Lil Wayne’s house on La Gorce Island in Miami Beach is for sale -- that is what has been all over the internet today, on blog after blog. Is it true? No it’s not.
The latest rumor was started by an erroneous April 7th report by AOL Real Estate, stating that Lil Wayne put his La Gorce Island home up for sale due to tax problems.
Lil Wayne doesn’t own a house on Miami Beach, but it he reportedly rents a home on La Gorce Island. 94 La Gorce Circle is a 15,000 square feet home which was built in 2004, and except for the relatively small lot on which it is situated, could well be considered a Miami Beach mansion.
The home is advertised as an architectural masterpiece with “rich woods, expanses of glass, steel & select marble, lavished throughout this ultra-modern residence that features sky terraces with incredible views”.
In actuality, the property has been on the market for sale for quite some time. It was listed for sale in 2006 for $13.9 million, and has been on the market for most of the time since then. In November 2010 the price was dropped to $12.9 million, where it stands today.
30 Haziran 2012 Cumartesi
Lil Wayne's House In Miami Beach For Sale
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.
Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Enfants et lits d'appoint
! Tous les enfants de moins de 7 ans séjournent à titre gracieux pour l'utilisation de la literie disponible dans la chambre des parents.Tous les enfants de moins de 2 ans sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits bébés.Tous les enfants plus âgés ou adultes sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits d'appoint.Le nombre maximum de lit d'appoint ou de lit bébé en chambre est égal à 1.Les lits d'appoint et lits bébés sont uniquement disponibles sur demande et ils doivent être confirmés par l'hôtel.Les suppléments ne sont pas automatiquement calculés dans le montant total de la réservation et ils doivent être réglés séparément à l'hôtel.
L'hotel Park
L'hotel Park Lane dispose d'une connexion internet
Willy's Beach Club Hotel

Willy's Beach Club Hotel is in Boat Station 1. It is absolutely Beach-Front Hotel and located across Willy's Rock – the most photograph spot and landmark in the island. It's in the quiet area of the white beach, yet accessible to the main road for your day-to-day itinerary and walking distance to famous beach front bars for your night life as distance well. Thus they guarantee privacy, serenity an fun at the same time.
The resort has 36 newly renovated spacious rooms; a multi-purpose air conditioned hall with maximum capacity of 180 persons with complete audio-visual conference equipment, perfect for in-door events, caters seminars and special occasions. Everything is arranged from your choice of motif to your selected food to meet your budget.

27 Haziran 2012 Çarşamba
Miami Makes Forbes List Of America's Most Expensive Communities
Fisher Island, Miami Beach, just ranked by Forbes as #37 of America's most expensive zip codes, boasts a not too shabby median home price of $2,295,291. Forbes just published it's new list, with 4 Miami zip codes earning a spot as one of America's highest priced places to buy a home or condo, including aforementioned Fisher Island (33109), Key Biscayne (33149), Coral Gables (33146), and 2 small communities just north of Miami Beach -- Bal Harbour and Indian Creek (33154).
The report stated that these 4 zip codes make Miami one of the most expensive places to buy property in the United States, in spite of the fact that home prices have plummeted sharply in recent years, and that foreclosures have continued to mount. Hi-end luxury home prices have seen a slowing slide, according to Mike Simonsen, CEO of Altos Research, a Mountain View, Calif., firm that tracks housing market data.
"We have yet to see mortgage defaults climb aggressively into higher-priced homes, but there are some signs that those could hit in next twelve months" Simonsen said. "If those mortgage resets drive inventory at the higher end, that would cause major problems."
Although it does seem as if the luxury real estate market in Miami has all but slowed to a halt, a number of luxury realtors are reporting that foreign buyers are re-entering the market place to pick up those hi-end bargains which may no longer be as available in a year from now.
