft's Java thru COM and only do it on Windows.
Compare writing style of Bill Joy in the links below:
Joy recites at SF Poetry Slam Date:
GODDAMMIT! (the GPL is EVIL
I sit here at my terminal
coding a storm in my vi,
a malloc() for some array,
while strncpy() bounds a check,
but inside I seethe -- inside I rumble,
at all the lines locked up,
and the derived headers claimed with glee,
for I know the caged free()
consumed by the GPL!
Free means FREE GODDAMMIT,
it means I take and offer as I please,
it doesn't mean to taint my work,
just because I swiped some header,
or one little readline,
it's the state of being FREE
as opposed to the state of being NOT FREE
Don't you understand RMS,
the GPL is EVIL!,
it's a blight of a free license,
and a virus to behold,
consuming all code afterwards,
in an atomic chain reaction,
like red tide spread across our ocean,
all our oysters now inedible!
Free coders far and wide,
listen to my swan-song by the sea,
for while Solaris kicks BSD's ass,
and my SCSL is a sight to see,
at least BSD and MIT leave code FREE
unlike that UNAMERICAN red GPL crap,
with it RMS will suck you dry,
Because Free means FREE GODDAMMIT!
and The GPL is EVIL!
Business Week claims “[Bill Joy] will scour for business plans not only in computing but also in fields like alternative energy and new materials.”
From Event Brief of Q1 2004 ADTRAN, Inc. Earnings Conference Call – Final
Fair Disclosure Wire:
“ADTN made good progress last year with a 32% revenue increase and a 95%
net income increase, which resulted in sequential QtoQ growth…
Q14. I'm wondering if you could
provide some color on linearity of sales and orders in the quarter and whether
your guidance which is indicating 2.6-5% sequential revenue growth is assuming
just kind of flat linearity from the March month. ( Bill
Joy (Phonetic) - Kaufman Brothers) A. (Jim Matthews)
March quarter as you know is typically more backend loaded than others. Again,
given the reasons that Mark explained earlier in the call. So, January was low
and March was higher. In terms of 2Q and really the other quarters within the
fiscal year, month-to-month is pretty much random as far as linearity. But
never to the point of how the March quarter is in terms of being more backend
Q15. Is there any percentage you could put into what the March quarter looked like? ( Bill Joy - Kaufman Brothers) A. (Jim Matthews) I doon't have that before me.
Q16. In terms of lead-time, your ability to deliver on an order typically for your mature products, I guess is seven days; can you give something comparable for the newer products including DSLAMs and optical products? ( Bill Joy - Kaufman Brothers) A. (Jim Matthews) We try to stick to the same range of 7-10 days for all of our products. As we gain more experience in terms of order flow, we can better predict what will happen in the near term and plan our supply chain accordingly. So, we are always focused on maintaining that perhaps pretty much worse case lead-time of 7-10 days.
From The Ecologist, Oct 2000, article titled DISCOMFORT AND JOY.(Bill Joy and vision of the future):
“'If someone is doing biological, chemical,
nuclear, genetic, robotic or nanotech weapons of mass destruction [for
example], then that is of global interest. One thing is for sure – we urgently
need to set up a world regulatory body if only to protect us from ourselves.'
Joy likes the idea of international regulation of new technologies, and it
features heavily in his thinking, such as it is, about tackling the problems
of potential runaway technology. 'The situation in ancient
by Brent Schlender:
"To be honest, I can't believe I
lasted this long," says Bill Joy. "It seems
like I've been working on the same basic problems since college… In many ways Joy resembles a geek from central casting--his nebula of tousled
hair and piercing eyes give him the look of a mad scientist…
Beyond his day job, Joy has owned a
A voracious reader, Joy likes to open a novel and start reading from the
middle, just to see if he can figure out what happened in the earlier pages of the book. And when he decided he needed to lose some weight a few years ago, he started drinking copious amounts of coffee to quell his hunger pangs. He lost over 30 pounds.”
“Why aren't there more start-ups with
I think it's punctuated equilibrium, where some change happens and then a burst of creativity leaps out. After the microprocessor, you saw a burst of
companies, and then you saw the PC and the burst of companies, and then you saw the Net and a burst of companies. I think people have since been searching for something which would create another burst of innovation.
What's the status of your book on the
danger of new technologies?
It's on hold. September 11 changed the need from being a diagnosis book to a prescription book. And so I put it down in hopes of returning to it when I felt like I had an angle on the whole thing that I could carry through to a
Electronic Engineering Times,
“Sun Microsystems co-founder and VP
of Research Bill Joy says the
Java programming language that adds animation and other features to Web pages will eventually transform the Internet into one big operating system.”
The Source of the quotes below are Government Computer News,
“GCN: How bad do you think year 2000
JOY: As long as the power stays up, we'll be fine.
SUN ENGINEER TELLS us that chief scientist Bill Joy did not invent Jini.
This, despite the fact that Joy was paraded at Sun's JavaOne conference last
month, surrounded by cameramen, handlers and various lackeys.
Our tipster wasn't amused. "Perhaps I'm just being sensitive after four years
on the Java team at Sun watching folks get credit for work they had little to
do with," writes the engineer. "Bill Joy is an incredible asset to Sun and is
a true genius, but his genius lies in quickly grasping the potential of small
projects such as Java and Jini, applying them to very large problem domains,
and communicating those solutions to the world."
So hats off to those at Sun who really invented Jini, including our anonymous
``What we need to create is a Silicon
Continent, not just
--Sun Microsystems co-founder Bill Joy, innn The New York Times, seeking more government funds for high-tech research.
Sourced from Computergram
We think that Sun is hoping that Joy's maxim: 'expect innovation to happen elsewhere' doesn't apply in his new position.
From Fortune publication, in issue dated
We're uncomfortable because we're perceiving things we didn't see before. But they were there all along. Is that a bad thing? I don't think so. People feel sad because they now know the way the world always was. That's sad but healthy.
Sadmind daemon, perhaps an outrageous personalization of the root or administrator privileges, is used for what is typically called "root" in Sun Operating system and stands for SAD is distributed system administration operations first letters backwards within the Solstice AdminSuite. A serious security flaw in several versions of both Solaris and Trusted Solaris exist that make it possible for virtually any remote or local user to gain root privileges on a vulnerable machine, which allows administrators to perform remote administration tasks using the Sadmind daemon. The Sadmind daemon is installed by default on most installations of Solaris, which uses a weak authentication scheme allowing an attacker to send a series of special Remote Procedure Call (RPC) packets to the daemon to forge a client's identity.
