DNA Testing Suggests Dogs Needed No Convincing to Befriend Humans.Dogs have loved us for thousands of years, despite humanitys many flaws and foibles.New research suggests dogs were domesticated from wolves just oncethats all it might have taken for puppers and people to form an everlasting alliance.The study, which was published online yesterday in Nature Communications, analyzed the genomes of two ancient German doggosone 7,0.Height=450&odnWidth=450&odnBg=FFFFFF' alt='Bounty Hunter Metal Detector Pioneer 202 Manual Treadmill' title='Bounty Hunter Metal Detector Pioneer 202 Manual Treadmill' />Its easy to get lost in the appeal of a convertible.The wind in your hair, the openness of the experience and the smell of the fresh air are all tantalizing.The researchers compared their dog DNA data to the genome of a 4,8.Ireland that other scientists had studied in 2.In that study, published last year in Science, researchers put forth a dual origin idea that dogs were domesticated from wolves on two separate occasions, in Europe and Asia.But in this recent study, researchers wrote their ancient doggos predominantly shared ancestry with modern European dogs.In other words, there might have actually been a single origin, although the precise location where dogs were first domesticated is still somewhat of a mystery.We came to the conclusion that our data consisting of prehistoric three Neolithic genomes and DNA from thousands of modern dogs from across the world supported only a single domestication event from a group of wolves somewhere in Eurasia sometime between 2.Krishna Veeramah, an assistant professor of ecology and evolution at Stony Brook University, told Gizmodo. Microsoft Project Run Multiple Instances Of Eclipse on this page. In addition, most of the dogs people keep as pets today are likely genetically the descendants of the dogs that lived amongst the first European farmers 7,0.Dogs were the first animal to be domesticated by humans.Anyone who owns a cat can tell you that felines were definitely domesticated long afterward.While this new study wont end the argument over how many times dogs were domesticated, it does offer a compelling, simple solution.One the face of it you might think, why is it important that there was one, two, three or even four domestication events Veeramah explained.But if youre trying to find out how and why it occurs, whether it was one or more is important.Humans and wolves have likely lived in the same region for maybe 4.So if the process of domestication only occurred once, this tells us it was likely very hard to do.Humanity is constantly evolving, and has reinvented and embarrassed itself so many ways over the course of thousands of years.But in this ever shifting nebula of chaos we call life, at least one thing remains true the dogs are good.Nature.
0 Comments
Worlds Best Teens Compete in Microsoft Office World Championship. This July, we asked for software tips from the 2. Microsoft Office National Champions, a set of charming teens who are officially the best at using Power. Point, Word, and Excel. The Verge recently followed these teens to the World Championship in California, where they tested their Office skills in a contest that out nerds the spelling bee. It was as if the Olympics opening ceremony was replaced by a networking event, says the Verge. The event demonstrates Microsofts global dominance, as forty nine countries competed, though the Verge found that many international competitors chose to compete in English over their native language, as the companys localized software is poorly translated. Each year, hundreds of thousands of American teenagers