Share This Article
Comments (94)
Clinton’s server, which handled her personal and State Department correspondence, appeared to allow users to connect openly over the internet to control it remotely, according to detailed records compiled in 2012. Experts said the Microsoft remote desktop service wasn’t intended for such use without additional protective measures, and was the subject of US government and industry warnings at the time over attacks from even low-skilled intruders.
http://www.theguardian.com/us-news/2015/oc...
Time will tell.
Do you rally thing by probing into Hillary's Email will make a connection four why four American's died In Benghazi?
It's not about Benghazi. All the press could talk about when the story broke was that it was a private server in her 'basement''. It's not about that either. All I need to see in this latest news is the name 'Microsoft' and I know there's a problem.
It will not be long now!
..."He was right that it was no subject for the debate, but we absolutely haven't heard the end of the emails."...
Absolutely tired of hearing about emails; it is a mute issue!!!
I'm vote for H. Clinton and Bernie can be her V.P.
If she can't even make an email server secure, how can we expect her to make the country secure?
Have you forgotten Hillary's most resent job title?
@ Steve,
I'm not sure I understand your comment. Does a woman now have to know IT on top of all the other expectations that society places on us or does she need to have people working for her that do know IT?
That's like in my profession (nursing), patients want me to fix their televisions, AC / heating, food, .... come on get real~ Ha!
I tease my patients by joking, " I don't think they covered TV repair in nursing school." If there happens to a brave male nurse that has entered to profession of females, I ask for help because women know that men have to know how to fix stuff. ((wink-wink))
Securing her server was as simple as hiring the right people, like the company I worked for, Backbone Security.
Sound's like a good outfit.
Both private sector computers like apple with sensitive material has been hacked http://www.cnn.com/2013/02/19/tech/web/app...
The U.S. Post Office has been Hacked http://www.usatoday.com/story/tech/2014/11...
U.S. Military and Government Computers Hacked by Teenager http://www.theinternetpatrol.com/us-milita...
BANKS, have been hacked with our private Social Security numbers on it Officials warn 500 million financial records hacked http://www.usatoday.com/story/news/politic...
We hack into foreign governments computers and they hack into ours. Where is the investigations about that? The private sector really don't want you thinking to long or hard on that.
Bernie got it right, I too am sick of hearing about Hillary Email..
There's hacked at and then there's successfully hacked. Then there's unnecessarily hacked. Like unprotected s*x, like using Microsoft. Really, I worked in this business, understood the exploits, and scanned for exploits. I never faulted Hillary for having a private server, but I do fault her for failing at her job.
Here's the place to start Ron:
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics. It was designed to rapidly scan large networks, but works fine against single hosts. Nmap runs on all major computer operating systems, and official binary packages are available for Linux, Windows, and Mac OS X. In addition to the classic command-line Nmap executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap), a flexible data transfer, redirection, and debugging tool (Ncat), a utility for comparing scan results (Ndiff), and a packet generation and response analysis tool (Nping).
Nmap was named “Security Product of the Year” by Linux Journal, Info World, LinuxQuestions.Org, and Codetalker Digest. It was even featured in twelve movies, including The Matrix Reloaded, Die Hard 4, Girl With the Dragon Tattoo, and The Bourne Ultimatum.
Nmap is ...
Flexible: Supports dozens of advanced techniques for mapping out networks filled with IP filters, firewalls, routers, and other obstacles. This includes many port scanning mechanisms (both TCP & UDP), OS detection, version detection, ping sweeps, and more. See the documentation page.
Powerful: Nmap has been used to scan huge networks of literally hundreds of thousands of machines.
Portable: Most operating systems are supported, including Linux,Microsoft Windows, FreeBSD, OpenBSD, Solaris, IRIX, Mac OS X, HP-UX, NetBSD, Sun OS, Amiga, and more.
Easy: While Nmap offers a rich set of advanced features for power users, you can start out as simply as "nmap -v -A targethost". Both traditional command line and graphical (GUI) versions are available to suit your preference. Binaries are available for those who do not wish to compile Nmap from source.
