TDSS Botnet – Full Disclosure

Total Page:16

File Type:pdf, Size:1020Kb

TDSS Botnet – Full Disclosure 11/2010 (36) PRACTICAL PROTECTION IT SECURITY MAGAZINE Dear Readers, team First of all, Hakin9 team would like to wish you Merry Christmas and Happy New Year! Maybe it is a bit too early Editor in Chief: Karolina Lesińska but we will „see” each other in January next time and it will be [email protected] too late:) Since 2010 is coming to an end it is time for new Editorial Advisory Board: Matt Jonkman, Rebecca Wynn, resolutions. We have one – make Hakin9 magazine better Steve Lape, Shyaam Sundhar, Donald Iverson, Michael Munt – more popular and more reliable source for our readers. That DTP: Ireneusz Pogroszewski is why we are constantly in touch with our team of authors and Art Director: Ireneusz Pogroszewski [email protected] betatesters to get the most fresh and valuable opinions on each issue. So at this point we would like to thank all people Proofreaders: Henry Henderson aka L4mer, Michael Munt, Jonathan Edwards, Barry McClain who are helping us every day getting in return just a simple thanks. Without your support Hakin9 wouldn’t be as it is now Top Betatesters: Rebecca Wynn, Bob Folden, Carlos Ayala, Steve – not only a magazine but a community of great people. Hodge, Nick Baronian, Matthew Sabin, Laszlo Acs, Jac van den Goor, Matthew Dumas, Andy Alvarado I hope we will be working together Special Thanks to the Beta testers and Proofreaders who helped next year as good as we did this us with this issue. Without their assistance there would not be a year! Hakin9 magazine. Once again – Merry Senior Consultant/Publisher: Paweł Marciniak Christmas and Happy New CEO: Ewa Łozowicka Year! I hope all your wishes [email protected] and hopes for the future will Production Director: Andrzej Kuca come true. [email protected] Marketing Director: Karolina Lesińska Warm regards [email protected] Enjoy your reading Subscription: Iwona Brzezik Karolina Lesińska Email: [email protected] Editor-in-Chief Publisher: Software Press Sp. z o.o. SK 02-682 Warszawa, ul. Bokserska 1 Phone: 1 917 338 3631 www.hakin9.org/en Whilst every effort has been made to ensure the high quality of the magazine, the editors make no warranty, express or implied, concerning the results of content usage. All trade marks presented in the magazine were used only for informative purposes. All rights to trade marks presented in the magazine are REGULARS reserved by the companies which own them. To create graphs and diagrams we used program 6 in Brief by Latest news from the IT security world Armando Romeo, eLearnSecurity The editors use automatic DTP system ID Theft Protect Mathematical formulas created by Design Science MathType™ 8 Tools DISCLAIMER! Flexcrypt The techniques described in our articles may only by Shyaam Sundhar be used in private, local networks. The editors hold no responsibility for misuse of the presented techniques or consequent data loss. 46 ID fraud expert says... A brief analysis of the cyber security threat by Julian Evans 50 Emerging Threats Cyber State-Bullying by Matthew Jonkman 4 11/2010 www.hakin9.org/en 5 CONTENTS BASICS 10 The Spyware Within You by Rajat Khare Yes, today’s spyware though resides in your computer or mobile but it’s pretty much inside you. Whatever we do, wherever we go it’s stored in a computer or an embedded device like mobile phone. 12 The Ear of Sauron by John Aycock In The Lord of the Rings, Sauron wiles away the time peering out over Middle Earth with the Eye – lacking Internet access, Sauron couldn’t occupy himself flaming hobbits online.Sauron’s Eye has been realized, in a small way, by the webcams perched atop our monitors and embedded into our laptops and mobile devices. 14 dasbot: controlling IRC via bash by Israel Torres dasbot is an intuitive bash file driven IRC bot. It was created on a Mac and runs in a progressive environment where it can be updated with ease at a moments notice. It doesn’t require a compiler, sudo permissions or static path. You can run it until you decide to restart your uptime. 20 Knowing VoIP Part II – Getting deeper to the settings by Winston Santos In the last chapter we talked about what is VoIP, its advantages and disadvantages etc. But this time I will take you to the inside of the process when people place/receive a call. I will take the opportunity to explain what is required to properly configure a device to work + some tips to help people in taking the best of the service. ATTACK 24 TDSS botnet – full disclosure. Part II Andrey Rassokhin and Dmitry Oleksyuk After breaking into the world’s biggest botnet, which was covered in the previous issue of Hakin9, we performed thorough analysis of the botnet’s undercover logic. In this final article of the series the following details are revealed: The C&C server general configuration; Bots accounting system; Distribution partners accounting