Home Discord Chat
Go Back   ChiefsPlanet > Nzoner's Game Room > Media Center

Reply
 
Thread Tools Display Modes
Old 03-25-2014, 11:23 PM  
listopencil listopencil is offline
Immanentize The Eschaton
 
listopencil's Avatar
 
Join Date: Oct 2002
Location: In Partibus Infidelium
Casino cash: $2625880
Sophisticated malware discovered after 7 years, likely created by a nation-state




Security firm Kaspersky Labs recently released a research paper that uncovers the existence of a piece of highly complex malware that's been in circulation for almost seven years. It's called "The Mask," which is a rough English translation of Careto, a Spanish word for "ugly face" that was found in the malware's code. Aimed at high-level targets such as government institutions, embassies and large energy corporations, Kaspersky says "The Mask" has already claimed nearly 380 unique victims (with more than 1,000 IPs) in 31 countries that include China, France, Germany, the UK and the US. Kaspersky first spotted it in a spear phishing email campaign that entices the recipient over to malicious websites disguised as news sites like The Guardian and the Washington Post.

Kaspersky reports that the malware is extremely sophisticated, with a set of tools that include a rootkit, a bootkit, versions that'll affect 32- and 64-bit Windows, Mac OS X, Linux and possibly even mobile operating systems like Android and iOS. Once it gets its hooks into your system, it can be used to hijack all your communication channels and snatch everything from Skype conversations to sensitive encryption keys. It's also very difficult to detect. Due to the level of finesse found in the malware, Kaspersky concludes that "The Mask" was very likely created by a nation-state, much like Stuxnet and Duqu. As to which nation-state that is, the security firm doesn't know, but says it's probably one that is Spanish-speaking based on the code's language. Intrigued? Go on and hit the PDF link here to get the full rundown of what Kaspersky discovered.


http://www.securelist.com/en/downloa...emask_v1.0.pdf
Posts: 55,713
listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.listopencil is obviously part of the inner Circle.
    Reply With Quote
Old 03-26-2014, 10:37 PM   #16
patteeu patteeu is offline
The 23rd Pillar
 
patteeu's Avatar
 

Join Date: Sep 2002
Casino cash: $10019237
Quote:
Originally Posted by planetdoc View Post
Patching vulnerabilities could undermine your own offensive capabilties assuming that your target patches vulnerabilities you have made public.

Although the US could gather cyber weapons, using them such as they have with stuxnet and Flame lead to the arms-race.

Its like the idea of mutually assured destruction (aka MAD). No one uses nukes because they are scared others will too. After the US used cyberweapons, now plenty of others are as well.

The worst part about all of this is that the US is more technologically advanced than most (if not all) other countries, and thus are the most vulnerable to cyberattacks. They have neglected defending the homeland to go on the offensive.
Again, where do you get your confidence? What makes you think the US used cyberweapons first? Or that others wouldn't have acted without the US acting first?
__________________


“Boy, you all want power. God, I hope you never get it.” - Lindsay Graham
Posts: 110,871
patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 06:43 AM   #17
planetdoc planetdoc is offline
Veteran
 

Join Date: Apr 2012
Casino cash: $9995865
Quote:
Originally Posted by patteeu View Post
I'm not sure why you think you know that.
Evidence made available to the public.

It doesnt sound like you are disagreeing with anything I said, just wondering how I know. All of this is common knowledge at this point, but if there is a part of my post you disagree with, than CLEARLY let me know. I really dont feel like walking you through this when its readily available via a simple google search.

Quote:
Originally Posted by patteeu View Post
Again, where do you get your confidence? What makes you think the US used cyberweapons first?
Little Boy used against Hiroshima, was the first KNOWN deployment of an atomic bomb. Could another country have secretly acquired and deployed one first? sure, but their is no evidence of that and the idea is nearly statistically improbable.