Contains the similar message the Copyright(C) concept also seen in an image in cone.b worm: "Concept Virus(CV) V.6, Copyright(C)2001, (This's CV, No Nimda.)" Again in the worms we see wordplays of reversing the letters of words, which seems to be a pattern of Bill Joy, such as "Nimda" ("Admin" backwards) opens all disks installed on an infected computer for full access. Extra (similar to Juxta?) is similar as a word play to create the word "Netra" (Netra is Sun's line of Internet servers).
Kaspersky Labs reports "Nimda" ("Admin" backwards) " penetrates a computer in several different ways:
“First of all, via e-mail: an infected e-mail in HTML format, containing several embedded objects enters a target computer. Upon viewing the e-mail, one of the objects automatically starts up unbeknownst to the user. In order to accomplish this, the worm exploits a breach in Internet Explorer security that was first detected in March of this year.
Second of all, while surfing infected Web sites: In place of the original Web site, a user is shown its modified version containing a malicious Java program, which downloads and starts the "Nimda" copy on a remote computer, using the aforementioned breach.
Thirdly, via the local network: the worm scans all accessible network resources, dropping thousands of its copies here. This is done with the idea that upon finding the file on a disk or server, a user will single-handedly infect his/her own computer.
In addition to penetrating workstations, "Nimda" also carries out an attack on Web servers running under Microsoft Internet Information Server (IIS). The method for infecting IIS servers is identical to "BlueCode." The malicious program gains access to the hard disk of a remote server, downloads its file here from a previously infected computer, and then starts it. In order to accomplish this, it exploits a breach in IIS called "Web Server Folder Traversal" as described in the corresponding Microsoft announcement.”
“Kaspersky give you the W32.Klez.E removal tools” message is similar to message in MyDoom worm which gives a name to the worm of “Virus Alert: W32.Nodoom.A@mm”.
The worm author and Bill Joy is known for his word plays: nimba is admin backwards; jini is usually spelled Genie; Java was first called Oak; Jxta fits the pattern of putting “J” as in “Joy” for product name. Mad Hatter and Sadmind may also be his revealing product names..
THEREFORE, THE LOGIC HERE IS INCONSISTENT, AND LIKELY SO SPECIFIC TO PERHAPS ONLY BILL JOY'S AGENDA. I DOUBT ANYONE IS FRAMING BILL JOY, AND THIS MAY ALSO MAKE HIM A PRIME SUSPECT IN A RITUAL HUMAN SACRIFICE CULT. Worms seem to support an agenda of sacrifice.
Did Bill Joy, cofounder of Sun
Microsystems, use AOL computers to perhaps spread Viruses,
Very short mention of the anti-worms and their agenda of nonsacrifice.
BLENDED THREATS Chapter 5 Reviewing the past of Bill Joy:
There were about 5 reasons stated for the 22 hour crash of Ebay hosted using Sun Servers (lack of fans, lack of air conditioning of the servers, poor patches, poor coding, and lastly the CEO stated she hired and expersive security expert!
“$150,000. That’s a lot of money. I don’t actually know what happened to all the money.”
“A quarter of a million dollars in revenue is a great deal of money for a graduate student. Scott McNealy likes to say: ‘To ask permission is to seek denial.’”
Did Bill Joy stole from
"I franked it with the department frank so I didn’t have to pay for postage"
His poetry reading advocating software be free.
Various interviews or book reviews he did or he gave.
Wired article about the planet perhaps becoming grey goo due to his theory that Genetic Engineering, nanotech, and Robots or bots will combine into green goo, and how this may mirror turning hard drives into grey goo thru data theft of information on hard drives. SHOULDN'T THE planet have turned into brown or black goo?
Please compare POSSIBLE DIFFERENT AMOUNTS OF MONEY made and page 19 comment about being a State of California employee in FIRST link below WITH THE SECOND LINK BELOW (Does the State own the UNIX code that Sun Microsystems uses, and does Bill Joy owe the State of California licensing fees for product created on State of California Property and/or do both owe the State and/or Federal Government income taxes?) with the other link about free software from Bill Joy poem about the need for free software, and then the last link about Companies licensing Java, which suggests software needs to be free when it is convenient for Joy.
Compare page 19 quote from link below with A quarter of a million from the next link “$150,000. That’s a lot of money. I don’t actually know what happen to all the money.”: http://www.cwheroes.org/oral_history_archive/bechtolsheim_joy/BecJoy.pdf
Compare page 2 quote from the link below with the partly highlighted ”A quarter of a million dollars in revenue is a great deal of money for a graduate student. Scott McNealy likes to say: "To ask permission is to seek denial."”:
The UNIX Review Interview with Bill
Joy by P. Weinberger head of the Computing Techniques Research Department at
AT&T Bell Labs Weinberger SEEMS STUNNINGLY UNIMPRESSED WITH BILL JOY
AND SUGGESTS HE IS LYING AND DOES NOT
DO MUCH OPERATING SYSTEM CODING about
REVIEW Actually, the only reason I much care about kernel size is that, all
things being roughly equal, bigger systems tend to be buggier systems.
JOY What can I say, Peter? There's a huge amount of networking code in BSD
because we set out originally to network everything together...
REVIEW You did not! All you did was implement the Internet stuff!
JOY We made a list of all the protocols: SNA, X.25...
REVIEW That may be, but the way it worked out, you ended up just doing the
Internet. All your multiplexing, for instance, is done just the way the
Internet did it. Look at how hard those poor
to stick in the Xerox protocols, which actually are very simple.
JOY Well, Peter, things are hard.
REVIEW Things aren't that hard!
REVIEW Are you going to be writing
JOY That would be fun. I'll probably end up drafting some pieces of the
system, and then people will have a great time ripping them to shreds and
throwing them away. That's what's already happened around here with a number
of things. Still, the effect is that you push people in a certain direction
by providing them with examples...
