Jump to content

gonewrestling

Gorillas
  • Posts

    35
  • Joined

  • Last visited

 Content Type 

Articles

Coach

Teams

Team History

Wrestlers

Wrestler Accomplishments

Dual Results

Individual Results

Team Rankings

Individual Rankings Master

Individual Ranking Detail

Tournament Results

Brackets

College Signings

Media

State Bracket Year Info

Team Firsts and Lasts

Family History

Schedule-Main

Schedule-Details

Team History Accomplishments

Current Year Dual Results

Current Year Tournament Results

Forums

Events

Store

Downloads

Everything posted by gonewrestling

  1. Both Blue and Gold teams are still going for placement. They have 3 rounds of wrestling tomorrow starting at 9:00 AM east coast time. 9:00 AM Rd 6 Indiana Gold vs Illinois and Indiana Blue vs Maryland 11:15 AM Rd 7 Indiana Gold vs Virginia Blue and Indiana Blue vs Illinois 2:00 PM Rd 8 Indiana Gold vs PA Blue and Indiana Blue vs Virginia Blue
  2. we received a text from Aaron after the match. The 194 lb match has the wrong Indiana Gold participant listed. Aaron Stevenson wrestled against Michael Johnson Jones score was 8-3.
  3. New York Red 15 vs Indiana Blue 46 108- Dusty Kief , (Indiana Blue) Fall Will Montgomery , (New York Red) 2:55 117- Brandon Nelsen , (Indiana Blue) Maj Anthony Purzone , (New York Red) 15-3 124- Justin Kieffer , (Indiana Blue) Dec Nick Arujau , (New York Red) 9-3 130- Mason Berryman , (Indiana Blue) Dec Dante Epps , (New York Red) 8-4 135- Brock Norton , (Indiana Blue) Dec Dylan Palaeros , (New York Red) 9-4 140- Doug Welch , (Indiana Blue) Dec Joe Chiafatella , (New York Red) 10-3 145- Nick Terdick , (New York Red) Dec John Sims , (Indiana Blue) 8-4 150- Dalton Sparks , (Indiana Blue) Dec Mack Maldarelli , (New York Red) 3-1 157- Anthony Quiroz , (Indiana Blue) Fall Jermaine John , (New York Red) 1:47 165- Jackson Bratcher , (Indiana Blue) Fall James Ondris , (New York Red) 2:54 176- Braden Atwood , (Indiana Blue) Dec Joe Kavanaugh , (New York Red) 9-5 194- Angelo Malvestueto , (New York Red) Fall Michael Johnson-Jones , (Indiana Blue) 3:23 220- Conor Horl , (New York Red) Fall Andy Jacquet , (Indiana Blue) 1:23 285- Dylan McBride , (Indiana Blue) Fall Dave Agu , (New York Red) 5:21
  4. New York Black and New York super 6 rosters list the same particpants.
  5. AJ Is there anywhere that is posting results on the web? My son Aaron Stevenson is wrestling for the Gold team and we were unable to travel to PA and would like to follow the results if possible. Thank you, in advance. Paul Stevenson
  6. See link for last years team rosters and results. http://www.intermatwrestle.com/high_school/showcase08/main.aspx
  7. 2009 Brute Scholastic Showcase presented by the NWCA. The event will be held at Memorial Hall in York, PA on April 17-18,
  8. Top Ten Reason Sites are Hacked 1. Cross site scripting (XSS) The problem: The ?most prevalent and pernicious? Web application security vulnerability, XSS flaws happen when an application sends user data to a Web browser without first validating or encoding the content. This lets hackers execute malicious scripts in a browser, letting them hijack user sessions, deface Web sites, insert hostile content and conduct phishing and malware attacks. Attacks are usually executed with JavaScript, letting hackers manipulate any aspect of a page. In a worst-case scenario, a hacker could steal information and impersonate a user on a bank?s Web site, according to Snyder. Real-world example: PayPal was targeted last year when attackers redirected PayPal visitors to a page warning users their accounts had been compromised. Victims were redirected to a phishing site and prompted to enter PayPal login information, Social Security numbers and credit card details. PayPal said it closed the vulnerability in June 2006. How to protect users: Use a whitelist to validate all incoming data, which rejects any data that?s not specified on the whitelist as being good. This approach is the opposite of blacklisting, which rejects only inputs known to be bad. Additionally, use appropriate encoding of all output data. ?Validation allows the detection of attacks, and encoding prevents any successful script injection from running in the browser,? OWASP says. 2. Injection flaws The problem: When user-supplied data is sent to interpreters as part of a command or query, hackers trick the interpreter ? which interprets text-based commands ? into executing unintended commands. ?Injection flaws allow attackers to create, read, update, or delete any arbitrary data available to the application,? OWASP writes. ?In the worst-case scenario, these flaws allow an attacker to completely compromise the application and the underlying systems, even bypassing deeply nested firewalled environments.? Real-world example: Russian hackers broke into a Rhode Island government Web site to steal credit card data in January 2006. Hackers claimed the SQL injection attack stole 53,000 credit card numbers, while the hosting service provider claims it was only 4,113. How to protect users: Avoid using interpreters if possible. ?If you must invoke an interpreter, the key method to avoid injections is the use of safe APIs, such as strongly typed parameterized queries and object relational mapping libraries,? OWASP writes. 