Binary code – Canttot http://canttot.com/ Wed, 23 Nov 2022 02:20:25 +0000 en-US hourly 1 https://wordpress.org/?v=5.9.3 https://canttot.com/wp-content/uploads/2021/07/cropped-icon-32x32.png Binary code – Canttot http://canttot.com/ 32 32 Virginia Set to Reverse Rights for Trans Students in Public Schools https://canttot.com/virginia-set-to-reverse-rights-for-trans-students-in-public-schools/ Wed, 23 Nov 2022 00:37:58 +0000 https://canttot.com/virginia-set-to-reverse-rights-for-trans-students-in-public-schools/ Christiansburg, Virginia — The mass shooting at a club in Colorado Springs, Colorado, reignited concerns in the LGBTQ community about safety and discrimination. More than half of US states have little or no protections for transgender people, and as early as next week Virginia could roll back its limited public school rights. The administration of […]]]>

Christiansburg, Virginia — The mass shooting at a club in Colorado Springs, Colorado, reignited concerns in the LGBTQ community about safety and discrimination. More than half of US states have little or no protections for transgender people, and as early as next week Virginia could roll back its limited public school rights.

The administration of Republican Governor Glenn Youngkin has proposed a new policy which offers protections against discrimination and bullying, but would require parental permission to change a name or pronoun at school. It would also require students to use bathrooms that match their birth-assigned sex, except as required by federal law.

The shift to rollback policies implemented under former Virginia Governor, Democrat Ralph Northam, has led to heated public debate, sparking more 71,000 comments during the public comment period.

Dozens of speakers also spoke at an hour-long meeting of the Virginia Board of Education on October 20.

Sarah Via, among the parents present, says the new policy strengthens parental rights.

“You can’t have good quality education or mental health by excluding the parent from the process,” she said.

Opponents of Youngkin’s proposal argue that schools have become safe spaces for transgender students and that the new policy would put that at risk.

“Now our teachers, principals, counselors are getting the training and information they need to welcome kids like Bettie,” said Courtney Thomas, whose 11-year-old Bettie Thomas identifies as no binary and uses the pronunciation “zie” and “zir”.

Bettie said the children’s book “I am Jazz,” which tells the story of a transgender child, sparked conversation about gender when Bettie was 7.

Bettie described it as a “breakthrough” after years of “utter anger” and “confusion”.

“As soon as Bettie had words to describe how she felt, she was able to start moving towards a more authentic life,” Courtney said.

Courtney said the accommodating school policies allowed Bettie to thrive in the classroom, as well as at home.

“This decision I made has changed my life so much,” Bettie said.

The Thomas family is especially worried about the students who do not have the support of their parents.

The new policy will not go into effect until approved and finalized by the state superintendent, according to a spokesperson for the Virginia Department of Education.

While Virginia’s state code requires school districts to enforce Commonwealth school policies, there is no enforcement mechanism, which means some schools may choose not to comply.

Iran expands uranium enrichment program

McCarthy calls on DHS secretary to resign, threatens impeachment

Father and son make Ironman a team sport

]]>
Venus Ransomware | Zeoticus spin-off shows sophistication isn’t necessary for success https://canttot.com/venus-ransomware-zeoticus-spin-off-shows-sophistication-isnt-necessary-for-success/ Wed, 16 Nov 2022 15:31:39 +0000 https://canttot.com/venus-ransomware-zeoticus-spin-off-shows-sophistication-isnt-necessary-for-success/ Venus ransomware has been launching data encryption attacks across the globe since at least August 2022. Last week, the Healthcare Industry Cybersecurity Coordination Center released a advisory stating that at least one healthcare entity in the United States had fallen victim to Venus ransomware, prompting broader warnings for healthcare and other organizations to be on […]]]>

Venus ransomware has been launching data encryption attacks across the globe since at least August 2022. Last week, the Healthcare Industry Cybersecurity Coordination Center released a advisory stating that at least one healthcare entity in the United States had fallen victim to Venus ransomware, prompting broader warnings for healthcare and other organizations to be on their guard.

In this blog post, we provide further analysis, indicators of compromise and TTPs associated with Venus ransomware to help organizations and security teams better understand and defend against this threat.

Insight

Venus ransomware, also known as Goodgame, has been attracting attention since August 2022 and related samples have been known since at least mid-2021. There are enough markers and other metadata present in the Venus samples to suggest a genealogy with Zeoticus ransomwarewhich dates back to the beginning of 2020.

Venus ransomware is in the tradition of what might now be called the “legacy ransomware” model: a file locker sold on underground markets as a standalone package rather than on a subscription or “ransomware-as-a-service” model. The package includes a compiled binary and access to decryptors. Unlike more modern data extortion schemesthere are no public data leak sites or double extortion methods known to be associated with Venus ransomware operators at this time.

Underground advertisements offering Venus ransomware for sale started appearing in May 2022.

Venus ransomware forum advertisement

Translated, the message displayed in the image above reads “We are looking for pentesters”, a common euphemism for ransomware following a crackdown on open ransomware discussions in many forums after some high level attacks bring unwanted attention.

Aside from HC3’s warning last week about a healthcare organization being compromised by Venus ransomware operators, there is little indication that the targets are industry or sector specific. The initial access would be publicly exposed and vulnerable Remote Desktop Protocol (RDP) services, a common weakness in many types of organizations, regardless of industry or sector. Cybercriminals discover these vulnerable RDP services through tools such as Shodan, direct scanning, COTS/open source tools, or by purchasing access from a Initial Access Broker.

Venus Ransomware | Technical analysis

Upon launch, Venus ransomware samples will spawn a User Access Control (UAC) prompt in an effort to elevate privileges before continuing execution.

Venus ransomware elevates privileges UAC dialog

Subsequently, the malware launches a child process with the following syntax:

file.exe g g g o n e123

In common with Zeoticusthe ransomware then uses the ping to get a delay before dropping its own first-stage binary and hiding the console window from victims.