JOY No. Armies of people are already at work on that reconciliation
And, believe me, they have lots of tradeoffs to consider. There's the choice
between sockets and Streams, for starters; we'll be going with Streams,
because that's very important to AT&T, and we don't really care. And then
there are decisions that have to do with more precise timers and asynchronous
I/O. Single solutions will have to be found to each of these things, and that
will require negotiation: you know, you throw something away, they throw
something away, and then people live happily ever after. Even before we
signed the contract with AT&T, we already had a basic agreement on how to
reconcile 90-some percent of the differences. It's just going to take a lot
of work. But it's worth the effort because we just can't afford to have six
English versions of grep, six French versions of grep, and so forth and so on.
REVIEW Who are the principals of Phase 2 going to be?
JOY The normal cast of System V characters at AT&T.
Fact checker: Abstract: Bill Joy is V.P. of Research and Development at Sun Microsystems.
He authored the C shell and the vi editor for UNIX at
up a team from Sun and AT & T to create a new UNIX system for the 90s. Interviewer Peter Weinberger is the in
Joy seems to know that he took both ed and em code and added a simple
visual editor to create vi as evidenced by the following quotes: ‘‘But fundamentally, vi is still ed inside.’’ “So Chuck and I looked at that and we hacked on em for
a while, and eventually we ripped the stuff out of em and put some of it into
what was then called en, which was really ed with some em features.” “What happened is that Ken Thompson came to
Joy clearly understands
that people use what they can afford and NOT THE BEST PRODUCT AND HE ALSO
UNDERSTANDS HIS PRODUCTS AND INFERIOR AND TOO COMPLICATED TO USE as evidenced
by the following quotes:
“EMACS is a
nice editor too, but because it costs
hundreds of dollars, there will always be people who won't buy it.” “I think the wonderful thing about vi is that it has
such a good market share because we gave it away.” “I got tired of people complaining that it was too hard
to use UNIX because the editor was too complicated.” “I think the hard
thing about all these tools is that it takes a fair amount of
effort to become proficient.” “I'm
used to having a 24-line terminal with no ability to scroll back.” “I wish we
hadn't used all the keys on the keyboard.” “That
lack of programmability is probably what ultimately will doom vi.” “It can't
extend its domain.” “The fundamental problem with vi is that it doesn't have a
mouse and therefore you've got all these commands.” “The
point is that you want to have a system that is responsive.”
Bill clearly understands that functional and programmable products are needed, but refuses to do the work to complete projects as evidenced by the following quotes: “The problem was I spent all my time programming it because it was improving so fast that my programs kept breaking.” “It doesn't really have a unified concept.” “I got tired of maintaining my macros so I guess I'm looking forward to an editor I can learn and then forget about.” “I think multiple levels of undo would be wonderful, too.” “Having editing functionality everywhere would be great in the same sense that it would be nice to have history everywhere. What actually happened was that I was in the process of adding multiwindows to vi when we installed our VAX, which would have been in December of '78.” “Document preparation systems will also require large screen displays.” “I got tired of maintaining my macros so I guess I'm looking forward to an editor I can learn and then forget about.” “Just putting the termcap entries in that people would mail me would take hours a week, and I was tired after three or four years”.
Joy is inconsistent and/or deceitful about what products he uses or he admits he uses other person’s better products as evidenced by the following quotes: “I actually use vi for editing programs.” “I think one of the interesting things is that vi is really a mode-based editor.” “One of the good things about EMACS, though, is its programmability and the modelessness.” “I tried to use EMACS and I liked it” “The reason I use ed is that I don't want to lose what's on the screen.” “I use Interleaf for all my documentation.” “Interleaf is based on the formatting process.” “It is formatted, and I'm tired of using vi. I get really bored.” “Interleaf is very nice. I expect there to be a lot of competition for programs like that.” “The trouble is that UNIX is not accessible, not transparent in the way that Interleaf is, where you sit down and start poking around in the menu and explore the whole system.”
Joy knows that using windows would be the needed sophisticate needed in editing products in the future as evidenced by the following quotes: “I used to have a Concept terminal which had eight pages of memory, like a mini-version of a window system.” “I had almost rewritten all of the display code for windows, and that was when I gave up.” “What actually happened was that I was in the process of adding multiwindows to vi when we installed our VAX, which would have been in December of '78.” “I just don't like to lose what's in the window.” “I'm looking forward to the editor that's going to be embedded in the window system Warren Teitelman is working on.” “If that scrunch had not happened, vi would have multiple windows, and I might have put in some programmability - but I don't know.”
Joy’s role seems to be more of a specification author, or the vision or publicity person, rather than that of a programmer as evidenced by the following quotes: “I don't like reading things that have been heavily dictionized because they don't flow.” “But no, I don't generally have trouble with spelling mistakes.” “But with Interleaf I don't even have a spell program.”I got really big into writing manual pages, so I wrote manual pages for all the great features we were going to do but never implemented.”
Joy wrote a very
primitive visual display text type editor using keys rather than bitmaps or use
with a mouse in about two days that
likely took little concentrated effort
because he was also watching television at the time and it likely resembled
programming keys on a computer evidenced by the following quotes: “I started to write a new editor not too long
ago and had it about half done after two days.” “I remember right
after Carter got elected, I was sitting in my apartment in
Joy doesn’t seem to
understand that programming bitmapping is more complex that most would think to
interact with must work with other media, such as printers and peripherals, as
evidenced by the following quotes: “I think the Macintosh proves that everyone can have a bitmapped
display. Bitmap display is
media compatible with dot matrix or laser printers.” “It's ultimately the media and the set of
peripherals that you have on your machine that affects what the user sees.”
Joy is used to using the Open source community and university low level employees to do his programming for him and perhaps stealing code from his competitors as he seems to have done so all his live as evidenced by the following quotes: “I think editors have to come out of a certain kind of community.” “Really, what started it all was that we got some ADM-3As to do screen editing.”
Sophisticated products are simple, rather than complex, but Joy refuses to do the work to create them as evidenced by the following quotes: “Yesterday I had my tech guy come to the house and disconnect my Sun network, and tomorrow I'm having them shut down my company e-mail account.” “Well, limbo is not a good place to be.” “Since I sort of invented the editor that was most complicated, I thought I would compensate by also designing the editor that was most simple.” “Systems are going to get a lot more sophisticated.”
McKusick also seems unimpressed with Bill Joy’s coding abilities and calls his code ugly. McKusick works for IBM and IBM’s servers are twice as fast as Sun Servers at half the cost. Therefore, McKusick and Weinberger may NOT be guilty of professional envy, but may actually have much better products.
