Aurora Cannabis order for 1 million shares filled at open Dec 29 at $9.25 per share

Update: 1 Million shares of ACB Aurora Cannabis Inc filled at open Dec 29 at $9.25 per share.

IMHO this stock should Gap up when the markets open after New Years. Nice moves on a Friday before a Holiday, often are pre-cursors to nice moves when the markets reopen.

This post is not meant to be any kind of investment advice. Please do your own Due Diligence and speak to your own Licensed Financial Advisor beofre placing any bets at the Stockl markat casinos. You can lose money, possibly all of it.


Aurora Cannabis Inc breaking out on the Toronto Stock Exchange

On Dec 29 I will purchase one million shares of ACB (Aurora Cannabis Inc) at the open price for our Test Portfolio.

On Dec 28 the price closed at $8.94 per share.

My Sell Stop will be at $8.50

Risk will be $0.44 per share. Target Sell price IMHO could hit $14 per share. Risk vs Reward in my opinion is interesting.

This post is not Investment Advice to buy shares of Aurora Cannabis Inc on the Toronto Stock Excahnge or on Nasdaq. Do your own Due Diligence and speak to your own investment advisor before placing any bets at the Stock Market Casinos. You could lose money, possibly all of it.


Stock chart courtesy of the Toronto Stock Exchange at

Free Land – Artificial Intelligence Systems and Population Control

Artificail Intelligence graphic courtesy of

Free Land – Chapter 2 : Artificial Intelligence Systems and Population Control

Copyright 2017 Vincent Banial

One of the first challenges at Free Land, was to figure out how to eliminate Human Government.

With structure came efficiency. To maintain that efficiency, that structure had to be consistent. If that structure was under the control of a Human, then Human Emotions could affect the structure.

By replacing Humans with Artificial Intelligence, Human Emotions were eliminated and consistency would be maintained.

There is a concept from Computer Programming called Structured Programming. It is based on a tree like design structure. The objective was to improve the quality and clarity of the system being designed. The Main Controlling Module is at the top. Branches further down controled more specific things. The Branches interacted with the Main Module and other Branches as needed.

This approach was used when Free Land developed it’s Artificial Intelligence Control Systems. Those systems took over previous Government functions. Over time, all forms of Government were eliminated and replaced by Artificial Intelligence Control Systems.

Human emotions were eliminated, and so everyone would get treated equally. The underlying principal of Free Land was that Everyone was Equal.

When Everyone is in effect “Equal”, people learned that they could “Trust” one another. “Trust” was one key factor which was hard to come by in the old way of doing things. Lack of Trust created the Wars. Lack of Trust destroyed marriages. Lack of Trust brought on the Nuclear Winter, which almost eliminated Humanity.

Trusting one another was one of the cornerstones of the foundation developed to create Free Land.

The people of Free Land did not compete with one another. Instead they helped and cared for each other. This was a totally different mindset and it took a generation, for it to become the natural way of interacting with one another.

In the distant past before Free Land for example, when you had work done at your home you called in a number of contractors and got quotes to try to make sure that you were not being taken advantage of. When people competed with one another, some would try and take advantage of others.

Previously Money was the compensation for any work done. In Free Land the compensation was being able to help one another. It was a totally different mind set from the old ways of doing things and because of that Free Land survived.

The Main Artificial Intelligence System was called Mother Jill. The Sub Systems in the branches below were named Aunts, as in Aunt Helen or Aunt Betty. Each Sub System controlled specific facets of life.

Humans were only involved in the maintaining the systems and updating the software as requested by the AI Systems. One rather surprising thing which occurred as the Aunt AI subsystems came online, was that the Mother Jill Controlling System taught the Sub Systems a unique AI Language which only the AI Systems could understand. Yes, the AI Systems communicated with each other via their own language. Graphic of a computer data centre courtesy of http://www.urltarget.comAll the AI Systems and all the Sub Systems could also understand the language spoken by Humans in Free Land. Humans could also communicate any needs to the AI sub-systems by actually speaking to them. Later on a type of skull cap was developed which allowed one to communicate with the AI Sub Systems by speaking inside your head. The subsystem would stimulate specific regions of your brain and you heard their reply, again all inside your head.

Each Human member of Free Land had body implants. The implants in the palms of the hands, for example, allowed controlled access to buildings and services. The AI Sub Systems knew who did what and when, via the implants. The AI Systems also monitored the health of the citizens via the implants. For example, blood tests could done via the implants without drawing blood.

Because of the devastation that had taken place on Earth, resources were limited. Free Land’s food was grown in Green Houses. The population had to be controlled. Giving Birth was an affair of the entire community. Male Sperm was stored in Sperm banks. Pregnancy was via artificial insemination. The matching of potential Mother and Father was under the control of the AI Sub Systems. Genetic factors came into play and helped to create a stronger genetic base of the future population of Free Land.

When someone was going to die, as would be indicated by the implanted monitors, the AI Sub Systems went to the Gene database and matched females with males. The female was then artificially inseminated. This again eliminated Human Emotions. Falling in Love with someone who may not be the best genetic match could negatively impact the child. Caring for a child with birth defects would  also negatively impact everyone and so had to be minimized.

The AI AUNT Sub Systems made sure that the only the best genetic matches were allowed to combine to create children. This was for the good of the child and for the good of Free Land. Birth Defects were eliminated by this process.

