[Skunkworks] [kictanet] Cyber Warfare on Kenya or Random Chinese

Kennedy Kairu Kariuki kkairu at gmail.com
Sat Dec 6 21:29:44 EAT 2014


220.191.230.250Netname: JINHUA-GOVERNMENT-NETWORK -
Desc: Jinhua Electronic Government Network

info.jinhua.gov.cn




Kind Regards,

Kennedy KK

Mobile: +254721699119 / +254725292261
Skype: k.kairu
Gtalk: kkairu


On Sat, Dec 6, 2014 at 3:40 PM, njuki inbox via skunkworks <
skunkworks at lists.my.co.ke> wrote:

> Hey Chuks, been reading your blog, does these two posts relate with whats
> going on at Runda?
>
> http://chuksjonia.blogspot.com/2014/10/china-elfs.html
>
>
> http://chuksjonia.blogspot.com/2014/11/new-wave-of-attacks-this-post-is.html
>
>
>
> On Sat, Dec 6, 2014 at 12:30 PM, Gichuki John Chuksjonia via skunkworks <
> skunkworks at lists.my.co.ke> wrote:
>
>> Chinese Cyber Army is always known to go for Telecommunications and
>> Government networks, and due to that we know the main CIA station in
>> Africa is in Nairobi US Embassy and then take the understanding of
>> C4ISR thats used by all Cyber Armies, we all now where this is going,
>> lemmie stop there :D
>>
>> On 12/5/14, Peter Wakaba <peterwakaba at gmail.com> wrote:
>> > STATEMENT FROM CHINESE EMBASSY IN NAIROBI... AFTER MISTAKENLY SENDING
>> OUT A
>> > REPORT BY CHINA DAILY....
>> >
>> > *****
>> > *CORRECTION - THIS IS THE OFFICIAL STATEMENT FROM CHINESE FOREIGN
>> MINISTRY
>> > SPOKESPERSON HUA CHUNYING - THE PREVIOUS INFORMATION IS THE REPORTING BY
>> > CHINA DAILY AND THEREFORE ANYONE WISHING TO USE IT SHOULD QUOTE CHINA
>> > DAILY.*
>> >
>> >
>> > Foreign Ministry Spokesperson Hua Chunying's Regular Press Conference
>> > on December
>> > 5, 2014
>> > 2014/12/05
>> >
>> > *Q: The Kenyan police arrested 77 Chinese people suspected of financial
>> > fraud. Please give us more details on this case and what efforts has
>> China
>> > made.*
>> >
>> > A: We have noted this report. Investigation is still underway and
>> initial
>> > assessment shows that this is likely to be a telecommunication fraud
>> case.
>> > China and Kenya enjoy long-standing friendship, and the Chinese side
>> > resolutely supports the Kenyan side in combating all forms of illegal
>> and
>> > criminal activities. We will actively cooperate with the Kenyan side to
>> > carry out investigation and handle the case in accordance with law.
>> > Meanwhile, we also hope that the Kenyan side can safeguard the
>> legitimate
>> > rights and interests of Chinese citizens being involved and properly
>> deal
>> > with this case in a law-abiding and just way.
>> >
>> > *****
>> >
>> > ALLEGED CHINA DAILY REPORT SENT OUT BY CHINESE EMBASSY ALLEGEDLY BY
>> > MISTAKE:
>> >
>> > (sic)
>> > See attached, Statement by the Chinese Foreign Ministry spokesperson Mrs
>> > Hua Chunying on the 77 arrested communications fraudsters in Nairobi.
>> >
>> > *The Chinese Embassy in Kenya will also release an official statement in
>> > the course of the day.*
>> >
>> > Arrested 77 suspects in Nairobi may be involved in a telecommunication
>> > fraud and China will cooperate with relative parties to break the case,
>> > according to the Foreign Ministry Spokeswoman Hua Chunying.
