<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: North Korea&#8217;s Chinese IP addresses</title>
	<atom:link href="https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/</link>
	<description></description>
	<lastBuildDate>Tue, 30 Dec 2014 17:09:06 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=4.1</generator>
	<item>
		<title>By: Peter</title>
		<link>https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/#comment-50137</link>
		<dc:creator><![CDATA[Peter]]></dc:creator>
		<pubDate>Tue, 16 Apr 2013 07:16:50 +0000</pubDate>
		<guid isPermaLink="false">http://www.northkoreatech.org/?p=1861#comment-50137</guid>
		<description><![CDATA[Year&#039;s ago I was the target of an Attack named &quot;I love You &quot; I was using Black Ice Defender.  An Active Firewall that not only blocked but reverse raced the attack. I was using Windows 98 and at least one year post its  release. This hack was successful in scamming $600 million from US institute&#039;s but was stopped a few days after I had my own attack a probable attempt to turn my computer into a Zombie. All prior knowledge of the origin was South West China North of the Philippine Islands  The origin of this was  manila and the IP returned in my trace was that of Manila.  I did have that data            within a split second of being  attacked. Black Ice Was able to penetrate the Spoof software used and Find not only the IP but the Mac addresses of al of the Computers linked to the Router at the time of the attack. For some reason Active Firewalls were made illegal as an infringement of privacy. Any computer in the act of sending at that time  had to have its defences DOWN and I was able to obtain such data It should be logical to use an advanced Active Firewall . We need to be able to penetrate the Software used to HIDE IP addresses. its on the computer itself. Such software can be purchased for $29 to 39  on the net Legally. time to alter the laws to enable us to respond and perhaps shut these Dweebs down.]]></description>
		<content:encoded><![CDATA[<p>Year&#8217;s ago I was the target of an Attack named &#8220;I love You &#8221; I was using Black Ice Defender.  An Active Firewall that not only blocked but reverse raced the attack. I was using Windows 98 and at least one year post its  release. This hack was successful in scamming $600 million from US institute&#8217;s but was stopped a few days after I had my own attack a probable attempt to turn my computer into a Zombie. All prior knowledge of the origin was South West China North of the Philippine Islands  The origin of this was  manila and the IP returned in my trace was that of Manila.  I did have that data            within a split second of being  attacked. Black Ice Was able to penetrate the Spoof software used and Find not only the IP but the Mac addresses of al of the Computers linked to the Router at the time of the attack. For some reason Active Firewalls were made illegal as an infringement of privacy. Any computer in the act of sending at that time  had to have its defences DOWN and I was able to obtain such data It should be logical to use an advanced Active Firewall . We need to be able to penetrate the Software used to HIDE IP addresses. its on the computer itself. Such software can be purchased for $29 to 39  on the net Legally. time to alter the laws to enable us to respond and perhaps shut these Dweebs down.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Malware Attacks on Korean News Websites &#124; The Peninsula</title>
		<link>https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/#comment-10383</link>
		<dc:creator><![CDATA[Malware Attacks on Korean News Websites &#124; The Peninsula]]></dc:creator>
		<pubDate>Tue, 03 Apr 2012 15:55:05 +0000</pubDate>
		<guid isPermaLink="false">http://www.northkoreatech.org/?p=1861#comment-10383</guid>
		<description><![CDATA[[...] much of North Korea’s own internet infrastructure goes through China, and there are reports that there are batches of Chinese IP addresses owned specifically by North Korean entities.  And [...]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] much of North Korea’s own internet infrastructure goes through China, and there are reports that there are batches of Chinese IP addresses owned specifically by North Korean entities.  And [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: North Korea, why too many see it as a cyber threat? &#124; Security Affairs</title>
		<link>https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/#comment-6214</link>
		<dc:creator><![CDATA[North Korea, why too many see it as a cyber threat? &#124; Security Affairs]]></dc:creator>
		<pubDate>Tue, 10 Jan 2012 06:55:34 +0000</pubDate>
		<guid isPermaLink="false">http://www.northkoreatech.org/?p=1861#comment-6214</guid>
		<description><![CDATA[[...] According North Korea’s Chinese IP addresses blog the first is a block of 1,024 addresses that was put into use in 2010 by Star Joint Venture, the Internet service provider venture between the state-run Korea Posts and Telecommunications Co. and Thailand’s Loxley Pacific. This is used to house all the official North Korean websites, such as KCNA, Naenara, the Voice of Korea, and Rodong Sinmun. Computers in North Korea capable of accessing the global Internet, such as those owned by resident foreigners, also use addresses in this range. [...]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] According North Korea’s Chinese IP addresses blog the first is a block of 1,024 addresses that was put into use in 2010 by Star Joint Venture, the Internet service provider venture between the state-run Korea Posts and Telecommunications Co. and Thailand’s Loxley Pacific. This is used to house all the official North Korean websites, such as KCNA, Naenara, the Voice of Korea, and Rodong Sinmun. Computers in North Korea capable of accessing the global Internet, such as those owned by resident foreigners, also use addresses in this range. [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: North Korea&#8211;a (brief) month in review. Regular updates to resume! &#187; Opening Up North Korea</title>
		<link>https://www.northkoreatech.org/2011/06/26/north-koreas-chinese-ip-addresses/#comment-1206</link>
		<dc:creator><![CDATA[North Korea&#8211;a (brief) month in review. Regular updates to resume! &#187; Opening Up North Korea]]></dc:creator>
		<pubDate>Wed, 29 Jun 2011 20:53:21 +0000</pubDate>
		<guid isPermaLink="false">http://www.northkoreatech.org/?p=1861#comment-1206</guid>
		<description><![CDATA[[...] amazing (and pleasantly niche) blog North Korea Tech has an interesting piece detailing North Korea’s IP address blocks managed in Thailand and China. [...]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] amazing (and pleasantly niche) blog North Korea Tech has an interesting piece detailing North Korea’s IP address blocks managed in Thailand and China. [&#8230;]</p>
]]></content:encoded>
	</item>
</channel>
</rss>