The gene pool of the newborns became stronger. It takes a lot of resources to care for a child with mental or physical handicaps. Free Land did not have extra resources. It was also viewed as being unfair to the newborns, to allow the mating of inferior or poorly matched genes pools. All males had their Sperm collected and frozen. Then they had an operation to cut the tubes, which the sperm would have used to exit the body. Pregnancy was only possible via artificial insemination. Pregnancy was very strictly controlled, to maintain zero growth in the population numbers and to improve the genetic health of the overall population of Free Land.

To read more of the Free Land Diary click on this link to visit

The Asteroid Impact, followed by the Nuclear Winter will give birth to Free Land. Humanity will Survive.

Asteroid Impact courtesy of

Copyright 2017 Vincent Banial

Free Land, where survivors built a better world.

The Asteroid hitting the earth, destroyed the Middle East. Then the Nuclear Winter arrived, as nations fought over scarce energy resources.

Pockets of Humanity survived unscathed.

They saw how the old ways destroyed much of the Earth and so they started to experiment.

Out the chaos, the idea of Free Land was incubated. It already had factories and institutes of high education. It had been a High Technology Artificial Intelligence Center. If was also self-sufficient with fresh uncontaminated under ground water. Power generation was Hydrogen based after the Nuclear Fusion Reactors were shut down. Most of the population had very high Tech skills.

The model for their new Free Land was the lost tribes in the Amazon Rain Forest. No need for Money. No need for work. No need for Government. No need for Taxes. No Banks.

Free Land prospered. It’s people developed the skills that they wanted. They spent time with their families.

Everything was shared equally. No Money Hoarding Billionaires, as all citizens knew that they were equal. No money, as goods and services were available to everyone at no cost. Each member of Free Land contributed what they could and when they could. Each person knew that they played an important part in the survival of Free Land.

While Humanity disappeared from large parts of the Globe, that small pocket of Humanity survived, worked and shared together and created a new way of living called Free Land.

To read more of the Free Land Diary click on this link to visit

How effective is Chemotherapy as a treatment for Cancer?

Posted by Vincent Banial

Chemotherapy can be an effective treatment for Hodgkin’s disease (HD) – a type of lymphoma, which is a blood cancer. Chemotherapy can also be an effective form of treatment for Testicular Cancer.

What about other Cancers?

A study was published in the Dec 2004 issue of the Peer Reviewed Journal called Clinical Oncology, which addressed that question.

The following is taken from the abstract of that research Study :
“The overall contribution of curative and adjuvant cytotoxic chemotherapy to 5-year survival in adults was estimated to be 2.3% in Australia and 2.1% in the USA.”

The conclusion as found in the abstract was:
“it is clear that cytotoxic chemotherapy only makes a minor contribution to cancer survival. To justify the continued funding and availability of drugs used in cytotoxic chemotherapy, a rigorous evaluation of the cost-effectiveness and impact on quality of life is urgently required.”.

Found a link using a web search. The link is below ( you have to copy and paste the URL if you wish to visit their site – as you would from a web search):

Basically that is supposed to be a PDF of the results from that study published on Dec 2004 in Clinical Oncology. It lists over twenty different Cancers and the percentage increases in 5 year survival rates for those patients who received Chemotherapy treatment for said Cancer.

Clinical Oncology had also published another research study in November 2004. You can view an abstract at by clicking on this line.

The following was the conclusion of the Nov 2004 published in Nov 2004:
“Adjuvant chemotherapy after potentially curative surgery can improve 5-year survival by 4% in patients with early-stage non-small-cell lung cancer (NSCLC, stages IB–IIIA).”.

So after surgery, Chemotherapy may increase the 5 year survival rate in about 4% of the patients. Yes, only 4%.

Using the above quoted studies and being overly generous, in my opinion it may seem that Chemotherapy does not increase the 5 year Survival Rate for about 85% of patients with many forms of Cancer. The exception is that yes it may be a form of effective treatment for Hodgkin’s Disease and for the treatment of Testicular Cancer.

With some Cancers the study chart (see the link to the PDF above) shows Chemotherapy to have zero effect on 5 years Survival Rate.

That leaves the question: Why is Chemotherapy being given to Cancer patients?

Disclaimer: The above is posted for information purposes only. I am not giving Medical Advice. If you have a medical issue please consult with your Licensed Medical Doctor, Specialist or other Medical Professional.

Thank You Google News

I have no idea how this site ended up on Google News.

Reminds me of the time when I closed our CLiK CLiK Vic Zenfolio Photo Site. A few days later I got a personal email from a Google employee, asking me to check my Zenfolio site out as their Search Engine Spiders could no longer get into the site. Google is huge and here they were reaching out to a compartively tiny website run on a 3rd party platform (Zenfolio) which was not owned by Google. Simply amazing for them to do that.

Since we setup Uniquely Toronto here on WordPress, Google has consistently sent their Spiders to index any new posts and the Google Search Engine has referred hundreds of thousands of visitors our sites.

I have said it before and I’ll keep saying it:

Thank You Google !!


Thank You Google News !!!

How Cannabis kills Cancer Cells by Dr, Christina Sanchez

How Cannabis kills Cancer Cells

by Dr, Christina Sanchez

Video is courtesy of the Lincoln Horsley YouTube channel

“Cannabis has been shown to kill cancer cells in the laboratory ” posted by the National Cancer Institue at

Something which has apparently been known in Cancer Research circles, has been formally announced to the public.