>> >
>> >
>> >
>> > Hua said China and Kenya enjoy a long-term friendship and China strongly
>> > supports Kenya's efforts on fighting against all kinds of crimes. China
>> > will also collaborate with Kenya to conduct relative investigation and
>> > bring criminals to justice, she said in a regular press conference in
>> > Beijing on Friday.
>> >
>> >
>> >
>> > "We also hope Kenyan authorities could ensure Chinese citizens' lawful
>> > rights, and process this case in a justice and lawful manner," she
>> added.
>> >
>> >
>> >
>> > Earlier this week Kenya police found a large number of unregistered
>> > communication equipments in a villa near the office of United Nations
>> > Environment Programme in its capital city Nairobi, when they were
>> > investigating over a fire that killed one Chinese.
>> >
>> >
>> >
>> > When spotted the equipments and many other suspicious tools in the
>> house,
>> > the police then arrested 77 suspects.
>> >
>> >
>> >
>> > Sources said one of the suspects is a Thailand passport holder and the
>> rest
>> > are from the Chinese mainland and Taiwan.
>> >
>> >
>> >
>> > Tele fraud gang's dens previously were found in various regions and
>> > southeastern Asian countries including Indonesia, Philippine, Vietnam,
>> > Thailand, Laos, Malaysia and Singapore. This case may further signal a
>> > relocation of this kind of crime ring to Africa.
>> >
>> >
>> >
>> > The number of telecommunication fraud cases in China has exceeded
>> 300,000
>> > in 2013, resulting in a loss of more than 10 billion yuan ($1.63
>> billion),
>> > according to Chinese National Congress deputy Chen Weicai.
>> >
>> >
>> >
>> > This kind of crimes mostly targeted at Chinese citizens by calling them
>> to
>> > transfer certain amount of money to designated accounts based on
>> fabricated
>> > reasons and the callers were normally in the name of a public authority,
>> > including police, court, or banks. As the callers' number appeared on
>> the
>> > cell phone was changed to the official number of respective authority by
>> > special technologies, so victims followed their instructions although
>> with
>> > suspicions.
>> >
>> >
>> >
>> > In October, Egypt police unearthed a fraud ring and arrested 96 Chinese
>> > suspects accused of telecommunication fraud. The police said 56 of them
>> are
>> > from the Chinese mainland and the other 40 are from China's Taiwan
>> > province.
>> >
>> >
>> >
>> > In May, police from Fujian province uncovered two fraud gangs. In one
>> case,
>> > a woman surnamed Shi from Shishi city was defrauded over six million
>> yuan.
>> > The woman was called continually since March 30 by people claiming
>> > themselves as officials from post office, public security bureau and
>> > procuratorate. They told Shi that she was suspected to be involved in
>> money
>> > launder and needed to transfer her money to safe accounts.
>> >
>> >
>> >
>> > The police arrested 35 suspects and found the two gangs were based in
>> > Indonesia and Kenya. They carried out the fraud and then drew the money
>> in
>> > Taiwan.
>> >
>> >  ***** ENDS
>> >
>> >
>> >
>> >
>> >
>> >
>> >
>> > *Every morning in Africa, a gazelle wakes up, It knows it must run
>> faster
>> > than the fastest lion or it will be killed. Every morning a lion wakes
>> up,
>> > it knows it must outrun the slowest gazelle or it will starve to death.
>> It
>> > doesn't matter whether you are a gazelle or a lion. When the sun comes
>> up,
>> > you better start running. - In "The World is Flat" by Thomas L.
>> Friedman.*
>> >
>> > On Thu, Dec 4, 2014 at 3:43 PM, Gichuki John Chuksjonia via kictanet <
>> > kictanet at lists.kictanet.or.ke> wrote:
>> >
>> >> Cyberwarfare has changed, a lot over the year. Its not only sitting at
>> >> the
>> >> computer scanning networks and other Commandline stuff. These days
>> Cyber
>> >> Warfare is under the same framework The Defense uses, called C4ISR.