Partly to notice communication and writing style, and means to get free code, compare quotes “at least BSD and MIT leave code FREE” and “Solaris kicks BSD's ass” from the link below with the quote with different motive to license code “100+ companies have licensed it.” from the next link below: http://188.8.131.52/search/cache?_adv_prop=web&ei=UTF-8&va=poet+slam+poetry+bill+joy&va_vt=any&vp=+Solaris+kicks+BSD%27s+ass&vp_vt=any&vo=Free+BSD&vo_vt=any&vd=all&vst=0&vf=all&vm=i&fl=0&n=10&u=clug.chicago.il.us/list/1199/0317.html&w=poet+slam+poetry+bill+joy+free+bsd+%22solaris+kicks+bsd%27s+ass%22&d=611C936556&icp=1&.intl=us
Compare quote from the link below “100+ companies have licensed it.”:
My understanding is that in a Fortune article Bill Joy’s comment about his daughter being addicted the movie "Wizard of Oz" might suggest that Joy himself is a hacker and is getting his daughter to accept addiction and that he might be encouraging his daughter to accept that he may be involved in unethical use of the web.
Joy’s strange sending my own sayit.com card back to me without opening the card I sent him made me increasingly more suspicious of him, but this has escalated more and more, due to many, many strange events.
EBay crashing and perhaps five different reasons or stories for that: patches problem, fan problem, unairconditioned environment, recoding of software needed, CEO OF EBAY HIRED A SECURITY EXPERT (COULD HAVE BILL JOY INTENTIONALLY CRASHED EBAY TO GET A BETTER DEAL FOR SUN?).
venus.EBay.Sun.COM [184.108.40.206] is venus a mirror of earth (below) suggesting back
earth.EBay.Sun.COM Crashed after [220.127.116.11] or [18.104.22.168] ? private?
Received: from earth.sun.com (earth.EBay.Sun.COM [22.214.171.124]) by Eng.Sun.COM
Two different stories about amount of money he received or didn't receive for operating system while at CAL; different stories about what he did at CAL verses the current licensing fees at CAL along with a short explanation about software driving the economy based on The Atlantic Monthly article, Kept University The Atlantic Monthly article and framing a CAL student to get their tech partly due to the poverty of CAL due to lack of licensing fees, compare other universities licensing fee revenue, and a cover Tech Review article explaining almost all software in poorly designs and buggy.
Joy as the driver of bad, inconsistent technical strategy at Sun, and actually having only his name on a few patents. Joy as a credit taker. Bad Names and release dates for products.
Hopefully, showing an evolution of Bill Joy's physical appearance using photographs. It would be good to get the rights to the photo of Joy with writing on his face and sweating during a presentation with wild hair (AP has rights to that I think).
His important role in the political process, his connections, and ironic role in the antitrust case against Microsoft, with a short comparison of the GE/Honeywell antitrust case at the time, and the amount of money Joy wanted the government to spend of RD compared to the amount of money Microsoft spends on RD.
The pretty blonde female editor of Wired no longer there, and was in Vogue with photos of her children likely as a desperation measure after publishing Joy's article that started with him in a bar discussing if computers had consciousness, mentioned Woody Allen, had a full page vanity photo of him where he looked somewhat similar to a wayward warlock wearing a black suit, and ended mentioning getting a spell out of a stone:
"So I'm still searching; there are many more things to learn. Whether we are to succeed or fail, to survive or fall victim to these technologies, is not yet decided. I'm up late again - it's almost . I'm trying to imagine some better answers, to break the spell and free them from the stone."
Later, he was on Charlie Rose in an interview with his friends explaining that his Grey Goo theory similar to the Smurf Episode of Star Trek (about how nanotech, robots, and Genetic Engineering would get out of control, combine, and turn the planet into grey goo. Grey is the color of hard drives and the hacker may be acting out during hard drives into grey goo. Grey would likely be a strange color for the planet to turn into--brown would be a more likely color, or even black.). Star Trek is also mentioned in the article along with too much personal information that made his seem more similar to a cult leader and less similar to a scientist:
nights my parents went bowling, and we kids stayed home alone. It was the night
of Gene Roddenberry's original Star
Trek, and the program
made a big impression on
“And what do you think it will take
to make those kinds of things a reality rather than a general theory or
Joy: Well, I don't know. Just think of a "Star Trek" DVD at the store, and you'll see all sorts of stuff on there that we don't have. “
“Insecure software is a big issue, and the problems exposed by today’s hackers and malicious insiders are just the tip of the iceberg.”
Bill Joy, Co-founder, Sun Microsystems. The above is from the following link:
The above is quoted from the following link and the link above about BILL JOY has Bill Joy on the Board of an AV industry TYPE company ("automate security processes for software development and security teams") AND MY SUGGEST PROFIT FROM PERHAPS CREATING WORMS:
The CEO of Google may have a very deep and profitable relationship with Bill Joy that may go far beyond his relationship with the founders of Google who are alleged in the recent Vanity Fair to NOT treat the CEO well, who has more education than them likely, a Ph.D. from CAL and is Joy’s friend from CAL. Could Joy have stolen ad technology from Yahoo and given it to Google’s CEO, which was litigated about? Could Joy use a worm to help depress Google stock price to help benefit the CEO of Google, and could Joy want to do a Credit Card service for Google? If Joy hacked Ebay and did hacking to partly frame Martha Stewart to perhaps manipulate stock prices for companies he had an interest in, would he be guilty of insider stock manipulation? Hacking for profit could be pattern of Bill Joy.
Eric Schmidt, Google CEO, said "This is clearly great news for the industry: Bill Joy has a rare talent to see where technology is moving and how it will impact society. He is an inspired addition to the already impressive KPCB team." "KPCB has backed ....AOL...Google."
The above is quoted from the following link with suggests Joy may have ties to Google and AOL and could perhaps use their computers for improper purposes and both may use Sun Hardware:
The quote below suggests that Eric Schmidt, Google CEO, uses some strange language “bowels of the company” in reference to Google, which may suggest dirty business practices!
"You can't know what we are really up to until you are in the bowels of the company," Schmidt said during a recent interview with The Associated Press.”
The following link may suggest that Google uses Sun Ultra 2 UltraSPARC-II.