“Cannabis has been shown to kill cancer cells in the laboratory” posted by the National Cancer Institue at

Photo of a Marijuana / Cannabis plantPhoto courtesy of the United States Fish and Wildlife Service

The info  below is from the website of the National Cancer Institute (

Cannabis and Cannabinoids (PDQ®)–Patient Version



  • Cannabis , also known as marijuana, is a plant grown in many parts of the world which produces a resin containing compounds called cannabinoids. Some cannabinoids are psychoactive (acting on the brain and changing mood or consciousness) (see Question 1).
  • The use of Cannabis for medicinal purposes dates back to ancient times (see Question 3).
  • By federal law, the possession of Cannabis is illegal in the United States outside of approved research settings. However, a growing number of states, territories, and the District of Columbia have enacted laws to legalize medical marijuana (see Question 1).
  • In the United States, Cannabis is a controlled substance requiring special licensing for its use (see Question 1 and Question 3).
  • Cannabinoids are active chemicals in Cannabis that cause drug -like effects throughout the body, including the central nervous system and the immune system (see Question 2).
  • The main active cannabinoid in Cannabis is delta-9-THC. Another active cannabinoid is cannabidiol (CBD), which may relieve pain, lower inflammation, and decrease anxiety without causing the “high” of delta-9-THC (see Question 2).
  • Cannabinoids can be taken by mouth, inhaled, or sprayed under the tongue (see Question 5).
  • Cannabis and cannabinoids have been studied in the laboratory and the clinic for relief of pain, nausea and vomiting, anxiety, and loss of appetite (see Question 6 and Question 7).
  • Cannabis and cannabinoids may have benefits in treating the symptoms of cancer or the side effects of cancer therapies. There is growing interest in treating children for symptoms such as nausea with Cannabis and cannabinoids, although studies are limited (see Question 7).
  • Two cannabinoids (dronabinol and nabilone) are drugs approved by the U.S. Food and Drug Administration (FDA) for the prevention or treatment of chemotherapy -related nausea and vomiting (see Question 7 and Question 10).
  • Cannabis has been shown to kill cancer cells in the laboratory (see Question 6).
  • At this time, there is not enough evidence to recommend that patients inhale or ingest Cannabis as a treatment for cancer-related symptoms or side effects of cancer therapy (see Question 7).
  • Cannabis is not approved by the FDA for use as a cancer treatment (see Question 9).

                           ******* end of post from *******

The following are additional links with info related to Cannabis and THC being able to kill Cancer Cells:

Antineoplastic Activity of Cannabinoids…

Cannabinoid Receptor Ligands Mediate Growth Inhibition & Cell Death In Mantle Cell Lymphoma…

Δ9-Tetrahydrocannabinol Induces Apoptosis in Human Prostate PC-3 Cells via a Receptor-Independent Mechanism…

Antitumor Activity of Plant Cannabinoids with Emphasis on the Effect of Cannabidiol on Human Breast Carcinoma…

Cannabinoid Receptors As Novel Targets for the Treatment of Melanoma…

DEA Eliminates 48-Year-Old Monopoly on Research-Grade Marijuana, Clearing Pathway for FDA Approval and Rescheduling

Cannabis plants
Photo of Cannabis plants courtesy of A7nubis and

Note from Vince: This is am extremely important change as the Cannabis grown by NIDA is an uncommon variety and apparently low in THC.  The FDA could approve a Medical Study of the use of high THC Cannabis in the treatment of Cancer, but NIDA always had the final word. If they approved a medical study (their usual common response was “No”) the study had to use the NIDA supplied Cannabis variety.

WASHINGTON, D.C. — Today, the Drug Enforcement Administration (DEA) announced their intention to grant licenses to additional marijuana growers for research, thereby ending the DEA-imposed 48-year monopoly on federally legal marijuana.  Since 1968, the University of Mississippi, under contract to the National Institute on Drug Abuse (NIDA), has maintained the only facility in the United States with federal permission to grow marijuana for research.

“It’s a complete and total end of the NIDA monopoly! There has been no production monopoly on any other Schedule I substance, like MDMA or LSD—only the cannabis plant. Licensing non-government cannabis producers, and thereby creating a path to FDA approval, will finally facilitate the removal of marijuana from Schedule I, and ultimately allow patients to receive insurance coverage for medical marijuana,” said Rick Doblin, Ph.D., Founder and Executive Director of the Multidisciplinary Association for Psychedelic Studies (MAPS).

MAPS has been working to eliminate this cannabis research blockade since 1999. NIDA’s marijuana is eligible for research, but cannot be sold as a prescription medicine, making it unacceptable to the Food and Drug Administration (FDA) for use in future Phase 3 studies.  Ending the monopoly finally allows for a pathway to FDA approval for marijuana, which would thereby trigger rescheduling.

In 2001, MAPS partnered with University of Massachusetts-Amherst Professor Lyle Craker, Ph.D., to apply for a DEA license and end the monopoly. In 2007, after years of bureaucratic delays and lengthy legal hearings, a DEA Administrative Law Judge (ALJ) recommended that it would be in the public’s interest to grant Craker the license. In 2009, after almost two more years of delays and less than a week before the inauguration of President Obama, former DEA Administrator Michelle Leonhart rejected the ALJ recommendation. In 2011, Craker sued the DEA in the U.S. First Circuit Court of Appeals. In its 2013 decision, the Court uncritically accepted the DEA’s arguments that NIDA’s monopoly provided “an adequate supply produced under adequately competitive conditions.”