>> This
>> >> also applies to Penetration Testers like me, especially when we are
>> doing
>> >> Black Box Penetration testing. Lemmie give you an example. Earlier this
>> >> year we were doing a Penetration testing in a big firm in Southern
>> >> Africa.
>> >> They had their own VPN between countries and one point of Entry to the
>> >> Internet (They Believed so). So i became a Janitor for one week and
>> then
>> >> i
>> >> went ahead and found out the IT supporting company, and i went on to
>> the
>> >> HQ
>> >> offices pretending to be staff of the IT Company, with business cards
>> and
>> >> other IDs. From there getting into KAV and getting a connect-back
>> Binary
>> >> as
>> >> an AV agent to the whole company was just easy. All machines connected
>> >> with
>> >> a system shell to my CNC.
>> >>
>> >> So, i think with Cyber Warfare, the same applies everywhere, and what
>> we
>> >> should do is be afraid of those Nations that we don't know, what they
>> are
>> >> doing the same.
>> >>
>> >> So what is Cyberwarfare
>> >>
>> >> a) Cyber Espionage
>> >> b) Cyber Terrorism - Cyber-jihad
>> >> c) Cyber Hacktivism
>> >> d) Cyber Sabotage
>> >> e) Information Warfare
>> >> etc etc.
>> >>
>> >>
>> >> On Thu, Dec 4, 2014 at 2:22 PM, Walubengo J <jwalu at yahoo.com> wrote:
>> >>
>> >>> @Chuks,
>> >>>
>> >>> Very interesting development...instead of attracting chinese tourists,
>> >>> we
>> >>> seem to be attracting chinese hackers :-)
>> >>>
>> >>> But on a serious note, i still dont understand WHY they needed to be
>> >>> resident in Kenya in order to execute thier cybercrime when they can
>> do
>> >>> safely  from their homes in China.
>> >>>
>> >>> Or maybe they were sniffing the local airwaves in rich neighbourhoods
>> of
>> >>> Runda for wi-fi passwords - but you dont need a whole battaliion and
>> >>> server
>> >>> room to do that. Very fishy indeed.
>> >>>
>> >>> walu.
>> >>>
>> >>> --------------------------------------------
>> >>> On Thu, 12/4/14, Gichuki John Chuksjonia via kictanet <
>> >>> kictanet at lists.kictanet.or.ke> wrote:
>> >>>
>> >>>  Subject: [kictanet] Fwd: [Security Forum] Fwd: Cyber Warfare on Kenya
>> >>> or       Random Chinese
>> >>>  To: jwalu at yahoo.com
>> >>>  Date: Thursday, December 4, 2014, 11:11 AM
>> >>>
>> >>>  Lemmie patch up this discussion to
>> >>>  the other main mail list, for awareness.
>> >>>
>> >>>  ---------- Forwarded message ----------
>> >>>  From: BRIGHT GAMELI via Security <security at lists.my.co.ke>
>> >>>  Date: Thu, 4 Dec 2014 16:26:26 +0900
>> >>>  Subject: Re: [Security Forum] Fwd: Cyber Warfare on Kenya or
>> >>>  Random Chinese
>> >>>  To: fredrick Wahome <frewah85 at gmail.com>,
>> >>>  "Security Forum All
>> >>>  information security discussions in Africa are done here
>> >>>  (Hacking,
>> >>>  Decryptions, Security management, physical security,
>> >>>  Disastor
>> >>>  Recovery, Security Assessments etc etc)" <security at lists.my.co.ke>
>> >>>
>> >>>  Lets take a look at the strategic positions where these guys
>> >>>  are located.
>> >>>  Well even not much information has been release, a good yagi
>> >>>  antenna can go
>> >>>  really far as an example.
>> >>>
>> >>>  I also think the story will just die down and we will never
>> >>>  hear about it
>> >>>  again.
