Tag «杭州水磨»

Bass angler McLauchlan gets third win in a row at Trinity

first_imgThe Red Bluff Bass Anglers fished Trinity Lake on Sunday, Sept. 24 and Kevin McLachlan had a big day. The bite was slow for everyone except for McLachlan, whose winning weight of 21.42 lbs gave him his third victory in the past three tournaments. McLachlan caught two largemouth bass of more than 5 lbs for the biggest and second biggest fish, and a 3.24 lbs smallmouth for the biggest smallmouth of the tournament. Frank Johnston finished second with 15.08 lbs, and Jeremy Johnson took third …last_img read more

Many proven benefits have cover crops gaining interest

first_imgShare Facebook Twitter Google + LinkedIn Pinterest For thousands of years, farmers have used cover crops to help manage pests, reduce weeds, improve rainfall capture and enrich soil health. In addition to all of those benefits, today, there is renewed interest in using cover crops as a modern farming practice to help reduce carbon emissions.“Cover crops have been somewhat limited in adoption with about 3% of farmers utilizing them, but we are seeing a lot of interest these days,” said Mike Lohuis, Monsanto’s Director of Ag Environmental Strategy. “It’s not easy for a farmer to go from not using cover crops to full adoption so I think the practice is something that farmers want to try out on some of the more challenging acres of their farm.”Interest in cover crops are growing more rapidly in parts of Ohio and Indiana because of nutrient management issues, in Kentucky to mitigate soil erosion and in the Chesapeake Bay region where incentives were put in place to promote cover crop adoption. Lohuis says that getting started with the implementation of cover crops should utilize a crawl before you run mentality and he recommends using local knowledge and expertise, such as universities, government agencies and seed companies to find out what the correct cover crop to use for a particular situation and set long-term goals for using cover crops.Another reason for an uptick in cover crop interest today is their possible role in reducing carbon emissions.“A recent study by ICF International showed that cover crops have a very large potential with over 100 million metric tons of carbon emission reduction attainable across the U.S. agriculture system,” Lohuis said. “That could mean somewhere in the neighborhood of 200 kilograms to over a ton of greenhouse gas reduction per acre per year.”One way that Monsanto is hoping to expand the interest in cover crop use is with the Soil Health Partnership, which is a joint venture project with the National Corn Growers Association. The ultimate goal of the Soil Health Partnership is to measure and communicate the economic and environmental benefits of different soil management strategies, and provide a set of regionally specific, data‑driven recommendations that farmers can use to improve the productivity and sustainability of their farms.“This program is incredibly important to demonstrating the use of cover crops, reduced tillage or no-till on actual farms,” Lohuis said. “The participating farmers can see first-hand, the actual results with soil conditions, what happens to water quality and what happens to the bottom line.”That concept is being put into action in Northwest Ohio on the farm of Ryan Sanders in Edon, who has been using cover crops in one form or another for about eight years.“The Soil Health Partnership is a long-term commitment on our end as we will test cover crops and their impact on the soil versus no cover crops,” Sanders said. “We have those strip trials broken out into several different zones and plan to be a part of the project for five years and maybe longer.”The unique aspect of these cover crop trials being done inside of a real farm scenario makes it easier for nearby farmers who are curious about the practice to ask questions to their peers and get real results and data.“Everyday someone will ask me what I am getting out of the use of cover crops,” Sanders said. “My answer is that planting them does come at a cost and using cover crops has to be worth more than just the feel good aspect of bettering your soils, so at the end of the day it has to earn more bushels too.”One of the main reasons that Sanders got involved with the Soil Health Partnership is that it will turn all of his data into yield data on his strips and really show what the long-term impacts will be environmentally and economically.“The partnership allowed us to set up our trials the way that would work best for our farm and we took the simple is better approach,” Sanders said. “The program has created a really nice network of farmers and has also involved some heavy hitters that are looking deeper into the sustainability and soil health as a piece of the puzzle.”Being a part of the Soil Health Partnership also puts farmers like Sanders on the front line of the cover crop conversations as he shares how he does, why he does it and the results he is seeing from their use. It also gives him a platform to share his advice to farmers who are looking into starting a cover crop regimen.“The first piece of advice I would give is to have patience and flexibility,” Sanders said. “I don’t want to claim to be an expert because I am not. I have gained my knowledge by using cover crops on my own farm, by going to the same meetings as many other farmers to learn more about cover crops and by always visiting with those that are experts to glean more information every chance I get.”Figuring out how cover crops will work with everything from your herbicide programs to your fertility programs is key and Sanders says that the first thing farmers need before starting a cover crop program is an open mind.“You’re not going to be successful if you just put out 20 acres of radishes and don’t see any immediate results because we’re talking about building soils that have been farmed for decades,” Sanders said. “Farmers have always had a long-term vision and I think that is why a cover crop system will work for many of the folks ready to give them a shot.”last_img read more