Could Bill Joy co-founder of Sun Microsystems be the author of the MyDoom, Cone.b and all the worms with similar characteristics as those (avoids Google, has political, and personal messages)? Could the conflict also be about complex non-computer related security issues? Does he have remote control OF my computer sessions, along with other officials? Does Bill Joy have a pattern of at sabotage to relationships (or attempt to sabotage my relationships) with schools, government officials, email hosts, web hosts, law firms, and/or hack brojon.org website hosted by Yahoo and Tucows while spoofing Albanians (likely benefactor off oil pipeline from Middle East Conflict?) rand leave a hotmail email address (doubt they need an hotmail email address because it is a communist country unlikely to prosecute crimes against Western Nations)? Is there a pattern of framing and/or exploiting the communists and/or aligning himself with dictators.
Here is proof of Sun
server names PATAN AND LUKLA SEEM TO BE
patan.Central.Sun.COM [126.96.36.199] and lukla.Central.Sun.COM [188.8.131.52]
following link may suggest that Joy has an interest in: “innovation is in internet web services, software, architectures, energy, material science, info/life sciences
- or entirely new fields”.
David Gelernter wrote in the New York Times Magazine that Bill Joy had his daughter watching Seven Brides for Seven Brothers, which Ted Turner owns after he bought MGM
for about one-and-a-half-billion dollars because he wanted the MGM film library, WHICH INCLUED "Seven Brides for Seven Brothers". TED TURNER HAS BEEN KNOWN TO HAVE PROBLEMS WITH FEMALES, SEEM SEXIST (has been divorced from the equally politically controversial actress Jane Fonda after allegedly cheating on her.), and even seem ecologically hypocritical due to his selling gas that he has on his land, AND HAVE ANNOYED OTHERS DUE TO COLORIZING CLASSIC BLACK AND WHITE FILMS. Turner also had a large involvement as an owner and officer in AOL. Turner's CNN may have aired faked scud missile hits during the Gulf war. Turner may have a history of being untruthful, especially about politically sensitive information (even involving Jewish persons), and gave about a Billion dollars to the United Nations.
David Gelernter was the target of UNABOMBER FOR USING THE WORD "ENVITABLE" in reference to computer domination of modern culture IN HIS BOOK MIRROR WORLDS AND IS BILL JOYS FRIEND, and tends to write very shallow books and articles, sometimes about computers. Unabomber blew off some of Gelernter's fingers. Ironically, Bill Joy mentioned Unabomber in his Wired quasi-ecological article about how the planet might turn into gray goo due to possible out-of-control combining of Genetic Engineering, robots and nanotech, but recently likely talked about that in a Keynote speech at a conference at MIT, which may actually be an attempt to find new technology to invest in for his investment capital job.
The plot of the often well reviewed and sometimes mentioned as classic Seven Brides for Seven Brothers condones kidnapping females for the purpose of luring them into the backwoods and is summarized as follows:
Adam, the eldest of seven brothers, goes to town to get a wife, and immediately convinces Milly to marry him. They return to his backwoods home where she learns he has six brothers! All the brothers live in her new husband's cabin with her and her husband. Milly sets out to reform the uncouth siblings so they too may get wives of their own, and they decide to kidnap their brides after reading about the Roman capture of the Sabine women.
Often, Bill Joy and his possible friends and interests seem inconsistent in their viewpoints, and may have very conservative or archaic ideas about technology and culture, especially females. They may almost brainwash females to tolerating some possible illegal behavior.
Adam, the eldest of seven brothers, goes to town to get a wife. He convinces Milly to marry him that same day. They return to his backwoods home. Only then does she discover he has six brothers -- all living in his cabin. Milly sets outt to reform the uncouth siblings, who are anxious to get wives of their own. Then, after reading about the Roman capture of the Sabine women, Adam develops an inspired solution to his brothers' loneliness . . . kidnap the women they want!
b. Suspected pattern of extortion and/or an attempt to defraud in order frighten others into submitting to the desires of perhaps William N. Joy, cofounder of SUN MICROSYSTEMS AND PERSONS WHO MAY HAVE MISAPPROPRIATED THE AT&T kernel of their Operating system and/or received UNJUST compensation for possible minor improvements in the Kernel and/or additions to the kernel and/or may have not properly paid taxes on the kernel and/or not paid licensing fees to the Federal government for the government’s DARPA CONTRACT WITH THE UNIVERSITY OF CALIFORNIA WHEN HE WAS AN EMPLOYEE WORKING ON THE DARPA CONTRACT and/or his agents, masters, associates and/or entities he has dealing with or profits from or gets resources from and/or has the ability to violate their security systems using a series of crimes that seem to be done for political, environmental, and/or economic benefit or intimidation that may consist of:
Exhibit(s) 13-16 are information about the MyDoom worm.
II. The recent arsons (about 17 residences
mostly on weekends from about to , sometimes 4 in a
single night.) in
Exhibit(s) 17 Bill Joy’s possible handwriting; 18 is a article about the arsons by Dana Yates stating newspapers intended for delivery were set on fire suggesting a desire for wireless communications may have been a motive for the arsons; 19-42 the replanted trees in detail where the previously lopped trees with "USA" in surveyors chalk were with emphasis on showing that the lopped trees seemed to be pointing to street/business signs as motive for the arsons and street signs where the same streets where arsons would occur, handwriting samples and dates around gas stations near the arsons at the time of the arsons; names on streets that do not match street names, such as Irish which may suggest a motive to spy on the Irish bar with a sign about “car bombs”; “Granite” written on a Street that may suggest a product or router called Granite perhaps created by Sun Microsystems Co-founder Andy Bechtolsheim; Safe Harbor Shelter hot water container, Heath Plan of San Mateo advertised at Walgreens windows, and Dialysis Center (which may be intended for monitoring by noticing were surveyor marks are located?). 43. Is parts from an East Bay Express article dated May 17-23, 2006 about Wireless.
III. Moscone Center Bomb Threat during Oracle world and Seybold about September 10, 2001 and Plaintiff T.J.Watt has told to leave with others before the Macromedia demo that she wished to see, and Seybold likely has a record of her attendance.
IV. Halloween 2005 Mission Street in SF, CA Hertz had a suspicious explosion.
V. Critical PG&E power outages in the Bay Area over about the past 5 years; AND THERE ARE CONCERNS THAT BOTH THE SLAMMER AND BLASTER WORMS CONTRIBUTED TO LARGE PROBLEMS WITH THE GRID, Bill Joy is focusing on alternative energy or energy and may have had the means and/or motive to bypass computer security systems to sabotage utilities which may be possible according to the following exhibits 44,45, 46 are the next three links :
VI. MyDoom.a and Cone.a. I-worms both of which mention birthday, Melinda, cyclone (Win32.Cone.B seems to refer to Bill Gates' wife's birthday in a possible attempt to make Bill Gates jealous. Specifically it contains:
see my gift for your birthday ;-)
call me and say what you think about it?