system; The C&C protocol layout: bot requests and commands; Available control commands and payload modules; Detailed botnet statistics by countries, distribution partners, operating systems and bot versions. DEFENSE 40 Search Engine Security and Privacy – Part 2 by Rebecca Wynn It is always surprising to see how much information is available to anyone with an Internet connection and little tenacity. Since Part 1 was published in the July 2010 Hakin9 magazine, there have been huge changes within the search engine world. I will name a few key changes here. 4 11/2010 www.hakin9.org/en 5 In brief In brief WEB BROWSER DRIVEBY EXPLOITS ON NEWS FROM THE ANTIVIRUS INDUSTRY THE WILD Windows users can enjoy free AV protection since the Client side exploits are the real concern of security early days when Avira released its antivirus AntiVir for staffs of every company worldwide. As reported by free and AVG provided free protection from spyware Neil Daswani, CTO and founder of Dasient, in OWASP and worms. Then Comodo joined the panel pushing its AppSec DC conference, an incredible growth in the Internet Security suite comprising of the award winning number of exploits against client applications versus firewall and a performing AntiVirus, free for home use. server daemons demonstrates that the weakest link Now Sophos has just released a free version of its is still the end-user. Moreover, it proves to be hard to Antivirus for Mac users, becoming the first firm providing deploy a corporate wide policy to mitigate the use of, malware protection on this platform. or apply patches for vulnerable applications, when a The need for more malware protection under Mac is 0-day is released every other week against common real and supported by an increasing number of infection applications such as Adobe Reader, Flash Player or on this platform. Mozilla Firefox. The most targeted among these client The same Sophos has announced a decline in the applications are web browsers and their plugins. rate of growth of the company with the immediate effect By means of drive by download exploits, botnets, of firing 80 of its employees, for a total of 8% of the easily recruit new zombies, by silently downloading workforce. and installing malware without ever rising any suspicion AVG, firm specialized in Windows malware protection, in the victim. These drive by exploits have become has announced the buy out of DroidSecurity, an Israeli more and more complex in terms of distribution and startup company producing security software for Android obfuscation. Most of them involve Javascript and smartphones. iFrame injection. Others involve exploitation of the latest The deal will bring AVG in the growing, although still Flash player vulnerabilities. completely green, market of anti malware solutions for smartphones. Source: Armando Romeo, www.elearnsecurity.com Source: Armando Romeo, www.elearnsecurity.com WILL CLOUD BE EVIL? Cloud computing, beside the other thousand of GOOGLE BUG LETS MALICIOUS WEBSITES other meanings, refers to the possibility of running HARVEST YOUR EMAIL applications, or websites, on different virtualized hosts, A bug in the Google Apps Script API could have allowed with the benefit of scaling the need for CPU and memory for emails to be sent to Gmail users without their instantly. The business model is in use now is a pay per permission according to Google. cycle. Cost depends on the number of CPU cycles and The bug in Google had been demonstrated by a the CPU-time consumed. web page hosted on Google Blogger. This web page Thomas Roth, is a german guy who has cracked gathered the Google account email address of the user SHA-1 password with rented distributed CUDA visiting the web page and send an email to it. Google, computing. Although SHA-1 160bit is thought to has released a fix to this issue after an article exposing be,relatively, insecure, it is still used for SSL and other the privacy threat appeared on Techcrunch written by important implementations. This sounds even more Michael Arrington who, in turn, had given voice to the ironic if we consider that most of the SSL CA using author of the exploit complaining of the lack of interest MD5 when Sotirov et al, in 2009, managed to crack from Google security response team. SSL through MD5 collisions, switched over to SHA-1 few days later. Source: Armando Romeo, www.elearnsecurity.com New cloud cracking services are coming up. The most notorious is Moxie Marlinspike’s wpacracker.com, DHS MIGHT FINE COMPANIES FOUND offering the rental of 400 CPU’s cluster to crack WPA NONCOMPLIANT passwords. English and German dictionaries are The U.S. Department of Homeland Security, thanks to a available or, in general, the digits dictionary can be new law proposed by democrats, might be able to fine used, which contains all 100 million permutations of noncompliant tech firms with a fine of $100,000 a day.