/c ping localhost -n 3 > nul & del C:Users[user]Desktopfile.exe

After this step, a list of hard-coded processes is compared against what is running on the target and all applicable processes are terminated via taskkill.exe. A full list of targeted processes mirrors the hard-coded list found in the Zeoticus samples.

agntsvc.exe
agntsvc.exe
agntsvc.exe
agntsvc.exe
dbeng50.exe
dbsnmp.exe
encsvc.exe
excel.exe
firefoxconfig.exe
infopath.exe
isqlplussvc.exe
msaccess.exe
mspub.exe
mydesktopqos.exe
mydesktopservice.exe
mysqld-nt.exe
mysqld-opt.exe
mysqld.exe
ocautoupds.exe
ocomm.exe
ocssd.exe
onenote.exe
oracle.exe
outlook.exe
powerpnt.exe
sqbcoreservice.exe
sqlagent.exe
sqlbrowser.exe
sqlservr.exe
sqlservr.exe
sqlwriter.exe
synctime.exe
tbirdconfig.exe
thebat64.exe
thunderbird.exe
winword.exe
wordpad.exe
xfssvccon.exe

Persistence is achieved by adding an entry for the ransomware payload in the registry (Windows execution key). For instance:

Write Value HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionRun352.exe

Once encrypted, the affected files will be appended with the .venus extension. Note that .TXT files are not always encrypted by Venus ransomware.

The malware also changes the icons of encrypted files with an image written on %Windir% in the early stages of execution. The user’s wallpaper is also replaced with a .jpg picture written to %temp%. Both are given filenames with a regex-compliant 20-char random string d{20}for example:

  • 16773516481972502376.jpg
  • 34004731821972527219.jpg
  • 28604229151972527219.jpg

After all files have been processed, the malware uses registry editing to change the desktop background.

REGISTRYUSER[USERIDENTIFIER]Control PanelDesktopWallpaper = "C:Users[user]AppDataLocalTemp\[20char string)].jpg"

Encrypted Venus ransomware file

Once the desktop wallpaper is updated, the ransom note is displayed for the user. The ransom note is a .HTA file written in the same way %temp% with a string of 20 digits for the file name.

Venus ransomware ransom note

During execution, the malware attempts basic local discovery, such as finding the machine name and operating system. Venus ransomware traverses network shares available via NetShareEnum and wNetOpenEnum.

Some variants of Venus will use WMI to query or redirect services and additional system details. The following command is the one launched by the Venus ransomware:

wmi - start iwbemservices::execquery - rootcimv2 : select __path, processid, csname, caption, sessionid, threadcount, workingsetsize, kernelmodetime, usermodetime, parentprocessid from win32_process where ( caption = "msftesql.exe" or caption = "sqlagent.exe" or caption = "sqlbrowser.exe" or caption = "sqlservr.exe" or caption = "sqlwriter.exe" or caption = "oracle.exe" or caption = "ocssd.exe" or caption = "dbsnmp.exe" or caption = "synctime.exe" or caption = "mydesktopqos.exe" or caption = "agntsvc.exe" or caption = "isqlplussvc.exe" or caption = "xfssvccon.exe" or caption = "mydesktopservice.exe" or caption = "ocautoupds.exe" or caption = "agntsvc.exe" or caption = "agntsvc.exe" or caption = "agntsvc.exe" or caption = "encsvc.exe" or caption = "firefoxconfig.exe" or caption = "tbirdconfig.exe" or caption = "ocomm.exe" or caption = "mysqld.exe" or caption = "mysqld-nt.exe" or caption = "mysqld-opt.exe" or caption = "dbeng50.exe" or caption = "sqbcoreservice.exe" or caption = "excel.exe" or caption = "infopath.exe" or caption = "msaccess.exe" or caption = "mspub.exe" or caption = "onenote.exe" or caption = "outlook.exe" or caption = "powerpnt.exe" or caption = "sqlservr.exe" or caption = "thebat64.exe" or caption = "thunderbird.exe" or caption = "winword.exe" or caption = "wordpad.exe")

Additionally, the following commands are commonly used in Venus variants to inhibit or disable system recovery and backup systems.

vdsldr.exe -Embedding
cmd.exe (wbadmin.exe) delete shadows /all /quiet && bcdedit.exe /set {current} nx AlwaysOff && wmic SHADOWCOPY DELETE
wbadmin.exe delete catalog -quiet
vssadmin.exe delete shadows /all /quiet
mshta.exe [name].hta) - "C:Users[user]AppDataLocalTemp16773516481972502376.hta" {xxxxxxxxx-F1C3-4B2E-88BF-xxxxxxxxxx}{1E460BD7-F1C3-4B2E-88BF-xxxxxxxxxx}
WMIC.exe  SHADOWCOPY DELETE
bcdedit.exe /set {current} nx AlwaysOff

Connecting Venus Ransomware to Zeoticus

Like Zeoticus, Venus asks users to contact via email and TOX in order to engage with ransomware operators and does not use C2 servers for data exfiltration or backdoors.

As noted above, there are some code similarities between how Zeoticus and Venus use the ping ordered.

Zeoticus ransomware
Zeoticus ransomware
Venus ransomware
Venus ransomware

Also note how the p r i v e t2 marker in Zeoticus is paralleled by the g g g o n e123 marker in Venus.

The command-line syntax for persistence, termination tasks, and various “housekeeping” tasks between the two families is nearly identical, and both malware families hard-code the same list of processes to target for malware. ‘stop.

Like Venus, Zeoticus is also offered as a full standalone package rather than RaaS and is not bundled with a leak site.

Ransom notes and desktop backgrounds have similar stylistic connotations, and both malware variants write copies to mounted recovery volumes.

Neither family is particularly sophisticated and both use hard-coded strings in the malware without any attempt at obfuscation or anti-analysis.

SentinelOne protects against Venus Ransomware

SentinelOne Singularity™ Detects and fully prevents payloads, behaviors and artifacts associated with Venus and Zeoticus ransomware families.

Conclusion

Organizations are right to be concerned about the increased activity of this ransomware variant. As long as organizations leave vulnerable RDP services exposed to the public internet or fail to protect endpoints with a reliable next-generation security solution, attackers don’t need to invest resources in software. sophisticated malware. Venus ransomware may not specifically target healthcare organizations, but utility and critical infrastructure organizations may be symptomatic of those most in need of upping their game against such threats.