API of the Week: Data Source Handbook

first_imgThis week, instead of a single API we’re spotlighting ReadWriteWeb contributor Pete Warden‘s new e-book Data Source Handbook, which was just released today. Pete covers a slew of data sources including, of course, many APIs.“These are hand-picked services that I’ve actually spent time using during my own work,” Pete writes. “And I chose them because they add insights and information to data you’re already likely to be dealing with.”He’s made a list of services and a couple excerpts available here. Growing Phone Scams: 5 Tips To Avoid Why You Love Online Quizzes klint finley Related Posts How to Write a Welcome Email to New Employees? Here’s the full description of the book:If you’re a developer looking to supplement your own data tools and services, this concise ebook covers the most useful sources of public data available today. You’ll find useful information on APIs that offer broad coverage, tie their data to the outside world, and are either accessible online or feature downloadable bulk data. You’ll also find code and helpful links.This guide organizes APIs by the subjects they cover–such as websites, people, or places–so you can quickly locate the best resources for augmenting the data you handle in your own service. Categories include:Website tools such as WHOIS, bit.ly, and CompeteServices that use email addresses a search term, including GithubAPIs for finding information from just a name, including WhitePagesServices that help you locate people with accounts, such as KloutSearch APIs, including BOSS and WikipediaGeographical data sources, including SimpleGeo and US CensusCompany information APIs, such as CrunchBase and ZoomInfoAPIs that list IP address, such as MaxMindServices that list books, films, music, and products 7 Types of Video that will Make a Massive Impac… Tags:#APIs#hack last_img read more