I WILL KILL…
WE WANT TO KISS YOU…
We need freedom in
which are strange and inconsistent messages which I FEEL MAY SUGGEST BILL JOY IS UPSET MY POSSIBLE TECHNICALCONCEPTS DID NOT GET TRANSFERRED TO HIM ON HIS BIRTHDAY, and I was going to transfer tech to Bill N. Joy to him on my birthday as a birthday present for him, which is the day after my birthday, MyDoom has "shit happens" ( an old 1960's or 1970's slang expression) that Rock Star David Lee Roth said to me (likely in reference to the Dilantin incident because it came out both ends of my digestive tract at the same time) and "antiserum" (perhaps in reference to Dilantin being put into water and therefore becoming a serum).
Exhibit(s) 47 shows Bill Joy’s Birthday 48 shows T. J. Watt’s birthday, 49 T. J. Watt’s AT&T credit card, 50 AT&T credit card statement regarding hotmail account, 51 is an allegation of spying by AT&T.
VII. Google wallet, may have been motivated by bitpass.com, and the Cardsystems hacking may have been motivated to support the creation of Google wallet. The allegations that AT&T is spying may suggest that Bill Joy spies on my AT&T credit card usage, and other credit usage, and may have a habit of stealing technology and taking credit for other person’s work, and illegally sent out the AT&T operation system and that may have resulted in litigation later and/or the MyDoom worm to discourage litigation about whether the AT&T operation system should be free and/or was meant to be free according to a judge’s decision and various consent decrees. Informexp.com is my website, and it is still not programmed as I would like it to be.
VIII. Yahoo has accused Google of having their ad programming in Google's software, and Google makes about 99% of its income from ad revenue, and Bill Joy and the CEO of Google are on good terms, and recently Sun Microsystems has done a deal with Google for software to mostly support Google email services. I would consider Bill Joy the most likely person to have liberated Yahoo's software and given it to Google.
IX. I have suspected Bill Joy of monitoring, manipulating, impersonating, destroying my computer activities since about June 2000 since about the time I first emailed Sun Microsystems in their form field and have evidence of communication. HEPTING V. AT&T CORP (No. C-06-0672-VRW) suggests seizures of the domestic and international communications of millions of Americans perhaps for personal and/or corporate gain. I am unable to hock up to the web from my laptop, but was previously able to do so; I suspect my laptop is hacked to hell, so I use public library computers.
Exhibit(s) 52-62 show that the is a pattern of miscommunication, strange problems, possible denial of services or out of order computers, email address with strange spaces in them in my sent folder, suspected missing data and 61 shows perfect scores in shell programming, 62 shows the XML project proposed in Instructors handwriting that seems to have been stolen twice from my email, 63 shows my biz plan where I write in the subject line that send was disabled; 64 shows my renewable resource concept; 65 shows that I intended to transfer tech to Bill Joy, 66 shows I intended to transfer tech to Bill Joy on my Birthday November 7, for his birthday November 8, as a birthday present, but there is a reversion clause if he is guilty of serious wrongdoing, 67 shows that I public presented my tech concepts; 68a shows that I had communication with Bill Joy; (61-67 may suggest a motive for Bill Joy to monitor my computer sessions).
X. After I communicated my friends name to Bill Joy his website Brojon.org and/or Brojon.com was defaced allegedly by the Albanians which was hosted by Tucows and Yahoo's Geocities.
Exhibit 68b shows Bill Joy likely would be able to find the Brojon.org and/or Brojon.com webmaster’s website using his email address in the bounceback email from Bill Joy and may have had motive and opportunity to hack his website.
After Bush came into the Whitehouse's Microsoft servers were attacked by
the Code Red worm, and Microsoft servers in
Exhibit 68c is a spoofed email that I did not send to lawmakers that has in the body the message “Screw u all”; I was not expelled or suspected from school for this email, but that may have been intended by the author of the email. I did not have a motive to write the email because I want to have a nonadversarial relationship with lawmakers and my father has testified before lawmakers so I realize that can be a valuable relationship.
XII. The message “I just want to say LOVE YOU SAN!! Billy Gates why do you make this possible? Stop making money and fix your software!!" in the worm known as "LoveSAN" or "MSBlaster" suggests the real target of the worm author is a competitor in the computer industry. The santy worm also contains “san” just as the lovesan message contains “san” “NeverEverNoSanity” suggesting that SAN could stand for SANITY below we will see its image and font is similar in style to that of the iran message in the cone.b worm. Also, below are image links, respectively exhibits 69-72 showing the image about Melinda mentioned above in paragraph 1.3.1.VI.:
http://www.theage.com.au/ffximage/2004/12/22/santy,0.jpg (NeverEverNoSanity… defaced)
http://www.microasist.com/gifs/lovsan2.jpg (LOVE YOU SAN... Billy Gates…)
XIII. Many of the worms are similar in that they tend to be named by the author, mention a prior worm likely done by the author, have exe file names that are similar (COMPARE i-worm.sobig.exe WITH i-worm.bagle.s.exe i-worm.mydoom.exe i-worm.nimda.exe server.exe codered2.exe msblast.exe BCTOOL.EXE removal-tool.exe klez_removal.exe root.x worm.x) to the name of the worm, tend to avoid Google as a target, have cutter as various symbols in their messages that is similar from one worm to the next, and/or have some sort of 1180,117, 8, 7 repeating pattern AND/OR MAKE SOME MENTION TO BILL GATES. They are:
http://www.f-secure.co.jp/v-descs/v-descs2/nimda.jpg PATTERN MATCH WITH BAGLE AND MYDOOM MESSAGE BELOW WITH SIMILAR BEGINNING AND ENDING, BUT sequence repeats three times in the image below.
http://www.f-secure.com/v-descs/witty.shtml FOUR SYMBOL SEQUENCES FOUND IN SLAMMER? Possible I love as a heart symbol then the happyface may hint to Lovesan aka Blaster below after slammer below.
http://www.farpoint.it/images/MSBlast.gif HAPPY FACES , HEARTS, DIAMONDS, CLUBS MAY HAVE SYMBOLIC VALUES PARTLY AS FEELINGS TOWARDS OTHER POSSIBLE CO-FOUNDERS OF SUN MICROSYSTEMS, ESPECIALLY CONSIDERING JOY'S RECENT TILLING (see artlice bellow) COMMENT REGARDING SUN'S CEO. ONE SYMBOL MATCHES BUTTERFLY IMAGE IN FOUND IN BAGLE BELOW.
