SlideShare a Scribd company logo
THE  N EW  B L ACK 1
2 http://sg.linkedin.com/in/vishalkapoorinfotech
3 It’s déjà vu All Over Again
4
5 The Network Is The Computer
6
7
8 .com
9 The Return Of The WWW
10 S E C U R I T Y I S P L A S M A H O T AGAIN!
11
12 If You’re Going To Risk Going To Jail… $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ …It Might As Well Be For Money.
13
14 Doesn’t Pay ??? Crime Symantec Intelligence Quarterly  April-June 2010
15
16 The Walking Dead Bot Networks
17 Master Controller C&C Servers Suckers
18 Phishing Rent-A-Bot Denial Of Service Spam
PPI PPI PPI PPI
$49.95 PPI PPI PPI PPI PPI: Pay Per Install
Two Week Sales Leaders 10 cents per installation “Some of the biggest earners made more than $330,000 a month in commissions.” 50-90% of profit PPI Source: Brian Krebs, Security Fix, Washington Post, 3/16/2009
23 How End Users Get Infected Not  Obvious Not  Obvious Scary! Obvious Clicking link at trusted site Clicking on a email link Visiting high risk sites Just visiting a trusted site Clicking link at trusted site Stupid You & I
24 1st Line Of Defense: Common Sense  2nd Line Of Defense: Your AV
3 Components of Every Single AV Product on Earth Name   Fingerprint 11010101010101 Devil … Death 00011101010101 Signatures and repair instructions Scans files and executes repairs Killer UI, bells-and-whistles and alerts 25
26
27
28
29
30
31
32
33
34
35
36
A Web Page is a set of files & images Global2.css Logo.gif N360stor.gif Index.jsp Threatcon.gif Buyo.jsp Pca.gif Index.html Symantec.js Recentnews.gif
41
42 What Beyond Today’s Signature-Based AV??? Switch to Reputation Based Security presn.
43 Acknowledgements http://www.psdgraphics.com/icons/black-laptop-icon/ http://www.psdgraphics.com/icons/psd-white-laptop-icon/ http://dottech.org/tipsntricks/4932 http://penciltool.deviantart.com/ http://thedailyblonde.com/2009/07/would-you-like-fries-with-that/ http://www.mannythemovieguy.com/index.php?m=01&y=09&entry=entry090130-030249 http://www.freakingnews.com/Roadside-Breakdown-Pictures-55104.asp http://gertiecranker.blogspot.com/2009/09/rip-associations-off-stage.html  http://sohowww.nascom.nasa.gov/gallery/images/eit001.html  http://exceptionsnoted.wordpress.com/2010/01/  http://noiseatniagara.com/DThorp/SpenceDiamonds/home.html  http://www.greenlionlawncare.com/payment.html  http://visualartmsc.blogspot.com/  http://www.gamespot.com/pages/unions/forums/show_msgs.php?topic_id=24526800&union_id=1027  http://www.blind.org.ph/wayshelp/bancnet.html  http://usedbooksblog.com/blog/2008/12/  http://www.freeiconsweb.com/Mac_server_icons.html  http://chrissygardner.blogspot.com/ http://www.flickr.com/photos/sammorar/2926615695/

More Related Content

Similar to Security - The New Black

Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
Symantec
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
Luis R Castellanos
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
Ray Brannon
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and Cybercrime
Craig Heath
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced Engineer
Dug Song
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
Ray Brannon
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
IRJET Journal
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
Steve Poole
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
Andrew Prosser
 
La pecera 3
La pecera 3La pecera 3
La pecera 3
technoteacher3
 
Stu w25 a
Stu w25 aStu w25 a
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
Maxim Kozlovsky
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
Greg Wartes, MCP
 
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
Infoshare
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
n|u - The Open Security Community
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
Jonathan Care
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application security
Pawel Krawczyk
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
HackIT Ukraine
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
Комсс Файквэе
 

Similar to Security - The New Black (20)

Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check Security Trends to Watch in 2010 - A Mid-Year Status Check
Security Trends to Watch in 2010 - A Mid-Year Status Check
 
INT 1010 10-3.pdf
INT 1010 10-3.pdfINT 1010 10-3.pdf
INT 1010 10-3.pdf
 
Hum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraudHum 140: Social Media - Cyber fraud
Hum 140: Social Media - Cyber fraud
 
The Future of Computer Security and Cybercrime
The Future of Computer Security and CybercrimeThe Future of Computer Security and Cybercrime
The Future of Computer Security and Cybercrime
 
The Balanced Engineer
The Balanced EngineerThe Balanced Engineer
The Balanced Engineer
 
Chapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated CommunicationcmcChapter 12: Computer Mediated Communicationcmc
Chapter 12: Computer Mediated Communicationcmc
 
IRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing SitesIRJET-Content based approach for Detection of Phishing Sites
IRJET-Content based approach for Detection of Phishing Sites
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Centurylink 2018 threat report
Centurylink 2018 threat reportCenturylink 2018 threat report
Centurylink 2018 threat report
 