Al Capone's House in Miami Beach For Sale $6.85 Million
Al Capone's house in Miami Beach on Palm Island is for sale. Advertised as an opportunity to make a piece of Miami Beach history your own, the house once belonging to the infamous gangster Al Capone, comes replete with City of Miami Beach approved plans for rebuilding.
The Palm Island home, located at 93 Palm Ave, Miami Beach, FL, was previously listed in 2006, for $6.8 million, and went through 2 pending sales since that time, with no closing ever taking place. It was relisted for sale this month for $50,000 more than the original asking price.
The historical 6,103 square feet house, is situated on a 3 quarters acre lot, with 100 linear feet of frontage facing neighboring Hibiscus Island and Biscayne Bay. Built in 1922, the Capone house is one of the oldest homes in Miami Beach. Henry Morrison, who still owns the house, according to the Miami Dade property records, purchased it in 1971 for $56,000.
Lil Wayne's House In Miami Beach For Sale
Lil Wayne’s house on La Gorce Island in Miami Beach is for sale -- that is what has been all over the internet today, on blog after blog. Is it true? No it’s not.
The latest rumor was started by an erroneous April 7th report by AOL Real Estate, stating that Lil Wayne put his La Gorce Island home up for sale due to tax problems.
Lil Wayne doesn’t own a house on Miami Beach, but it he reportedly rents a home on La Gorce Island. 94 La Gorce Circle is a 15,000 square feet home which was built in 2004, and except for the relatively small lot on which it is situated, could well be considered a Miami Beach mansion.
The home is advertised as an architectural masterpiece with “rich woods, expanses of glass, steel & select marble, lavished throughout this ultra-modern residence that features sky terraces with incredible views”.
In actuality, the property has been on the market for sale for quite some time. It was listed for sale in 2006 for $13.9 million, and has been on the market for most of the time since then. In November 2010 the price was dropped to $12.9 million, where it stands today.
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.
Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
25 Haziran 2012 Pazartesi
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.
Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Enfants et lits d'appoint
! Tous les enfants de moins de 7 ans séjournent à titre gracieux pour l'utilisation de la literie disponible dans la chambre des parents.Tous les enfants de moins de 2 ans sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits bébés.Tous les enfants plus âgés ou adultes sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits d'appoint.Le nombre maximum de lit d'appoint ou de lit bébé en chambre est égal à 1.Les lits d'appoint et lits bébés sont uniquement disponibles sur demande et ils doivent être confirmés par l'hôtel.Les suppléments ne sont pas automatiquement calculés dans le montant total de la réservation et ils doivent être réglés séparément à l'hôtel.
L'hotel Park
L'hotel Park Lane dispose d'une connexion internet
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
Willy's Beach Club Hotel

Willy's Beach Club Hotel is in Boat Station 1. It is absolutely Beach-Front Hotel and located across Willy's Rock – the most photograph spot and landmark in the island. It's in the quiet area of the white beach, yet accessible to the main road for your day-to-day itinerary and walking distance to famous beach front bars for your night life as distance well. Thus they guarantee privacy, serenity an fun at the same time.
The resort has 36 newly renovated spacious rooms; a multi-purpose air conditioned hall with maximum capacity of 180 persons with complete audio-visual conference equipment, perfect for in-door events, caters seminars and special occasions. Everything is arranged from your choice of motif to your selected food to meet your budget.

24 Haziran 2012 Pazar
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Enfants et lits d'appoint
! Tous les enfants de moins de 7 ans séjournent à titre gracieux pour l'utilisation de la literie disponible dans la chambre des parents.Tous les enfants de moins de 2 ans sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits bébés.Tous les enfants plus âgés ou adultes sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits d'appoint.Le nombre maximum de lit d'appoint ou de lit bébé en chambre est égal à 1.Les lits d'appoint et lits bébés sont uniquement disponibles sur demande et ils doivent être confirmés par l'hôtel.Les suppléments ne sont pas automatiquement calculés dans le montant total de la réservation et ils doivent être réglés séparément à l'hôtel.