Recommended publications
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Title: Conquering Information Literacy, Conan the Librarian Public Library
    Title: Conquering Information Literacy, Conan the Librarian Public Library Audience: Public Library Patrons Grades 4th-7th Designers’ Names: Designed by Marie Cirelli, Gweneth Morton, and Andy Wolverton 1. Rationale for instruction: An information literate student can be defined as “one who accesses information efficiently and effectively, critically evaluates the information, and uses it accurately and creatively” (Grassian and Kaplowitz, 2009, p. 4). With the information explosion on the Internet, it is becoming more difficult and more important to be information literate. The public library can play a vital role in the education of its patrons by offering them the opportunity to learn and master the skills needed to be considered information literate. The mission of a public library is to provide information, support lifelong learning, and enrich the lives of its patrons. Based on experience with the patrons of the library and the mission of the library, an information literacy course for students in grades 4th-7th is being developed as a way to further support our patrons and meet the mission of the library. 2. Goal and objectives: Goal: The learner will understand how to search for and evaluate information from a variety of sources. Objective 1: The learner will apply the I-LEARN model. Objective 2: The learner will locate appropriate sources using the Internet and OPAC. Objective 3: The learner will apply the previously found information. Overview 1. Brief summary of unit: The unit is a three-day program in which students learn how to search for and evaluate information from a variety of sources. The program is structured for a younger age group and focuses on hands-on learning and immediate feedback.
    [Show full text]
  • The Hour of the Dragon by Robert E
    The Hour of the Dragon By Robert E. Howard Chapter 1: O Sleeper, Awake! THE LONG TAPERS flickered, sending the black shadows wavering along the walls, and the velvet tapestries rippled. Yet there was no wind in the chamber. Four men stood about the ebony table on which lay the green sarcophagus that gleamed like carven jade. In the upraised right hand of each man a curious black candle burned with a weird greenish light. Outside was night and a lost wind moaning among the black trees. Inside the chamber was tense silence, and the wavering of the shadows, while four pairs of eyes, burning with intensity, were fixed on the long green case across which cryptic hieroglyphics writhed, as if lent life and movement by the unsteady light. The man at the foot of the sarcophagus leaned over it and moved his candle as if he were writing with a pen, inscribing a mystic symbol’ in the air. Then he set down the candle in its black gold stick at the foot of the case, and, mumbling some formula unintelligible to his companions, he thrust a broad white hand into his fur-trimmed robe. When he brought it forth again it was as if he cupped in his palm a ball of living fire. The other three drew in their breath sharply, and the dark, powerful man who stood at the head of the sarcophagus whispered: “The Heart of Ahriman!” The other lifted a quick hand for silence. Somewhere a dog began howling dolefully, and a stealthy step padded outside the barred and bolted door.
    [Show full text]
  • The Sociology of Gender
    The Sociology of Gender Key Themes in Sociology This series introduces students to a particular topic in sociology in a concise format to provide a core text for a course, easily supplemented with addi- tional readings. Depending on the course content, these books cover major theoretical perspectives and key concepts, and contain illustrative material reflecting contemporary society. The authors have written with a sense of originality and to pose arguments, while maintaining an accessible and engaging writing style. They also include pedagogical features such as glossaries, further suggested reading, discussion questions and case studies. The series volumes do not oversimplify the material, yet contain the basic knowledge students need to work through primary readings and class discussion. Published: The Sociology of Gender: An Introduction to Theory and Research Amy S. Wharton Forthcoming: Citizenship Peter Kivisto and Thomas Faist Science and Technology in Society Daniel Kleinman The Sociology of Gender An Introduction to Theory and Research Amy S. Wharton © 2005 by Amy S. Wharton BLACKWELL PUBLISHING 350 Main Street, Malden, MA 02148-5020, USA 108 Cowley Road, Oxford OX4 1JF, UK 550 Swanston Street, Carlton, Victoria 3053, Australia The right of Amy S. Wharton to be identified as the Author of this Work has been asserted in accordance with the UK Copyright, Designs, and Patents Act 1988. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, except as permitted by the UK Copyright, Designs, and Patents Act 1988, without the prior permission of the publisher.