Free: The primary goals of the Nmap Project is to help make the Internet a little more secure and to provide administrators/auditors/hackers with an advanced tool for exploring their networks. Nmap is available for free download, and also comes with full source code that you may modify and redistribute under the terms of the license.
Well Documented: Significant effort has been put into comprehensive and up-to-date man pages, whitepapers, tutorials, and even a whole book! Find them in multiple languages here.
Supported: While Nmap comes with no warranty, it is well supported by a vibrant community of developers and users. Most of this interaction occurs on the Nmap mailing lists. Most bug reports and questions should be sent to the nmap-dev list, but only after you read the guidelines. We recommend that all users subscribe to the low-traffic nmap-hackersannouncement list. You can also find Nmap on Facebook and Twitter. For real-time chat, join the #nmap channel on Freenode or EFNet.
Acclaimed: Nmap has won numerous awards, including "Information Security Product of the Year" by Linux Journal, Info World and Codetalker Digest. It has been featured in hundreds of magazine articles, several movies, dozens of books, and one comic book series. Visit the press pagefor further details.
Popular: Thousands of people download Nmap every day, and it is included with many operating systems (Redhat Linux, Debian Linux, Gentoo, FreeBSD, OpenBSD, etc). It is among the top ten (out of 30,000) programs at the Freshmeat.Net repository. This is important because it lends Nmap its vibrant development and user support communities.
https://nmap.org
Now ask Hillary if she ever had a security firm run nMap against her system to test for vulnerabilities.
I'm itching to know.
Here's another resource:
http://www.govinfosecurity.com
Steve, don't you recall that Hillary's private security firm was brought this same committee and found nothing, they did not get anywhere on that road.
Please, don't make the mistake and think that Hillary just ran out to one of the big box story's, bought a sever, hooked it up and start using it for her Email's.
This guy?
"Mr. Pagliano’s legal counsel told the committee yesterday that he would plead the 5th to any and all questions if he were compelled to testify," a spokesperson for Judiciary Committee Chairman Sen. Charles Grassley, R-Iowa, told Fox late Wednesday.
So you knew that Hillary's server was managed by a private security corporation?
There was Pagliano then was Platte River Networks. Is that who you're calling a security corporation? The only technical details I've heard have come from the AP, and that's only been within the bounds of a reporter's ability. I haven't seen anything from a technical person but I will double check.
From their website:
Don’t be the next TARGET. Intuition provides Business Class network security delivered on premise and through the Cloud including: Endpoint Security for servers and devices, Next Generation Firewalls, Unified Threat Protection, Monitoring, Mobile Protection, Web and Email Security.
http://platteriver.com/services/managed-it...
Do you think "Business Class network security" was sufficient to protect State Department emails?
This is what the Republican Party loves to tout, the private business sector can do things better then the Goverment. So, why should Hillary worry about her email server with the claims of these companies make, they promised security.
I didn't ask about what the Republicans love to tout. I want to know what Platte River delivered, not what they promised.
Calm down Steven, your line of questing is leaning toward the right.
Now Steven, I am not on the investigation committee, how I am I supposed to know. Now, what I do know is this is the eighth time that Benghazi has been investigated and they found no fault with Hillary.
Again, I do not care about Benghazi. I want to know about the server security, as I have from day 1. I don't care who asks the question, just that somebody does, after how long now?
Wouldn't the question best be answered by the private company providing server security? If indeed Hillary E-mail server was ever compromised in the first place.
This investigation is about Benghazi and four dead Americans and has nothing to do with Hillary's E-mails, this is what makes this Investigation a witch-hunt.
I'm not alleging that Hillary's server was compromised. I'm saying that if she had done her job properly she would have written documentation on the security measures taken, which if she had produced it early on should have put a quick end to this mess.
@ Steve,
..."Then there's unnecessarily hacked. Like unprotected s*x, like using Microsoft."...
