<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>News &#8211; Phocean.net</title>
	<atom:link href="/category/news/feed" rel="self" type="application/rss+xml" />
	<link>/</link>
	<description>Computer Security Blog</description>
	<lastBuildDate>Fri, 24 Feb 2017 21:17:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.10</generator>
	<item>
		<title>New page : Docs</title>
		<link>/2013/03/16/new-page-docs.html</link>
		<pubDate>Sat, 16 Mar 2013 21:18:51 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1561</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1561</guid>
		<description><![CDATA[I just created a new page, Docs, that, for now, hosts two mind maps. I hope it will be useful, and please let me know any suggestion and criticism so that I can improve them.]]></description>
				<content:encoded><![CDATA[<p>I just created a new page, <a href="/docs">Docs</a>, that, for now, hosts two mind maps. I hope it will be useful, and please let me know any suggestion and criticism so that I can improve them.</p>
]]></content:encoded>
			</item>
		<item>
		<title>A relative got hacked for scamming activities</title>
		<link>/2013/01/20/a-relative-got-hacked-for-scamming-activities.html</link>
		<pubDate>Sun, 20 Jan 2013 16:40:03 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Forensic]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Privacy]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[firefox]]></category>
		<category><![CDATA[Forensics]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[scam]]></category>
		<category><![CDATA[scammer]]></category>
		<category><![CDATA[scamming]]></category>
		<category><![CDATA[sqlite]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1474</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1474</guid>
		<description><![CDATA[One of my relative got hacked. After a phone conversation with him, I realized that his computer was hacked a few days before. He told me that he saw the mouse moving by itself, but what happened then was not clear to him. Anyway, he did not feel the urge to call me immediately. Needless to...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>One of my relative got hacked.</p>
<p>After a phone conversation with him, I realized that his computer was hacked a few days before. He told me that he saw the mouse moving by itself, but what happened then was not clear to him. Anyway, he did not feel the urge to call me immediately. Needless to say that his knowledge on computers is low.<br />
I immediately started to investigate.</p>
<h2>How the computer was hacked</h2>
<p>The computer is running Ubuntu . I suspected a vulnerability, but I soon realized that it was much simpler than that: by mistake, a VNC session was left opened!</p>
<p><em><strong>x11vnc</strong></em> with <strong><em>no authentication</em></strong> and <em><strong>no logging</strong></em>&#8230; Damned!</p>
<h2>What the attacker did</h2>
<p>What he tried first was to create a user to maintain access. But the scammer was probably low tech and soon abandonned.</p>
<p>Here is his sequence in the shell history:</p>
<pre>261 adduser -u 0 -o -g 0 -G 0,1,2,3,4,6,10 -M xxxcx
262 useradd -d /home/xxxcx -m nokia00
263 passwd xxxcx</pre>
<p>Command <strong>#261</strong> failed, because of unproper syntax. I guess he meant useradd, as adduser on Debian/Ubuntu has totally different options. Note that what he was trying to do is create a new root user named xxxcx (with no home directory).</p>
<p>He probably did not realize his mistake, but yet tried this time useradd with fewer options in command <strong>#262</strong>. This time, he would create the home directory and name the user nokia00&#8230; Why not. Alas, the command can&#8217;t work as a standard user!</p>
<p>Then, command <strong>#263</strong>: he tried to change the current password, but again he failed as it is required to know it before updating it&#8230;</p>
<p>And that&#8217;s it. Pretty lame, isn&#8217;t it? He got quickly discouraged and started to use exclusively <em><strong>Firefox</strong></em>.</p>
<h2>On-line shopping</h2>
<p>With support of <a title="forensicswiki.org" href="http://www.forensicswiki.org/wiki/Mozilla_Firefox">forensicswiki.org</a>, I dumped the full Firefox profile on my computer and started to analyze it with the <a title="Sqlite Manager" href="https://addons.mozilla.org/fr/firefox/addon/sqlite-manager/">Sqlite Manager</a> extension.</p>
<blockquote><p>Sorry but I will be hiding private info and sensitive data that could be used for a legal action.</p></blockquote>
<p>I got most info from the files <em><strong>cookies.sqlite</strong></em> and <em><strong>places.sqlite</strong></em>.</p>