That is the same with cyberweapons deployed by Operation Olympic Games.

link
Quote:
researchers at Symantec have uncovered a version of the Stuxnet computer virus that was used to attack Iran's nuclear program in November 2007, being developed as early as 2005, when Iran was still setting up its uranium enrichment facility.
you are going to be hard pressed to find a deployment of a cyberweapon by a nation state before that time frame.

Quote:
Originally Posted by patteeu View Post
Or that others wouldn't have acted without the US acting first?
There is no proof that another country wouldnt have deployed atomic and plutonium weapons before the US. Since US deployment in world war II, there has been an arms race to acquire nuclear weapons because it is thought of as the "great equalizer."

Same can be said about cyberweapons. There is no proof that another country wouldn't have acted first, but the fact that the US has, led to a race by other countries to have similar capabilities.

Last edited by planetdoc; 03-27-2014 at 07:00 AM..
Posts: 2,174
planetdoc has disabled reputation
    Reply With Quote
Old 03-27-2014, 08:17 AM   #18
htismaqe htismaqe is offline
'Tis my eye!
 
htismaqe's Avatar
 

Join Date: Aug 2000
Location: Chiefsplanet
Casino cash: $10269900
Quote:
Originally Posted by planetdoc View Post
3. Instead of working to make US interests more secure, the US government has worked to cripple and backdoor hardware and software. This makes US companies and infrastructure more vulnerable to attack.

4. US finds and gather 0-day exploits and vulnerabilities for offensive attacks, but fail to tell US companies so that they may fix their vulnerabilities....once again making them more vulnerable to attack.
That's because, to the NSA, American companies are potential enemies. Everybody is a potential enemy actually.

The former head of the NSA Cyber program, General Keith Alexandar, was a well known paranoid megalomaniac...
Posts: 100,022
htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:21 AM   #19
Amnorix Amnorix is offline
In BB I trust
 
Amnorix's Avatar
 

Join Date: May 2003
Location: Boston, Mass.
Casino cash: $10029808
Stunningly naive, in my view, to think that other countries wouldn't use cyberweapons if the US hadn't done it first.

I also don't understand why/how the NSA controls whether privately developed software has backdoors, etc. I doubt Microsoft etc. would be very receptive to the NSA approaching them to do that.
__________________
"I love signature blocks on the Internet. I get to put whatever the hell I want in quotes, pick a pretend author, and bang, it's like he really said it." George Washington
Posts: 43,125
Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.Amnorix is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:33 AM   #20
htismaqe htismaqe is offline
'Tis my eye!
 
htismaqe's Avatar
 

Join Date: Aug 2000
Location: Chiefsplanet
Casino cash: $10269900
Quote:
Originally Posted by Amnorix View Post
I also don't understand why/how the NSA controls whether privately developed software has backdoors, etc. I doubt Microsoft etc. would be very receptive to the NSA approaching them to do that.
The government has all kinds of handshake agreements in this arena. Microsoft is as complicit as any company.

One of the few that doesn't cooperate is Google (largely because they have world domination goals of their own that they don't want to share) and the government straight up went after them.
Posts: 100,022
htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:37 AM   #21
loochy loochy is offline
Hey Loochy, I'm hooome!
 
loochy's Avatar
 

Join Date: Oct 2008
Location: PooPooKaKaPeePeeShire
Casino cash: $2540752
omg no wai

1000 ips? that's it?
__________________
Hey Loochy, I'm hoooome!
Posts: 40,211
loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.loochy is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:41 AM   #22
patteeu patteeu is offline
The 23rd Pillar
 
patteeu's Avatar
 

Join Date: Sep 2002
Casino cash: $10019237
Quote:
Originally Posted by planetdoc View Post
Evidence made available to the public.

It doesnt sound like you are disagreeing with anything I said, just wondering how I know. All of this is common knowledge at this point, but if there is a part of my post you disagree with, than CLEARLY let me know. I really dont feel like walking you through this when its readily available via a simple google search.
I find your confidence in these paranoid, blame-America theories of yours fascinating. I was curious how you come by it. I disagree with your entire theory.