How To Build A Botnet In 15 Minutes

first_img3 Areas of Your Business that Need Tech Now Cognitive Automation is the Immediate Future of… The mission is clear: infiltrate the target corporate network in order to obtain corporate data and perhaps even some intellectual property along the way. Tools on hand? Just you, a clean Internet-connected machine and 15 minutes of uninterrupted time.With just a little knowledge, that’s plenty of time to get inside a supposedly unbreachable network—just by building your own botnet.What’s A Botnet, Again?Simply put, a botnet is a network of malware-infected computers that are remote-controlled by a command server. Whoever controls the botnet can make those zombie computers do bad stuff—launching distributed denial-of-service attacks is one favorite pastime—or just exploit them to harvest passwords and to access other private information within, say, a corporate network.See also Does It Really Take A Government To Launch Cloud-Based Cyberattacks?Botnets have been overshadowed recently by criminal phishing expeditions, nation-state hacks and zero-day attacks, but they represent a type of threat no one should dismiss lightly. Botnet zombies are already pervasive inside home and business networks—in part because ordinary security measures often don’t protect against them.But it’s also true that setting up a botnet is ridiculously easy. Simon Mullis, systems engineer at the security vendor FireEye, recently walked me through the process of creating a malware package that would install and infect an end-user system on a target network, turning it into a zombie that would do our bidding.The premise of the exercise was straightforward: Infect a target system that started off completely free of malware. Of course, Mullis wasn’t blasting a hapless PC with zombie malware; he just targeted a clean Window virtual machine he’d set up himself. To control the bot, he created his own command-and-control system by spinning up a LAMP server on Amazon Web Service’s EC2 platform. (He used EC2 simply for its convenience; he could just as easily have run the demonstration from a physical server right there in his office.)How To Build A BotnetOpening his browser, Mullis searched for a botnet builder tool for malware known as Ice IX. Google’s top response to his particular query—which I’m not going to reveal here—yielded a site that offered the tool for free. Ice IX is a nasty little piece of malware that injects a fake Facebook page into a victim’s browser that collects credit card information under false pretenses.Any malware, though, would have done just as well. Using methods and tools that can be found online in minutes, a botnet creator can create a central command and control server and then use social engineering to inject malware onto the victim’s computer—by, say, emailing an innocuous looking but disguised file, or tricking a user into downloading the file from a compromised website.After downloading and installing the Ice IX kit software, Mullis started up its bot builder kit and began to set up the parameters for the malware—specifying, for instance, how often the malware would communicate with the command server, what actions it would undertake and even how it would hide from anti-virus scans. Much of this work was simply a matter of filling in appropriate fields in the Ice IX builder kit’s straightforward Windows interface.Some of the rest required editing the Ice IX kit’s powerful setup.txt script. Individual command lines in that script might direct the malware to take screenshots of pages that were visited by the zombie machine’s browser on a certain domain, such as a bank web site. Or have the malware tell the zombie machine’s browser to block sites (such as anti-virus updating sites) altogether. It can also redirect legitimate site URLs to malevolent sites intended to collect critical information—credit card numbers, Social Security numbers, passwords. You name it.Once he’d set the malware’s specifications, including the location of its controlling command server, Mullis uploaded Ice IX-produced files to his LAMP server. And presto—he had a fully configured botnet command server.Congratulations On Your New Botnet!Constructing the bot and prepping the command server is the first half of the equation. Next up is the task of encrypting and packing the infected file that will deliver containing the bot-installation malware on the target machine. The file is usually a PDF or document file, as those are the ones many users will click without thinking when faced with a phishing email or a malicious website.The malware delivery file is created with a ‘crypter and packer software, and is sent to the target for infection with the aforementioned social engineering practices. At this point, the zombied computer can now be under the author’s control.After delivering the malware package to his Windows virtual machine, Mullis simulated a user double-clicking on the file, packaged to appear as a PDF document. The file suddenly vanished from the desktop of the virtual Windows PC; its malware package was already running invisibly in the background, installing the bot software and seizing control. An unsuspecting user could easily be completely unaware that her system had just been zombified.The Bot Goes To WorkSuppose some unscrupulous individual had just zombified a corporate PC in the real world. What happens next?If the goal is network infiltration, the zombie can now read email and monitor traffic and communications, enabling its overseer to work his way through the organization in hopes of sniffing out passwords, identifying specific databases containing engineering secrets, and fingering users with greater administrative powers. At every opportunity, the botmaster spreads more malware to other computers, bolstering the ranks of his zombie horde within the corporate network and improving the odds that he’ll stumble across something juicy.And if he needs to grant his zombies new powers, all the botmaster has to do is upload new malware packages to the infected computers. This highlights one of the major dangers of botnets—they can be customized to perform just about any type of illicit activity the botmaster wants. It’s is a slower and less flashy method of attack than zero-day attacks that exploit known weaknesses in the software running on PCs and servers. But it can be every bit as effective.Botnet infiltration works so well in part because most people will tend to trust files that appear to have originated with other employees inside the company’s network. People will almost always pass along files from sources they know. And that’s a very large problem: Mullis estimated that “around 95% of the organizations we work with has this type of malware somewhere on their networks.”And while creating a botnet like this isn’t the sort of thing any person off the street could do, it’s uncomfortably close. You need some basic knowledge of how webservers are constructed—in particular, some familiarity with back-end databases like MySQL that have become ubiquitous for managing all the information stored on websites. If you’ve ever run a website, you could do this.See also BotClouds: How Botnets Now Offer Crime-As-A-ServiceThe website Mullis visited to download Ice IX kit in the first place listed the 14 steps for installing and using the software right on the download page. Step 14? “Profit.”Welcome To The Big LeaguesMullis’ point in running this demo was to underscore just how powerful malware-creation tools have become, how simple they are for relatively unsophisticated computer jockeys to use—and just how easy it is to find them. These tools are far beyond the level of sophistication the talented amateurs known as “script kiddies” once used: In just 13 minutes, anyone with a modicum of knowledge can use simplified point-and-click tools to build malware that can steal identities and corporate secrets alike without breaking a (metaphorical) sweat.See also The Hackers Are WinningAnd that’s just what Mullis found with a few Google searches; one can only imagine what tools the big-league hackers have at their disposal. That, Mullis said, is the real problem: Malware creation is frightenly easy to create for nearly all levels of hackers, thanks to the easy availability of these malware builder kits. The really dangerous malware is light-years beyond what prepackaged tools like the Ice IX kit can produce.Complicating this is the fact that anti-virus software is often unaware of this kind of malware. Zombie-type malware can only be detected if the anti-virus vendor has managed to get a signature for the malware in question. This is often difficult, since this malware takes active pains to avoid detection.In the arms race between hackers and users, the hackers are winning. The sheer volume of available malware-building kits makes that clear. Eventually, defenders should be able to catch up, but for now, it’s open season for incautious users. Image courtesy of Shutterstock IT + Project Management: A Love Affair Tags:#botnet#security center_img Massive Non-Desk Workforce is an Opportunity fo… brian proffitt Related Posts last_img read more