{"id":14090,"date":"2011-11-29T08:38:39","date_gmt":"2011-11-29T13:38:39","guid":{"rendered":"http:\/\/ok-cleek.com\/blogs\/?p=14090"},"modified":"2011-11-29T08:38:39","modified_gmt":"2011-11-29T13:38:39","slug":"oege-on-error-generate-excuse","status":"publish","type":"post","link":"https:\/\/ok-cleek.com\/blogs\/?p=14090","title":{"rendered":"OEGE: On error, generate excuse"},"content":{"rendered":"<p><a href='http:\/\/redtape.msnbc.msn.com\/_news\/2011\/11\/29\/9076395-exclusive-millions-of-printers-open-to-devastating-hack-attack-researchers-say'>HP has apparently implemented<\/a> the legendary <a href=\"http:\/\/groups.google.com\/group\/alt.folklore.computers\/browse_thread\/thread\/b56ae65fafddf157\/f3e09e518c48aade?hl=en&ie=UTF-8&q=%22kindle+fire+in+printer%22&pli=1\">Kindle Fire in Printer<\/a> operation!<\/p>\n<blockquote><p>Printer security flaws have long been theorized, but the Columbia researchers say they've discovered the first-ever doorway into millions of printers worldwide.  In one demonstration of an attack based on the flaw, Stolfo and fellow researcher Ang Cui showed how a hijacked computer could be given instructions that would continuously heat up the printer\u2019s fuser \u2013 which is designed to dry the ink once it\u2019s applied to paper \u2013  eventually causing the paper to turn brown and smoke.<\/p><\/blockquote>\n<p>Sounds like they've implemented the \"Send all Data to Japan\" op, too.<\/p>\n<blockquote><p>In one demonstration, Cui printed a tax return on an infected printer, which in turn sent the tax form to a second computer playing the part of a hacker\u2019s machine. The latter computer then scanned the document for critical information such as Social Security numbers, and when it found one, automatically published it on a Twitter feed.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>HP has apparently implemented the legendary Kindle Fire in Printer operation! Printer security flaws have long been theorized, but the Columbia researchers say they've discovered the first-ever doorway into millions of printers worldwide. In one demonstration of an attack based on the flaw, Stolfo and fellow researcher Ang Cui showed how a hijacked computer could [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-14090","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts\/14090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=14090"}],"version-history":[{"count":0,"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=\/wp\/v2\/posts\/14090\/revisions"}],"wp:attachment":[{"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=14090"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=14090"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ok-cleek.com\/blogs\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=14090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}