    [Show full text]
  • Download Ebook ~ Articles on Conan the Barbarian, Including: Conan
    [PDF] Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer, Hyborian Age, Thrud... Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer, Hyborian Age, Thrud The Barbarian, Cimmeria (conan), The Hyborian Age, Aquilonia (conan), Conan The Barbarian (fil Book Review A must buy book if you need to adding benefit. I could possibly comprehended every little thing using this created e publication. I found out this book from my dad and i encouraged this pdf to understand. (Georg ianna Gerlach) A RTICLES ON CONA N THE BA RBA RIA N, INCLUDING: CONA N THE LIBRA RIA N, CONA N THE DESTROYER, HYBORIA N A GE, THRUD THE BA RBA RIA N, CIMMERIA (CONA N), THE HYBORIA N A GE, A QUILONIA (CONA N), CONA N THE BA RBA RIA N (FIL - To save A rticles On Conan The Barbarian, including : Conan The Librarian, Conan The Destroyer, Hyborian A g e, Thrud The Barbarian, Cimmeria (conan), The Hyborian A g e, A quilonia (conan), Conan The Barbarian (fil PDF, remember to click the web link beneath and download the ebook or have access to additional information that are have conjunction with Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer, Hyborian Age, Thrud The Barbarian, Cimmeria (conan), The Hyborian Age, Aquilonia (conan), Conan The Barbarian (fil ebook. » Download A rticles On Conan The Barbarian, including : Conan The Librarian, Conan The Destroyer, Hyborian A g e, Thrud The Barbarian, Cimmeria (conan), The Hyborian A g e, A quilonia (conan), Conan The Barbarian (fil PDF « Our online web service was released by using a hope to function as a full on the web computerized catalogue which offers entry to great number of PDF guide collection.
    [Show full text]
  • Festivities Planned to Celebrate TCU's 125Th Anniversary No-Tolerance Law
    WEATHER FORECAST High 90s Low 70* Mostly sunny Cheerleader tryouts Inside moved to coliseum FRIDAY Tryouts for cheerleading VolleyFrogs, star ready AUGUST 29, 1997 squads scheduled for for sophomore season. Saturday in the Rickel See page 7 Texas Christian University Building will be held in 95th Year • Number 5 Daniel-Meyer Coliseum instead, said cheerleader sponsor John Finke, the assistant athletic director for marketing and promotions. Finke said the tryouts were originally scheduled in the Festivities planned No-tolerance law Rickel Building Gym 3 because the coliseum floors were to be refinished this weekend. to celebrate TCU's stiffens penalties "We decided since they're going to cheer in Daniel- Meyer anyway, tryouts should give them a chance to 125th anniversary for teen drinking get familiar with the home- team advantage," Finke said. By Danielle Daniel will be a celebration on the lawn," she SuperFrog, the 30-foot inflatable Punishments include license suspension Tryouts for the coed squad SKIFF STAFF said. "We are going to have finger Homed Frog and the Frog Horn. will begin at 9 a.m. Saturday. The university community will kick foods and punch, and the Jazz Food will be a part of the festivities By Jennifer Longley meanor and comes with a fine of up Candidates will be required off a celebration of its 125th academic Ensemble will play. It will he a place with Riscky's barbecue and Frog DESIGN EDITOR to $500. attendance at an alcohol to perform a standing back year starting Sept. 1 I with a lawn for snacks and fellowship." Chill, a grape-flavored cool treat creat- Minors across Texas will face awareness class.
    [Show full text]
  • Articles on Conan the Barbarian, Including: Conan the Librarian, Conan the Destroyer
    SS3PUCZIJFZW // PDF < Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer,... A rticles On Conan Th e Barbarian, including: Conan Th e Librarian, Conan Th e Destroyer, Hyborian A ge, Th rud Th e Barbarian, Cimmeria (conan), Th e Hyborian A ge, A quilonia (conan), Conan Th e Barbarian (fil Filesize: 7.51 MB Reviews It is simple in study easier to fully grasp. It is definitely basic but unexpected situations within the fifty percent in the ebook. I am delighted to let you know that this is actually the finest publication i have got read inside my own life and could be he very best ebook for actually. (Destiny Walsh) DISCLAIMER | DMCA 3TDRJIJVGRBM » PDF ^ Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer,... ARTICLES ON CONAN THE BARBARIAN, INCLUDING: CONAN THE LIBRARIAN, CONAN THE DESTROYER, HYBORIAN AGE, THRUD THE BARBARIAN, CIMMERIA (CONAN), THE HYBORIAN AGE, AQUILONIA (CONAN), CONAN THE BARBARIAN (FIL To read Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer, Hyborian Age, Thrud The Barbarian, Cimmeria (conan), The Hyborian Age, Aquilonia (conan), Conan The Barbarian (fil eBook, make sure you refer to the web link listed below and save the file or get access to additional information which might be highly relevant to ARTICLES ON CONAN THE BARBARIAN, INCLUDING: CONAN THE LIBRARIAN, CONAN THE DESTROYER, HYBORIAN AGE, THRUD THE BARBARIAN, CIMMERIA (CONAN), THE HYBORIAN AGE, AQUILONIA (CONAN), CONAN THE BARBARIAN (FIL ebook. Hephaestus Books, 2016. Paperback. Book Condition: New. PRINT ON DEMAND Book; New; Publication Year 2016; Not Signed; Fast Shipping from the UK.