SEQUENCE PATTERNS REPEATS along with (ONE DIAMOND, TWO CLUBS, A PARAMID? TWO HAPPY FACES) there may be patterns within patterns.
http://www.f-secure.com/weblog/archives/looking4work.gif 7 (seven) similar repeats at front and 8 (eight) at the end MYDOOM Message "We searching 4 work in AV industry"
Exhibit 73 and 74 are images of some of the messages listed in the worms above and my show a pattern in the symbols before and after the written messages, and the 7 before then 8 similar symbols after the written message: “We searching 4 work in the AV industry” may symbolize both Bill Joy’s and my birthdays, respectively 7th and 8th of November; THERE ARE MANY REPEATING SYMBOLS AND/OR PATTERN MATCHES IN THE IMAGES FOUND IN THE WORMS SUGGESTING ONE AUTHOR AND/OR GROUP OF AUTHORS.
SOBIG (8's again? sobig from firstname.lastname@example.org "port 8998" secret 8-byte code worm will deactivate itself on June 8, 2003; W32.Sobig.A@mm worm can download Backdoor.Lala ALSO KNOWN AS BackDoor-AOT Trojan
WHICH WAS Discovered ON
XIII. Nepal, which likely has one of the worst dictatorships that exists Lukla and Patan (seemingly NEPAL location) server names from SUN MICROSYSTEMS MAY SUGGEST THE WORST ABOUT ALMOST EVERYTHING REGARDING BILL JOY WHO SEEMED TO CONTROL SUN CENTRAL WITH THE EMAIL ADDRESS email@example.com respectively exhibits 77 and 78:
lukla.Central.Sun.COM [184.108.40.206] notice Central.Sun.COM
XIV. POSSIBLE NEXUS BETWEEN GOOGLE, VC FIRM, BILL JOY, POLITICANS, THE ATT OS CODE.
1. FORTIFY SOFTWARE LISTED ON A WEBPAGE WITH THEIR Kleiner Perkins Caufield & Byers (THE VC FIRM) LOGO ON IT is Exhibit 79a, IN which Bill Joy is a Partner; I suspect JOY, a director at Fortify Software, likely BROUGHT Fortify Software Kleiner Perkins Caufield & Byers; Joy ALSO HAD FORMER SUN MICRO CO-FOUNDER, ANDY (GRANITE CREATOR WHICH WAS SOLD TO CISCO SYSTEMS – ALLEGATIONS OF SECURITY PROBLEMS WITH also exist with CISCO PRODUCTS – GRANITE TOO MAY HAVE SPYWARE BECAUSE ANDY HAS INVESTED IN SPYWARE) INVESTING THROUGH HIGHBAR Ventures, where he invested with Roy Sardinia and another Sun co-founder Andy Bechtolsheim, BEFORE GOING TO THE VC FIRM AS A PARTNER? Some links that may pertain to the above are:
http://news.com.com/2100-1033-209420.html?legacy=cnet Given the long delay between that $220 million purchase and the debut of gear based on the high-speed technology, some industry pundits dismissed the move as a failure. "They got burned," (8500 series could be a revenue gold mine for Cisco?)
http://news.com.com/2100-1036-5126160.html father of Cisco's Gigabit Ethernet switches (Granite Systems in 1995 to develop network switches)
http://www.cisco.com/warp/public/707/cisco-sa-20030717-blocked.shtml routers as well as switches and line cards which run Cisco IOS software…For Public Release 2003 July 16 at (GMT)
http://news.com.com/Bechtolsheims+machine+dreams/2008-1010_3-5857470.html interview with andy (servers to handle video)
2. WORMS AVOID GOOGLE, a Kleiner
Perkins Caufield & Byers portfolio company, (VC FIRM'S INVESTMENTS, SUCH AS
FORTIFY SOFTWARE) MAY BENEFIT FROM
3. THE VC FIRM AND GOOGLE NEED WIRELESS TO BE COMPETITIVE WITH CONTRIES THAT HAVE WIRELESS AND GOOGLE'S WIRELESS LIKELY GOES TO Kleiner Perkins Caufield & Byers SF LOCATION at 1 Embarcadero Center, and SF ONE OF THE FIRST PLACES LIKELY SETUP FOR GOOGLE WIRELESS (SURVEYOR MARKS MAY INDICATE THIS.). Exhibit 80 is a News.com article about Google Wireless mentioning concerns about data records of uses Internet sessions.
Google has made zero bids to do wireless for both San Francisco and Mountain View, and likely will bid zero in the entire Bay Area and some links about that are below:
4. PERHAPS JOY, GOOGLE'S CEO, AND THE HAVE LONG STANDING RELATIONSHIPS GOING BACK TO GRADUATE STUDIES AT CAL TOGETHER, BOTH HELD THE SAME POSITION AT SUN MICROSYSTEMS, AND JOY WAS LIKELY PUT ON THE BOARD OF NOVEL BY THE GOOGLE’S CEO WHO WAS THEN THE CEO OF NOVEL, AND THE GOOGLE'S CEO RAVES ABOUT JOY’S PROGRAMMING SKILLS. THE VC FIRM LIKELY HAS LONG STANDING RELATIONSHIPS WITH JOY.
5. GOOGLE MAY USE SUNSPARC CHIP. (SEE AND COMPARE WITH ABOVE #1, #2, #3, #4.)
6. GOOGLE ACCEPTS SLEAZY SPONSERED LINKS (PORN), WHICH MAY SUPPORT COST-SHIFTING TO THE GOVERMENT AND INCREASE HEALTH CARE AND OTHER COSTS, AND GENERALLY MAY CAUSE HARM TO INNOCENT VICTIMS, OFTEN WHO ARE UNWILLING TO TESTIFY ABOUT THEIR VICTIMIZATION, OR EVEN REMEMBER THEIR VICTIMIZATION, respectively exhibits 81-83.