Quote:
Originally Posted by planetdoc View Post
Little Boy used against Hiroshima, was the first KNOWN deployment of an atomic bomb. Could another country have secretly acquired and deployed one first? sure, but their is no evidence of that and the idea is nearly statistically improbable.

That is the same with cyberweapons deployed by Operation Olympic Games.

link
Cyber warfare is often a bit more subtle than a nuclear bomb. It would be tough to miss news of a nuclear bomb detonation, but cyber attacks don't make the same splash if they're even disclosed publicly.

Quote:
Originally Posted by planetdoc View Post
you are going to be hard pressed to find a deployment of a cyberweapon by a nation state before that time frame.
It took me one google search to find this wikipedia entry:

Quote:
A 2008 article in the Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies by Jason Fritz alleges that the Chinese government from 1995 to 2008 was involved in a number of high profile cases of espionage, primarily through the use of a "decentralized network of students, business people, scientists, diplomats, and engineers from within the Chinese Diaspora".[28] A defector in Belgium, purportedly an agent, claimed that there were hundreds of spies in industries throughout Europe, and on his defection to Australia Chinese diplomat Chen Yonglin said there were over 1,000 such in that country. In 2007, a Russian executive was sentenced to 11 years for passing information about the rocket and space technology organization to China. Targets in the United States have included ‘aerospace engineering programs, space shuttle design, C4ISR data, high-performance computers, Nuclear weapon design, cruise missile data, semiconductors, integrated circuit design, and details of US arms sales to Taiwan’.[28]

While China continues to be held responsible for a string of cyber-attacks on a number of public and private institutions in the United States, India, Russia, Canada, and France, the Chinese government denies any involvement in cyber-spying campaigns. The administration maintains the position that China is not the threat but rather the victim of an increasing number of cyber-attacks. Most reports about China's cyber warfare capabilities have yet to be confirmed by the Chinese government.[29]
I know I won't convince you of anything here, but I definitely think your theory that the US opened a pandora's box that hadn't previously been opened with Stuxnet is wrong and I think the information you rely on for your confidence is feeble. I'm sure that in the end, we'll just have to agree to disagree again.
__________________


“Boy, you all want power. God, I hope you never get it.” - Lindsay Graham
Posts: 110,871
patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:46 AM   #23
planetdoc planetdoc is offline
Veteran
 

Join Date: Apr 2012
Casino cash: $9995865
Quote:
Originally Posted by Amnorix View Post
Stunningly naive, in my view, to think that other countries wouldn't use cyberweapons if the US hadn't done it first.
once again, one can substitute the word "nuclear" for "cyber." The previous deterent was that would be considered an "act of war."

Quote:
Originally Posted by Amnorix View Post
I also don't understand why/how the NSA controls whether privately developed software has backdoors, etc.
an example would be the NSA paying RSA to implement (and make default) the weakened random number generator Dual EC BRG.

Quote:
Originally Posted by Amnorix View Post
I doubt Microsoft etc. would be very receptive to the NSA approaching them to do that.
http://www.bloomberg.com/news/2013-0...-of-firms.html
Quote:
Originally Posted by article
Microsoft Corp. (MSFT), the world’s largest software company, provides intelligence agencies with information about bugs in its popular software before it publicly releases a fix, according to two people familiar with the process. That information can be used to protect government computers and to access the computers of terrorists or military foes.

Redmond, Washington-based Microsoft and other software or Internet security companies have been aware that this type of early alert allowed the U.S. to exploit vulnerabilities in software sold to foreign governments, according to two U.S. officials. Microsoft doesn’t ask and can’t be told how the government uses such tip-offs, said the officials, who asked not to be identified because the matter is confidential.
http://www.theguardian.com/world/201...tion-user-data
Quote:
Originally Posted by article
Microsoft has collaborated closely with US intelligence services to allow users' communications to be intercepted, including helping the National Security Agency to circumvent the company's own encryption, according to top-secret documents obtained by the Guardian.
There has also been speculation that NSA paid microsoft to backdoor skype. Prior to MS purchase of skype in 2011 for $8.5 billion, skype used a decentralized "p2p" system. After MS purchase it became centralized, and its ability to comply with PRISM tripled.