L'hotel Park
L'hotel Park Lane dispose d'une connexion internet
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
Willy's Beach Club Hotel

Willy's Beach Club Hotel is in Boat Station 1. It is absolutely Beach-Front Hotel and located across Willy's Rock – the most photograph spot and landmark in the island. It's in the quiet area of the white beach, yet accessible to the main road for your day-to-day itinerary and walking distance to famous beach front bars for your night life as distance well. Thus they guarantee privacy, serenity an fun at the same time.
The resort has 36 newly renovated spacious rooms; a multi-purpose air conditioned hall with maximum capacity of 180 persons with complete audio-visual conference equipment, perfect for in-door events, caters seminars and special occasions. Everything is arranged from your choice of motif to your selected food to meet your budget.

23 Haziran 2012 Cumartesi
Lil Wayne's House In Miami Beach For Sale
Lil Wayne’s house on La Gorce Island in Miami Beach is for sale -- that is what has been all over the internet today, on blog after blog. Is it true? No it’s not.
The latest rumor was started by an erroneous April 7th report by AOL Real Estate, stating that Lil Wayne put his La Gorce Island home up for sale due to tax problems.
Lil Wayne doesn’t own a house on Miami Beach, but it he reportedly rents a home on La Gorce Island. 94 La Gorce Circle is a 15,000 square feet home which was built in 2004, and except for the relatively small lot on which it is situated, could well be considered a Miami Beach mansion.
The home is advertised as an architectural masterpiece with “rich woods, expanses of glass, steel & select marble, lavished throughout this ultra-modern residence that features sky terraces with incredible views”.
In actuality, the property has been on the market for sale for quite some time. It was listed for sale in 2006 for $13.9 million, and has been on the market for most of the time since then. In November 2010 the price was dropped to $12.9 million, where it stands today.
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.
Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Enfants et lits d'appoint
! Tous les enfants de moins de 7 ans séjournent à titre gracieux pour l'utilisation de la literie disponible dans la chambre des parents.Tous les enfants de moins de 2 ans sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits bébés.Tous les enfants plus âgés ou adultes sont facturés 500 RUB par nuit et par personne pour l'utilisation des lits d'appoint.Le nombre maximum de lit d'appoint ou de lit bébé en chambre est égal à 1.Les lits d'appoint et lits bébés sont uniquement disponibles sur demande et ils doivent être confirmés par l'hôtel.Les suppléments ne sont pas automatiquement calculés dans le montant total de la réservation et ils doivent être réglés séparément à l'hôtel.
L'hotel Park
L'hotel Park Lane dispose d'une connexion internet
Willy's Beach Club Hotel

Willy's Beach Club Hotel is in Boat Station 1. It is absolutely Beach-Front Hotel and located across Willy's Rock – the most photograph spot and landmark in the island. It's in the quiet area of the white beach, yet accessible to the main road for your day-to-day itinerary and walking distance to famous beach front bars for your night life as distance well. Thus they guarantee privacy, serenity an fun at the same time.
The resort has 36 newly renovated spacious rooms; a multi-purpose air conditioned hall with maximum capacity of 180 persons with complete audio-visual conference equipment, perfect for in-door events, caters seminars and special occasions. Everything is arranged from your choice of motif to your selected food to meet your budget.

21 Haziran 2012 Perşembe
Miami Makes Forbes List Of America's Most Expensive Communities
Fisher Island, Miami Beach, just ranked by Forbes as #37 of America's most expensive zip codes, boasts a not too shabby median home price of $2,295,291. Forbes just published it's new list, with 4 Miami zip codes earning a spot as one of America's highest priced places to buy a home or condo, including aforementioned Fisher Island (33109), Key Biscayne (33149), Coral Gables (33146), and 2 small communities just north of Miami Beach -- Bal Harbour and Indian Creek (33154).