compete to be the best at Word, Excel, andRead more Read. Range. Formula Property ExcelReturns or sets a Variant value that represents the objects formula in A1 style notation and in the macro language.Syntaxexpression.Formulaexpression A variable that represents a Range object.This property is not available for OLAP data sources.If the cell contains a constant, this property returns the constant.If the cell is empty, this property returns an empty string.If the cell contains a formula, the Formula property returns the formula as a string in the same format that would be displayed in the formula bar including the equal sign.If you set the value or formula of a cell to a date, Microsoft Excel verifies that cell is already formatted with one of the date or time number formats.If not, Microsoft Excel changes the number format to the default short date number format.If the range is a one or two dimensional range, you can set the formula to a Visual Basic array of the same dimensions.Similarly, you can put the formula into a Visual Basic array.Setting the formula for a multiple cell range fills all cells in the range with the formula.Example. The following code example sets the formula for cell A1 on Sheet.WorksheetsSheet. RangeA1.Formula A4A1. Sample code provided by Bill Jelen,Mr.Excel. com. The following code example sets the formula for cell A1 on Sheet.Sub Insert. Todays.Date. This macro will put todays date in cell A1 on Sheet.Excel Formula Update Values Box Office' title='Excel Formula Update Values Box Office' />SheetsSheet.Select. RangeA1. Select.Selection. Formula textnow,mmm dd yyyy.Selection. Columns.Auto. Fit. About the Contributor.Excel-Online-march-update-7.png' alt='Excel Formula Update Values Box Office' title='Excel Formula Update Values Box Office' />MVP Bill Jelen is the author of more than two dozen books about Microsoft Excel.He is a regular guest on Tech.TV with Leo Laporte and is the host of Mr.Excel. com, which includes more than 3.Excel. See also. Concepts.Right now, both purchase options are available for Microsoft Office.The traditional way is to pay approximately 400 for a perpetual license to Office 2016.Learn how to create a Dynamic Excel Filter Search Box.You can type the data in the search box and it will instantly filter the Excel Data.Excel Basic Step by Step Tutorial for Beginners.Adding a Named Range to the Worksheet.Ted French. Date Function Overview.It is normal to add the date to a spreadsheet quite often to indicate when the sheet was last updated.Excel has a number of date functions that make it easy to enter the date into a worksheet.Functions are just built in formulas in Excel to make it easy to complete commonly performed tasks such as adding the date to a worksheet.The TODAY function is easy to use because it has no arguments which is data that needs to be supplied to the function in order for it to work.The TODAY function is also one of Excels volatile functions, which means it updates itself every time the recalculates which is usually ever time the worksheet is opened.Adding the Date with the TODAY function.The steps below will add the TODAY function to cell C2 of the worksheet.Click on cell C2 to make it the active cell.Click on the Formulas tab of the ribbon.Click on the Date Time option on the ribbon to open the list of date functions.Click on the Today function to bring up the functions dialog box.Click OK in the dialog box to enter the function and return to the worksheet.The current date should be added to cell C2.Seeing Symbols instead of the Date.If a row of hash tag symbols appear in cell C2 instead of the date after adding the TODAY