Let me get this correct, so you're saying that Ms. Clinton should have abstained altogether or is it that she should have used the pill? Which one as I'm confused?
If you are not alleging that Hillary's server was compromised, then what is your point.. She has said that she made a mistake which she has taken ownership it.
Now that she has taken ownership a while back for using a private server and using a private company providing server security, why should this be a focus point for a Benghazi Investigation?
This Benghazi investigation should be on four dead Americans and has nothing to do with Hillary's E-mails, this is what makes this Investigation a witch-hunt.
Steve, I know that you have said you don't care about the Benghazi investigation but if the purpose of finding out what happen to four dead Americans is the focus of the investigation, this should be the point and not focus on something that was totally unrelated, like some E-mail.
Now if you want to know about Hillary's emails and her server, start a separate investigation on that and you will find all the answers you are looking for.
Can't you see that this Benghazi committee is being used for dethroning Hillary's popularity which three republicans has came out and said. What this committee is doing, is throwing crap on the wall, just to see what will stick?
Now the interest is building for this Thursday meeting with this committee and all the while Hillary's pop's are revising upwards.
I've never had electronic transfers (HIPPA) compared to s*xual transfers ((lol))
@ Deac,
..."This is what the Republican Party loves to tout, the private business sector can do things better then the Goverment. So, why should Hillary worry about her email server with the claims of these companies make, they promised security."...
Well it depends on which private sector company you get... protected s*x and wreckless/carefree s*x!
Absolutely Amazing....
You got that info, I would like that link.
Jen, we used to call it a rubber. I think the technical name is prophylactic.
Deacon,
This story broke 7 months ago. I never associated it with Benghazi or the subcommitte, or cared that it was a private server, in a basement or any of that crap. You care about those things, I do not.
If you are not alleging that Hillary's server was compromised, then what is your point?
And I don't give a damn if she apologized for it or not. I want her to tell SOMEONE, what steps she took to secure it!
Look at you Steven, relax and calm down.
You know the answer to that question, wasn't it you who gave me a link earlier in this blog to the company named Intuition that was handling the security on Hillary's E-mail server?
Deacon, Microsoft is a company name, so what?
Maybe I should have said, Hewlett-Packard is a company name.
So, what was that Link you gave me?
That was Platte River Networks, in Denver. Have you noticed how MSNBC et al usually bring in experts to explain technical matters? Have you seen any network security professionals, for the last 7 months, brought in to educate the public about how to secure an email server? Please point me in the right direction, because I have not.
Was that link pertaining to Hillary's email Server?
No, it was not.
Then why would you sent me that link Steven?
Look, if Hillary had hired me, not only would her email server have been secure, but she would have had the documentation to prove it at her fingertips.
That is not answering my question to you Steven and I want you to stop running away from your own words!.
Why would you send me that link on Monday, October 19th 2015 at 8:39AM ?
There was Pagliano then was Platte River Networks. Is that who you're calling a security corporation? The only technical details I've heard have come from the AP, and that's only been within the bounds of a reporter's ability. I haven't seen anything from a technical person but I will double check.
Monday, October 19th 2015 at 6:47AM
Steve Williams | delete
Have you looked at the AP report?
I am very very disappointed in your sad attempt to run away from your own words STEVEN. These are your words which I could not have made this stuff up on you, you did this yourself by shooting your own creditability down with me and you put all of what you said in the past and what you say in the future, in question.
This is the second LIE I have busted you in, the first one involved Plan Parenthood and now this!
Steven, you did not have to LIE to me. this is a prime example of right wing thinking which you will stand on without any bases to backup your believes.
WOW! Steven, I thought highly of you and I guess that was my fault but you did not have to LIE too me then hide and run away like it never happen!
WOW!
Wow is right. You seem not to realize our whole exchange is right here in plain sight, who is the one who can't answer questions.