>> >>>
>> >>>  The government however will need to speed up forensics of
>> >>>  these servers and
>> >>>  all to know what kind of activities were being carried
>> >>>  around. But again, I
>> >>>  highly doubt we will get to know the details.
>> >>>  Another good read here
>> >>>
>> >>>
>> >>>
>> http://www.kahawatungu.com/2014/09/06/chinese-hackers-embarassed-uhuru-usa/
>> >>>
>> >>>  Lets not turn a blind eye to all these before it is too
>> >>>  late.
>> >>>
>> >>>  ~ze3D~
>> >>>
>> >>>
>> >>>  On Thu, Dec 4, 2014 at 3:54 PM, fredrick Wahome via Security
>> >>>  <
>> >>>  security at lists.my.co.ke>
>> >>>  wrote:
>> >>>
>> >>>  > The reason why the government will not allow media into
>> >>>  the rooms to
>> >>>  > capture the real setups....This will be just forgotten
>> >>>  as Kanyaris issue.
>> >>>  > It must be a big operational group with safe havens
>> >>>  spread across the
>> >>>  > country. How I wish the digital government would invest
>> >>>  in cyber
>> >>>  > intelligence. But for now this will remain just a
>> >>>  wish...
>> >>>  >
>> >>>  > On Thu, Dec 4, 2014 at 9:45 AM, John Doe. <agikabia at gmail.com>
>> >>>  wrote:
>> >>>  >
>> >>>  >> As someone commented earlier,most guys on this list
>> >>>  have equipments
>> >>>  >> running in their homes as well.
>> >>>  >> The information being provided is really not clear
>> >>>  on what they were
>> >>>  >> doing.
>> >>>  >> Most likely as fredrick has said and i tend to
>> >>>  agree,this guys were
>> >>>  >> actually up to no good.
>> >>>  >> The question that begs is this.
>> >>>  >> Since our government turned to the East for
>> >>>  Financial Support.loans
>> >>>  >> etc...do you really think China will allow these
>> >>>  guys to be placed behind
>> >>>  >> bars in kenya?
>> >>>  >> Most likely this story will go quiet and not be
>> >>>  remembered.
>> >>>  >> I just tend to imagine how many other places may be
>> >>>  in operation in
>> >>>  >> kenya and even being run by other nationalities.
>> >>>  >>
>> >>>  >> Regards
>> >>>  >> Antony
>> >>>  >>
>> >>>  >> On Thu, Dec 4, 2014 at 9:33 AM, fredrick Wahome via
>> >>>  Security <
>> >>>  >> security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>
>> >>>  >>> I have every reason to believe this is a cyber
>> >>>  espionage by these
>> >>>  >>> Chinese guys. Peeped into some conversation on
>> >>>  IRC with some blackhats in
>> >>>  >>> 2012 and they mentioned something like Chinese
>> >>>  CyberSpy ring operating in
>> >>>  >>> Nairobi. However they are spying all over
>> >>>  Africa with Runda being one of
>> >>>  >>> their safe house. But as obvious if you try to
>> >>>  alert the government the
>> >>>  >>> Ruaraka boys will actually start investigating
>> >>>  you
>> >>>  >>>
>> >>>  >>> On Thu, Dec 4, 2014 at 9:08 AM, Adam Nelson via
>> >>>  Security <
>> >>>  >>> security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>>
>> >>>  >>>> The reporting and statements by GoK are
>> >>>  still too vague to understand
>> >>>  >>>> what actually happened.  Half the
>> >>>  people on this list have network
>> >>>  >>>> equipment and servers in their house.
>> >>>  And if you were running a serious
>> >>>  >>>> cybercrime syndicate in a house, you don't
>> >>>  need dozens of people to do it.