The report stated that these 4 zip codes make Miami one of the most expensive places to buy property in the United States, in spite of the fact that home prices have plummeted sharply in recent years, and that foreclosures have continued to mount. Hi-end luxury home prices have seen a slowing slide, according to Mike Simonsen, CEO of Altos Research, a Mountain View, Calif., firm that tracks housing market data.
"We have yet to see mortgage defaults climb aggressively into higher-priced homes, but there are some signs that those could hit in next twelve months" Simonsen said. "If those mortgage resets drive inventory at the higher end, that would cause major problems."
Although it does seem as if the luxury real estate market in Miami has all but slowed to a halt, a number of luxury realtors are reporting that foreign buyers are re-entering the market place to pick up those hi-end bargains which may no longer be as available in a year from now.
Al Capone's House in Miami Beach For Sale $6.85 Million
Al Capone's house in Miami Beach on Palm Island is for sale. Advertised as an opportunity to make a piece of Miami Beach history your own, the house once belonging to the infamous gangster Al Capone, comes replete with City of Miami Beach approved plans for rebuilding.
The Palm Island home, located at 93 Palm Ave, Miami Beach, FL, was previously listed in 2006, for $6.8 million, and went through 2 pending sales since that time, with no closing ever taking place. It was relisted for sale this month for $50,000 more than the original asking price.
The historical 6,103 square feet house, is situated on a 3 quarters acre lot, with 100 linear feet of frontage facing neighboring Hibiscus Island and Biscayne Bay. Built in 1922, the Capone house is one of the oldest homes in Miami Beach. Henry Morrison, who still owns the house, according to the Miami Dade property records, purchased it in 1971 for $56,000.
Lil Wayne's House In Miami Beach For Sale
Lil Wayne’s house on La Gorce Island in Miami Beach is for sale -- that is what has been all over the internet today, on blog after blog. Is it true? No it’s not.
The latest rumor was started by an erroneous April 7th report by AOL Real Estate, stating that Lil Wayne put his La Gorce Island home up for sale due to tax problems.
Lil Wayne doesn’t own a house on Miami Beach, but it he reportedly rents a home on La Gorce Island. 94 La Gorce Circle is a 15,000 square feet home which was built in 2004, and except for the relatively small lot on which it is situated, could well be considered a Miami Beach mansion.
The home is advertised as an architectural masterpiece with “rich woods, expanses of glass, steel & select marble, lavished throughout this ultra-modern residence that features sky terraces with incredible views”.
In actuality, the property has been on the market for sale for quite some time. It was listed for sale in 2006 for $13.9 million, and has been on the market for most of the time since then. In November 2010 the price was dropped to $12.9 million, where it stands today.
Billy Joel's La Gorce Island Home For Sale
Bllly Joel's home on La Gorce Island in Miami Beach was just placed on the Miami MLS for sale for $14,750,000. The 10,040 square feet home on beautiful and exclusive La Gorce Island boasts 7 bedrooms and 8.8 bathrooms and is situated on a 3/4 acre lot, with 150 linear feet of bayfront.
Billy Joel purchased the Miami Beach property in 2006 for $13,500,000. La Gorce Island is one of the most beautiful and well kept of all of the islands in the Miami Beach area. Also living in the area in and around the island have been celebrities Cher, Lil Wayne, Dwyane Wade, and Chris Bosh.
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
20 Haziran 2012 Çarşamba
Duqu: You're safe unless you use TrueType Fonts?
Let's be thankful for that! The big news in the malware world yesterday came when Microsoft announced a work around for Duqu, named by researchers in the CrySyS Lab (the Laboratory for Cryptography and System Security at Budapest University of Technology and Economics) because it prefixes some created filenames with the letters "~DQ".
On October 14, 2011, CrySyS contacted Symantec to get some help analyzing the malware, and Symantec released an extremely informative 67 page PDF report called W32.Duqu: The Precursor to the next Stuxnet. (The link is to version 1.3 of the report, updated on November 1, 2011).