    [Show full text]
  • {Dоwnlоаd/Rеаd PDF Bооk} Art of Red Sonja
    ART OF RED SONJA PDF, EPUB, EBOOK Chris Lawrence,Alex Ross,Frank Cho,Adam Hughes,Jim Lee,Michael Turner,Frank Brunner,John Cassaday,Marc Silvestri,Frank Thorne | 208 pages | 08 Feb 2011 | Dynamic Forces Inc | 9781606900666 | English | Runnemede, United States Art of Red Sonja PDF Book Over 35 years in the making! Matt Wagner is an American comic book writer and artist, best known as the creator of the series Mage and Grendel. Tierney with covers by Boris Vallejo :. Learn how to enable JavaScript on your browser. Featuring a look at every aspect of the she- devil with a sword - Red Sonja! First solo story in black and white. Ramona Fradon was one of the most prolific and high profile female cartoonists at a Unsourced material may be challenged and removed. Everyone on earth has been infected with a nano-tech virus that allows a central computer known as Also featured in the cover painted by John Buscema. Sonja is then nursed to health by Osin, in Sonja's previous life a bard companion and now a gruff swordsman, who accepted the curse of Claw the Unconquered for himself in exchange for the ability to locate and train the new incarnation of Red Sonja. Newsletter Sign-up. Tags: red sonja, red sonya, joe badon, comic book, illlustration, cartoon, comic, fantasy, conan the barbarian, brigitte nielsen, warrior, comics, movie, film, womens, female, sword, red hair, girls. Tags: redsonja, red, sonja, comics, warrior, sexy, fight, barbarian, chainmail, bikini. A Series terminator , a robot-only version of the cyborg played by Arnold Schwarzenegger.
    [Show full text]
  • Read Ebook \\ Articles on Conan the Barbarian, Including: Conan The
    5QID9CFTGE33 » Kindle » Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer,... Download Kindle ARTICLES ON CONAN THE BARBARIAN, INCLUDING: CONAN THE LIBRARIAN, CONAN THE DESTROYER, HYBORIAN AGE, THRUD THE BARBARIAN, CIMMERIA (CONAN), THE HYBORIAN AGE, AQUILONIA (CONAN), CONAN THE BARBARIAN (FIL Read PDF Articles On Conan The Barbarian, including: Conan The Librarian, Conan The Destroyer, Hyborian Age, Thrud The Barbarian, Cimmeria (conan), The Hyborian Age, Aquilonia (conan), Conan The Barbarian (fil Authored by Books, Hephaestus Released at 2016 Filesize: 7.77 MB To read the data file, you will need Adobe Reader application. You can download the installer and instructions free from the Adobe Web site if you do not have Adobe Reader already installed on your computer. You can obtain and help save it for your PC for in the future read through. Be sure to follow the link above to download the PDF document. Reviews Most of these ebook is the perfect publication accessible. It is writter in easy terms and not difficult to understand. It is extremely difficult to leave it before concluding, once you begin to read the book. -- Anastasia K ihn Completely among the best ebook I actually have possibly read. It can be rally fascinating throgh reading through period of time. I am very easily can get a pleasure of studying a written ebook. -- Mr. Antone Rogahn Sr. The publication is great and fantastic. Sure, it is enjoy, nevertheless an interesting and amazing literature. You will not truly feel monotony at at any moment of your own time (that's what catalogues are for concerning when you request me).