>> >>>  >>>>
>> >>>  >>>> --
>> >>>  >>>> Kili - Cloud for Africa: kili.io
>> >>>  >>>> Musings: twitter.com/varud <https://twitter.com/varud>
>> >>>  >>>> More Musings: varud.com
>> >>>  >>>> About Adam:
>> >>>  www.linkedin.com/in/adamcnelson
>> >>>  >>>>
>> >>>  >>>> On Thu, Dec 4, 2014 at 7:25 AM, Mark
>> >>>  Kipyegon via Security <
>> >>>  >>>> security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>>>
>> >>>  >>>>> A more recent news report now claims
>> >>>  the group is being charged in
>> >>>  >>>>> court with illegally operating a radio
>> >>>  station. The same report then links
>> >>>  >>>>> this "cyber-crime command centre" to
>> >>>  hacking facebook accounts, mpesa
>> >>>  >>>>> fraud, card theft and bizarrely,
>> >>>  "Police said the Chinese were preparing to
>> >>>  >>>>> raid the country's communication
>> >>>  systems".
>> >>>  >>>>>
>> >>>  >>>>> Would anyone have more usable
>> >>>  information on this?
>> >>>  >>>>>
>> >>>  >>>>> --
>> >>>  >>>>> Mark.
>> >>>  >>>>>
>> >>>  >>>>> On 2 Dec 2014, at 14:20, "Almerindo
>> >>>  Graziano via Security" <
>> >>>  >>>>> security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>>>>
>> >>>  >>>>> the entire country is welcoming
>> >>>  supplies and services from China
>> >>>  >>>>> across the ENTIRE critical
>> >>>  infrastructure..That worries me more in terms of
>> >>>  >>>>> cyber warfare. No need of backdoor when
>> >>>  you are let in through the front
>> >>>  >>>>> door :-)
>> >>>  >>>>>
>> >>>  >>>>> Hence I seriously doubt the news is
>> >>>  related to cyber warfare
>> >>>  >>>>> Al
>> >>>  >>>>>
>> >>>  >>>>> On 02/12/2014 14:07, Adam Nelson via
>> >>>  Security wrote:
>> >>>  >>>>>
>> >>>  >>>>> And it might just be that these guys
>> >>>  are working on an oilfield in
>> >>>  >>>>> Turkana and have VHF radios and Runda
>> >>>  is their HQ and they simply didn't
>> >>>  >>>>> have the correct visas.
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  >>>>>   --
>> >>>  >>>>> Kili - Cloud for Africa: kili.io
>> >>>  >>>>>  Musings: twitter.com/varud <https://twitter.com/varud>
>> >>>  >>>>> More Musings: varud.com
>> >>>  >>>>> About Adam:
>> >>>  www.linkedin.com/in/adamcnelson
>> >>>  >>>>>
>> >>>  >>>>> On Tue, Dec 2, 2014 at 1:30 PM, Robin
>> >>>  Wood via Security <
>> >>>  >>>>> security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>>>>
>> >>>  >>>>>> On 2 December 2014 at 10:28,
>> >>>  Gichuki John Chuksjonia via Security
>> >>>  >>>>>> <security at lists.my.co.ke>
>> >>>  wrote:
>> >>>  >>>>>> > Cyber Warfare is real
>> >>>  >>>>>>
>> >>>  >>>>>> I would agree that Cyber Warefare
>> >>>  is real but would say that this is
>> >>>  >>>>>> possibly more like normal
>> >>>  criminality than warfare.