Last edited by planetdoc; 03-27-2014 at 09:00 AM..
Posts: 2,174
planetdoc has disabled reputation
    Reply With Quote
Old 03-27-2014, 08:46 AM   #24
htismaqe htismaqe is offline
'Tis my eye!
 
htismaqe's Avatar
 

Join Date: Aug 2000
Location: Chiefsplanet
Casino cash: $10269900
Quote:
Originally Posted by patteeu View Post
I find your confidence in these paranoid, blame-America theories of yours fascinating. I was curious how you come by it. I disagree with your entire theory.
Regardless of who did it first, the US has been involved in some very nefarious cyberattacks, some against US companies.
Posts: 100,022
htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 08:59 AM   #25
planetdoc planetdoc is offline
Veteran
 

Join Date: Apr 2012
Casino cash: $9995865
Quote:
Originally Posted by patteeu View Post
I find your confidence in these paranoid, blame-America theories of yours fascinating. I was curious how you come by it. I disagree with your entire theory.
ok. will walk you through it.



Quote:
Originally Posted by planetdoc View Post
1. The US declared cyberattacks an act of war.

2. US undermined this position with the Stuxnet and Flame virus.
already linked the first. US originally said that a cyberattack is an act of war. Than Hayden said stuxnet is "not an act of war." Thus the position was undermined.

Quote:
Originally Posted by planetdoc View Post
3. Instead of working to make US interests more secure, the US government has worked to cripple and backdoor hardware and software. This makes US companies and infrastructure more vulnerable to attack.

4. US finds and gather 0-day exploits and vulnerabilities for offensive attacks, but fail to tell US companies so that they may fix their vulnerabilities....once again making them more vulnerable to attack.
already linked documents citing this in this thread. the link below goes further into the topic and provides sources.
The Currency of Exploitation

Quote:
Originally Posted by patteeu View Post
Cyber warfare is often a bit more subtle than a nuclear bomb. It would be tough to miss news of a nuclear bomb detonation, but cyber attacks don't make the same splash if they're even disclosed publicly.
sure, that is why it took security researchers years to detect and figure out stuxnet. That being said, there is no evidence of a cyberattack similar to stuxnet prior to stuxnet.


Quote:
Originally Posted by patteeu View Post
It took me one google search to find this wikipedia entry:
that is no way in any level comparable to stuxnet. Those type of attacks are not sophisticated and can be done by anyone unlike the sophistication of stuxnet. Its like comparing handguns to nuclear weapons.
Posts: 2,174
planetdoc has disabled reputation
    Reply With Quote
Old 03-27-2014, 09:17 AM   #26
patteeu patteeu is offline
The 23rd Pillar
 
patteeu's Avatar
 

Join Date: Sep 2002
Casino cash: $10019237
Quote:
Originally Posted by planetdoc View Post
ok. will walk you through it.





already linked the first. US originally said that a cyberattack is an act of war. Than Hayden said stuxnet is "not an act of war." Thus the position was undermined.


already linked documents citing this in this thread. the link below goes further into the topic and provides sources.
The Currency of Exploitation



sure, that is why it took security researchers years to detect and figure out stuxnet. That being said, there is no evidence of a cyberattack similar to stuxnet prior to stuxnet.




that is no way in any level comparable to stuxnet. Those type of attacks are not sophisticated and can be done by anyone unlike the sophistication of stuxnet. Its like comparing handguns to nuclear weapons.
What a cop out. First you said the US launched the first cyber warfare attack. Now, you're complaining because the US may not have actually started it, but they did it better. I hope we continue to be better. You're desperate to blame the US. I think your arguments are garbage.