<div id="attachment_1482" style="width: 590px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/cookies" rel="attachment wp-att-1482"><img class="size-medium wp-image-1482" alt="cookies.sqlite: a lot of info: email and billing info used by the attacker" src="/wp-content/uploads/2013/01/cookies-580x345.png" width="580" height="345" srcset="/wp-content/uploads/2013/01/cookies-580x345.png 580w, /wp-content/uploads/2013/01/cookies-940x560.png 940w, /wp-content/uploads/2013/01/cookies-500x298.png 500w, /wp-content/uploads/2013/01/cookies.png 1394w" sizes="(max-width: 580px) 100vw, 580px" /></a><p class="wp-caption-text">cookies.sqlite: a lot of info: email and billing info used by the attacker</p></div>
<div id="attachment_1483" style="width: 590px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/places" rel="attachment wp-att-1483"><img class=" wp-image-1483 " title="places.sqlite" alt="places" src="/wp-content/uploads/2013/01/places-580x345.png" width="580" height="345" srcset="/wp-content/uploads/2013/01/places-580x345.png 580w, /wp-content/uploads/2013/01/places-940x560.png 940w, /wp-content/uploads/2013/01/places-500x298.png 500w, /wp-content/uploads/2013/01/places.png 1394w" sizes="(max-width: 580px) 100vw, 580px" /></a><p class="wp-caption-text">places.sqlite: attacker&#8217;s browsing history, with interesting purchase references in GET parameters</p></div>
<p>The guy didn&#8217;t loose time, he knew precisely what he wanted and what to do.</p>
<ol>
<li>He first visited two websites to localize the computer: <a title="ip2location.com" href="http://ip2location.com">ip2location.com</a> and <a title="ip-tracker.org" href="http://www.ip-tracker.org">ip-tracker.org</a>. You may think that it is a strange first move, but I will come back on that later as I have a theory.</li>
<li>Now that he knew in what country he was (country XXX), he started to do online shopping.</li>
</ol>
<p>It is interesting that his online shopping was all linked to web hosting:</p>
<ul>
<li>templates from dreamtemplates.com</li>
<li>a .net domain name (with however part of the prefix being localized accordingly to the country suffix).</li>
<li>hosting at netfirms.com and mg1host.com</li>
</ul>
<p>Note that the criminal used a online payment platform that I never heard about before: 2checkout.com aka 2co.com.</p>
<p>Unfortunately, when I investigated, all cookies were expired so I could not connect to the criminal&#8217;s account.</p>
<p>Yet, it still had some valuable info. The most interesting info I found was from a cookie from dreamtemplates.com. I got all the billing info used by the attacker:</p>
<ul>
<li>attacker&#8217;s gmail address (probably compromised or anonymous)</li>
<li>Name and address for the billing, that sounded real&#8230;</li>
</ul>
<p>Also, GET parameters in URLs were very interesting.</p>
<p>In some of them, you can guess the amount of the purchase he did. He for sure bought stuff for at least a total of 500$. But it is without counting the stuff that I cannot guess from URLs, so it is probably sensibly much more in reality.</p>
<p>But, even better, some had order ids. Hey, wait! Let&#8217;s have a look on the 2co website:</p>
<div id="attachment_1487" style="width: 474px" class="wp-caption alignnone"><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/2co_order_review" rel="attachment wp-att-1487"><img class=" wp-image-1487 " alt="2co order review = order number + email" src="/wp-content/uploads/2013/01/2co_order_review-580x362.png" width="464" height="290" srcset="/wp-content/uploads/2013/01/2co_order_review-580x362.png 580w, /wp-content/uploads/2013/01/2co_order_review-480x300.png 480w, /wp-content/uploads/2013/01/2co_order_review.png 781w" sizes="(max-width: 464px) 100vw, 464px" /></a><p class="wp-caption-text">2co order review = order number + email</p></div>
<p>Hmmm&#8230; we have the email address and the order number&#8230; bingo!</p>
<p><a href="/2013/01/20/a-relative-got-hacked-for-scamming-activities.html/order" rel="attachment wp-att-1488"><img class="alignnone  wp-image-1488" alt="order" src="/wp-content/uploads/2013/01/order-580x911.png" width="406" height="638" srcset="/wp-content/uploads/2013/01/order-580x911.png 580w, /wp-content/uploads/2013/01/order-190x300.png 190w, /wp-content/uploads/2013/01/order.png 676w" sizes="(max-width: 406px) 100vw, 406px" /></a></p>
<p>Now, we have at least all info of the credit card owner, certainly the biggest victim in this mess.</p>
<h2>Conclusion</h2>
<p>That&#8217;s it for now. We are still in the process of transmitting the info to the police and alerting the victim.</p>
<p>Here are a few thoughts by the way:</p>
<ul>
<li>Logging, always logging! It is a pity that we know literally nothing about the scammer source ip address. All his actions were made from within a VNC session and it leaves no trace. He may have came from another proxy, but who knows&#8230; I still have a little hope that under legal request, the Internet provider of my relative will be able to provide some logs.</li>
</ul>
<ul>
<li>Nowadays, it is still difficult to report such a case to the police and to help the victim. The local police is at loss and does not really know what to do. The cyber section is slow to answer, probably crawling under requests (mostly spam stuff?).</li>