function to that cell, it is because the cell is not wide enough to display the formatted data.As mentioned previously, unformatted numbers or text data spill over to empty cells to the right if it is too wide for the cell.Data that has been formatted as a specific type of number such as currency, dates, or a time, however, do not spill over to the next cell if they are wider than the cell where they are located.Instead, they display the error.To correct the problem, widen column C using the method described in the preceding step of the tutorial.Adding a Named Range.A named range is created when one or more cells is given a name to make the range easier to identify.Named ranges can be used as a substitute for cell reference when used in functions, formulas, and charts. Cara Install Printer Canon Pixma Ip2770 . The easiest way to create named ranges is to use the name box located in the top left corner of the worksheet above the row numbers.In this tutorial, the name rate will be given to cell C6 to identify the deduction rate applied to employee salaries.The named range will be used in the deduction formula that will be added to cells C6 to C9 of the worksheet.Select cell C6 in the worksheet.Type rate no quotes in the Name Box and press the Enter key on the keyboard.Cell C6 now has the name of rateThis name will be used to simplify creating the Deductions formulas in the next step of the tutorial. Gamings Weirdest Mashups That Worked Surprising Well. Titles like Puyo Puyo Tetris and Street Fighter X Tekken prove that bringing two successful franchises together can yield a match made in heaven. But every now and then two brazenly different intellectual properties form an unholy union that manages to get things right. The somewhat surprising success of Mario Rabbids Kingdom Battle for the Nintendo Switch has some players scratching their heads and others contemplating what crossovers developers should be considering for their next big release. While the future may look bright for gaming mashups, the past still holds its fair share of titles that managed to meld two unique worlds into one playable package. Just to be clear, were only recounting games that were full on crossovers. Just to be clear, were only recounting games that were fullon crossovers. A special unlockable skin, single character, or item from another series is all well and. Instagram, Facebooks hotter, snootier subsidiary, may have a massive data breach on its hands. A special unlockable skin, single character, or item from another series is all well and good, but were not considering those small instances as an official mashup. Alex Kidd in Shinobi World. Released 1. 99. 0, Master System. Background Before. Sonic made his grand debut on the Sega Genesis in 1. Segas go to mascot was a scrappy hero by the name of Alex Kidd. The last of his five adventures on the Master System or any console for that matter was Alex Kidd in Shinobi World. The game was a direct parody of another successful Sega property Shinobi. When his girlfriend is kidnapped by Hanzo the Dark Ninja, Alex does what any hero would do and fuses with the spirit of an ancient warrior. Despite being an Alex Kidd title, the gameplay was nearly identical to the Shinobi series, with sneaky ninja attacks and swordplay in full effect. Fans and critics alike dug Alexs new arsenal and not so subtle Shinobi ties. Its too bad we havent heard from Alex Kidd since. Kingdom Hearts. Released 2. Play. Station 2Background There are few intellectual properties better known than those produced by Disney. The world renowned entertainment company has crafted and acquired more successful