3. Malicious file execution The problem: Hackers can perform remote code execution, remote installation of rootkits, or completely compromise a system. Any type of Web application is vulnerable if it accepts filenames or files from users. The vulnerability may be most common with PHP, a widely used scripting language for Web development. Real-world example: A teenage programmer discovered in 2002 that Guess.com was vulnerable to attacks that could steal more than 200,000 customer records from the Guess database, including names, credit card numbers and expiration dates. Guess agreed to upgrade its information security the next year after being investigated by the Federal Trade Commission. How to protect users: Don?t use input supplied by users in any filename for server-based resources, such as images and script inclusions. Set firewall rules to prevent new connections to external Web sites and internal systems. 4. Insecure direct object reference The problem: Attackers manipulate direct object references to gain unauthorized access to other objects. It happens when URLs or form parameters contain references to objects such as files, directories, database records or keys. Banking Web sites commonly use a customer account number as the primary key, and may expose account numbers in the Web interface. ?References to database keys are frequently exposed,? OWASP writes. ?An attacker can attack these parameters simply by guessing or searching for another valid key. Often, these are sequential in nature.? Real-world example: An Australian Taxation Office site was hacked in 2000 by a user who changed a tax ID present in a URL to access details on 17,000 companies. The hacker e-mailed the 17,000 businesses to notify them of the security breach. How to protect users: Use an index, indirect reference map or another indirect method to avoid exposure of direct object references. If you can?t avoid direct references, authorize Web site visitors before using them 5. Cross site request forgery The problem: ?Simple and devastating,? this attack takes control of victim?s browser when it is logged onto a Web site, and sends malicious requests to the Web application. Web sites are extremely vulnerable, partly because they tend to authorize requests based on session cookies or ?remember me? functionality. Banks are potential targets. ?Ninety-nine percent of the applications on the Internet are susceptible to cross site request forgery,? Williams says. ?Has there been an actual exploit where someone?s lost money? Probably the banks don?t even know. To the bank, all it looks like is a legitimate transaction from a logged-in user.? Real-world example: A hacker known as Samy gained more than a million ?friends? on MySpace.com with a worm in late 2005, automatically including the message ?Samy is my hero? in thousands of MySpace pages. The attack itself may not have been that harmful, but it was said to demonstrate the power of combining cross site scripting with cross site request forgery. Another example that came to light one year ago exposed a Google vulnerability allowing outside sites to change a Google user?s language preferences. How to protect users: Don?t rely on credentials or tokens automatically submitted by browsers. ?The only solution is to use a custom token that the browser will not ?remember,?? OWASP writes. 6. Information leakage and improper error handling The problem: Error messages that applications generate and display to users are useful to hackers when they violate privacy or unintentionally leak information about the program?s configuration and internal workings. ?Web applications will often leak information about their internal state through detailed or debug error messages. Often, this information can be leveraged to launch or even automate more powerful attacks,? OWASP says. Real-world example: Information leakage goes well beyond error handling, applying also to breaches occurring when confidential data is left in plain sight. The ChoicePoint debacle in early 2005 thus falls somewhere in this category. The records of 163,000 consumers were compromised after criminals pretending to be legitimate ChoicePoint customers sought details about individuals listed in the company?s database of personal information. ChoicePoint subsequently limited its sales of information products containing sensitive data. How to protect users: Use a testing tool such as OWASP?S WebScarab Project to see what errors your application generates. ?Applications that have not been tested in this way will almost certainly generate unexpected error output,? OWASP writes. 