>> >>>  >>>>>>
>> >>>  >>>>>> Robin
>> >>>  >>>>>>
>> >>>  >>>>>>
>> >>>  >>>>>> > ---------- Forwarded message
>> >>>  ----------
>> >>>  >>>>>> > From: BRIGHT GAMELI via
>> >>>  Security <security at lists.my.co.ke>
>> >>>  >>>>>> > Date: Tue, 2 Dec 2014 17:57:00
>> >>>  +0900
>> >>>  >>>>>> > Subject: [Security Forum]
>> >>>  Cyber Warfare on Kenya or Random Chinese
>> >>>  >>>>>> > To: "Security Forum All
>> >>>  information security discussions in Africa
>> >>>  >>>>>> are
>> >>>  >>>>>> > done here (Hacking,
>> >>>  Decryptions, Security management, physical
>> >>>  >>>>>> > security, Disastor Recovery,
>> >>>  Security Assessments etc etc)"
>> >>>  >>>>>> > <security at lists.my.co.ke>
>> >>>  >>>>>> >
>> >>>  >>>>>> > Should we start to say Cyber
>> >>>  Warfare is real on Kenya or just brush
>> >>>  >>>>>> this
>> >>>  >>>>>> > off as another random
>> >>>  happenings in Runda.
>> >>>  >>>>>> >
>> >>>  >>>>>> >
>> >>>  >>>>>> >
>> >>>  >>>>>>
>> >>>
>> http://www.trending.co.ke/police-arrest-36-chinese-natio-852390307.html
>> >>>  >>>>>> >
>> >>>  >>>>>> > ~ze3D~
>> >>>  >>>>>> >
>> >>>  >>>>>> >
>> >>>  >>>>>> >
>> >>>  >>>>>> > --
>> >>>  >>>>>> > --
>> >>>  >>>>>> > Gichuki John Ndirangu, C.E.H ,
>> >>>  C.P.T.P, O.S.C.P
>> >>>  >>>>>> > I.T Security Analyst and
>> >>>  Penetration Tester
>> >>>  >>>>>> > jgichuki at inbox d0t com
>> >>>  >>>>>> >
>> >>>  >>>>>> > {FORUM}http://lists.my.co.ke/pipermail/security/
>> >>>  >>>>>> > http://chuksjonia.blogspot.com/
>> >>>  >>>>>> >
>> >>>  >>>>>> >
>> >>>  _______________________________________________
>> >>>  >>>>>>  > Security mailing list
>> >>>  >>>>>> > Security at lists.my.co.ke
>> >>>  >>>>>> > http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>>>
>> >>>  >>>>>>
>> >>>  _______________________________________________
>> >>>  >>>>>> Security mailing list
>> >>>  >>>>>> Security at lists.my.co.ke
>> >>>  >>>>>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>>>
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  _______________________________________________
>> >>>  >>>>> Security mailing listSecurity at lists.my.co.kehttp://
>> >>> lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  _______________________________________________
>> >>>  >>>>> Security mailing list
>> >>>  >>>>> Security at lists.my.co.ke
>> >>>  >>>>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  >>>>>
>> >>>  _______________________________________________
>> >>>  >>>>> Security mailing list
>> >>>  >>>>> Security at lists.my.co.ke
>> >>>  >>>>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>>
>> >>>  >>>>
>> >>>  >>>>
>> >>>  >>>>
>> >>>  _______________________________________________
>> >>>  >>>> Security mailing list
>> >>>  >>>> Security at lists.my.co.ke
>> >>>  >>>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>> --
>> >>>  >>> Kind Regards;
>> >>>  >>>
>> >>>  >>> ------------------------------------------
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  >>> *Fredrick Wahome Ndung'uTeam LeaderSecunets
>> >>>  TechnologiesWebsite:
>> >>>  >>> www.secunets.co.ke <http://www.secunets.com>Cell: +254725264890
>> >>>  >>> <%2B254725264890>Email: fred at secunets.co.ke
>> >>>  <fred at secunets.com>Experts
>> >>>  in:
>> >>>  >>> Web 2.0 Applications, Domain Registration, Web
>> >>>  Hosting, Information
>> >>>  >>> Security, Linux Applications, Computer Forensic
>> >>>  & I.C.T Consultancy."Secure
>> >>>  >>> Business Technology"*
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>
>> >>>
>> >>>
>> -------------------------------------------------------------------------------
>> >>>  >>> *SECUNETS TECHNOLOGIES DISCLAIMER:*
>> >>>  >>>
>> >>>  >>> This email message and any file(s) transmitted
>> >>>  with it is intended
>> >>>  >>> solely for the individual or entity to whom it
>> >>>  is addressed and may contain
>> >>>  >>> confidential and/or legally privileged
>> >>>  information which confidentiality
>> >>>  >>> and/or privilege is not lost or waived by
>> >>>  reason of mistaken transmission.