BTW, I don't care whether one person said cyber warfare is an act of war and then a different person said it isn't. As far as I'm concerned, that's an attempt to deflect from the issue.
__________________


“Boy, you all want power. God, I hope you never get it.” - Lindsay Graham
Posts: 110,871
patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 09:40 AM   #27
planetdoc planetdoc is offline
Veteran
 

Join Date: Apr 2012
Casino cash: $9995865
Quote:
Originally Posted by patteeu View Post
What a cop out. First you said the US launched the first cyber warfare attack.
reading comprehension fail. Where did I say that? Here are my posts related to this statement in sequential order.

Quote:
Originally Posted by planetdoc View Post
us govt opened up pandora's box by weaponizing the internet.
Quote:
Originally Posted by planetdoc View Post
nope. you dont have to use those offensive capabilities like the US did with stuxnet. Its like saying that since the US has nuclear weapons than they should go ahead and use it.
Quote:
Originally Posted by planetdoc View Post
Although the US could gather cyber weapons, using them such as they have with stuxnet and Flame lead to the arms-race.
Quote:
Originally Posted by planetdoc View Post
That is the same with cyberweapons deployed by Operation Olympic Games.

you are going to be hard pressed to find a deployment of a cyberweapon by a nation state before that time frame.
Quote:
Originally Posted by planetdoc View Post
That being said, there is no evidence of a cyberattack similar to stuxnet prior to stuxnet.
your linked wikipedia article deals with espionage.

Quote:
A 2008 article in the Culture Mandala: The Bulletin of the Centre for East-West Cultural and Economic Studies by Jason Fritz alleges that the Chinese government from 1995 to 2008 was involved in a number of high profile cases of espionage
Mariom-Webster (your favorite dictionary) defines espionage as
Quote:
the things that are done to find out secrets from enemies or competitors : the activity of spying
that is far different than an "attack" which they define as
Quote:
to act violently against (someone or something) : to try to hurt, injure, or destroy (something or someone)
Quote:
Originally Posted by patteeu View Post
BTW, I don't care whether one person said cyber warfare is an act of war and then a different person said it isn't. As far as I'm concerned, that's an attempt to deflect from the issue.
Not at all. US claimed earlier that cyberwarfare is an act of war. Thus the consequences of it would be a physical retaliation. By doing this themselves against Iran and declaring that it isnt an act of war, than they legitimized it for other nations.

Last edited by planetdoc; 03-27-2014 at 09:50 AM..
Posts: 2,174
planetdoc has disabled reputation
    Reply With Quote
Old 03-27-2014, 11:47 AM   #28
patteeu patteeu is offline
The 23rd Pillar
 
patteeu's Avatar
 

Join Date: Sep 2002
Casino cash: $10019237
Laughable.
__________________


“Boy, you all want power. God, I hope you never get it.” - Lindsay Graham
Posts: 110,871
patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.patteeu is obviously part of the inner Circle.
    Reply With Quote
Old 03-27-2014, 06:44 PM   #29
Dayze Dayze is offline
Resident Glue Sniffer
 
Dayze's Avatar
 

Join Date: Nov 2003
Casino cash: $5489358
should've used Norton. morons.
__________________
Life is 99% inspiration, 1% Perspiration, and 1% Attention to Detial.

RIP & Godspeed:
Saccoppo
Lonewolf Ed
Fire Me Boy
Posts: 37,353
Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.Dayze is obviously part of the inner Circle.
    Reply With Quote
Old 03-28-2014, 08:15 AM   #30
htismaqe htismaqe is offline
'Tis my eye!
 
htismaqe's Avatar
 

Join Date: Aug 2000
Location: Chiefsplanet
Casino cash: $10269900
Quote:
Originally Posted by Dayze View Post
should've used Norton. morons.
Norton is one of the worst AV suites on the market.
Posts: 100,022
htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.htismaqe is obviously part of the inner Circle.
    Reply With Quote
Reply

Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is On
HTML code is On

Forum Jump




All times are GMT -6. The time now is 11:04 PM.


This is a test for a client's site.
Fort Worth Texas Process Servers
Covering Arlington, Fort Worth, Grand Prairie and surrounding communities.
Tarrant County, Texas and Johnson County, Texas.
Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.