Clinton’s server, which handled her personal and State Department correspondence, appeared to allow users to connect openly over the internet to control it remotely, according to detailed records compiled in 2012. Experts said the Microsoft remote desktop service wasn’t intended for such use without additional protective measures, and was the subject of US government and industry warnings at the time over attacks from even low-skilled intruders.
http://www.theguardian.com/us-news/2015/oc...
Thursday, October 15th 2015 at 9:05AM
Steve Williams | delete
Time will tell.
Thursday, October 15th 2015 at 11:24AM
Deacon Ron Gray
Just what I thought, You sent me this link http://platteriver.com/services/managed-it... on Monday, October 19th 2015 at 8:39AM ? Then tell me what you should have said when I bust you in that LIE for it after a few attempts YOUR WORDS: Maybe I should have said, Hewlett-Packard is a company name. Tuesday, October 20th 2015 at 7:49PM.
Mind you, we are on the topic of Hillary's Email Server. I asked you this question: Was that link pertaining to Hillary's email Server? on Tuesday, October 20th 2015 at 8:18PM you said No, it was not. Tuesday, October 20th 2015 at 8:44PM then I asked you this: Then why would you send me that link Steven? Tuesday, October 20th 2015 at 8:47PM
Now when I asked why would you do that, you Ignored me and act like I didn't ask you a thing. You went down this street, I quote: Look, if Hillary had hired me, not only would her email server have been secure, but she would have had the documentation to prove it at her fingertips. Tuesday, October 20th 2015 at 8:47PM That street was a road that I would not go down with you as this was your weak attempt to change the subject.
Now when I confronted you and told you, I quote That is not answering my question to you Steven and I want you to stop running away from your own words!. Why would you send me that link on Monday, October 19th 2015 at 8:39AM ?
instead of answering why you LIED you me about that LINK, you repasted something that do not answer the question Why would you send me that link on Monday, October 19th 2015 at 8:39AM ? Here's what you sent me STEVEN and I quote:There was Pagliano then was Platte River Networks. Is that who you're calling a security corporation? The only technical details I've heard have come from the AP, and that's only been within the bounds of a reporter's ability. I haven't seen anything from a technical person but I will double check.
Monday, October 19th 2015 at 6:47AM
Steve Williams | delete
Tuesday, October 20th 2015 at 9:43PM
After I told you what I thought of your actions to me on this blog, then this morning I get this from you, I quote: Wow is right. You seem not to realize our whole exchange is right here in plain sight, who is the one who can't answer questions.
YOU ARE RIGHT the record is here, in front of you right now and you never did answer my question to why you sent me that link and now you want to go and take another path like I never asked you anything. YES the record is right in front of you and have been in front of you when you first started LYING, and running away from your own words but that will not stop you from LYING.
Go ahead and stop these LIES since you cant even standby your own words, what a shame Steven. I am very disappointed in with you.
.
STEVEN, when a man can't backup his own words and run like hell from those words like you did here on this blog, your words have little meaning to me and that is sad. I am disappointed with you.
Think about what I said Ron. I said that link does not pertain to Hillary's email server. It pertains to Platte River Networks mission statement. What does that tell us about Hillary's email server security? Nothing!
It's the difference between promising something, and delivering on that promise. Okay.
So that was your attempt to misdirect the flow of the dialog from Mr. Pagliano who was the head of the company who ran the security for Hillary's Email Sever.
THESE ARE YOUR WORDS: This guy? Mr. Pagliano’s legal counsel told the committee yesterday that he would plead the 5th to any and all questions if he were compelled to testify," a spokesperson for Judiciary Committee Chairman Sen. Charles Grassley, R-Iowa, told Fox late Wednesday. Sunday, October 18th 2015 at 7:37PM
Was this your attempt to misdirect the flow of this dialog?
Networks are like roads," Michael Markulec explains. "And we provide the road map."
Markulec's company, Lumeta, is about to start drawing maps that will reveal every intersection, cul-de-sac and IP address in the U.S. military's vast and sprawling NIPRNet (Non-classified Internet Protocol Router Network). The "non-classified but sensitive" network is used around the world by several million U.S. personnel and about 10 million devices, Markulec said.