Since the 2013 decision, Craker’s argument that NIDA does not have an adequate supply has become significantly more apparent. NIDA has been unable to provide the strains requested for MAPS’ long-delayed Phase 2 clinical trial of smoked marijuana to treat symptoms of posttraumatic stress disorder (PTSD) in 76 U.S. veterans. As a result, the study is proceeding with lower potency marijuana than what MAPS researchers requested.

The DEA has previously claimed that U.S. international treaty obligations under the United Nations Single Convention on Narcotic Drugs (Single Convention) require a federal monopoly, but in April 2016, the State Department released a statement clarifying that the Single Convention does not in fact limit the number of U.S. marijuana producers.

Furthermore, the DEA’s 2009 rejection of the ALJ recommendation to license Craker relied heavily on a U.S. Department of Health and Human Services (HHS) protocol review process, which was eliminated in 2015.

MAPS’ upcoming Phase 2 clinical trial of marijuana for PTSD in veterans is in collaboration with investigators in Phoenix, Arizona, and at Johns Hopkins University, the University of Colorado, and the University of Pennsylvania. The study is funded by a $2.15 million grant to MAPS from the State of Colorado. The study has received full regulatory approval, and will be the first randomized controlled trial of whole plant marijuana as a treatment for PTSD.

Founded in 1986, MAPS is a non-profit research and educational organization working to evaluate the safety and efficacy of botanical marijuana as a potential prescription medicine for specific medical uses approved by the FDA.


Additional information can be found at

Rick Doblin, Ph.D., MAPS Executive Director

Natalie Ginsberg, MAPS Policy & Advocacy Manager

The above Press Release is courtesy of the Multidisciplinary Association for Psychedelic Studies (MAPS)  whose Mission Sates :


Founded in 1986, the Multidisciplinary Association for Psychedelic Studies (MAPS) is a 501(c)(3) non-profit research and educational organization that develops medical, legal, and cultural contexts for people to benefit from the careful uses of psychedelics and marijuana.

Ozzy Osbourne to perform his 1983 classic “Bark at the Moon”, during the Total Solar Eclipse on Aug 21 at the Moonstruck Festival

Ozzy Osbourne to perform his 1983 classic “Bark at the Moon” during the Total Solar Eclipse on Aug 21 at the Moonstruck Festival in Carterville, Illinois.

Video is courtesy of the Ozzy Osbourne YouTube channel

Marcus Hutchins, who had stopped the spread of WannaCry RansomWare, has apparently been arrested.

Marcus Hutchins works as a Cyber-Securty Researcher at Kryptos Logic. It was Marcus who had apparenlty stopped the spread of the WannaCry version 1 RansomWare. He found the Kill Switch after decompliing the WannaCry v1 code. Once he registered a Domain name found in the code, the spread of WannaCry V1 RansomWare slowed down dramatically. Soon after  WannaCry version 2, which removed the kill switch, was spotted on the Internet.

Marcus was in Vegad for the Black Hat and Def Con conferences. He was apparenly arrested after the confernces.

Clik on this line to visit the Motherboard website to read more details about the apparent arrest of Marcus Hutchins.

Click on this link to visit The Telegraph newspaper website to read their post titled: “FBI arrests WannaCry hero Marcus Hutchins in Las Vegas”.

Click on this link to visit the BBC website and read to post titled: “NHS cyber-defender Marcus Hutchins arrested in US”.

Click on this link to view our prior coverage of the WannaCry Ransomware outbreak.

Ways to protect your computers from Petya Ransomware

Some CERT recommendations to better protect your computers from becoming infected by Petya Ransomware:

    • Perform regular backups of all critical information to limit the impact of data or system loss and to help expedite the recovery process. Ideally, this data should be kept on a separate device, and backups should be stored offline.
    • Applocker policies to block execution of files having name perfc.dat as well as psexec.exe utility from sysinternals.
    • Don’t open attachments in unsolicited e-mails, even if they come from people in your contact list, and never click on a URL contained in an unsolicited e-mail, even if the link seems benign. In cases of genuine URLs close out the e-mail and go to the organization’s website directly through browser.
    • Restrict execution of powershell /WSCRIPT/ PSEXEC / WMIC in enterprise environment Ensure installation and use of the latest version (currently v5.0) of PowerShell, with enhanced logging enabled. script block logging, and transcription enabled. Send the associated logs to a centralized log repository for monitoring and analysis.
    • Establish a Sender Policy Framework (SPF),Domain Message Authentication Reporting and Conformance (DMARC), and DomainKeys Identified Mail (DKIM) for your domain, which is an email validation system designed to prevent spam by detecting email spoofing by which most of the ransomware samples successfully reaches the corporate email boxes.
    • Application whitelisting/Strict implementation of Software Restriction Policies (SRP) to block binaries running from %APPDATA%, %PROGRAMDATA% and %TEMP% paths. Ransomware sample drops and executes generally from these locations. Enforce application whitelisting on all endpoint workstations.
    • Deploy web and email filters on the network. Configure these devices to scan for known bad domains, sources, and addresses; block these before receiving and downloading messages. Scan all emails, attachments, and downloads both on the host and at the mail gateway with a reputable antivirus solution.
    • Disable macros in Microsoft Office products. Some Office products allow for the disabling of macros that originate from outside of an organization and can provide a hybrid approach when the organization depends on the legitimate use of macros. For Windows, specific settings can block macros originating from the Internet from running.
    • Configure access controls including file, directory, and network share permissions with least privilege in mind. If a user only needs to read specific files, they should not have write access to those files, directories, or shares.
    • Disable remote Desktop Connections, employ least-privileged accounts.