There have been two IP addresses confirmed to be associated with Duqu and serving as Command & Control. The first IP was in India - 206.183.111.97. The second was in Hungary - 77.241.93.160. Traffic flow to either of these IP addresses would be a strong positive indicator of a Duqu infection! Both sites are down now.
The first server was announced to be down on October 31st in stories such as this one -- India Shuts Server Linked to Duqu Computer Virus that shares some details of a server located at 200 employee data center Web Werks.
The second server was at Combell in Belgium -- as described in stories such as this one -- Duqu Hackers Shift to Belgium After India Raid.
Duqu is a data stealing program that shares several blocks of code with Stuxnet. In fact, one of the two pieces of malware we've seen that is described as being Duqu is also detected as Stuxnet by some AV vendors.
Here's a VirusTotal report of the better detected of those pieces of code, which had the MD5 value e1e00c2d5815e4129d8ac503f6fac095. This file is not "Duqu" but is rather "an .exe file related to Duqu" which is a much larger program (this one is only 9k in size).
(Click for VirusTotal Report)
Non "generic" definitions for this malware included:
Avast: Win32:Duqu-F
Emsisoft: Trojan.Win32.Stuxnet!IK
Ikarus: Trojan.Win32.Stuxnet
Microsoft: Trojan:Win32/Duqu.E
NOD32: probably a variant of Win32/Duqu.A
TrendMicro: TROJ_DUQU.AJ
Symantec mentioned MD5s
9749d38ae9b9ddd81b50aad679ee87ec
Wed Jun 01, 03:25:18 2011
Stealing information
4c804ef67168e90da2c3da58b60c3d16
Mon Oct 17 17:07:47 2011
Reconnaissance module
856a13fcae0407d83499fc9c3dd791ba
Mon Oct 17 16:26:09 2011
Lifespan extender
92aa68425401ffedcfba4235584ad487
Tue Aug 09 21:37:39 2011
Stealing information
In each of those above, the link on the MD5 will show you the VirusTotal report. I find it interesting that TrendMicro consistently names these files "TROJ_SHADOW.AG" which makes me wonder if they had independently discovered this malware family prior to the naming as Duqu by the CrySyS team.
Symantec calls attention to the fact that several of these files show compile dates AFTER the public disclosure of the existence of Duqu.
Delivery Mechanism
Symantec disclosed in their report that one of the infections they were analyzing had been infected via a Word Document that exploited the system using a previously unknown 0-day attack.
We now know from Microsoft more about this exploit. On November 3, 2011, Microsoft released this Microsoft Security Advisory (2639658)
Vulnerability in TrueType Font Parsing Could Allow Elevation of Privilege. The advisory starts with an executive summary which says, in part:
Microsoft is investigating a vulnerability in a Microsoft Windows component, the Win32k TrueType font parsing engine. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. The attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. We are aware of targeted attacks that try to use the reported vulnerability; overall, we see low customer impact at this time. This vulnerability is related to the Duqu malware.
Microsoft has released a work around. The exploit is taking advantage of the fact that there is a problem in one of the DLL's called by TrueType in certain circumstances. If a system denies access to that .DLL, T2EMBED.DLL, then the exploit would fail to work.
The workaround can be executed like this, but Microsoft cautions that applications that rely on EMBEDDED TrueType fonts could then fail to display properly:
(For older Windows versions)
Echo y| cacls "%windir%\system32\t2embed.dll" /E /P everyone:N
(For newer Windows versions)
Takeown.exe /f "%windir%\system32\t2embed.dll"
For more details on the workaround, please see Microsoft Security Advisory: Vulnerability in TrueType font parsing could allow elevation of privileges which offers a "Fix It For Me" button to apply the work around for you.