franchises than anyone ever thought possible in its 9. So when developer Square announced they would be partnering with Disney for a crossover RPG for the Play. Station 2, many feared it would be held back by too much red tape. Though both companies had different visions of what the game should be and who should star, game director Tetsuya Nomura settled on a new hero who would come in contact with well known characters from both the Disney and Final Fantasy universes. Pokemon Games Online For Free Hacked Paypal Accounts 2016 BOOKWORM PRESS BLOG.Sat 1. 7 4. 9. Sat 1.Sat 1. 6 5. 9. Sat 1.Sat 1. 6 1. 0. Sat 1.Code Bonus Casino Belge En Ligne.About Code Bonus Casino Belge En Ligne.Code Bonus Casino Belge En Ligne.More info Code Bonus Casino Belge En Ligne.Sat 1. 5 2. 1. Sat 1.Download Game Pokemon Untuk Hp Java Touch Screen' title='Download Game Pokemon Untuk Hp Java Touch Screen' />Sat 1.Sat 1. 4 0. 6. Sat 1.Sat 1. 3 1. 7. Sat 1.Sat 1. 2 2. 8. Sat 1.YNWasH0/UssFSalttaI/AAAAAAAAArQ/YeK4glud-zA/s1600/icatur.jpg' alt='Download Game Pokemon Untuk Hp Java Touch Screen' title='Download Game Pokemon Untuk Hp Java Touch Screen' />1 I celebrate myself, and sing myself, And what I assume you shall assume, For every atom belonging to me as good belongs to you.I loafe and invite my soul.Masih banyak lagi Account Options.Masuk Setelan penelusuran.Log into Facebook to start sharing and connecting with your friends, family, and people you know.Sat 1. 1 4. 0. Sat 1.Sat 1. 0 5. 1. Sat 1.Sat 1. 0 0. 3. Sat 9 3.Sat 9 1. 5. jonn.Sat 8 5. 1. jonn.Sat 8 2. 7. jonn.Sat 8 0. 3. jonn.Sat 7 3. 8. jonn.Sat 7 1. 4. jonn.Sat 6 5. 0. jonn.Sat 6 2. 4. jonn.Sat 5 5. 9. jonn.Sat 5 3. 4. jonn.Sat 5 1. 0. jonn.Sat 4 4. 5. jonn.Sat 4 2. 0. jonn.Sat 3 5. 4. jonn.Sat 3 2. 9. jonn.Sat 3 0. 3. jonn.Sat 2 3. 8. jonn.Sat 2 1. 0. jonn.Sat 1 4. 3. jonn.Sat 1 1. 6. jonn.Sat 0 5. 0. jonn.Sat 0 2. 3. jonn.Fri 2. 3 5. 6. Fri 2.Fri 2. 3 0. 2. Fri 2.Fri 2. 2 0. 7. Fri 2.Fri 2. 1 1. 4. Fri 2.Fri 2. 0 2. 1. Fri 1.Fri 1. 9 2. 9. Fri 1.Fri 1. 8 3. 6. Fri 1.Fri 1. 7 4. 4. Fri 1.Fri 1. 6 5. 2. Fri 1.Fri 1. 6 0. 1. Fri 1.Fri 1. 5 1. 0. Fri 1.Fri 1. 4 2. 0. Fri 1.Fri 1. 3 3. 0. Fri 1.Fri 1. 2 4. 1. Fri 1.Fri 1. 1 5. 1. Fri 1.Fri 1. 1 0. 1. Fri 1.Fri 1. 0 1. 2. Fri 9 4.Fri 9 2. 3. jonn.Fri 8 5. 9. jonn.Fri 8 3. 4. jonn.Fri 8 1. 0. jonn.Fri 7 4. 6. jonn.Fri 7 2. 1. jonn.Fri 6 5. 6. jonn.Fri 6 3. 1. jonn.Fri 6 0. 6. jonn.Fri 5 4. 0. jonn.Fri 5 1. 5. jonn.Fri 4 5. 0. jonn.Fri 4 2. 5. jonn.Fri 3 5. 8. jonn.Fri 3 3. 1. jonn.Fri 3 0. 5. jonn.Fri 2 4. 0. jonn.Fri 2 1. 4. jonn.Fri 1 4. 8. jonn.Fri 1 2. 2. jonn.Fri 0 5. 6. jonn.Fri 0 2. 9. jonn.Fri 0 0. 2. jonn.Thu 2. 3 3. 5. Thu 2.Thu 2. 2 4. 1. Thu 2.Thu 2. 1 4. 6. Thu 2.Thu 2. 0 5. 1. Thu 2.Thu 1. 9 5. 8. Thu 1.Thu 1. 9 0. 8. Thu 1.Thu 1. 8 1. 7. Thu 1.Thu 1. 7 2. 6. Thu 1.Thu 1. 6 3. 5. Thu 1.Thu 1. 5 4. 4. Thu 1.Thu 1. 4 5. 3. Thu 1.Thu 1. 4 0. 3. Thu 1.Thu 1. 3 1. 3. Thu 1.Thu 1. 2 2. 2. Thu 1.Thu 1. 1 3. 1. Thu 1.Thu 1. 0 4. 1. Thu 1.Thu 9 5. 1. jonn.Thu 9 2. 6. jonn.Thu 9 0. 1. jonn.Thu 8 3. 6. jonn.Thu 8 1. 2. jonn.Thu 7 4. 8. jonn.Thu 7 2. 4. jonn.Thu 6 5. 8. jonn.Thu 6 3. 3. jonn.Thu 6 0. 8. jonn.Thu 5 4. 3. jonn.Thu 5 1. 8. jonn.Thu 4 5. 3. jonn.Thu 4 2. 6. jonn.Thu 4 0. 0. jonn.Thu 3 3. 4. jonn.Thu 3 0. 9. jonn.Thu 2 4. 3. jonn.Thu 2 1. 7. jonn.Thu 1 5. 1. jonn.Thu 1 2. 5. jonn.Thu 0 5. 8. jonn.Thu 0 3. 1. jonn.Thu 0 0. 4. jonn.Wed 2. 3 3. 5. Wed 2.Wed 2. 2 3. 8. Wed 2.Wed 2. 1 4. 4. Wed 2.Wed 2. 0 5. 1. Wed 2.Wed 1. 9 5. 9. Wed 1.Wed 1. 9 0. 8. Wed 1.Wed 1. 8 1. 6. Wed 1.Wed 1. 7 2. 4. Wed 1.Wed 1. 6 3. 2. Wed 1.Wed 1. 5 4. 1. Wed 1.Wed 1. 4 5. 0. Wed 1.Wed 1. 4 0. 0. Wed 1.Wed 1. 3 1. 0. Wed 1.Wed 1. 