Click on this link to view the prior coverage about WannaCry Ransomware found on Uniquely Toronto.

Posted by Vincent Banial

Find the Key needed to unencrypt a Hard Drive encrypted by Petya Ransomware

Click on this link to visit the GitHub site where Leo Stone has posted some code which might just figure out the key required to unencrypt a Hard Drive encrypted by Petya Ransomeware. He suggests to try finding the key using an image copy of the Petya encrypted Hard Disk,. That way the original may not be harmed.  

Disclaimer: if you use Leo Stone’s code and method, you do so at your own risk. Loe also suggested to make and use an image copy of the encrypted hard Drive so as not to potentially damage the original. Leo’s code may find the key, or it may not. Playing around with the encrypted Hard Drive may damage it to the point that even if you pay the Ransom, you may not be able to reteive your data from said hard drive. I again state that following Loe Stone’s method as posted on GitHub is done at your own risk. Do your own Due Diligence. You could lose all the data on the hard drive.

Posted by Vincent Banial

Petya Ransomware Major Global Attack

WannaCry Ransomware paved the way by showing how to quickly spread across the Global Internet. It focused on on a vulnerability with Windows SMB which had been there for years and only exploited by Nation State employed Hackers.

Petya Ransonware, as has been named by the Security Staff at Kaspersky Lab, learned much from the WannaCry outbreak. Petya Ransomware has spread to thousands of computers at major institutions across the Globe. Petya ransomware is just starting. This is a major Ransomware attack.

It is basically a Worm which was first spread by malicious XL spreadsheets. Once on a network it stays in memory and as such is no so easy to detect and protect against. It looks like it is also focusing on the Windows SMB protocol and the Ports which support SMB.No wonder the focus on SMB as Petya use EternalBlue code as did WannaCry

My big fear is that Banks and Financial Institution had been targeted by Petya Ransomware. If it infects a large number of Banks then we could possibly see a Major Banking Crisis. It might be an idea to keep some cash on hand, in a safe place. Because it operates as Worm Code it is hard to detect and eliminate.

I will prepare a full review later this week. In the meantime the following are links which will shed light on what is happening. Some of the protective measures which stopped WannaCry Ransomware in it’s tracks, like disabling SMB ports, could also work to stop or slow the spread of Petya Ransomware.

Click on this link to visit Krebs On Security to read their initial post about Petya.

Click on this link to visit the Kaspersky Lab post titled “Petya Ransomware eats your hard drives

Click on this link to visit the Securelist site to read their very detailed post about how Petya Ransomware functions.

Click on this link to visit the Check Point site to read their discussion of the Petya Ransomware worldwide outbreak.

Video is courtesy of the F-Secure YouTube channel

 Click on this link to view the prior coverage about WannaCry Ransomware found on Uniquely Toronto.

Posted by Vincent Banial

Analysis of PETYA Ransomware running live on a computer

Petya Ransomware could be called WannaCry V3 as it is using the same EternalBlue / DoublePulsar code. It starts running via a Windows DLL. In the video below Colin runs Petya on a computer to be able to study it.

Video is courtesy of the Colin Hardy YouTube channel

“Making Peace with Cannabis” by Zach Walsh, PhD, Assistant Professor in the UBC Department of Psychology

This TEDx Talk is titled “Making Peace with Cannabis“. It features Zach Walsh, PhD, who is an Assistant Professor in the UBC Department of Psychology and Co-Director for the Centre for the Advancement of Psychological Science and Law. He is also involved in a current study at UBC which is investigating treating PTSD using Medical Cannabis.

Video is courtesy of the TEDx Talks YouTube channel

WannaCry Ransomware infected Traffic Cameras in Australia and Honda’s Sayama factory

Posted by Vincent Banial

WannaCry Ransomware is far from dead. It is still out there on the internet, searching for more victims.

Uniquely Toronto recently had extensive coverage about WannaCry Ransomware and Security Patches and had links to Security Patches and steps to better Secure computers against WannaCry.

When Wannacry was first discovered, Automobile manufacturing plants had been affected after WannaCry infected the Auto Plant’s computers. Seems that the IT folks at a Hond Auto Plant in Japan have not been folllowing the Cyber Security news. WannaCry Ransomware infected Honda’s Sayama car production plant this week.

Click on this link to visit the Reuters News post about Wannacry being found on the computer newtwork at Honda’s Sayama car production plant this week.

Apparently the WannaCry Ransomware was also spread to over 50 Traffic cameras via a USB memory stick. That happened in Austalia. Since wannacry encrypts owner created files on a computer, I would assume it would encrypt any JPGS or video files created by the Traffic cameras. Interesting that it is being claimed that it was spread by the use of a USB Memory stick. A good question to ask, would be “Where has that USB stick been plugged into a computer which was connected to the main system network”. USB Memory sticks generally have to be plugged into a computer to acquire ransomware.