La pecera 3
La pecera 3La pecera 3
La pecera 3
 
Stu w25 a
Stu w25 aStu w25 a
Stu w25 a
 
Top 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk FactorsTop 5 Cryptocurrency Scam Risk Factors
Top 5 Cryptocurrency Scam Risk Factors
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
infoShare 2011 - Paweł Krawczyk - Why care about application security (open)
 
Integral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud PresentationIntegral Ad Science Digital Ad Fraud Presentation
Integral Ad Science Digital Ad Fraud Presentation
 
News Bytes - December 2010
News Bytes - December 2010News Bytes - December 2010
News Bytes - December 2010
 
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
30 years living a happy life - Breaking Systems, Chasing Bad Guys and Teachin...
 
Why care about application security
Why care about application securityWhy care about application security
Why care about application security
 
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
Ник Белогорский - Будни Кремниевой Долины. История карьеры Ника, борьба с хак...
 
Threat report h1_2013
Threat report h1_2013Threat report h1_2013
Threat report h1_2013
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
FODUU
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Things to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUUThings to Consider When Choosing a Website Developer for your Website | FODUU
Things to Consider When Choosing a Website Developer for your Website | FODUU
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 

Security - The New Black

  • 1. THE N EW B L ACK 1
  • 3. 3 It’s déjà vu All Over Again
  • 4. 4
  • 5. 5 The Network Is The Computer
  • 6. 6
  • 7. 7
  • 9. 9 The Return Of The WWW
  • 10. 10 S E C U R I T Y I S P L A S M A H O T AGAIN!
  • 11. 11
  • 12. 12 If You’re Going To Risk Going To Jail… $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ $ …It Might As Well Be For Money.
  • 13. 13
  • 14. 14 Doesn’t Pay ??? Crime Symantec Intelligence Quarterly April-June 2010
  • 15. 15
  • 16. 16 The Walking Dead Bot Networks
  • 17. 17 Master Controller C&C Servers Suckers
  • 18. 18 Phishing Rent-A-Bot Denial Of Service Spam
  • 19.
  • 20. PPI PPI PPI PPI
  • 21. $49.95 PPI PPI PPI PPI PPI: Pay Per Install
  • 22. Two Week Sales Leaders 10 cents per installation “Some of the biggest earners made more than $330,000 a month in commissions.” 50-90% of profit PPI Source: Brian Krebs, Security Fix, Washington Post, 3/16/2009
  • 23. 23 How End Users Get Infected Not Obvious Not Obvious Scary! Obvious Clicking link at trusted site Clicking on a email link Visiting high risk sites Just visiting a trusted site Clicking link at trusted site Stupid You & I
  • 24. 24 1st Line Of Defense: Common Sense 2nd Line Of Defense: Your AV
  • 25. 3 Components of Every Single AV Product on Earth Name Fingerprint 11010101010101 Devil … Death 00011101010101 Signatures and repair instructions Scans files and executes repairs Killer UI, bells-and-whistles and alerts 25
  • 26. 26
  • 27. 27
  • 28. 28
  • 29. 29
  • 30. 30
  • 31. 31
  • 32. 32
  • 33. 33
  • 34. 34
  • 35. 35
  • 36. 36
  • 37. A Web Page is a set of files & images Global2.css Logo.gif N360stor.gif Index.jsp Threatcon.gif Buyo.jsp Pca.gif Index.html Symantec.js Recentnews.gif
  • 38.
  • 39.
  • 40.
  • 41. 41
  • 42. 42 What Beyond Today’s Signature-Based AV??? Switch to Reputation Based Security presn.
  • 43. 43 Acknowledgements http://www.psdgraphics.com/icons/black-laptop-icon/ http://www.psdgraphics.com/icons/psd-white-laptop-icon/ http://dottech.org/tipsntricks/4932 http://penciltool.deviantart.com/ http://thedailyblonde.com/2009/07/would-you-like-fries-with-that/ http://www.mannythemovieguy.com/index.php?m=01&y=09&entry=entry090130-030249 http://www.freakingnews.com/Roadside-Breakdown-Pictures-55104.asp http://gertiecranker.blogspot.com/2009/09/rip-associations-off-stage.html http://sohowww.nascom.nasa.gov/gallery/images/eit001.html http://exceptionsnoted.wordpress.com/2010/01/ http://noiseatniagara.com/DThorp/SpenceDiamonds/home.html http://www.greenlionlawncare.com/payment.html http://visualartmsc.blogspot.com/ http://www.gamespot.com/pages/unions/forums/show_msgs.php?topic_id=24526800&union_id=1027 http://www.blind.org.ph/wayshelp/bancnet.html http://usedbooksblog.com/blog/2008/12/ http://www.freeiconsweb.com/Mac_server_icons.html http://chrissygardner.blogspot.com/ http://www.flickr.com/photos/sammorar/2926615695/

Editor's Notes

  1. PPI = Pay Per Install