Duqu Compared to Stuxnet
The Symantec report has 22 or so pages of original Symantec content, and then has as the majority of it's body the report by the CrySyS Lab, which has a section that compares the Duqu and Stuxnet code. In particular, the Decryption function seems to be nearly identical.
IRS Identity Theft leads to 25 year Sentence for Alabama Fraudsters
The sentences were announced on the main Department of Justice website with the title Leaders of Multi-million Dollar Fraud Ring That Used Stolen Information of Medicaid Recipients Each Sentenced to Over 25 Years in Prison
The charges brought against Veronica Dale include:
CR. NO: 2:10-CR-242-MEF (see see Indictment
18 USC § 286: Conspiracy to Defraud the Government
18 USC § 287: False, Fictitious or Fraudulent Claims
18 USC § 641: Theft of Government Public Money, Property or Records
18 USC § 1028A: Aggravated Identity Theft
CR. NO: 2:11-CR-69-MEF (see see Indictment
18 USC § 1343: Wire Fraud
18 USC § 1028A: Aggravated Identity Theft
In the first case, the defendants were:
Veronica Denise Dale
Alchico Dewayne Grant
Laquanta Grant
Isaac C. Dailey
Leroy Howard
In a superseding indictment filed for crimes that occurred after the first case was already underway, the defendants were:
Melinda Renae Clayton
Alchico Dewayne Grant
Veronica Denise Dale
Stephanie Adams
Valerie Byrd
Veronica owned and operated Dale's Tax Service, a tax preparation business located in Montgomery, Alabama.Looking back, it is likely that opening the Tax Service was just part of the plan to commit these crimes.
Veronica obtained Social Security numbers and names and used them to prepareand file false income tax returns and directed tax refunds to be deposited into accounts controlled by her and her co-defendants.
The bank accounts received at least $2.3 million in tax refunds.
1/21/2009 $4,990
2/14/2009 $5,124
3/6/2009 $7,352
3/15/2009 $10,688
3/15/2009 $10,031
3/15/2009 $10,332>
3/24/2009 $10,636
etc. etc. (the indictment lists 26 filings, but this happened well over 500 times!)Money was deposited into accounts opened in 2008, 2009, and 2010 at Regions Bank in Montgomery, Alabama and Woodforest Bank in Montgomery, Alabama, as well asAlabama State Employees Credit Union, MAX Credit Union. In 2011 additional accountswere opened at Bank of America where several more tax returns were received.
Veronica turned herself in to US Marshall Service on December 17, 2010.Here is the amazing part. AFTER TURNING HERSELF IN, and being released on bail pending trial, SHE KEPT STEALING MONEY FROM THE IRS!!!
The second case (2:11-CR-69-MEF) explains that between approximately January 2011 and April 2011, Dale conspired with Melinda Clayton and others to file an ADDITIONAL 155 fraudulent tax returns, to gather another$494,424 in tax refunds. THIS WAS AFTER DALE HAD ALREADY TURNED HERSELFIN because of the charges in the other case! She "caused to be stored at Clayton'sresidence thousands of names and social security numbers unlawfully obtained from EDS."
She pleaded guilty October 14, 2011.
The guilty plea (see see the Plea Agreementincludes the fact that "on counts 1,9,10,27 and 28, a 6-level enhancement is warranted because the Defendant's direct participation in the offense involved 250 or more victims.
The guilty plea explains that "Between June 2007 and February 2008, the Defendant worked as a temporary employee at EDS in Montgomery, Alabama.She "was able to and did wrongfully and illegally acquire Medicaid recordswhich included the names, social security numbers, and dates of birthsof thousands of inviduals who received Medicaid benefits.
Between January 2009 and December 2010, she used these records stolen from EDSto file over 500 false tax returns.
308 of those tax retunrs deposited money into accounts of the AlabamaState Employees Credit Union controlled by Betty Washington. The accountsreceived approximately $1,440,632.40 in false tax refunds.