Click on this link to visit the 3Aw News Radio Station’s post about wannacry infecting Traffice camera in Austalia.

Traffice cameras must be a huge money maker. The wannaCry ransomware infection was started apparently on June 6. So by June 22 at least 8,000 Traffic Tickets may be withdrawn because of the infection of the Traffic camera. Those cameras must generate huge amounts of money for the city and for insurance companies and for the court system of lawyers, judges and clerks. Nice money making scheme with possibly little impact on traffic safety. 8,000 tickets in two weeks!!!

Click on this link to visit the Canadian Global News page to read their post titled: “8,000 red-light camera traffic tickets withdrawn in Australia due to WannaCry virus”.


Prada Paperclip shaped Money Clip is available at Barneys for only $185 US Dollars

Posted by Vincent Banial.

At Barneys in New York you can buy your own Prada branded Paperclip shaped Money Clip for only $185 US Dollars (shipping may be extra).

Click on this link to visit website post featuring this item.

There is a bargain priced “used” one available at THE REAL REAL, at for only $125 US (shipping maybe extra).

Click on this link to visit post about the used item they have for sale.

Photo courtesy of the website.

The following are some sample links to Twitter Tweets:

What looks essentially like a Paperclip selling for $185, is the talk of Twitter of late.

Disclaimer : Always check with the official websites mentioned to confirm price and availability. The price of the Prada item mentioned above is subject to change without notice. Actually everything posted above is subject to change without notice.

$12.8 Million U.S. Dollar Bespoke Sweptail Rolls-Royce, could set a new World Record for the Most Expensive New Automobile

Video is courtesy of the Rolls-Royce Motor Cars YouTube channel 

I could wax eloquent about the new Rolls-Royce Bespoke Sweptail Motor Car. The custom built Rolls-Royce Bespoke Cars Sweptail apparently sold for 10 Million British Pounds or about 12.8 Million U.S. Dollars, which could set a new world record as being the Most Expensive New Automobile.

Video is courtesy of the effspot YouTUbe channel

I will instead post the official News Release from Rolls-Royce Motor Cars:

Photo of a Rolls-Royce Sweptail courtesy of Rpolls-Royce Motor Cars

Photo of the Rolls-Royce Sweptail is courtesy of Rolls-Royce Motor Cars.


Media Information


27 May 2017, Villa d’Este

When, approximately one year ago, Rolls-Royce presented 103EX to the world, it invoked its coachbuilding heritage to inspire its future clientele. This Vision Vehicle envisaged a world of completely personal luxury mobility where new technologies would allow every Rolls-Royce to be designed in their owners’ image, should they wish. Such a Rolls-Royce would represent the truest meaning of luxury – a personal, Bespoke motor car like no other for each individual commissioning patron.

The mere idea of a modern coachbuilt Rolls-Royce was not enough for one Rolls-Royce connoisseur however. This individual approached the marque with his own idea of a two-seat Rolls-Royce that he wanted to be created in the here and now. That motor car is here, now and is christened ‘Sweptail’. In a nod to the swept-tail of certain Rolls-Royces from the 1920s, admired by the client so much, he asked Rolls-Royce to reimagine this feature on his one-off motor car.

Photo of a Rolls-Royce Sweptail courtesy of Rpolls-Royce Motor Cars

Photo of the Rolls-Royce Sweptail is courtesy of Rolls-Royce Motor Cars.

Presenting the car to the media at the Concorso d’Eleganza at Villa d’Este on Saturday 27th May 2017, Torsten Müller-Ötvös, Chief Executive Officer, Rolls-Royce Motor Cars said, “Sweptail is a truly magnificent car. It exudes the romance of travel for its own sake, and immediately places ‘Sweptail’ in the pantheon of the world’s great intercontinental tourers.  Rolls-Royce’s history as the world’s leading coachbuilder is at the very core of its identity as the world’s leading luxury brand. The arrival of 103EX shone a light on the future of Rolls-Royce in this field, and ‘Sweptail’ is proof, today, that Rolls-Royce is at the pinnacle of coachbuilding. We are listening carefully to our most special customers and assessing their interest in investing in similar, completely exclusive coachbuilt masterpieces.  At the same time we are looking into the resources which will allow us to offer this unique service to these discerning patrons of luxury.”

Through this commission, Rolls-Royce has proven once again to be the world’s leading luxury goods provider.

Continue reading

“Rivolta” gives an insight into the Exploits of a 15-year-old “Elite” Hacker named Michael ‘MafiaBoy’ Calce, who had taken down the websites of some of the largest companies.

Michael “MafiaBoy” Calce was just 15 years old. During his Exploit days, prior to being arrested, he had taken down the websites of some of the largest companies in the world, causing an estimated $1.7 billion in losses. He realized the depth of what he had done, after watching a news program where then President Clinton spoke about what “Mafiaboy” had done.

This video: “Rivolta: Inside the Mind of Canada’s Most Notorious Hacker” was produced by HP Canada. “Rivolta” was directed by Hubert Davis.

In one way this young person was extremely curious and yet his educators did not pick-up on that, so he sought out info elsewhere. In one part of the video, Michael Calce talked about taking a computer programming class in Pascal, but showed his instructor that he could code the course examples in far more powerful and complex “C Language“.