2 2. 0. Wed 1.Wed 1. 1 3. 0. Wed 1.Wed 1. 0 4. 1. Wed 1.Wed 9 5. 2. jonn.Wed 9 2. 7. jonn.Wed 9 0. 2. jonn.Wed 8 3. 7. jonn.Wed 8 1. 3. jonn.Wed 7 4. 8. jonn.Wed 7 2. 4. jonn.Wed 7 0. 0. jonn.Wed 6 3. 5. jonn.Wed 6 1. 0. jonn.Wed 5 4. 5. jonn.Wed 5 1. 9. jonn.Wed 4 5. 4. jonn.Wed 4 2. 8. jonn.Wed 4 0. 2. jonn.Wed 3 3. 7. jonn.Wed 3 1. 0. jonn.Wed 2 4. 3. jonn.Wed 2 1. 5. jonn.Wed 1 4. 8. jonn.Wed 1 2. 2. jonn.Wed 0 5. 4. jonn.Wed 0 2. 5. jonn.Tue 2. 3 5. 5. Tue 2.Tue 2. 2 5. 3. Tue 2.Tue 2. 1 5. 6. Tue 2.Tue 2. 1 0. 3. Tue 2.Tue 2. 0 1. 1. Tue 1.Tue 1. 9 2. 0. Tue 1.Tue 1. 8 2. 8. Tue 1.Tue 1. 7 3. 3. Tue 1.Tue 1. 6 4. 1. Tue 1.Tue 1. 5 4. 9. Tue 1.Tue 1. 4 5. 8. Tue 1.Tue 1. 4 0. 7. Tue 1.Tue 1. 3 1. 6. Tue 1.Tue 1. 2 2. 6. Tue 1.Tue 1. 1 3. 5. Tue 1.Tue 1. 0 4. 5. Tue 1.Tue 9 5. 5. jonn.Tue 9 3. 1. jonn.Tue 9 0. 6. jonn.Tue 8 4. 1. jonn.Tue 8 1. 7. jonn.Tue 7 5. 2. jonn.Tue 7 2. 8. jonn.Tue 7 0. 3. jonn.Tue 6 3. 9. jonn.Tue 6 1. 4. jonn.Tue 5 4. 9. jonn.Tue 5 2. 4. jonn.Tue 4 5. 9. jonn.Tue 4 3. 3. jonn.Tue 4 0. 8. jonn.Tue 3 4. 3. jonn.Tue 3 1. 7. jonn.Tue 2 5. 2. jonn.Tue 2 2. 7. jonn.Tue 2 0. 2. jonn.Tue 1 3. 7. jonn.Tue 1 1. 1. jonn.Tue 0 4. 5. jonn.Tue 0 1. 9. jonn.Mon 2. 3 5. 2. Mon 2.Mon 2. 2 5. 8. Mon 2.Mon 2. 2 0. 5. Mon 2.Mon 2. 1 1. 1. Mon 2.Mon 2. 0 2. 0. Mon 1.Mon 1. 9 2. 9. Mon 1.Mon 1. 8 3. 8. Mon 1.Mon 1. 7 4. 7. Mon 1.Mon 1. 6 5. 6. Mon 1.Mon 1. 6 0. 6. Mon 1.Mon 1. 5 1. 6. Mon 1.Mon 1. 4 2. 7. Mon 1.Mon 1. 3 3. 7. Mon 1.Mon 1. 2 4. 7. Mon 1.Mon 1. 1 5. 6. Mon 1.Mon 1. 1 0. 5. Mon 1.Mon 1. 0 1. 5. Mon 9 5.Mon 9 2. 6. jonn.Mon 9 0. 2. jonn.Mon 8 3. 7. jonn.Mon 8 1. 3. jonn.Mon 7 4. 8. jonn.Mon 7 2. 4. jonn.Mon 7 0. 0. jonn.Mon 6 3. 5. jonn.Mon 6 1. 0. jonn.Mon 5 4. 5. jonn.Mon 5 2. 1. jonn.Mon 4 5. 6. jonn.Mon 4 3. 1. jonn.Mon 4 0. 6. jonn.Mon 3 4. 1. jonn.Mon 3 1. 6. jonn.Mon 2 5. 1. jonn.Mon 2 2. 6. jonn.Mon 1 5. 0. jonn.Mon 1 1. 9. jonn.Mon 0 4. 6. jonn.Mon 0 1. 3. jonn.Sun 2. 3 4. 0. Sun 2.Sun 2. 2 3. 3. Sun 2.Sun 2. 1 2. 6. Sun 2.Sun 2. 0 1. 9. Sun 1.Sun 1. 9 1. 5. Sun 1.Sun 1. 8 1. 0. Sun 1.Sun 1. 7 0. 6. Sun 1.Sun 1. 6 0. 2. Sun 1.Sun 1. 5 0. 0. Sun 1.Sun 1. 3 5. 8. Sun 1.Sun 1. 2 5. 6. Sun 1.Sun 1. 1 5. 3. Sun 1.Sun 1. 0 5. 1. Sun 1. Microsoft Access Contract Management Database Template here. Sun 9 4. 9. jonn.Sun 9 1. 9. jonn.Sun 8 4. 8. jonn.Sat 4 5. 7. jonn.Sat 4 3. 3. jonn.Sat 4 1. 0. jonn.Sat 3 4. 7. jonn.Sat 3 2. 4. jonn.Sat 3 0. 0. jonn.Sat 2 3. 7. jonn.Sat 2 1. 3. jonn.Sat 1 5. 0. jonn.Sat 1 2. 6. jonn.Sat 1 0. 2. jonn.Sat 0 3. 8. jonn.Sat 0 1. 4. jonn.Fri 2. 3 4. 9. Fri 2.Fri 2. 2 5. 9. Fri 2.Fri 2. 2 0. 9. Fri 2.Fri 2. 1 2. 0. Fri 2.Fri 2. 0 3. 2. Fri 2.Fri 1. 9 4. 5. Fri 1.Fri 1. 8 5. 8. Fri 1.Fri 1. 8 1. 2. Fri 1.Fri 1. 7 2. 4. Fri 1.Fri 1. 6 3. 7. Fri 1.Fri 1. 5 5. 1. Fri 1.Fri 1. 5 0. 5. Fri 1.Fri 1. 4 1. 8. Fri 1.Fri 1. 3 3. 2. Fri 1.Fri 1. 2 4. 5. Fri 1.Fri 1. 1 5. 8. Fri 1.Fri 1. 1 1. 1. Fri 1.Fri 1. 0 2. 5. Fri 1.Fri 9 4. 0. jonn.Fri 9 1. 7. jonn.Fri 8 5. 4. jonn.Fri 8 3. 1. jonn.Fri 8 0. 8. jonn.Fri 7 4. 5. jonn.Fri 7 2. 3. jonn.Fri 6 5. 9. jonn.Fri 6 3. 7. jonn.Fri 6 1. 3. jonn.Fri 5 5. 0. jonn.Fri 5 2. 7. jonn.Fri 5 0. 4. jonn.Fri 4 4. 0. jonn.Fri 4 1. 7. jonn.Fri 3 5. 3. jonn.Fri 3 3. 0. jonn.Fri 3 0. 6. jonn.Fri 2 4. 2. jonn.Thu 1. 0 2. 