Indicators of Compromise

SHA1
026ce3bceb3a82452f0fc38c0b9abfa90f2c9d87
06757be6174bdc9ef8fe899bcbe5e6e5547dc059
0d0bbcecc80ea3b1712678b24ba925ac2903531f
102b8625e5662c89efe4547dc2cb173be8b08851
10f2ed474a9e0065fed2afebbfe81dc596f46542
13315ee0ba756ac3e7edf2b9a4028b7649ece754
1482e7fdbab29c3e8a2f3ccd1c6ddd48a54c06b0
14d031138fb0aad2432cadf2e0d241ca75b2dfbb
1970f6c17567d56c3e7840fe33a6959dd887fca2
1992336a5d752187c979e24a95a871d8932ade6d
1cb7e2ab7012990bd5051120c3ef8a438035aa88
1fb9b8115d74cf38d6a90b9049c73ea6eb743643
326dc3ca63d10968054153305a9564fac2a37ba3
5166d17d8e9a91a3a36b5edaf168699b03bb13de
5d1229ece791a55823f60298cb7dcf9c0494f3ee
62383813a6ca85fc9c70051c361e0273e135593d
6bf35f44a2267755c2646c89c836bd618c4e964c
6e530c9a3eddabc29c2f8f6aca6c6f786ae052d6
7f4bcc7d13bf3ebab836a770718cc8273470d660
7f8cd9947f9c2bddd9586868c181b4c6a86f10a5
88433f6f33d7b81178815412111d146185b9a857
895eb3047e7a28ce219fdd7e7ad5ce2a61312d93
969a91d0038c10599f0f1f647cf0da869b5ded34
ac1c4cb8a6920bb7276dbf1435040f4003f8580c
ac348c2673f9c66d695bc75b65cbe32adc7887a6
ba145483608a4ea567ed3c3c2b7e396098f5386a
c40909226c102ceb3cf97e9037c590f1623af013
c7a16493be181dbe5ec8d993883bbc1759d22131
c91f54077b8ad8dd8e3f5807181b941124a4e971
da452698643d21a0212d62bd293e0c250f684b14
e044edce8646124ddc39906e6fb6f02eaff16161
e47eefdacf2b1190d2c95cb2800628429bfa115b
ec11f6abf13044a438a7f363bda2c9d5709d2475
fd30e7fcce4c1c372981cde822ba36ded96b7614
ff8747471c9641b17543038433137d7c0ffbcbb7

SHA256
04d75593f6acdfe0c959345b8d6702166537d7533abfeb4b568339dee1986b5e
0a4e5832841ffff9f8d27ce8216d655c8743b682fff0f90dee6bd3ea83dec028
0dc0da0739b227a9dae83be93d1b232c645dbffc7499709ae05c4ffa1bf44000
223f6c995c3de7613fd6e317ff88683999f43225d4ece6640cc752fd1f60ddbc
260ddec8adb08c4f1a3fa3cf75f8faf8b70f40cf49d4965ac15b60929350294c
261286c526153f77f317b0ecb015836aed4ab3a69f0bdfbd189836f209f896e7
2e2cef71bf99594b54e00d459480e1932e0230fb1cbee24700fbc2f5f631bf12
380791c0b797096fresh3013ef5666e9c965b93d6cd203d0445132bac3cab5f7c4
49fd52a3f3d1d46dc065217e588d1d29fba4d978cd8fdb2887fd603320540f71
52f7ace0de098c3c820416b601d62c4f56c9b20b569fa625bf242b625521f147
59b05789e5ac3d47c0a3d0f3e4ccacb2667cb7367e42adb9a3cbb108a538fc77
65524db4cc14954481961341c72aa8cf00f78144915cd9eb357c99c3ab669b52
6a52b9cd66ae94e8d27eb0bc3a63e6bd2c3ba6903637533a554d786e00af2404
6d8e2d8f6aeb0f4512a53fe83b2ef7699513ebaff31735675f46d1beea3a8e05
79f3aca3bd4e35948db577c9c0b0949c93c9869df6151889aa95b2ef9b8fae17
7b42fa7abdb7e2cfdbb3001e18cf09f62aefd0607684b956aa02c866c12539ac
7d703d0266823347ead7b3333e5e7ac5dd9d36231da62edfe407159aec0afbc9
7e2201b3fd0cf8a6e550ad4af3419e8955bb4ebbca15e11f8ba7a9f4d48cc88c
8045ad5cda6c42e5669cf52e492c004d842c7ae6f8a09522134834d0f57347eb
91845c398b06ddad405f15c1ff73c0ba6c2d27aca46bb04449f1b0855a5fd243
969bfe42819e30e35ca601df443471d677e04c988928b63fccb25bf0531ea2cc
9aa3826da16367166ac01379dd79eab4f0925a6f9b23eab87df6c498bce987c4
a3fa331e4a1e6171cfbda8739513b9477596400b283f32479f4342a1a4d21469
a558d293b26621888f71149c977cc9b68383f0e4cf039d09910f0a97892d7b33
aa0cfdc539cb2db1109606802d6b09a0652c9d60396faa7829ee692df580561f
c54f9afbcf5ed31373855154e8d2f8c2511c76cbbcbed325b30b98ddf3049f98
d6098f0d579273528b28b0b49c8b72b6f9908aef9e1ba0ec5da0874fa8c92266
d9aa454dc2c5d430ac2585f170fcd1ba7a3d31ba80dcc6f22676673c50919865
de6547c284800a6153f79e8518db48a41cc7841550bfdb699f084e988355c952
e844cf44b04c924730626cf2a0342890606d55386f757e99871092bbfc585044
ee036f333a0c4a24d9aa09848e635639e481695a9209474900eb71c9e453256b
f7fe602573c1c9df594ae7d29ddcad56332001005ae5d7786ce3cb452d381d54
fa7ba459236c7b27a0429f1961b992ab87fc8b3427469fd98bfc272ae6852063
faee1c99d47e9dc02bce9a89363817b94200d8a825e3bce0bc4e98f4e0feb2c0