</ul>
<ul>
<li>Not every one has a computer specialist among friends or relatives. It must be a terrible experience to see the police coming to you for a fraud one hasn&#8217;t committed directly. Few people, even sometimes among IT professionals, understand that.</li>
</ul>
<ul>
<li>The criminal seemed low tech, but very organized at the same time.<br />
Here is my theory: he probably has a precise goal and is not loosing time.<br />
He follows a process: geo-localize the victim or target a country and choose accordingly financial data in his database.<br />
Then, he purchases stuff from a list of items he needs or he is requested.<br />
Finally, if he could not find a way to maintain access in seconds, he leaves. Mission done: this scammer is probably doing it full time, as a professional activity. Lame but efficient for the crime industry.</li>
</ul>
<ul>
<li>The credit card info was accompanied with private info: real name and address. We all know that but it is always shocking to think how it can easily obtained: compromised computer, hacked online shop or database, dishonest employee (e.g. at the hotel), etc.</li>
</ul>
<ul>
<li>The websites  will probably be used for more scamming and illegal activities. I am going to monitor the domain I got for a while.</li>
</ul>
<p>Keep wired for updates.</p>
]]></content:encoded>
			</item>
		<item>
		<title>SSTIC 2012</title>
		<link>/2012/06/10/sstic-2012.html</link>
		<pubDate>Sun, 10 Jun 2012 05:40:41 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Challenge]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[Defense]]></category>
		<category><![CDATA[Hacking]]></category>
		<category><![CDATA[SSTIC]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1246</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1246</guid>
		<description><![CDATA[I came back from the 2012 edition of SSTIC, where despite the concerns, there were still some nice conferences. Until slides and papers are published, you can find some nice reports (all in French). But the most impressive will remain the challenge: look at the solution! What a hell! Just reading and trying to understand...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2012/06/10/sstic-2012.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>I came back from the 2012 edition of <a title="SSTIC" href="https://www.sstic.org">SSTIC</a>, where despite the concerns, there were still some nice conferences.</p>
<p>Until slides and papers are published, you can find <a title="SSTIC 2012" href="http://sid.rstack.org/blog/index.php/545-sstic-2012-deuxieme-jour">some</a> <a title="SSTIC 2012" href="/2012/04/14/hes-2012.html">nice</a> <a title="SSTIC 2012" href="/2012/04/14/hes-2012.html">reports</a> (all in French). But the most impressive will remain the challenge: look at the <a title="SSTIC 2012" href="http://www.time0ut.org/blog/challenge/challenge-sstic-2012/">solution</a>! What a hell! Just reading and trying to understand all details in the solution is still challenging!</p>
<p>Big respect for the guys who have the talent of going over so many tricks.</p>
]]></content:encoded>
			</item>
		<item>
		<title>HES 2012</title>
		<link>/2012/04/14/hes-2012.html</link>
		<pubDate>Sat, 14 Apr 2012 17:48:10 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[conference]]></category>
		<category><![CDATA[HES]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1173</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1173</guid>
		<description><![CDATA[It has been a long long time since my last post&#8230; I have been very busy, but hopefully I am coming back in the coming months. Just a quick note to tell that I just come back from the Hackito Ergo Sum 2012 (HES). And that was great. All conferences were interesting and the level...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2012/04/14/hes-2012.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>It has been a long long time since my last post&#8230; I have been very busy, but hopefully I am coming back in the coming months.</p>
<p>Just a quick note to tell that I just come back from the <a title="HES 2012" href="http://2012.hackitoergosum.org/blog/schedule/schedule">Hackito Ergo Sum 2012</a> (HES).</p>
<p>And that was great. All conferences were interesting and the level was very high. We could enjoy a lot of new stuff that is going to be discussed in the community during the next months. On top of that, it was really well organized.</p>
<p>So far it is the conference that I enjoyed the most in France. Keep up the good work!</p>
]]></content:encoded>
			</item>
		<item>
		<title>Acquisitions among SIEM actors</title>
		<link>/2011/10/04/acquisitions-among-siem-actors.html</link>
		<pubDate>Tue, 04 Oct 2011 17:14:13 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Arcsight]]></category>