7. Broken authentication and session management The problem: User and administrative accounts can be hijacked when applications fail to protect credentials and session tokens from beginning to end. Watch out for privacy violations and the undermining of authorization and accountability controls. ?Flaws in the main authentication mechanism are not uncommon, but weaknesses are more often introduced through ancillary authentication functions such as logout, password management, timeout, remember me, secret question and account update,? OWASP writes. Real-world example: Microsoft had to eliminate a vulnerability in Hotmail that could have let malicious JavaScript programmers steal user passwords in 2002. Revealed by a networking products reseller, the flaw was vulnerable to e-mails containing Trojans that altered the Hotmail user interface, forcing users to repeatedly reenter their passwords and unwittingly send them to hackers. How to protect users: Communication and credential storage has to be secure. The SSL protocol for transmitting private documents should be the only option for authenticated parts of the application, and credentials should be stored in hashed or encrypted form. Another tip: get rid of custom cookies used for authentication or session management. 8. Insecure cryptographic storage The problem: Many Web developers fail to encrypt sensitive data in storage, even though cryptography is a key part of most Web applications. Even when encryption is present, it?s often poorly designed, using inappropriate ciphers. ?These flaws can lead to disclosure of sensitive data and compliance violations,? OWASP writes. Real-world example: The TJX data breach that exposed 45.7 million credit and debit card numbers. A Canadian government investigation faulted TJX for failing to upgrade its data encryption system before it was targeted by electronic eavesdropping starting in July 2005. How to protect users: Don?t invent your own cryptographic algorithms. ?Only use approved public algorithms such as AES, RSA public key cryptography, and SHA-256 or better for hashing,? OWASP advises. Furthermore, generate keys offline, and never transmit private keys over insecure channels. 9. Insecure communications The problem: Similar to No. 8, this is a failure to encrypt network traffic when it?s necessary to protect sensitive communications. Attackers can access unprotected conversations, including transmissions of credentials and sensitive information. For this reason, PCI standards require encryption of credit card information transmitted over the Internet. Real-world example: TJX again. Investigators believe hackers used a telescope-shaped antenna and laptop computer to steal data exchanged wirelessly between portable price-checking devices, cash registers and store computers, the Wall Street Journal reported. ?The $17.4-billion retailer's wireless network had less security than many people have on their home networks,? the Journal wrote. TJX was using the WEP encoding system, rather than the more robust WPA. How to protect users: Use SSL on any authenticated connection or during the transmission of sensitive data, such as user credentials, credit card details, health records and other private information. SSL or a similar encryption protocol should also be applied to client, partner, staff and administrative access to online systems. Use transport layer security or protocol level encryption to protect communications between parts of your infrastructure, such as Web servers and database systems. 10. Failure to restrict URL access The problem: Some Web pages are supposed to be restricted to a small subset of privileged users, such as administrators. Yet often there?s no real protection of these pages, and hackers can find the URLs by making educated guesses. Say a URL refers to an ID number such as ?123456.? A hacker might say ?I wonder what?s in 123457?? Williams says. The attacks targeting this vulnerability are called forced browsing, ?which encompasses guessing links and brute force techniques to find unprotected pages,? OWASP says. Real-world example: A hole on the Macworld Conference & Expo Web site this year let users get ?Platinum? passes worth nearly $1,700 and special access to a Steve Jobs keynote speech, all for free. The flaw was code that evaluated privileges on the client but not on the server, letting people grab free passes via JavaScript on the browser, rather than the server. How to protect users: Don?t assume users will be unaware of hidden URLs. All URLs and business functions should be protected by an effective access control mechanism that verifies the user?s role and privileges. ?Make sure this is done ? every step of the way, not just once towards the beginning of any multi-step process,? OWASP advises.
  9. Start time is 8:00 AM I will see if I can aquire the schedule for the day and will post it this evening. JOHNSON COUNTY VARSITY WRESTLING TOURNAMENT WEIGH-IN 7:00 A.M. 1ST ROUND 8:00 A.M. (Rounds 2,3 & 5 will begin immediately after the conclusion of the previous round). There will be a 30:00 intermission between rounds 3 & 4 @INDIAN CREEK HIGH SCHOOL SATURDAY, DECEMBER 20, 2008 PAIRINGS (First named team will be the HOME team and have the Official Scorebook) MAT 1 ? East Mat/West Scoreboard MAT 2 ? West Mat/East Scoreboard ROUND 1 MAT 1 MAT 2 Indian Creek vs. Center Grove Franklin vs. Whiteland Bye: Greenwood ROUND 2 MAT 1 MAT 2 Indian Creek vs. Greenwood Center Grove vs. Franklin Bye: Whiteland ROUND 3 MAT 1 MAT 2 Greenwood vs. Center Grove Whiteland vs. Indian Creek Bye: Franklin ROUND 4 MAT 1 MAT 2 Franklin vs. Indian Creek Whiteland vs. Greenwood Bye: Center Grove ROUND 5 MAT 1 MAT 2 Whiteland vs. Center Grove Franklin vs. Greenwood Bye: Indian Creek
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.