Lumeta's network-mapping software, IPSonar, will find and identify all devices on the NIPRNet and tell network operators how they are interconnected, Markulec said. "Without that knowledge, you can't manage the network. And if you can't manage it, you can't secure it."
"You can't defend what you don't know," agreed Mark Orndorff, director of Defense Information Systems Agency' Mission Assurance and Network Operations.
Mapping isn't IPSonar's only talent. The software, which is costing the Defense Department more than $10 million, also searches for leaks.
"Our most critical requirement was leak detection," Orndorff said.
The military needs to know where information is entering and leaving the network without authorization.
With attacks on the U.S. Defense Department networks rising rapidly, tightening security has taken on new urgency. DoD networks are probed thousands of times a day and sometimes are penetrated by hackers, botnets, worms, phishers, zombies and more.
In successful attacks, malicious software takes control of computers, servers and other equipment on the network, often to gather information to transmit it out of the network, back to the attackers.
IPSonar is designed to find those leaks and alert network operators.
During the mapping process, Markulec said, IPSonar will undoubtedly discover misconfigured firewalls, connections to other networks that shouldn't be there and modems that are communicating with the outside world but shouldn't be.
http://archive.defensenews.com/article/201...
The OpenNet Plus project is intended to address the Secretary’s commitment to providing, as soon as possible, all Department employees with desktop access to the Internet’s World Wide Web to help carry out the foreign affairs mission. Access to the Internet is being accomplished via the Department’s existing global Open Net- work (OpenNet) infrastructure. OpenNet serves as the foundation for sensitive but unclassified information processing and communications among headquarters organizations and over 260 locations worldwide and is used by most employees for typical day-to-day operations and for e-mail. This network is mirrored on the classi- fied side of the Department by a second network that supports secure office auto- mation, e-mail, and limited web-based communications up to the secret level.
https://oig.state.gov/system/files/9623.pd...
Why can't you stand by your own words Steven, your words are you. By this action alone overshadows anything you are not saying about some other links.
As fur as this committee is concerned it lost it's creditability long ago and fell dead on it's face with the recent admission of three Republicans on this matter.
We will see more Thursday Morning.
I'm trying to educate you about network security Ron.
Steven, at this point, I can't focus on but one thing right now and this is the FACT that you have LIED to me by your own words or you will not acknowledge that fact. You have not yet or will not address that FACT. You carry on like it is OK to LIE to me and you don't care what you do or how you LIED, it is all about what you want to say right now and that is unacceptable.
If your point is so strong, you would have to use the tools of deception, Trickery and lies to make your point. Remember Steven LIES will not stand the test of time, only the truth will.
You can't say I've lied when you don't know the subject. You used to research things Ron, what happened? I've given you lots of leads but it appears you haven't followed through on them.
I told you that network security needs to be documented. In 7 months now I haven't seen any documentation, have you?
Clinton has said her server featured “numerous safeguards” but she has yet to explain how well her system was secured and whether, or how frequently, security updates were applied.
http://www.theguardian.com/us-news/2015/oc...
As long as we're talking about lies, this one's a whopper:
Steve, don't you recall that Hillary's private security firm was brought this same committee and found nothing, they did not get anywhere on that road.
Please, don't make the mistake and think that Hillary just ran out to one of the big box story's, bought a sever, hooked it up and start using it for her Email's.
Sunday, October 18th 2015 at 3:19PM
Deacon Ron Gray
Mr. Gowdy said in the interview last week that he had pressed Mr. Boehner to have another House committee examine the matter of Mrs. Clinton’s emails, but that Mr. Boehner had rejected the request.
“I would have liked nothing more than for the speaker to find another committee,” Mr. Gowdy said.
By ERIC LIPTON, NOAM SCHEIBER and MICHAEL S. SCHMIDT
OCTOBER 11, 2015
http://mobile.nytimes.com/2015/10/12/us/po...
