Tuesday, November 26, 2013

Introduction


I would like to share my personal information.
I was born on July 8, 1965 in Naju, South Korea, a city that is famous for its pear production in Korea.
I moved to Seoul when I was 7 years old, and grew up until I entered middle school. I’ve joined in the Air Force Academy Early College High School, it’s similar to ROTC School, but the hierarchical level structure to upperclassmen relationship is very hard to follow with class schedule. The upperclassmen makes up the rules in the school.
I wish to study about the Korea military aviation business and high technology for my future career, and I have also learned some military fighting skills and teaching skills to teach soldiers for leadership.
One year later, I left the military high school and enrolled into a private high school until graduation.
In Korea, every male students have to join the military to serve the country after they turn 19 years old.
If you live in a politician family, or have a military family member or a rich family member, your service in the military or working in the green zone will be reduced, but if you through the problem that I had to go through, you would have to go to a nearby DMZ area or deployed to DMZ for 30 months.
I joined the Army like everyone else did, and applied a higher rank position that required to extend my military service.   
I didn’t choose to go through the 30 months service, after joining army. I applied a 7 year service contract with the military service. Before I joined the Army, I took drama classes in High school and performed on stage several times.
I was an actor, I was in three films.
The actor life style and Military life style are really different from each other. Even if they were different from each other, I worked hard to get used to living the military life style. I really don’t like stay in warm water and then jump into cold water.


But I overcame the differences of living the military and acting lifestyle, then I had to overcome another problem similar to the one that I had just overcame, but it seems like nothing has changed from the past.
The problem that I am currently in is the Korean and English language structure. These two languages are really different from each other, the time zone between America and Korea is also different.
One of my weaknesses is learning other languages, especially English.
After I turned 27 years old, I moved to America and worked in the IT field, where I am now.
I married with my lovely Korean wife through the traditional way that Korean people had to go through, like match making traditions. I didn’t know her very well before we got married.
My mother suggested that I should get married, so I did, through the traditional way of a Korean marriage style.
Now I am living with my three loving kids (girl 15 years old, boy 13 years old and a 10 years old baby).

Now, I’m working at CACI and my job function is supporting new equipment training for operation and maintenance device and troubleshoots including repairs for the US military troops.

Sunday, November 24, 2013

Microsoft Patches Vulnerability Attackers Used to Target IE Users

This topic is very interesting to me.

http://www.securityweek.com/microsoft-patches-vulnerability-attackers-used-target-ie-users


Microsoft swatted a recently-discovered, zero-day bug being used in a watering hole attack as part of this month's Patch Tuesday update.

The flaw, CVE-2013-3918, is a remote code execution vulnerability the InformationCardSigninHelper ActiveX component used by Internet Explorer. The issue was already set to be fixed in MS13-090 before FireEye discovered it, explained Dustin Childs, group manager of response communications for Microsoft Trustworthy Computing.  

According to Microsoft, the attack in the wild is targeting IE 7 and IE 8 on Windows XP. The exploit being used by the attackers actually combines two distinct vulnerabilities. In addition to the remote code execution bug, there is also an information disclosure vulnerability used as well to improve the reliability of the exploit and to create ROP (return-oriented programming) payloads specifically targeted for the victim's machine.