>> >>>  >>> If you have received this message by error you
>> >>>  are not authorized to view
>> >>>  >>> disseminate distribute or copy the message
>> >>>  without the written consent of
>> >>>  >>> Secunets Technologies and are requested to
>> >>>  contact the sender by telephone
>> >>>  >>> or e-mail and destroy the original. Although
>> >>>  Secunets Technologies takes
>> >>>  >>> all reasonable precautions to ensure that this
>> >>>  message and any file
>> >>>  >>> transmitted with it is virus free, Secunets
>> >>>  Technologies accepts no
>> >>>  >>> liability for any damage that may be caused by
>> >>>  any virus transmitted by
>> >>>  >>> this email.
>> >>>  >>>
>> >>>  >>>
>> >>>  >>>
>> >>>  _______________________________________________
>> >>>  >>> Security mailing list
>> >>>  >>> Security at lists.my.co.ke
>> >>>  >>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >>>
>> >>>  >>
>> >>>  >>
>> >>>  >
>> >>>  >
>> >>>  > --
>> >>>  > Kind Regards;
>> >>>  >
>> >>>  > ------------------------------------------
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>  > *Fredrick Wahome Ndung'uTeam LeaderSecunets
>> >>>  TechnologiesWebsite:
>> >>>  > www.secunets.co.ke <http://www.secunets.com>Cell: +254725264890
>> >>>  > <%2B254725264890>Email: fred at secunets.co.ke
>> >>>  <fred at secunets.com>Experts
>> >>>  in:
>> >>>  > Web 2.0 Applications, Domain Registration, Web Hosting,
>> >>>  Information
>> >>>  > Security, Linux Applications, Computer Forensic &
>> >>>  I.C.T Consultancy."Secure
>> >>>  > Business Technology"*
>> >>>  >
>> >>>  >
>> >>>  >
>> >>>
>> >>>
>> >>>
>> -------------------------------------------------------------------------------
>> >>>  > *SECUNETS TECHNOLOGIES DISCLAIMER:*
>> >>>  >
>> >>>  > This email message and any file(s) transmitted with it
>> >>>  is intended solely
>> >>>  > for the individual or entity to whom it is addressed
>> >>>  and may contain
>> >>>  > confidential and/or legally privileged information
>> >>>  which confidentiality
>> >>>  > and/or privilege is not lost or waived by reason of
>> >>>  mistaken transmission.
>> >>>  > If you have received this message by error you are not
>> >>>  authorized to view
>> >>>  > disseminate distribute or copy the message without the
>> >>>  written consent of
>> >>>  > Secunets Technologies and are requested to contact the
>> >>>  sender by telephone
>> >>>  > or e-mail and destroy the original. Although Secunets
>> >>>  Technologies takes
>> >>>  > all reasonable precautions to ensure that this message
>> >>>  and any file
>> >>>  > transmitted with it is virus free, Secunets
>> >>>  Technologies accepts no
>> >>>  > liability for any damage that may be caused by any
>> >>>  virus transmitted by
>> >>>  > this email.