The subject was evolved by you when you introduce a link in your own words which I brought to attention was a LIE. I won't confuse you this the details but go back through this blogs records and you will see the LIE you told and the many times I asked you to standby your own words and you just ran away from them, like you are doing now.
The subject was sidetracked by you, to Benghazi. In response to my second comment on this blog you lied and said "Steve, don't you recall that Hillary's private security firm was brought this same committee and found nothing, they did not get anywhere on that road."
Have you even read the AP report I've posted three times now?
Steven, isn't Hillary set to testify before the Benghazi committee tomorrow morning and the question will be about her Emails? Is that a safety Duction?
I guess we'll see what she gets asked. I don't know if the committee is smart enough to ask the right questions.
Why do you feel you have to LIE to make a point?
What's so mysterious about why I posted a link to Platte River Networks, when you never answered the question I asked in relation to it?
If you would have said that you was an error with that link, this dialog would have continued to flow but what got me going, you was acting like it was OK to LIE to me and you walked away from ownership of your actions. GOT IT!!!
The AP exclusively reviewed numerous records from an Internet "census" by an anonymous hacker-researcher, who three years ago used unsecured devices to scan hundreds of millions of Internet Protocol addresses for accessible doors, called "ports." Using a computer in Serbia, the hacker scanned Clinton's basement server in Chappaqua at least twice, in August and December 2012. It was unclear whether the hacker was aware the server belonged to Clinton, although it identified itself as providing email services for clintonemail.com. The results are widely available online.
So the first scan was August, Benghazi was September, and the second scan was December.
Let's see if the special subcommittee is smart enough to make the connection.
Like I brought out earlier in this blog about the level of security report on both private sector computers and the government's computer.
If they do question the security of Hillery's server, let them investigate this hack: http://www.cnn.com/2015/03/10/politics/sta...
Her info may still have been compromised with all the level of security put on government computers.
So far it seems like Hillary is having fun at your BenGhazi investigation.
I know I am, what a circus. You Libs are great politicizers.
What do that have to do with this statement: "So far it seems like Hillary is having fun at your Benghazi investigation."
Then you replied this: I know I am, what a circus. You Libs are great politicizers.
WHAT!
Wow, this is going on too long.
What! What do you mean MY Benghazi investigation!
This GOP committee has failed to learn anything new. Hillary is making them look bad on this E-mail server question.
Now all they got is speculation and no more FACTS.
Clinton's testimony has gone on further then any other testament at this committee. After 5 Million dollars and all this time the GOP still have nothing.
YES!!! this is going on too long.
I know that you are hoping that this Benghazi investigation could strike a blow to Hillary but after nine hour, they have not laid a glove on her yet.
She's pretty slick.
I know that this is not the results you was looking for.
The Chairman was asked if there was one new thing he learned from todays investigation and he could not answer or would not answer.
He knows that he and this committee GOP failed to wear Hillary Clinton down after 11 hours of testimonies as he walked away from the chamber..
Reporters caught up with the chairman in the hallway and he was asked the same question and he said that he would have to read the transcripts!!! WHAT!!!
I can see the morning headlines saying "CLINTON WINS." I am sure that she will get a bump in the polls for her Presidential endurance in her run for the Democratic nominee for President.
Replace the word Slick with REAL.
The results were much better than I expected.
Gowdy already knew just how sneacky she is.
Now I hear that the Chairman said that he learned nothing new. After 7 other investigations what do Hillary need to be "sneacky" for? Remember she was questioned in 7 other investigations before this one.
All she had to do was keep her cool and be real and she did that well.
Now, I am sick of hearing about Hillary's DAMN E-mail's.
Post a Comment
Please log in to post comments.
He was right that it was no subject for the debate, but we absolutely haven't heard the end of the emails. The key question from the start was whether Clinton's server was secure and it's finally, after all this time, coming out that maybe it wasn't.