Compare below xxx+underage search on different search engines:
7. GOOGLE IS LIKELY NOT IN COMPLIANCE WITH A FEDERAL COURT ORDER. (SEE #6 ABOVE.)
8. JOY MAY WANT TO BRING MY WEBSITE
INFORMEXP.COM TO GOOGLE AND MAY HAVE WANTED TO COPY BITPASS.COM WHICH I USE ON
MY WEBSITE AS GOOGLE WALLET. The CARDSYSTEMS HACKING with possible stolen
credit card numbers, MAY HAVE BEEN DONE BY BILL JOY, AND THAT MAY HAVE BEEN
PARTLY DONE TO HAVE INSIGHT INTO HOW TO MANAGE GOOGLE WALLET. PREVIOUSLY,
YAHOO HAS ACCUSED GOOGLE OF STEALING YAHOO'S ADVERTISING TECHNOLOGY AND THAT,
too, MAY HAVE BEEN DONE BY BILL JOY. A
female employee is missing from XOS! Software in
9. GOOGLE AND THE VC FIRM MAY NEED MY POSSIBLE PRIMARY SYSTEM DRIVER TECHNOLOGY (JOY HAS EVEN BEEN QUOTES AS SHOWING AN INTEREST IN ALTERNATIVE ENERGY, NEW INDUSTRIES, INNOVATION, AND/OR DISRUPTIVE AND/OR REPLACEMENT TECHNOLOGY), WHICH WOULD BE CONCEPTS FOR A POSSIBLE RENEWABLE ENERGY POWERSOURCE AND POSSIBLE ANTI-TORNATO/MISSILE CONCEPT. Exhibits articlies “60 seconds with Bill Joy” and “Rejoicing again” 84 and 85 show that Bill Joy is interesting in invested in Alternative energy.
10. GOOGLE AND THE VC FIRM TEND TO CONTROL POLITICANS WHO TEND TO CONTROL THE ENTITLEMENTS, BENEFITS AND GENERAL WELFARE OF THE POPULATION; THIS IN TURN CAN BREAK THE BACKBONE OF THE INSURANCE INDUSTRY. DATA DESTRUCTION AND UTILITY OUTAGE CAN ALSO COST-SHIFT TO THE INSURANCE INDUSTRY AND THE GOVERNMENT.
1. LOCAL POLITICANS AND/OR LAW ENFORCEMENT ALLOW THE HEALTH PLAN OF SAN MATEO, HEALTH DISTRICT, FUNDS TO NON-PROFITS, COUNTY HOSPITAL (OVERPAID AND INCOMPETENT PERSONNEL?,) WHICH MAY ALL RESEMBLE RITUAL HUMAN SACRIFICE:
C. ALLEGATIONS OF LOCAL POLITICANS INVOLVED IN RITUAL HUMAN SACRIFICE AND ONE ALLEGEDLY IS RUNNING FOR A Peninsula Health Care District (PHCD) Board of Directors POSITION. Exhibits 86 and 87 are emails from two of my sources about RITUAL HUMAN SACRIFICE IN THE REGION.
D. PERSONS SEEMING TO SUFFER AND DIE DUE TO ALL THE CORRUPTION AND/OR INCOMPETENCE IN THE MEDICAL FIELD. “The Grand Jury finds that the Peninsula Health Care District (PHCD) Board of Directors, in its pursuit to build a new hospital, is not able to negotiate terms of a new agreement in the best interest of the District's residents” IS FROM THE 3RD LINK BELOW. IS FROM THE 4TH LINK BELOW “San Mateo County grand jury has questioned a Peninsula hospital district's use of taxpayers' money to fund various nonprofit agencies… district has collected so much revenue since its creation 56 years ago that it currently has $41 million in its coffers”
THE KERNEL: ATT OS CODE
1. THE KERNEL MAY BE A MOTIVE FOR THE RITUAL HUMAN SACRIFICE (TO SUPPORT
NOT INVESTIGATING JOY WHO ALLEGEDLY WAS WORKING ON THE CODE AS AN STATE OF
CALIFORNIA EMPLOYEE AND THE WAS LITIGATED ABOUT THE 1990’S REGARDING THE CODE I
THINK FROM AN ENTITIES THAT CLAIMS TO HAVE BOUGHT RIGHTS TO THE ATT KERNEL
CODE). THE CONSENT DECREES REGARDING THE
BREAKUP OF MA
2. THERE ARE ALLEGATIONS THAT ENGINEERS ARE INVOLVED AND SINCE ABOUT 1990'S OVER ABOUT 300 MEMBERS MAY EXIST IN THE CULT. THRESS SOURCES SEEMS TO EXIST ON PARTS OF THE ALLEGATIONS FROM THE PREVIOUS SENTENCE, WITH ONE POSSIBLE MEMBER LISTING INFILTRATION.ORG ON HIS WEBSITE AND MAY HAVE BEEN AN APPLE COMPUTER EMPLOYEE, ANOTHER MAY HAVE BEEN A CITY OF PALO ALTO CITY COUNCIL MEMBER, AND TWO MAY BE BOARD MEMBERS OF SAN MATEO COUNTY AND ONE MAY A SHERIFF IN THE BAY AREA, OR WAS THE SHERIFF-POSSIBLE MEMBERS ARE: Mike Nevin, Bern Beecham, Theresa McCarthy (Reese), Don Horsley, Gail Gradek, Caren Weinstein, Ben Schloss.
3. LACK OF PROTECTION
FROM ILLEGAL SEARCH AND SEIZURE (Fourth Amendment of the of the
a. Same as I.3.1.b. and I.3.2.a. above.
My concepts or desire for a possible Case/sort priority system (now partly done in informexp.com with a 5 star rating by ixquick.com), renewable resource powersource concept, and possible anti-tornado/missile device were partly or all presented to PALO ALTO CITY COUNCIL WITH VISUALS about 8 years ago (some ideas are older than that and evolving), mostly were previously written in affidavit2.doc which I may not have due but may be found later. My possible Case/sort priority and renewable resource powersource concept are enclosed as emails.
Very short mention of power outages, replacement technology that I may advocate (presented to Palo Alto City Council during Oral Communications visual and this was written in an email to Bill Joy), and some mention that this could also be motivating reasons for the worms.
The following are notes for the agent, fact checker, Editor:
Images below from links:
*@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.* *@*.*