How many other genius kids who have the inner desire to learn, are also being missed by their Educators? Yes, this video is about the Exploits of a 15-year-old “Elite” Hacker, but it is also about an Educational System which in my opinion failed this young lad.

Video is courtesy of the HP Canada YouTube channel

Altaro is offering a free ebook “Ransomware: A Survival Guide”

Click on this link to visit the Altraro website to Download their free ebook titled “Ransomware: A Survival Guide”. They ask for your name and email to be able to D/L. Just do a Google search on “Temp Email” to find a site which will give you a free temp email address, if you do not wish to give out your email address.

The Altaro eBook is a short, yet interesting read about Ransomware.

Altaro also have a much more detailed video about Ransomware on their YouTube channel (see below).

Video is courtesy of the Altaro Software YouTube channel

Posted by Vincent Banial

WannaKey along with WanaKiwi may help to decrypt your WannaCry encrypted files without having to pay the Ransom

WannaKey works with older variants of Windows Server and Windows Workstation Operating Systems such as Windows Server 2003, Windows Server 2008, Windows XP, Windows 7, and Windows Vista.

When WannaCry encrypts your files, it creates a Private Key which is used to create the decrypt key. Then the Private key is erased. On older Windows systems the erase does not remove the data from memory. So if you are lucky and you have “not” rebooted the PC then there is a chance that WannaKey could recover the Private key, because it is still held in the system memory.

Once you have the Private Key then you can use a different program called wanakiwi to decrypt the files on the WannaCry encrypted PC.

The key point to remember is that the above process “MAY’ work. The Computer which was encrypted by WannaCry Ransomware, must “NOT” have been rebooted. Any files to download would be done using a different computer and then run on the encrypted PC via a USB flash Drive.  The WannaCry code did issue the command to erase the Private Key but the bug in older Windows Operating Systems is that Private Key has not been erased from the computer’s main memory.  With a bit of luck, you may be able to decrypt your WannaCry encrypted PC. Note there is no guarantee that this will work. If you are unsure how to go about this, then get a computer professional to help you.

Click on this Link to visit the GitHub page for Wannakey.

Click on thsLink to visit the

Click on this Link to visit the Comae Blog post by Matt Suiche titled “WannaCry — Decrypting files with WanaKiwi + Demos”. Matt goes thru the whole process along with screen shots.

Video is courtesy of the Vishnu Ava YouTube channel

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

Posted by Vincent Banial

Disclaimer: Everything in the post above is subject to change without notice. There could be unintentional errors. Please confirm all info via the linked to websites and web pages. Best Practice is to also always create daily backups. If you try to decrypt a WannaCry encrypted personal computer or server, you do so at your own risk. There is no guarantee that the above info will be successful in decrypting the files.

CERT had issued Vulnerability Note VU#867968 advising about the SMB vulnerability in Microsoft Windows

WannaCry Ransomware seems to have appeared out of the blue. Because of it thousands of people have searched the internet to find out how to disable SMB on their Microsoft Windows based Servers and Workstations and Personal Computers. Thousands had dropped by Uniquely Toronto to read out posts which provided details on ways to disable SMB v1.0.

Now Adylkuzz is running another major attack which is underway and uses the SMB vulnerability in Windows.

There was a prior Cert advisory titled: “Vulnerability Note VU#867968” (Microsoft Windows SMB Tree Connect Response denial of service vulnerability) was issued on Feb 02 2017.

In March Microsoft issued their Microsoft Security Bulletin MS17-012 which addressed the SMB issue.

There was also an even earlier US-CERT Advisory posted on Jan 16 2017 titled: “SMB Security Best Practices”, which suggested “blocking outbound SMB connections (TCP ports 139 and 445 along with UDP ports 137 and 138) from the local network to the WAN. “. Port blocking can be done using your Firewall Software (or Hardware)

“US-CERT cautions users and administrators that disabling or blocking SMB may create problems by obstructing access to shared files, data, or devices. The benefits of mitigation should be weighed against potential disruptions to users. For more information on SMB, please review Microsoft Security Advisories 2696547 (link is external) and 204279 (link is external).”

Microsoft Windows MS17-010 Security Update:

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

Posted by Vincent Banial

Disclaimer: Everything in the post above is subject to change without notice. There could be unintentional errors. Please confirm all info via the linked to websites and web pages. Please install the Microsoft Windows MS17-010 Security Update (see link above). Best Practice is to also always create daily backups

Massive Adylkuzz attack is underway which uses the same tools used by WannaCry

New Adylkuzz Malware attack uses the same tools which were used by WannaCry Ransomware – (EternalBlue for instance) which were released by The Shadow Brokers back in April. Eternal Blue code scans a network to find computers running the Microsoft SMB v1.0 protocol service (open TCP ports 139 and 445 along with UDP ports 137 and 138). When found it can then install the malware.  Adylkuzz is infecting thousands of computers around the Globe. Microsoft released a Security patch back in March which addressed the SMB vulnerability. Last week Microsoft also released further Windows Security Patches for Windows systems going back to Windows XP.  Microsoft’s Windows Security Updates will stop the spread of WannaCry and Adulkuzz, once the Security Patches have been installed and the system rebooted. At the bottom of this post, you will find links to the official Microsoft Patches.