		<category><![CDATA[correlation]]></category>
		<category><![CDATA[Gartner]]></category>
		<category><![CDATA[log]]></category>
		<category><![CDATA[SIEM]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=1167</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=1167</guid>
		<description><![CDATA[The SIEM planet has recently gone crazy. Following the acquisition of the leader, Arcsight, by HP last year, IBM just acquired Q1 Labs&#8230; and Mc Afee, Nitrosecurity ! With RSA and Norton having their own solutions, we know have 5 big players in the arena (see Gartner 2011). This is a good proof that the...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2011/10/04/acquisitions-among-siem-actors.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>The <strong>SIEM</strong> planet has recently gone crazy. Following the acquisition of the leader, <a title="HP to acquire" href="http://www.hp.com/hpinfo/newsroom/press/2010/100913xa.html" target="_blank">Arcsight, by HP</a> last year, <a title="IBM to acquire Q1 Labs" href="http://www.net-security.org/secworld.php?id=11729" target="_blank">IBM just acquired Q1 Labs</a>&#8230; and <a title="Mc Afee to acquire Nitrosecurity" href="http://www.net-security.org/secworld.php?id=11727" target="_blank">Mc Afee, Nitrosecurity</a> !</p>
<p>With RSA and Norton having their own solutions, we know have 5 big players in the arena (see <a title="Gartner Magic Quadrant 2011" href="http://www.arcsight.com/collateral/whitepapers/Gartner_Magic_Quadrant_2011.pdf">Gartner 2011</a>). This is a good proof that the correlation market is growing and that the solutions are getting mature.</p>
]]></content:encoded>
			</item>
		<item>
		<title>A link between Stuxnet and the OpenBSD IPSEC backdoor rumor ?</title>
		<link>/2011/01/16/a-link-between-stuxnet-and-the-openbsd-ipsec-backdoor-rumor.html</link>
		<pubDate>Sun, 16 Jan 2011 22:12:53 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Forensic]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[backdoor]]></category>
		<category><![CDATA[IPSEC]]></category>
		<category><![CDATA[OpenBSD]]></category>
		<category><![CDATA[stuxnet]]></category>
		<category><![CDATA[worm]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=967</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=967</guid>
		<description><![CDATA[Found on Full Disclosure, a weired but troubling connection of two security affairs : the OpenBSD backdoor rumor and the stuxnet worm.]]></description>
				<content:encoded><![CDATA[<p>Found on Full Disclosure, a weired but troubling connection of two security affairs : <a title="OpenBSD backdoor and stuxnet" href="http://extendedsubset.com/?p=43" target="_blank">the OpenBSD backdoor rumor and the stuxnet worm</a>.</p>
]]></content:encoded>
			</item>
		<item>
		<title>Homepage mascotte, here and now !</title>
		<link>/2011/01/16/homepage-mascotte-here-and-now.html</link>
		<pubDate>Sun, 16 Jan 2011 03:28:14 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=955</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=955</guid>
		<description><![CDATA[Well, following a suggestion from my wife, I decided to bring up a mascotte for this website. I admit that it was a lot of fun playing with Gimp and Inkscape, which are really great tools. So please welcome our new little spiky friend : I hope that you have nothing against hedgehogs, which should...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2011/01/16/homepage-mascotte-here-and-now.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>Well, following a suggestion from my wife, I decided to bring up a mascotte for this website.<br />
I admit that it was a lot of fun playing with Gimp and Inkscape, which are really great tools.</p>
<p>So please welcome our new little spiky friend :</p>
<p><img class="aligncenter size-full wp-image-956" title="hello world" src="/wp-content/uploads/2011/01/hello-world.png" alt="" width="266" height="132" /></p>
<p>I hope that you have nothing against hedgehogs, which should be inspiring the security industry !</p>
]]></content:encoded>
			</item>
		<item>
		<title>OpenID rants</title>
		<link>/2010/07/23/openid-rants.html</link>
		<pubDate>Fri, 23 Jul 2010 03:44:37 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Defense]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[OpenID]]></category>
		<category><![CDATA[password]]></category>
		<category><![CDATA[Wordpress]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=877</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=877</guid>
		<description><![CDATA[After I tried to set this blog as my own OpenID provider using the OpenID WordPress plugin, I got a weired error message: &#8220;This is an OpenID Server, Nothing to See Here&#8230; Move Along&#8221; I could not find what as wrong, as all prerequisites were fulfilled, until I find this nice post. The patch there...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2010/07/23/openid-rants.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>After I tried to set this blog as my own OpenID provider using the <a title="OpenID WordPress Plugin" href="http://wordpress.org/extend/plugins/openid/" target="_blank">OpenID WordPress plugin</a>, I got a weired error message:</p>