>> >>>  >
>> >>>  >
>> >>>  > _______________________________________________
>> >>>  > Security mailing list
>> >>>  > Security at lists.my.co.ke
>> >>>  > http://lists.my.co.ke/cgi-bin/mailman/listinfo/security
>> >>>  >
>> >>>
>> >>>
>> >>>
>> >>>  --
>> >>>  --
>> >>>  Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
>> >>>  I.T Security Analyst and Penetration Tester
>> >>>  jgichuki at inbox d0t com
>> >>>
>> >>>  {FORUM}http://lists.my.co.ke/pipermail/security/
>> >>>  http://chuksjonia.blogspot.com/
>> >>>
>> >>>  _______________________________________________
>> >>>  kictanet mailing list
>> >>>  kictanet at lists.kictanet.or.ke
>> >>>  https://lists.kictanet.or.ke/mailman/listinfo/kictanet
>> >>>
>> >>>  Unsubscribe or change your options at
>> >>>
>> https://lists.kictanet.or.ke/mailman/options/kictanet/jwalu%40yahoo.com
>> >>>
>> >>>  The Kenya ICT Action Network (KICTANet) is a
>> >>>  multi-stakeholder platform for people and institutions
>> >>>  interested and involved in ICT policy and regulation. The
>> >>>  network aims to act as a catalyst for reform in the ICT
>> >>>  sector in support of the national aim of ICT enabled growth
>> >>>  and development.
>> >>>
>> >>>  KICTANetiquette : Adhere to the same standards of acceptable
>> >>>  behaviors online that you follow in real life: respect
>> >>>  people's times and bandwidth, share knowledge, don't flame
>> >>>  or abuse or personalize, respect privacy, do not spam, do
>> >>>  not market your wares or qualifications.
>> >>>
>> >>>
>> >>
>> >>
>> >> --
>> >> --
>> >> Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
>> >> I.T Security Analyst and Penetration Tester
>> >> jgichuki at inbox d0t com
>> >>
>> >> {FORUM}http://lists.my.co.ke/pipermail/security/
>> >> http://chuksjonia.blogspot.com/
>> >>
>> >>
>> >>
>> >>
>> >>
>> >> _______________________________________________
>> >> kictanet mailing list
>> >> kictanet at lists.kictanet.or.ke
>> >> https://lists.kictanet.or.ke/mailman/listinfo/kictanet
>> >>
>> >> Unsubscribe or change your options at
>> >>
>> https://lists.kictanet.or.ke/mailman/options/kictanet/peterwakaba%40gmail.com
>> >>
>> >> The Kenya ICT Action Network (KICTANet) is a multi-stakeholder platform
>> >> for people and institutions interested and involved in ICT policy and
>> >> regulation. The network aims to act as a catalyst for reform in the ICT
>> >> sector in support of the national aim of ICT enabled growth and
>> >> development.
>> >>
>> >> KICTANetiquette : Adhere to the same standards of acceptable behaviors
>> >> online that you follow in real life: respect people's times and
>> >> bandwidth,
>> >> share knowledge, don't flame or abuse or personalize, respect privacy,
>> do
>> >> not spam, do not market your wares or qualifications.
>> >>
>> >
>>
>>
>> --
>> --
>> Gichuki John Ndirangu, C.E.H , C.P.T.P, O.S.C.P
>> I.T Security Analyst and Penetration Tester
>> jgichuki at inbox d0t com
>>
>> {FORUM}http://lists.my.co.ke/pipermail/security/
>> http://chuksjonia.blogspot.com/
>>
>> _______________________________________________
>> skunkworks mailing list
>> skunkworks at lists.my.co.ke
>> ------------
>> List info, subscribe/unsubscribe
>> http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
>> ------------
>>
>> Skunkworks Rules
>> http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
>> ------------
>> Other services @ http://my.co.ke
>>
>
>
> _______________________________________________
> skunkworks mailing list
> skunkworks at lists.my.co.ke
> ------------
> List info, subscribe/unsubscribe
> http://lists.my.co.ke/cgi-bin/mailman/listinfo/skunkworks
> ------------
>
> Skunkworks Rules
> http://my.co.ke/phpbb/viewtopic.php?f=24&t=94
> ------------
> Other services @ http://my.co.ke
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.my.co.ke/pipermail/skunkworks/attachments/20141206/af183227/attachment.html>


More information about the skunkworks mailing list