Video is courtesy of the DAHBOO77 YouTUbe channel

This new AdylKuzz Malware does not request any ransom from the owner of the infected computer. It does it’s processing in the background. One interesting aspect about the way that Adylkuzz works is that once it infects a computer it then disables the SMB v1.0 protocol. That move prevents any other Malware from infecting the computer. Adylkuzz may very well have protected thousands of computers around the globe from becoming infected by WannaCry Ransomware because Adylkuzz it is believed has been running in the wild on the internet for many weeks and before the WannaCry attack was launched.

Click on this Link to visit the PHYS.Org website to read their post titled: “Another large-scale cyberattack underway: experts”.

Adylkuzz essentially is a Cryptocurrency Miner. Apparently, it is being reported that Adylkuzz does not damage any files. A lot of people use their powerful computers to do Cryptocurrency Mining. Cryptocurrency like Monero and Bitcoin is essentially untraceable Internet money which can be converted to a National Currency or used directly on the Internet. Adylkuzz mines the Monero Cryptocurrency. Once installed on the infected computer it will start to use computer resources. On an older slow PC, the end user will notice a dramatic slowdown. On a Top End fast PC there will be a far less noticeable slowdown. What will be dramatically affected, will be one’s useable internet bandwidth. Downloads and even web page loading will take longer. Watching internet videos will be affected with slowdowns.

To prevent being infected by either WannaCry or Adylkuzz one needs to make sure that any Microsoft Windows Security Updates have been installed. Yes, one can manually disable the SMB v1.0 protocol on a PC, but the Microsoft Security Patches also patch other holes and vulnerabilities in the Windows Operating Systems. Install the Windows Security Patches. Also make sure to Update any and all of your Computer Security software like your Firewall, Anti-Virus, and Anti-Malware software. Then consider buying an external hard drive (if you do not already have one) and start backing up your data. Having a daily Backup of your data files costs far less than having to pay Ransomware, should your PC become infected.

Click on the following like to visit the Proofpoint cybewrsecurity firm’s post titled: “Adylkuzz Cryptocurrency Mining Malware Spreading for Weeks Via EternalBlue/DoublePulsar”.

Click on this Link to visit the Symantec Security Response blog to read their post titled: “Adylkuzz Cryptocurrency Miner Is Not The Next WannaCry”.

Click on this Link to visit the site to read their post titled: “New Adylkuzz cyberattack targeted at mining virtual currency in infected computers”.

Click on this Link to visit the RT website to read their post titled: “WannaCry XXL? 2nd even bigger global cyber attack already underway”.

The following was posted by Anonymous on their YouTube channel TORnado – Anonymous France. Permission to share was posted on their YouTube channel along with the video linked to below,:
“Published on May 17, 2017

Greetings citizens of the world,

We are Anonymous.

This is a new warning about a massive hack.
Following the attack “WannaCry Ransomware”, a much larger hack was discovered.

Much more vicious, better hidden and bringing much more money to black-hats hackers, this massive virus is called “Adylkuzz” and simply uses the same flaw as WannaCry.
This is once again a computer tool stolen from the NSA.
But this time it is not your data that is affected but your entire computer that through the rat, will become a minor zombie of crypto-currency.

For the moment of what we, Anonymous know, here is the process:

The virus enters the computer with DoublePulsar and EternalBlue, via the MS17-010 fault on the TCP port 445 as the previous “WannaCryptor” but there will be nothing on the screen. You will not even know that you are infected.

Then the hack will begin to mining the cryptomony with your machine, ie you will produce virtual currency of type “Monero”, similar to the famous bitcoin without
You know it and free for hackers you do not know.
Knowing that the mining uses the abilities of the PC, the victim then undergoes slowdowns which causes a malfunction of the computer.

Several hundred thousand people would already be in this case, that’s why we’re alerting you once again. It seems that “WannaCry” was only the part of the iceberg, stay alert, update your Windows and keep your antivirus.

On our side we follow different tracks to find these hackers. Already about 40,000 dollars in Monero have recently been discovered probably the money gained through the hack.

The cryptomontee is thus once again likely to have a bad image in the media whereas this currency remains a practical and anonymous means to buy or give money.

Now calls to the Anonymous, it’s time to stop these criminals and help those affected or not knowing how to protect themselves.
The NSA can not even protect its own data, so we can only count on ourselves.
In any event,

We’re Anonymous,
We are Legion,
We do not forget,
We do not forgive,
Rogues, thieves, whoever you are,
Expect us.


The video below, by Anonymous, is the above info but spoken in French.
Video is courtesy of the TORnado – Anonymous France YouTube channel

The following are LINKS to Official Microsoft Patches for assorted versions of Windows (including Windows XP). Download English language security updates:

Windows Server 2003 SP2 x64,

Windows Server 2003 SP2 x86,

Windows XP SP2 x64,

Windows XP SP3 x86,

Windows XP Embedded SP3 x86,

Windows 8 x86,

Windows 8 x64

To download localized versions for the security update for Windows XP, Windows 8 or Windows Server:

Microsoft Windows MS17-010 Security Update:

Click on this link to view other CyberSecurity related posts found on Uniquely Toronto.

Posted by Vincent Banial

Disclaimer: Everything in the post above is subject to change without notice. There could be unintentional errors. Please confirm all info via the linked to websites and web pages. Best Practice is to always create daily backups