TAB AT&CT

S0106 – cmd.exe
T1005 – Local system data
T1012 – Register of requests
T1018 – Remote system discovery
T1070.004 – Removed flag: file deletion
T1082 – Discovery of system information
T1112 – Edit Registry
T1120 – Device discovery
T1202 – Indirect order execution
T1486 – Encrypted data for impact
T1490 – Inhibit system recovery
T1491.001 – Defacing: Internal defacing
T1547.001 – Startup or login autostart execution: registry execution keys / startup folder
T1555.003 – Password store credentials: Web browser credentials
T1564.003 – Hide artifacts: hidden window

]]>
Your hat-trick 10/1 for European football on Sunday evening https://canttot.com/your-hat-trick-10-1-for-european-football-on-sunday-evening/ Sun, 13 Nov 2022 14:10:04 +0000 https://canttot.com/your-hat-trick-10-1-for-european-football-on-sunday-evening/ Social sharing buttons have been hidden due to cookie preferences. Please allow functional cookies for this to work. Cookie settings 7:45 p.m.: Juventus vs Lazio – Both teams score? No goals and less than 2.5 goals7:45 p.m.: Monaco against Marseille – Monaco to win8:30 p.m.: Famalicao v Sporting – Both teams to score and over […]]]>

7:45 p.m.: Juventus vs Lazio – Both teams score? No goals and less than 2.5 goals
7:45 p.m.: Monaco against Marseille – Monaco to win
8:30 p.m.: Famalicao v Sporting – Both teams to score and over 2.5 goals

*A hat-trick with these bets pays out approximately ten/1 with Paddy Power. CLICK HERE TO ADD IT TO YOUR BETSLIP.

7:45 p.m .: Juventus v Lazio – BTTS? No goals and less than 2.5 goals

TV: BT Sport 1 and BT Sport Ultimate

We start in Turin where Juventus, 4th, hosts Lazio, who are having an excellent season and occupy 2nd place. It’s another huge game for the Old Lady but they will be in high spirits after facing Inter last weekend and following up with a win at Verona on Tuesday.

Lazio also entered this one on back-to-back wins, but they have recently been dealing with Binary Code with three straight one-goal games. Juventus aren’t much more exciting with just four goals in their last three Serie A games.

WELCOME TO PADDY POWER NEWS!

We then have to follow this trend and mistakenly look on the lower side of Paddy’s target markets. With both being so high in the league, both have good home and away records respectively, so it could be beneficial to walk away from a WDW bet as it could go either way.

I like the look of Both teams to score? No goals and less than 2.5 goals. This has landed in Juve’s last three games and two of the opposing team’s matches in the same period. Both have great defenses and these two just might cancel each other out.

7:45 p.m.: Monaco v Marseille – Monaco to Win

TV: BT Sport 2

In France then where the 5th hosts the 4th in Monaco and the shock of Marseille. The hosts’ best form this season has come on the road while Marseille have quite similar home and away records.

The principality club had experienced a small swing of two draws and two losses between four wins on the rebound and since then they have now won three consecutive games in all competitions. Marseille had had a torrid run of five defeats in their last seven competitions, but they picked up a big win against Lyon last weekend.

Despite this recent improvement, I still think we can return with confidence. Monaco will win. They have scored eight goals and conceded only one in their last three while Marseille have scored four, conceded four and won, drawn and lost in their last three.

8:30 p.m .: Famalicao v Sporting – BTTS & Over 2.5 goals

Television: Viaplay Xtra

We finish in Portugal for the trip from Sporting to Famalicao. The visitors have been a bit disappointing this season and they are 5th, 12 points behind Benfica. Famalicao is 14th and just two points clear of the relegation playoff spot.

Sporting’s main problem this season has been their away form in the Primeira Liga. They’ve taken just seven points from six games and are in the bottom half of the table away from home. Famalicao are doing well at home and have nine points from five games in front of their own fans.

This one feels like there’s banana peel written all over it and it might be better to support the goals. Sporting’s attacking output was quite good, but their defense fell short. Overall, their 12 league games this season have seen 38 goals at an average of 3.17 per game.

Famalicao didn’t score many goals, just 10 in 12 games, dispatching 16 in that span, to give them a combined average of 2.17 per game. I will continue Both teams to score and over 2.5 goals. Overs has played in six of Sporting’s last seven league games, with both teams scoring in four of them. The hosts have scored in four of their last five games so we’ll be backing them to do so again here.

Sunday football tips

7:45 p.m.: Juventus vs Lazio – Both teams score? No goals and less than 2.5 goals
7:45 p.m.: Monaco against Marseille – Monaco to win
8:30 p.m.: Famalicao v Sporting – Both teams to score and over 2.5 goals

*A hat-trick with these bets pays out approximately ten/1 with Paddy Power. CLICK HERE TO ADD IT TO YOUR BETSLIP.

*All prices are current with our stylish widgets, while copy odds are accurate at time of publication but subject to change.

READ MORE

THE PADDY POWER GUIDE TO SAFER PLAY – ALL YOU NEED TO KNOW

The latest football odds are on PaddyPower.com right now

]]>
LLVM’s BOLT enabled by default for Linux x86/AArch64 test builds https://canttot.com/llvms-bolt-enabled-by-default-for-linux-x86-aarch64-test-builds/ Fri, 04 Nov 2022 09:43:00 +0000 https://canttot.com/llvms-bolt-enabled-by-default-for-linux-x86-aarch64-test-builds/ We need your support: This site is mainly supported by advertisements. Ads are what have kept this site maintained daily for over 18 years. We do our best to ensure that only clean and relevant advertisements are displayed, when obnoxious advertisements are detected we endeavor to remove them as soon as possible. If you would […]]]>

BOLT as the Technology developed by Facebook/Meta to optimize binaries behalf better performance by optimizing code layout merged with mainline LLVM earlier this year. Now that we are approaching the end of the year, BOLT is getting a small promotion by being enabled by default for Linux x86_64 and AArch64 test builds.

The LLVM test build script used to generate LLVM resources for testing new compiler release candidates has been updated to generate BOLT by default. This default BOLT for LLVM test builds currently only applies to Linux and AArch64 and x86_64 architectures.

The default change was merged yesterday for future test version consumption.