    [Show full text]
  • But╦ You Don't Look Like a Librarian
    OLA Quarterly Volume 11 Number 1 Humor US: Librarians and Laughter (Spring 2005) July 2014 But… You Don't Look Like a Librarian Ruth Kneale National Solar Observatory Recommended Citation Kneale, R. (2014). But… You Don't Look Like a Librarian. OLA Quarterly, 11(1), 8-10. http://dx.doi.org/ 10.7710/1093-7374.1743 © 2014 by the author(s). OLA Quarterly is an official publication of the egonOr Library Association | ISSN 1093-7374 But … You Don’t Look Like a Librarian! by Ruth Kneale ave you ever had someone say, • You’re not a typical librarian, are you? Systems Librarian “You can’t be a librarian—you National Solar Observatory Hdon’t look like one!”? Or “Wow, • I never met a librarian who rode a yeah, I believe you’re a librarian.” Sure you motorcycle before. have —we all have—at one time or another. Some think it’s funny, some think not—but • Where’s your bun? I tell you, sometimes I just have to laugh! It amazes me what folks will say to us, what • I didn’t know you had to go to school happens to us when we’re out and about, to be a librarian! on TV, in bars, in comic strips—heck, they even make comments about our eyewear! • You’re too (young, funny, noisy, One bonus of researching the image messy, cute) to be a librarian. of librarians over the last several years is that folks share their stories and experi- • You don’t dress like a librarian. ences with me.
    [Show full text]
  • By Lee A. Breakiron the DARK MAN MEN, PART
    REHEAPA Summer Solstice 2012 By Lee A. Breakiron THE DARK MAN MEN, PART ONE The 1980s had seemed a promising time for Robert E. Howard publications and study. Book and fanzine publishing was down from its 70s’ peak, but there had been notable achievements, namely the appearances of Don Herron’s The Dark Barbarian: The Writings of Robert E. Howard ̶ A Critical Anthology (Greenwood, 1984); the journal Cromlech edited by Marc Cerasini and published by Robert M. Price, the latter also publishing a wealth of unseen REH in a slew of chapbooks from Cryptic Publications [1]; Novalyne Price Ellis’s memoir One Who Walked Alone: Robert E. Howard, the Final Years (Grant, 1986); the first book-length critical treatment, Robert E. Howard: Starmont Reader’s Guide #35 (1987) by Cerasini and Charles Hoffman; and two volumes of REH’s Selected Letters (Necronomicon, 1989 and 1991). This seemed to bode well for Howard’s receiving, at long last, the critical acceptance his work deserved, but there would still tough going ahead if it was to transcend its pulpish origins in the eyes of academia. The drive for such recognition was not helped by market manipulation designed to stifle the publication of REH in paperbacks, the flood of pastiches intended to supplant them, the disappointment of two Conan movies with no real connection to Howard’s stories, and the decline in the quality and popularity of Marvel’s Conan comics and magazines. All of these trends would only worsen in the 1990s, exemplified by the abysmal Kull the Conqueror movie in 1997.
    [Show full text]
  • Old Maids, Policeman, and Social Rejects: Mass Media Representations and Public Perceptions of Librarians
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln E-JASL: The Electronic Journal of Academic E-JASL 1999-2009 (volumes 1-10) and Special Librarianship Spring 2008 Old Maids, Policeman, and Social Rejects: Mass Media Representations and Public Perceptions of Librarians Maura Seale Grand Valley State University Follow this and additional works at: https://digitalcommons.unl.edu/ejasljournal Part of the Communication Technology and New Media Commons, Mass Communication Commons, Scholarly Communication Commons, and the Scholarly Publishing Commons Seale, Maura, "Old Maids, Policeman, and Social Rejects: Mass Media Representations and Public Perceptions of Librarians" (2008). E-JASL 1999-2009 (volumes 1-10). 107. https://digitalcommons.unl.edu/ejasljournal/107 This Article is brought to you for free and open access by the E-JASL: The Electronic Journal of Academic and Special Librarianship at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in E- JASL 1999-2009 (volumes 1-10) by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. Copyright 2008, the author. Used by permission. Electronic Journal of Academic and Special Librarianship v. 9 no. 1 (Spring 2008) Old Maids, Policeman, and Social Rejects: Mass Media Representations and Public Perceptions of Librarians Maura Seale, Arts and Humanities Librarian Zumberge Library, Grand Valley State University, Allendale, Michigan, USA Abstract This paper investigates the relationships between mass media representations of librarians and users’ perceptions and consequent use of librarians and libraries by asking three questions: 1. How are librarians depicted by the mass media? 2. How does the public perceive librarians and how might these views relate to mass media representations? 3.
    [Show full text]