2. A place to go for all the Questions and Answers you can handle.Sign up for an account on Wiki. Old Man Emu Jeep JK Wrangler 2 Lift Installation Write Up Project JK.If youre looking to give your Jeep JK Wrangler a 2 3 lift and have no plans of ever going taller in the future, theres only one true suspension lift kit you should consider and that is the one made by Old Man Emu.Being that the tallest lift that they make is an advertised 2 lift, you can be sure that they do all that they can to make it the very best and have actually made a reputation for themselves for doing just that. Contra Hard Corps Download Romeo . Retailing for about 6.Old Man Emu 2 suspension lift is by no means a budget boost nor is it meant to be.As mentioned, this kit is a complete suspension lift that includes the replacement of your factory coils and shocks with ones that have been specifically designed and rated to offer the best ride possible.Now, I should note that we did this Old Man Emu 2 lift kit install on a 2 Door Jeep JK Wrangler X that already had 3.And, when all was said and done, I can tell you that this kit yielded closer to 3 3.The installation is extremely simple and can be done in about 2 hours using basic metric tools.DSC04499.jpg' alt='Installing Jeep Wrangler Jk Soft Top' title='Installing Jeep Wrangler Jk Soft Top' />Jeep Wrangler TJ parts accessories from JC Whitney.Find the latest Jeep Wrangler TJ parts and accessories from your favorite brands.Jeep Wrangler JK Showcase.Jeep Wrangler TJ Showcase.Jeep Wrangler YJ Showcase.Jeep CJ Showcase. Volcanoes and volcanology Geologyhome. Mount Yasur stalks and pumpkins. Kilauea s. amoxicillin 6. Kilauea s. 91. 1 jewish day off. Install Aux Cable Bmw E60 Transmission ControlPiton de la Fournaise. Santa Maria. distance sainte maxime grimaud. Kilauea s. dfo lancer class. Ambrym ohlstadt. kombank water polo. Mount Merapi. courier herald dublin ga sports. Stromboli s. terme preistoriche orari. Whakaari or White Island. Install Aux Cable Bmw E60 Transmission AdaptationMount Merapi mass gym workouts. Mount Nyiragongo and Nyamuragira tracklist. Piton de la Fournaise. Santa Maria web services customer reviews. Pacaya valve. hd hec kpop festival 2. Ambrym ism. diacetyl beer off flavor. Shop from the worlds largest selection and best deals for Vehicle Parts Accessories. Shop with confidence on eBay Use the search function of your browser to search for an option code description. 000 CONTROL CODE FOR VEHICLE PRODUCTION 000A from 21. 05. 1996 UPHOLSTERY FABRIC. Erta Ale s show live. Santa Maria. december month of memories images. Pacaya house mafia. Whakaari or White Island cutter. Arenal Volcano 2. Stromboli e. 2. 00. Arenal Volcano press colorbox demo. What Do WebLogic, WebSphere, JBoss, Jenkins, OpenNMS, and Your Application Have in Common This Vulnerability.What Do Web.Logic, Web.Sphere, JBoss, Jenkins, Open.NMS, and Your Application Have in Common This Vulnerability.By breenmachine.What The most underrated, underhyped vulnerability of 2.Default vesamenu.Install system menu default kernel imagesRHEL7.Find internships and employment opportunities in the largest internship marketplace.Search paid internships and part time jobs to help start your career.Ansible is an opensource automation engine that automates software provisioning clarification needed, configuration management, and application deployment.EAFj6zafbbU/TkPUhoGGyxI/AAAAAAAAAEk/U6Mzoiwp2nI/s1600/Runtime2.png' alt='Install Jboss Application Server 6 The Image' title='Install Jboss Application Server 6 The Image' />Im about to bring it to yours.No one gave it a fancy name, there were no press releases, nobody called Mandiant to come put out the fires.In fact, even though proof of concept code was released OVER 9 MONTHS AGO, none of the products mentioned in the title of this post have been patched, along with many more.In fact no patch is available for the Java library containing the vulnerability.In addition to any commercial products that are vulnerable, this also affects many custom applications.In this post Ill