Those who want to know more about this post-link optimizer developed by Facebook can find the code in-tree here. Generating an optimized binary works for large apps with Faceobok/Meta having even worked on optimized linux kernel images, but either way one needs to first profile the app/software with linux perf so that BOLT can make appropriate optimizations to the code layout. The linked GitHub page describes more BOLT optimization steps and other details for those who want to play around with this LLVM tool.

]]>
T-Mobile will have a mandatory $35 activation fee starting Nov. 3 https://canttot.com/t-mobile-will-have-a-mandatory-35-activation-fee-starting-nov-3/ Tue, 01 Nov 2022 21:46:00 +0000 https://canttot.com/t-mobile-will-have-a-mandatory-35-activation-fee-starting-nov-3/ T-Mobile will now have a mandatory activation fee whether you activate in-store or online. T-Mobile has made a name for itself in the wireless industry over the past decade by being the “non-carrier”. Now what exactly does that mean, it means the wireless service provider has operated differently than traditional service providers, providing better value, […]]]>

T-Mobile will now have a mandatory activation fee whether you activate in-store or online.


T-Mobile has made a name for itself in the wireless industry over the past decade by being the “non-carrier”. Now what exactly does that mean, it means the wireless service provider has operated differently than traditional service providers, providing better value, choices and special benefits. While there’s no doubt that T-Mobile has transformed the wireless industry, it looks like, for the first time in a long time, it will introduce something that isn’t very user-friendly.


Although T-Mobile has been charging for activations for some time, it did so as part of the “assisted support” fee. These fees have increased steadily over the past two years and were optional fees that could be avoided by ordering online and setting things up yourself. Now, it looks like that won’t even be an option anymore, as a new $35 “device connection fee” fee will now apply to orders placed in-store or online.

According to T-Mo Report, these new charges will apply when you activate a new line or add a line to an existing plan. Additionally, these charges will apply even if you bring your own device and have it activated with the carrier or sign up for home internet service. Fortunately, charges will not apply to SIM or eSIM swaps, JUMP! Upgrades, prepaid lines or customers who activate a new product after a trade-in.

With this new change, T-Mobile becomes like any other carrier, charging to activate lines. While new customers probably won’t notice, old customers will certainly be surprised the next time they choose to activate a new service line with the “Un-carrier”. If you’ve been thinking about activating with T-Mobile, be sure to check out some of the best phones they must offer and activate the service by November 3 so you can avoid the mandatory $35 fee.


Source: T-Mo Report

]]>
TikToker Esther Abrami wants to shake up the world of classical music https://canttot.com/tiktoker-esther-abrami-wants-to-shake-up-the-world-of-classical-music/ Sun, 30 Oct 2022 09:52:44 +0000 https://canttot.com/tiktoker-esther-abrami-wants-to-shake-up-the-world-of-classical-music/ Esther Abram. (Provided) Viral TikTok violinist Esther Abrami has had to break down barriers in her career for as long as she can remember. Although she was in the classical music industry for more than a decade, building his career has been no small feat. Now with nearly 400,000 subscribers on TikTok and fresh on […]]]>

Esther Abram. (Provided)

Viral TikTok violinist Esther Abrami has had to break down barriers in her career for as long as she can remember.

Although she was in the classical music industry for more than a decade, building his career has been no small feat.

Now with nearly 400,000 subscribers on TikTok and fresh on her back new EP, Projectorwhere she collaborated with the UK’s first all-female, non-binary string performers, His outfitthe change is just beginning.

From forgotten composers and LGBTQ+ to the reinvention of classical music, Projector is an ode to perspective rarely seen in the white male-dominated industry.

In addition to teaming up with HER together, her new single “Reverie for violin and piano” was written by the first openly transgender Oscar nominee, Angela Morley. Morley passed away in 2009, but her legacy lives on.

“I didn’t know there were trans composers”

This was after Abrami heard his work in a HER Ensemble concert, that the pieces began to fall together.

“I fell in love with the piece straight away.” Abrami tells PinkNews, “I was like ‘how is this not a classic of the violin repertoire? It is not possible.’ it’s just such a gorgeous piece.

“I could only have named you a handful of female songwriters a few years ago, despite my immersion in the industry for over 15 years”, admits Consta, “I didn’t even know there were trans songwriters I didn’t know any composer of color.

“It’s funny because a lot of these female songwriters were really famous in their time and then something happens that they miss in the history books. We are not taught them, we do not hear their music.

“Angela Morley is a name I discovered when I was researching music a few years ago,” says HER Ensemble member Ellie Consta. PinkNews.

Morley became a household name in Britain in the 1950s before going public in 1972. During her career, she won three Emmy Awards and was nominated for an Oscar in 1974 and 1976.

For Abrami and Consta, they recognize that the classical music industry has a long history of gatekeeping, especially when it comes to the queer community.

“There are so many topics that are not talked about and that are taboo,” Abrami recalls.

“For a long time I went along with this because you don’t want to lose a job or get a bad reputation in the industry.”

Soon she was inspired by women before her, like violinist Jennifer Pike who “opened up about being a young girl entering a predominantly male orchestra” or Rachel Coleman who spoke of “judgment and stereotypes” that she was confronted with.

Esther Abram. (Classic Sony)

Abrami and Consta agree that a huge obstacle in the industry is the strict dress code that traditional classical music adheres to.

Esther Abrami hosts a podcast entitled women in classical where she interviews different people in the industry about their experience, and they have their last live event in California in October.

“People felt free,” she recalls, “just to have a room where everyone could really be themselves. And we didn’t have this thing of fitting into the typical way of dressing.

“There are times when critics comment on your appearance, the first thing they do is how does it relate to the music?”

And this strict dress code, often a white top and a long black skirt for women, most often affects queer people.

Consta says: “It’s very rare to see someone in an orchestra with tattoos, piercings, dyed hair. Anything “other” is very unusual. The binary genre of instruments and concert clothes seems difficult to me.

“And I feel like it’s a very easy change to make that automatically includes loads of people. It makes people feel like they can fit into those spaces.

In fact, Consta admits that this judgmental environment caused her to “remove parts” of herself and her sexuality.

“It makes you think, maybe some of these composers might have identified themselves differently, had they had the terminology or had they been licensed, I wonder? Maybe, maybe not,” Consta concludes.

This idea of ​​freedom and inclusion is woven into the heart of Esther Abrami and HER’s work together and they hope it will make waves in the industry.

When HER Together asked their social media followers to give their own experiences, the responses were shocking.

Whether it’s telling people to dye their hair a natural color to “hide their gayness” or being told their outfits aren’t “feminine or stylish enough.”

“It’s by having these conversations that you can create space and realize that things can be different,” says Abrami.

]]>
Meet Ally Watson OAM, Founder of Code Like A Girl https://canttot.com/meet-ally-watson-oam-founder-of-code-like-a-girl/ Wed, 26 Oct 2022 22:23:36 +0000 https://canttot.com/meet-ally-watson-oam-founder-of-code-like-a-girl/ Ally Watson is a software engineer who has spent years working as a solo developer and is recognized for her work promoting diversity and opportunities for women in tech, her dedication to education and women’s training and advocacy for the promotion of coding and software development. among women. In 2015, she created her company called […]]]>

Ally Watson is a software engineer who has spent years working as a solo developer and is recognized for her work promoting diversity and opportunities for women in tech, her dedication to education and women’s training and advocacy for the promotion of coding and software development. among women.

In 2015, she created her company called Code like a girl – inspired by her passion for educating and training women in coding and software development. Ally wanted to close the gender gap within the tech industry and build a future where women didn’t feel like strangers in Australia’s STEM industries. Code Like A Girl started as a way for Ally to meet other women who code.

After moving to Australia from Scotland, Ally wanted to form strong bonds and female friendships. So she decided to host her own event, one specifically for women in tech. She had no idea that one event would turn into many and become the humble beginnings of Code Like A Girl.

Ally Watson received a Medal of the Order of Australia (OAM) early this year on Australia Day.

“Working on gender equality can feel like a relentless marathon, many people tell you it can’t be done in your lifetime,” Ally said after receiving the OAM.

“It takes a rare optimism to keep pushing as hard as we do at Code Like a Girl and times like this matter. When the country you call home, sees you and recognizes your work. It’s a great motivation to keep moving forward, knowing how much there is still to do.

We spoke with Ally about her accomplishments this year and her inspiring career journey:

Congratulations on your OAM nomination. What does this mean to you ?

What’s important to me is what it might mean for others. As a girl who grew up in a social housing estate in a small town in Scotland, I am undeniably proud of how far we have come. I know the journey I have made will inspire others. My ambition has always been to lead conversations about gender equity in technology and positively influence other gender minorities to enter the field of coding. I know that becoming an OAM recipient will only further this ambition and it fills me with great gratitude.

Ally Watson OAM

How has Code Like A Girl evolved since you founded it and how can people get involved?

My mantra has always been “fall in love with the problem, not the solution” and so we have evolved over the years. With every initiative and every project, you learn something new about what is possible and what works. We are always striving to find a solution that is scalable, sustainable, and most importantly, that creates the change we want to see – a gender-balanced tech workforce that represents the wealth of our society.

Today, that’s exactly what we do. We work with over 50 businesses in Australia to support all gender minorities (women/trans/non-binary women etc.) who are immediately looking to transition into tech roles but may face barriers such as no coding skills or lack of formal qualifications.

We connect our community with paid software engineer internships and for those who need more skills, we support them through our industry-led online coding courses and tutorials that help them get there.

Recognition Matters focuses on messages such as “you can’t be what you can’t see”. What does this statement mean to you?

Research tells us that girls are more likely to express their identity using adjectives, rather than verbs that boys tend to use. What it tells me is that the girls, they want BE someone, not only DO something when they grow up.

Why do female role models in STEM make a difference?

The importance of real models cannot be underestimated. Just look at the “Scully Effect,” a phenomenon that saw the fictional FBI agent inspire a surge in female STEM enrollments while the show aired.

Ally Watson codes like a girl
Ally Watson OAM

Who have been some of your mentors and how have they helped shape your career?

As a founder and first-time manager, it’s been a steep learning curve. I have endless gratitude for the countless people who have championed my vision and leadership from the start.

One such person being Andrew Ritchie, founder of Estimate One. What started as a simple LinkedIn post in 2017 is now one of my most trusted advisors.

Every major pivot or irreversible decision I make, I like to bounce off Ritchie. Although he runs one of Australia’s largest technology platforms for construction procurement, he always makes time and space available for our sessions.

An incredible and genuine ally for gender equality, I knew right away that I had met someone aligned in values ​​and passionate about what I was trying to achieve. As a founder himself, he also understood the emotional cost of running a business and still not only provides business advice and guidance, but has also been an anchor for my mental well-being.

My advice for finding a good mentor is that they not only need to have your “vision”, but it is important that they have you too.

To learn more about Code Like A Girl, visit https://www.codelikeagirl.com/

]]>
Dozens of people protest against the IDB investigation https://canttot.com/dozens-of-people-protest-against-the-idb-investigation/ Sat, 22 Oct 2022 20:37:38 +0000 https://canttot.com/dozens-of-people-protest-against-the-idb-investigation/ Unwilling to let the problem die, dozens of parents and supporters took to the streets this morning to protest the controversial study administered by the Inter-American Development Bank (IDB). Under a heavy police presence, protesters began their march from Kensington Oval just after 10 a.m. and arrived in Independence Square just before noon. Donning signs, […]]]>

Unwilling to let the problem die, dozens of parents and supporters took to the streets this morning to protest the controversial study administered by the Inter-American Development Bank (IDB).

Under a heavy police presence, protesters began their march from Kensington Oval just after 10 a.m. and arrived in Independence Square just before noon.

Donning signs, some of which read, ‘Let Parents Do Their Job’, ‘Stop Sexualizing Our Children’, ‘Let Parents Decide’ and ‘We Say ‘NO’ to the New Sex Curriculum’, the group marched to accompany the music strong all along the main street of Bridgetown.

They were protesting against the survey sanctioned by the Ministry of Education, Technological and Vocational Training and administered to 733 junior high school students.

The survey asked these children about sensitive topics such as their sexuality and gender identity.

Reverend Ferdinand Nicholls, pastor of House of Freedom Ministries and one of the protest organizers, said Barbados TODAY other measures had to be taken.

“I am part of this protest because of the concern we have for the future of our children and the future of our country. Some may wonder why we are protesting and we are really protesting with a dual purpose. We want justice to the parents and children of Barbados What was done to the children in our schools was against the laws of Barbados under Section 8 of the Data Protection Act and we want justice to be done “, did he declare. Barbados TODAY.

“We would like to encourage parents to file a class action lawsuit against the Ministry of Education, the IDB and Code.org and we call as parents and families for the resignation of the Minister of Education, Director of Education and anyone responsible for approving the survey conducted in our schools. Apologies are simply not enough.

“We say no to the introduction of comprehensive sex education in our primary schools, preschools and secondary schools and yes to the teaching of sex education based on an optimal home approach. Children are our future and as a nation we need to create an environment in which they can thrive and grow to become productive citizens, and confusing them with sex and gender ideology is simply counterproductive” , he added.

Nicholls also called on the government to publicly state its position on introducing CSE into the school curriculum.

He also called on the government to develop a school sex education policy that clearly identifies what should be taught to children about sexual orientation, gender identity and “the notion that sex is binary and fluid”. .

Nicholls also asked if CARICOM has signed any agreements that mandate the teaching of comprehensive sex education in school curricula in the region. (RB)

Read our ePaper. Quick. Factual. Free.

Register and stay up to date with Barbados FREE recent news.

]]>
What is fuzzy matching? – TechNative https://canttot.com/what-is-fuzzy-matching-technative/ Thu, 20 Oct 2022 06:00:45 +0000 https://canttot.com/what-is-fuzzy-matching-technative/ Fuzzy matching (FM), also known as fuzzy logic, fuzzy string matching, fuzzy name matching, or fuzzy string matching, is an artificial intelligence and machine learning technology that identifies similar, but not identical, in sets of data tables. FM uses an algorithm to navigate between absolute rules to find duplicate strings, words/entries, which do not immediately […]]]>

Fuzzy matching (FM), also known as fuzzy logic, fuzzy string matching, fuzzy name matching, or fuzzy string matching, is an artificial intelligence and machine learning technology that identifies similar, but not identical, in sets of data tables.

FM uses an algorithm to navigate between absolute rules to find duplicate strings, words/entries, which do not immediately share the same characteristics. Where typical search logic works on a binary pattern (i.e.: 0:1, yes/no, true/false, etc.) – fuzzy string matching instead finds strings, entries and/or text in datasets that fall between the two. of these final parameters and navigates towards intermediate degrees of truth.

Fuzzy String Match helps find fuzzy matches even when certain words are misspelled, abbreviated, or omitted, a feature widely used in search engines. Ultimately, the approximate string match provides a match score, and since it is used to identify words, phrases, and strings that do not match perfectly, the match score will not be 100%.

How does fuzzy matching work?

Landing on the right fuzzy matching algorithm is important to help determine the similarity between one string and another. In one case, you can have a single character distance between “essay” and “trail”, or search for “passport” when the existing string says “passport” – a typo. Of course, not every case of fuzzy logic will be a matter of single-character distance. “Martin Luther Junior” is quite similar to “Martin Luther King, Jr.” Distances vary and there are various fuzzy name matching algorithms to help fill these gaps.

Performing a fuzzy logic search with loosely defined rules for string matching has some drawbacks. Using a weak system increases the risk of false positives. In order to keep these false positives to a bare minimum, or ideally non-existent, your fuzzy string matching system needs to be rather holistic. It must account for misspellings, abbreviations, name variations, geographic spellings of certain names, abbreviated nicknames, acronyms, and many other variables.

Fuzzy name matching algorithms

While there are many string matching algorithms to choose from when reconciling datasets, there is no one-size-fits-all solution for all use cases. Here are some of the most reliable and often used string matching techniques in data science for finding approximate matches.

Distance from Levenshtein

Levenshtein distance (LD) is one of the fuzzy matching techniques that measures between two strings, the given number representing how far the two strings are from an exact match. The higher the number of the Levenshtein edit distance, the further the two terms are from identity.

For example, if you measure the distance between “Cristian” and “Christian”, you would have a distance of 1 since you would be one “h” away from an exact match. This term is often interchangeable with the term “edit distance”.

Examples of Levenshtein modification distance

  1. Power -> Powder (Insert “w”) – Distance: 1
  2. Lovin -> Loving (Insert “g”) – Distance: 1
  3. Porpoise -> Goal (Substitute “o” for “u”, Insert “i”) – Distance: 2

Distance from Hamming

Named after American mathematician Richard Hamming, Hamming distance (HD) is quite similar to Levenshtein except that it is mainly used in signal processing, whereas the former is often used to calculate distance in strings textual. This algorithm uses the American Standard Code for Information Interchange (ASCII) table to determine the binary code assigned to each letter in each string to calculate the distance score.

Hamming distance examples

Take the text strings “Corn” and “Cork”. If you are trying to find the HD between these two, your answer would be a distance of 2, not 1, as you would get with Levenshtein’s algorithm. To get this score, you have to look at the binary assignment of each letter, one by one. Since the ASCII Binary Character Table assigns the code (01101110) for N and (01101011) for K, you will notice that the difference between each letter’s code occurs in two places, so an HD of 2.

Damerau-Levenshtein

This LD variant also finds the minimum number of operations needed to make two strings a direct match, using single-character distance operations like insertion, deletion, and substitution, but Damerau-Levenshtein goes one step further by incorporating a fourth possible operation – the transposition of two characters to find an approximate match.

Damerau–Levenshtein example

String 1: Michael

Channel 2: Michaela

Operation 1: transposition: swap the characters “a” and “e”

Operation 2: insert “a” (end of string 2)

Range = 2

Each operation has a count of “1”, so each insertion, deletion, transposition, etc. is weighted equally.

Fuzzy Matching Use Cases

The use cases for FM are vast, with many real-world applications, deduplication being one of the most popular among them. Imagine streaming the same digital ad to a user who has already reacted negatively to that ad and favorably to another. How would the user experience be affected if a financial institution imposed fraud detection on a transaction that the user repeats every week? It is the use of fuzzy string matching that has enabled deduplication to streamline records in so many of our modern data systems.