<p><em>&#8220;This is an OpenID Server, Nothing to See Here&#8230; Move  Along&#8221;</em></p>
<p>I could not find what as wrong, as all prerequisites were fulfilled, until I find this <a title="openID server" href="http://patchlog.com/wordpress/openid-server-on-php-5-3/" target="_blank">nice post</a>. The patch there works very well, thanks to the author (it is a shame that it wasn&#8217;t yet included in the trunk).</p>
<p>This and the lack of active open-source development around OpenID seems to show that it is not really popular. It is a shame because it is a pretty good solution against the multiplication of passwords. I wouldn&#8217;t want to use OpenID for my bank account access, but it is just right for many sites, forums, etc. Unfortunately, no many sites are yet OpenID enabled and the choice when you want to become your own provider is very limited (most of projects listed in the official wiki are dead, with no update for the last 2 years).</p>
]]></content:encoded>
			</item>
		<item>
		<title>Downtimes: a hardware problem</title>
		<link>/2010/04/07/downtimes-a-hardware-problem.html</link>
		<pubDate>Wed, 07 Apr 2010 18:07:24 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[Hardware]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[News]]></category>
		<category><![CDATA[System]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=784</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=784</guid>
		<description><![CDATA[You may have noticed that the site had a lot of downtimes recently. I was having a daily kernel panic and weired file system corruptions, which I first tought were coming from the successive crashes and reboots. However, while it happened again and again and I could not find any good reason for that, I...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2010/04/07/downtimes-a-hardware-problem.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>You may have noticed that the site had a lot of downtimes recently.</p>
<p>I was having a daily kernel panic and weired file system corruptions, which I first tought were coming from the successive crashes and reboots.</p>
<p>However, while it happened again and again and I could not find any good reason for that, I became more doubtful about my hardware and finally found the culprit.<br />
I booted on Memtest, installed with zypper from the repo, which immediately displayed a lot of errors. The tedious task of isolating the faulty memory module revealed that it was one from a Ballistix bundle that I bought just 3 months ago.</p>
<p>I usually use Kingston or Corsair and never had such a problem, but maybe I was just lucky. I will test now the customer service of Ballistix.</p>
]]></content:encoded>
			</item>
		<item>
		<title>My new toy</title>
		<link>/2010/03/16/my-new-tool.html</link>
		<comments>/2010/03/16/my-new-tool.html#comments</comments>
		<pubDate>Tue, 16 Mar 2010 21:16:47 +0000</pubDate>
		<dc:creator><![CDATA[phocean]]></dc:creator>
				<category><![CDATA[News]]></category>

		<guid isPermaLink="false">http://www.phocean.net/?p=751</guid>
		<guid isPermaLink="false">http://www.phocean.net/?p=751</guid>
		<description><![CDATA[No, it is not a computer this time. And yes, it is off topic, but I wanted to thank a Japanese friend for his gift and, at the same time, promote his work : He owns a small company in Hokkaido producing a number of wood toys. He is an artist and designs them, which...<br><i class="icon-right-hand"></i> <span class="read-more"><a href="/2010/03/16/my-new-tool.html">Continue Reading</a></span>]]></description>
				<content:encoded><![CDATA[<p>No, it is not a computer this time. And yes, it is off topic, but I wanted to thank a Japanese friend for his gift and, at the same time, promote his work :</p>
<p style="text-align: center;"><a href="/wp-content/uploads/2010/03/P1020041-320x200.js" /></a></p>
<p>He owns a <a title="Milcar" href="http://www.milcar.js">small company</a> in Hokkaido producing a number of wood toys. He is an artist and designs them, which are all hand made and from the local wood.</p>
<p>In our industrial society, where all toys are made of plastic in chinese factories, it is refreshing to see such authentic and nice wood toys.</p>
<p>So think about it for your kids. His website is only in Japanese for now but if you are interested, drop an e-mail and my friend will certainly answer to you shortly (last link in the <a title="Milcar" href="http://www.milcar.js">menu page</a>).</p>
]]></content:encoded>
			<wfw:commentRss>/2010/03/16/my-new-tool.html/feed</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
	</channel>
</rss>