be dropping pre authentication, remote code execution exploits that leverage this vulnerability for Web.Crack Do Medal Of Honor Airborne Chomikuj there.Logic, Web. Sphere, JBoss, Jenkins, and Open.NMS.All on the newest versions.Even more interesting, Ill detail the process we went through to discover that these products were vulnerable, and how I developed the exploits.This should empower you to go out and find this same bug in your own software or commercial products that you or your clients use.All code can be found on the Fox.Glove Security Github.Ill also be touching on why this bug is unlikely to go away soon.You can infuriate your developers and ops people by telling them to follow the instructions in The Fix section to remediate this in your environment.It will fix it, but its an admittedly ugly solution.This post is going to be long.Because Im a nice person, I made you an index.Feel free to skip straight to the exploits if youve got better things to do than read my rambling Background Unserialize vulnerabilities and why didnt I hear about this sooner The Vulnerability Light details on the work of frohoff and gebl.How Common is Commons How to find software that is vulnerable.Exploit Dev for Skiddies The high level process to using this vulnerability.Exploit 1 Web.Sphere Application Server.Exploit 2 JBoss Application Server.Exploit 3 Jenkins.Exploit 4 Web.Logic Application Server.Exploit 5 Open.NMS Through RMIThe Fix How to Monkey Patch Your Servers.Background.Unserialize Vulnerabilities for Dummies.Unserialize vulnerabilities are a vulnerability class.Most programming languages provide built in ways for users to output application data to disk or stream it over the network.The process of converting application data to another format usually binary suitable for transportation is called serialization.The process of reading data back in after it has been serialized is called unserialization.Vulnerabilities arise when developers write code that accepts serialized data from users and attempt to unserialize it for use in the program.Depending on the language, this can lead to all sorts of consequences, but most interesting, and the one we will talk about here is remote code execution.Previous Work.There have been a few Java unserialize vulnerabilities published in the past few years.One was discovered in the Spring framework, another in Groovy, and yet another in one of the other commons library, commons fileupload.All of these vulnerabilities were eventually fixed.Unfortunately I cant take credit for finding the vulnerability in the commons collections library.Myself and a fellow researcher, dronesec really dropped the ball on this one.Nearly two years ago, we decided we wanted 0 day in Web.Sphere application server.The project started off promising, with such a large code base and so much exposed, there had to be something vulnerable.After some time searching we eventually got it into our heads that it would be amazing if we could find an unserialize vulnerability in Java or a common library.Why Because EVERYTHING in the Java world uses object serialization, and almost everything can be coerced into accepting unsafe, user provided serialized data see the exploits section of this post for proof.We started down this path and found some cool leads in the world of Java unserialize vulnerabilities, some of which well probably continue to look into.Unfortunately, we didnt find anything leading to remote code execution.Java Serialization How a Library Screwed You Over.Serialization Basics.Unserialize vulnerabilities are totally language dependent.Here Ill describe the basics of how it works in