When we launched RediSearch in 2016, one of its main features was an auto-suggest engine with FM. Anyone who’s ever surfed the web has seen auto-suggest in action on a search engine. Speaking of search engines, have you ever misspelled a word when searching Google, but still got the results you were looking for? Google will actually serve what it thinks you wanted to type as the main query while also providing an option to search for the word(s) as you typed them right below. In this way, fuzzy matching has helped shape how AI/ML has helped improve our most trusted search engines.

Benefits of fuzzy matching

Research has found that human error is the source of a significant amount of duplication that occurs in record keeping and data management. An Online Research Journal study on the outlook for health information management found that duplicate medical records are not only common, but also dangerous and costly. The study, led by Beth Haenke Just, MBA, RHIA, FAHIMA, used a multisite dataset of 398,939 patient records and found that the majority of name field mismatches were the result of misspellings ( 54.14% in first name fields, 33.62% in surname fields). domains and 58.3% for middle names). Human error is often the biggest obstacle to data management and record linkage. FM has become an indispensable tool for joining imprecise datasets in medical, financial services, social security fraud identification, and more. Ultimately, FM has saved modern enterprises countless hours of labor on the often costly and painstaking work of manual deduplication.

Other benefits of FM include:

Precision: FM is much more granular than deterministic matching, with the ability to find matches using imprecise data, penetrating deeper than regular binary strings

Flexibility: The different fuzzy logic algorithms available allow to solve the most complex problems

Easy to build: Implementing fuzzy logic in your system is a simple process

Configurable: It is easy to modify the logic according to your specific needs

Implementing fuzzy matching in different programming languages

Fuzzy Matching algorithms can be implemented in various programming languages ​​such as:

Python – Many choose to use the Fuzzywuzzy Python library when trying to do fuzzy string matching. This library uses the LD algorithm by default

R – Mainly used for statistical calculation and graphics

Java – A little more complicated to implement FM in Java, but not impossible! This GitHub repository houses a Java implementation of this same Fuzzywuzzy library

Excel – Via add-ons such as Fuzzy Lookup, Exis Echo, and even using the VLOOKUP function

Implementations are similar, with all languages ​​comparing sets, matching patterns, and determining statistical distance from perfect matching.

How to Minimize Errors in Fuzzy Search

With FM, reliability is not an infallible guarantee. Sometimes false positives appear which require manual error checking. It’s important to ask: will a few false positives outweigh the benefit of correctly matching exponentially more data? If it’s negligible, maybe spending time manually checking for errors wouldn’t be time well spent. Matching the right algorithm and programming language with the right use case is the best way to avoid errors when applying fuzzy logic to data matching.


About the Author

Eric Silva is Head of SaaS Product Marketing at Say it again. Redis accelerates applications by creating a database for a real-time world. It’s the driving force behind Open-Source Redis, the world’s most popular in-memory database, and the commercial provider of Redis Enterprise, a real-time data platform. Redis Enterprise provides real-time services to over 8,000 organizations worldwide. It’s built on the unparalleled simplicity and speed of open-source Redis, plus an enterprise-grade data platform that delivers the robustness of modern data models, manageability, automation, performance, and resiliency. to deploy and run modern applications at any scale from anywhere on the planet.

Featured Image: Adobe Stock


]]>
Providing menstrual products to workers under a new mandate will cost federal employers about $16 million a year https://canttot.com/providing-menstrual-products-to-workers-under-a-new-mandate-will-cost-federal-employers-about-16-million-a-year/ Mon, 17 Oct 2022 20:47:45 +0000 https://canttot.com/providing-menstrual-products-to-workers-under-a-new-mandate-will-cost-federal-employers-about-16-million-a-year/ Federal employers are estimated to spend more than $16 million annually to provide workers with menstrual products, as required by a new mandate from the Department of Labor, according to a government report. “The absence of menstrual products in the workplace can result in physical and psychological risks to the health and safety of menstruating […]]]>

Federal employers are estimated to spend more than $16 million annually to provide workers with menstrual products, as required by a new mandate from the Department of Labor, according to a government report.

“The absence of menstrual products in the workplace can result in physical and psychological risks to the health and safety of menstruating employees,” reads a government report entitled “Regulatory Impact Analysis Summary”, dated October 15.

“This could include resorting to improvised solutions or avoidance of the workplace due to anxiety, shame and stigma, and could impact mental health, performance and productivity.”

The Labor Department released details of its proposed changes to the Canada Labor Code on Oct. 15 that would require federally regulated employers, such as airlines and banks, to provide employees with free menstrual products, as first reported by Blacklock’s Reporter.

Already the labor code requires federal employers to provide workers with “basic sanitary products” like toilet paper and toilet soap.

The government’s cost estimate of the proposed change projects how much employers will have to spend on sanitary products over a 10-year period. Providing workers with only tampons and sanitary napkins, not counting the cost of purchasing dispensers and containers, will represent more than $10 million annually.

The amendment will also require federal employers to install menstrual product disposal containers not only in women’s restrooms, but also in men’s bathrooms “to ensure there is no inequality”.

“This will ensure that the unique needs of non-binary people, transgender men and intersex people are also taken into account,” reads the report.

The report adds that “about 35%” of federal employees need menstrual products and expecting them to buy their own places a financial burden on low-income working women.

“The financial burden is particularly heavy for low-income and marginalized menstruating people, including Indigenous and 2SLGBTQI+ people,” the report said.

The report’s reasons for providing federal workers with menstrual products include building a “more inclusive Canada”, addressing “systemic inequities, such as gender discrimination” and promoting ” fairness and equality”.

“We would never ask people to bring their own toilet paper to work. So why do we do this with menstrual products? We are changing that,” Labor Secretary Seamus O’Regan Jr. said in a Press release.

Marci Ien, Minister for Women and Gender Equality and Youth, said “all obstacles to their access [menstrual products] must be broken down. »

“This initiative is a step in the right direction to achieve menstrual equity and advance gender equality in the workplace,” she said.

Follow

Peter Wilson is a journalist based in Ontario, Canada.

]]>