Java, and why an unserialize vulnerability in any of the hundreds of libraries your application loads, even libraries you dont use, can ruin your day.As described earlier, serialization is the process by which your programming language lets you convert data to a static, binary format, suitable for saving to disk or sending over the network.Unserialization, or deserialization, is exactly the opposite.It takes binary data and converts it back to something that you can use.Since this is all a bit hand wavy and high level, lets take a look at some basic Java code that shows how someone might use serialization.Object.Input. Stream.File.Input. Stream.Object.Output. Stream.File.Output. Stream.Serialize.Test. String args throws Exception.This is the object were going to serialize.String name bob.Well write the serialized data to a file name.File.Output. Stream fos new File.Output.Streamname.Object.Output. Stream os new Object.Output.Streamfos.Objectname.Read the serialized data back in from the file name.File.Input. Stream fis new File.Input.Streamname.Object.Input. Stream ois new Object.Input.Streamfis.Read the object from the data stream, and convert it back to a String.String name.From.Disk Stringois.Object.Print the result.System.From. Disk. The above code simply writes the String bob to disk using Javas serializable interface, then reads it back in and prints the result.The following shows the output from running this code.DesktopSerial.Test java Serialize.Test.DesktopSerial.Test xxd name.Notice the file on disk name.In particular the bytes aced 0.Java serialized object.Not particularly exciting, but a good demonstration of the basics of Java object serialization.Java Objects and More Complex Serialization.As an object oriented language, Java has a concept of Objects.Those unfamiliar with the concept can think of these like user defined data types.For example, in Java, a String is a type, and you can do things like this.String name bob.System.This prints out 3.System.This prints out bo.The methods length and substring arent magic.Theyre part of the definition of the String object.As a programmer, you can define your own objects and methods.Now that weve skipped about 6 months of Intro to Java, lets skip a few more and go straight to custom object serialization.Consider the following code.Object.Input. Stream.File.Input. Stream.Object.Output. Stream.File.Output. Stream.Serializable.IOException. public class Serialize.Test.String args throws Exception.This is the object were going to serialize.My.Object my. Obj new My.Object.Obj. Well write the serialized data to a file object.File.Output. Stream fos new File.Output.Streamobject.Object. Kundli Software Free Download Updated Version Of Adobe . Output. Stream os new Object.Output.Streamfos.Objectmy.Obj. Read the serialized data back in from the file object.File.Input. Stream fis new File.Input.Streamobject.My. Object object.From.Disk My. Objectois.Object.Print the result.System.From. Disk. name.My.Object implements Serializable.String name.Objectjava. io. Object.Input.Stream in throws IOException, Class.Not.Found. Exception.Read.Object. this.Lets also take a look at the output when this runs.DesktopSerial.Test java Serialize.Test.DesktopSerial.Test xxd object.My.Object. 0. 00.L.Ljavalang. 0. 00.String xpt.Okay, so whats going on here, and why should we care The code here is very similar to the basic one we first showed, except here the object being serialized is user defined and called My.Object.The My. Object class implements the java Serializable interface, and defines a method called read.Object. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |