WELCOME TO SIG OFFICIAL
HOW TO MEDITATE IS NEXT VIDEO
-------------------------------------------
HUMAN RELATIONS WITH PYRAMID - PART 5 - Duration: 3:57.
Welcome back, ladies and gentleman.
I have explained how
every structure or process system that exists in every element
were back to how we understand the process we called pyramid.
So,
pyramid is a code that is given to this shape.
The ancients have stated its name as pyramid so we accepted it also as pyramid.
But actually it presented the specified formulas
in human's life.
I have explained in the previous video how we can apply the benefits from these formulas.
So here's the example,
in the medical courses too.
How we want to understand it
on how our body system works.
How every cell grows.
How it is related towards each other.
Hence we could unravel it if we could find a clarified process for the formula that is in the pyramid.
So why K24?
What is K24?
I have explained from the start.
K is a factor, specified.
It has no change.
It has to be one.
So K is where everything starts with one.
2 is everything that exists in the universe in the law of Z.
It comes in pair.
Hence that is why it is 2.
Everything has its partner.
If it has no partner, we could not unravel the issue of pyramid.
And about 4,
when we look at the shape of a pyramid, it has four corners between each other,
but it has more unique features, ladies and gentlemen.
The shape of pyramid that I'm showing here is just its base.
Actually every degree that existed in a pyramid
there are 52 degrees,
there are 51 degrees,
There are varieties of pyramid in this world, if we look at the existing pyramid.
Actually they have their own role.
For the 52 pyramid
actually it was built with 52 degrees.
What for?
51 was built.
What for?
Everything has its reason.
And I will share with all of you.
Just basically because everything will take a lot of time.
But basically how does the process works.
So as a scientist,
as a scholar.
Let us together understand this.
Maybe and for sure I could open another space
for exploring and understanding the science of pyramid
and from here could know clearly what is ALAMTOLOGI.
We will continue after this.
-------------------------------------------
What is Magic League - Duration: 9:34.
What is Magic League
If you really like the fun and excitement of a prerelease, I have a format for you.
It's Magic League.
And I'll tell you all about it, right now.
Welcome Young Mage I'm The Rhino.
Young Mage is devoted to reaching and teaching young mages of all ages.
Subscribe now to show your support.
And don't forget to tap that bell down below to get notifications of all the cool stuff
coming soon.
Man, Friday Night Magic is fun.
I really like building new and different decks.
But some people just play the same deck over and over.
It'd be great if there was a format that was like the prerelease.
We always have so much fun at those.
"I Pharaoh say, why not try Magic League"
Magic League?
What's that.
V "It's a new in store format that's dynamic and fast paced."
How do I start?
"You start with 3 booster packs…
And build a 30 card deck."
"Each week you add another booster pack to your pool."
Wow, this is great.
I have so many questions.
"For that you need to call an expert."
Ok.
What is Magic League?
Do you only play in a store or can you play at home?
Do you only use packs from Amonkhet or can you use other other sets like Kaladesh?
Can you use the same deck in more than one league?
Does your minimum deck size change as you add more packs?
What happens if somebody starts partway through the league?
How many games do you play each week?
Is there a winner?
What are the prizes?
What is the unladen air speed of a swallow?
Magic League is amazing.
The games are fast paced.
And my deck gets better and better each week.
Magic
League is really fun.
Comment below and tell me what you think.
Are
you
ready to play in a Magic League?
Do you think you have
what it
takes
to win?
Make sure you click like on my videos, it helps out a lot.
Don't forget to subscribe, if you haven't already.
And there are a few things here and here that may interest you.
I have more videos coming out soon.
And until then, Rhino out.
-------------------------------------------
DEF CON 24 - Patrick Wardle - Ive got 99 Problems, but LittleSnitch aint one - Duration: 20:02.
>Um this is Patrick Wardle, we've got 99 problems but a little snitch aint one. And I
will just let him take his talk away. [Applause] >> Aloha. So let's talk about owning little
snitch. As he mentioned my name is Patrick Wardle. I worked at a bunch of Acronymed places,
currently the director of R&D at Synack. So synack does crowdsourced vulnerability
discovery with vetted security researchers. So if you are interested in getting paid to
find bugs in our customers web apps, mobile apps, IOT devices and network endpoints then check
out synack.com. Alright we only have 20 minutes so we are gonna jam through a good amount of
stuff. We are gonna start by briefly talking about what little snitch is. We are then
gonna talk about how to bypass it, how to exfiltrate data or talk to a Command and control
server without being detected by the firewall. Then i'm gonna talk about reverse engineering
the kernel component looking for a security vulnerability and then talk about a bug that I
found. Now before attacking any technology it's good to have basic understanding, so let's
briefly talk about what little snitch is. So what is little snitch? Well little snitch is
basically a firewall. Basically its goal is to alert the user if its sees any unauthorized
traffic. So this couple be a piece of malware, connecting to a command and control centre or
an attacker trying to exfiltrate data. It has various components. There is a kernel driver or a
kernel extension that runs in ring 0, and we are going to be focusing mostly on this, because
this is where the security vulnerability I found lies. There's also some pieces that
run in user mode, so there is a daemon that runs in the root session that does some rules
managment, and then there is some interactive components that run in the user session. Most
notably there is a launch agent that is responsible for displaying the alert anytime the
firewall core detects unauthorized traffic. So it's gonna pop up telling the user
process x is trying to connect to IP address y, then the user can confirm or deny it. Alright
so little snitch is a firewall, so how can we bypass it. That is to say how can we exfiltrate
data without being detected or connect to a command and control server without generating any
popups which would alert the user to what we are doing. So the first thing is, let's look
at the little snitches' firewall rules. What is this, there is a default undeletable system rule
that says anyone can talk to Icloud. So what we can do is reverse engineer the iCloud
protocol, and its pretty basic, its JSON based. And once we understand the protocol what we
can do is set up a Command and control server on iCloud then we can write our custom code that's
trying to exfiltrate data or write some malware that connects to a Command and control server
that is then on iCloud. Now little snitch will see this traffic but since it conforms to
that rule, it won't generate an alert. So basically now we can exfiltrate data, talk to Command
and control server without alerting the user at all. Another way to bypass little
snitch is by abusing its process level trust. So little snitch in terms of granularity, assigns
trust at the process level. This means the process is allowed to talk to the internet,a ny code
or threads of dynamic libraries within that process, can talk to the internet as well. So this
means if we can find any way to inject malicious code into any of the processes that little
snitch trusts or allows to talk to the internet, we can connect out without the user being
alerted. So for example on my box gpg keychain is allowed to talk to the internet, which
makes sense. It does key management, checks for updates, stuff like that. Fortunately gpg
keychain is vulnerable to a dialling hijack attack. This means we can plant a malicious
dynamic library on the filesystem and then every time this application is started,
either by the user or programmatically by some malware in the background, the dynamic
library will be loaded automatically by the OS loader into context. Into the process
context of this trusted application. At that point we can then connect out to the
internet. Again little snitch will see this connection, but since it conforms to a rule it
will allow it without alerting the user. Finally another way to bypass little snitch is to
simply turn it off. So I reverse engineered what happens when the user clicks on stop network
filter. And basically what happens is the user mode component of the firewall
connects and authenticates to the kernel component and we will talk about how to do that in a
minute. But once it's connected and authenticated it simply invokes method B. Method B takes
a single parameter, a 0 to turn off the firewall, or a 1 to turn it on. So we can write our own
code to do this ourselves. So the best part about this bypass is, is it's invisible to the UI.
so if malware invokes method B with a 0 to turn off the firewall to exfiltrate data and
then connect to a command and control server. If the user looks at the status of the
firewall it will show that it is on. Alright so let's talk about how to reverse engineer little
snitch. Specifically its kernel extension. With the goal of finding a exploitable a kernel
vulnerability. Bypassing a firewall, bypassing any security product is you know pretty easy.
You target a certain anti-virus product you target a certain firewall you are going to be
able to get around it. Little snitch makes it really easy, but still they should not have
exploitable security bugs. Right these are security tools. So in my opinion that's kinda what we
want to find, because that a lot bigger of a problem. So little snitch kernel extension lives in
slash library slash extensions. its signed and its started automatically every time the
system starts. We look at its info dot plist file which has characteristics about it. We can
see it's a IOkit driver. So what is IOkit? IOkit is basically apple's device driver
environment. So it's a object oriented programming model that's implemented in a subset
of C++. And there is a lot of good resources on it, so I am not gonna spend a lot of time
talking about details, but on the slide we can see this is a skeleton hello world driver.
Basically you implement a bunch of C++ methods, you compile this, load it into the kernel,
and then the kernel proper will invoke these methods. SO we can see for example invokes you know
init, proc, start, and obviously you can put code in these methods to do whatever you want
your driver to do. Now in terms of reversing specifically looking for exploitable kernel
vulnerabilities I always like to see how and where user mode data is processed. The idea here is
if we can pass in user mode date code to the kernel mode driver and it processes it in a
vulnerable way we might be able to find a security vulnerability. So it's important
to understand what mechanisms IOkit provides to pass in user mode data that's processed by an
IOkit driver. So as the slide shows there's a variety of mechanisms, we are only going to
focus on sending control requests. Because this is what little snitch does and this is
also the mechanism where you pass larger structures that might have pointers, sizes,
interesting things that the kernel driver might not validate or use correctly. So first let's
kinda talk about a conceptual overview of how a user can invoke a method in the kernel
driver. So in this slide we see at the bottom there's a user or some user mode, and say it wants
invoke a method for example: method 1. How does it do this, well it makes a request to the
kernel with a selector. A selector is simply an integer and as we will see its an index.
So this request gets routed into the kernel and then the kernel proper will forward to the
correct IOKit driver. Specifically it will call that IOkit driver's external method
function. What the external method function does is use the selector that integer as an
index into array of function pointer. These are the methods that the driver exports or
exposed to user mode. So if we want to invoke method 1, we pass in 1. So once the external
method has extracted that function pointer, calls it the dispatch method, it invokes its
super class. The super class performs some basic validation, uhh and for example if method 1
picks a strucutre of size x, and makes sure the user also passed in a structure, and that
structure they passed in is of size x.Now it doenst validate whats in that strucutre and we
will see in a minute thats kinds of a problem. Now once that parameter validation is
successful, the super class then will directly invoke the dispatch method. So will then
actually invoke method 1. So here's an example of some user mode code of how to actually do
this. So there's basically 3 steps. Step one is you use find the driver you want to connect
to and you do this by the driver's name. You then connect to it to create connection
object and then finally you invoke the method. Um and there is a bunch of api how you invoke
the um kernel mode method. In this example we are passing in a structure so we call the IO
connect call structure method. This again gets routed into the kernel, the kernel will invoke
the external method of the driver, that will validate the parameters and the call the
function that the selector indicated. Okay so let's get back to little snitch and talk
about how to connect to its IOkit driver and then how to enumerate the methods and then
audit them. So if we reverse engineer the user mode components, specifically the
user mode daemon of little snitch we can see it connecting to the little snitch driver via
the string at_obdev_lsnke. So what we can do is write our own custom code that tries to
connect to that kernel extension as well. And when we compile and run that, low and behold we are
allowed to connect to the kernel extension. So what dispatch methods can we call, that is to
say what methods does the little snitch kernel driver export or expose that we can invoke from
user mode. So if we reverse engineer the external method of the little snitch IOkit driver,
we can see where it uses that selector. And in the disassembly you can see there is an array of
function pointers called s method that IDA pro has flagged. So we double click on that and
follow the cross reference we can see there are all the methods that we can invoke, you
just invoked. So there is 17 of them or so. So I started auditing these methods cause
again these are the methods we can reach from user mode. And when I got to method 7 I found
an interesting bug. So method 7 calls a bunch of helper functions and one of these
helper functions processes the data that gets passed in from user mode. So what method 7 is
trying to do is simply copy some bytes from user mode into kernel mode. So it takes a structure
that has a size of these bytes and then the user mode address of where to copy from. Now if
you look at the pseudo code it's probably easiest to see unless you prefer to read assembly. But
you can see it extracts the size out of the user mode structure, allocates a buffer, and then if
that allocation is successful it copies the data of that same size into the kernel. So you
might look at this and took me a while and I didn't really see that there was a problem and
this looked like normal valid code. Well the problem is size matters. Why? Well the
allocation function they use which is OS_malloc takes a 32 bit integer. Well the copy
function which is copy_in takes a 64 bit integer. So obviously if you pass in a 64 bit size,
which is what little snitch extracts from that structure it's gonna truncate that when it
allocates it. So for example if we pass in one with a bunch of zeros and a two, basically 64bit
value, it's actually gonna truncate that when it goes to allocate that. So in this case
it's going to only allocate a buffer of 2 bytes. Then when it goes to the copy, copy_in uses
the entire 64 bit value. There is no truncation that occurs. So obviously we get a massive heap
overflow, because it tries to copy some 2 to the 31 or 4 billion bytes into that. Alright
so can we exploit this bug? Well turns out first before the vulnerable there is actually a
check in the little snitch driver. And what the check does it checks some value which turns
out to be a authentication flag and if that is not set to 1 it fails, it does not even invoke
the buggy code. So we have to figure out how to set the flag so we can reach the buggy code.
So I reverse engineered the remaining piece or methods in the little snitch kernel driver
and I found out that method 8 is the code that sets this flag. Basically what methods 8 does is
it's expects a hash from user mode and then it computes a secondary hash itself and then
compares these hashes. If the hashes match it sets the flag to 1. So this is exactly how we can
pass in the correct hash so that those both match , so we can set the authentication flag. So we
connect to the little snitch driver, we invoke method 4, which passes back some 16 bytes
of random data, we then hash that with md5 and a hard coded salt. The hard coded salt is
embedded in the user mode components of the little snitch firewall. An then we invoke
method 8, again method 8's gonna recompute or compute the secondary hash, and since we
know how to generate that hash, it will now match and authenticate. So it's basically
kinda like security through obscurity for authentication purposes. Okay so we can now
authenticate, but can we trigger this bug? So I found this bug in 2013 and when I was stepping
through the code in a kernel debugger I saw yes they extracted a 64 bit value, passed
that to a allocation routine that truncated that down to 32bits, so for example it would
only allocate a buffer of 2 bytes or 3 bytes. But then when I stepped over the copy routine
it actually only also copied 3 or 4 bytes. So you know that was sad, right? Did Not actually
trigger the bug. So I looked into the copy_in routine to figure out what it was doing. Um
copy_in is a function written by Apple and under the hood it calls underscore bcopy. If you
look at the assembly for underscore bcopy, it's a handwritten assembly routine.
You can see although function definition says hey I take a vm size T, which is a 64 bit value
on 64bit systems, and even the comment says I am going to use rdx which is again a 64 bit
register. You look at the assembly code they actually only ECX register. So this means that
64 value that gets passed in, that size is also gonna get truncated. So unfortunately this
at the time wasn't really a bug. Well I did what any normal person did and I filed bug
report with apple. I basically said hey guys [Laughter] your bcopy routine is [clapping] is
buggy. And we all know how Apple is, they take their time. So I had to wait 2 and a half years
for them to fix this. That's why I am only talking about it now. So they fixed it which is good,
so if you look at bcopy now and look at the assembly, you can see they correctly use RDX or
the 64 bit registers. As the function definition says it should. So awesome. So we can
authenticate and we can trigger the bug. But it's still gonna try to copy some massive amount
of bytes into a small allocated buffer. Which is gonna trash the kernel and cause a kernel panic.
So basically we need to figured out a way to how exactly control the number of bytes, so we can
maybe overflow it by 6 or 7 bytes. You know we need a tactical solution here. So how
can we take this whole kernel copy. Well turns out that bcopy is actually fault tolerant,
which is a good thing, so bcopy again is copying data from user mode into kernel mode. So what
happens if it hits an unmapped page it handles this gracefully and stops copying. So we can
exploit this fact by passing in an address that's close to a page boundary of an unmapped
page. So we can map two pages in user mode, unmap the seconds page, and then pass in pointer
that say like 5 bytes before that unmapped page, and what's gonna happen is that copy
routine is going to try and copy 4 billion bytes in, but as soon as it hits that unmapped page
it's gonna stop. So that's perfect cause now we control the exact number of bytes that are
copied. So now we have all the components needed for an exploitable heap overflow. We
control the size of an allocation buffer in the kernel. We control the values of the
bytes copied, there is no constraints. We can put in 0s, nulls, whatever we want. And
most importantly we can copy the number of bytes that get copied into this buffer. So what we can
do to exploit this, is we can perform a heap spray, some heap feng shui, and basically get a
C++ object that we own to be immediately adjacent to this little snitch buffer. We can
then overflow the little snitch buffer into that C++ object and if you know how a C++ object is
laid out in memory, it has a vtable which is a pointer to all its function pointers. So we can
corrupt that or control that vtable. And once you control the vtable of an object you control,
if you can invoke methods on that, it will use the corrupted vtable. Which basically give you
RIP. So here is a screenshot of the kernel broken on instruction, it's a call
instruction uses RAX. I've blown it up a little bigger so you can see the values. But if we look
at what RAX is, its 41 41 41 41, so basically we control the instruction pointer in kernel
mode. Now firstly we dont have the time to talk to how to weaponize this exploit, but
there's been a great number of really awesome talks articulating exactly how to do
this if you have such a heap overflow. So they talk about how to groom the heap, how to get
these C++ objects, where you need to be, how to bypass kslr, [inaudible], smap, that kind of
stuff and some payload. Now one interesting weaponization technique you can maybe use with
this, is that even if the bug patched, this is still a valuable bug. So in modern
versions of OS 10, even if you have root access, you can't bypass system integrity
protection and you can't load unsigned code into the kernel. However this is a signed driver,
so as long as we have a buggy version of this driver, we can bring this to a target, load the
driver and then exploit the vulnerability. Once we exploited it, we have arbitrary code
execution in the context of ring 0, in the kernel. Now we can bypass system integrity
protection or even run unsigned code in the kernel. Alright so let's wrap this up. So what did
the vendor do, so the good news is they fixed the bug pretty quickly. So I said hey guys you
should probably just pull out the 32 bit value and pass that to both the allocation and the
copy function, then you don't really have to care about what it's doing under the hood. So
that's exactly how they patched it. Fortunately then they really down played the bug, so the
exact quote was they fixed a rare issue that could cause a kernel panic. This is bullshit.
It's not a rare issue, this was in all versions of little snitch. Its also not a kernel
panic. it's a exploitable security vulnerability. So I was a little urked, because I was
like come one guys you are a security company. You Are providing payed security tools,
if someone reports you a security bug, at least you know like lets your users know that
they should update. So you know that was a little of a bummer, but I think they've got better.
Alright um I'M assuming you guys are interested in Mac stuff, which is why you are here. So
I'm just briefly going to mention my personal Mac security website, I apologize for the
shameless plug. But everything is free, lot of opensource Mac security tools. There's a bunch
of modern Mac malware samples if you want to reverse engineer, the AV guys don't always like to
share. So I try to share. And also I blog about this stuff, so feel free to check it out, if
not, no worries. Alright so we have 54 seconds so there's time for one or two questions, i'll
hang around afterwards if any of you want to chat. So are there any questions about little
snitch kernel exploitation? Anything else? Anything Else? [applause] That one slide. Yes
[applause] Awesome well thanks again, feel free to shoot me email any time. Ummm I love
talking about all this stuff. Um and thank you again I really appreciate you attending my
talk. [applause]
-------------------------------------------
NFL hopeful De'Veon Smith is product of Howland High School - Duration: 2:48.
the NFL... Doug
Datish was picked by the Falcons
in the 6th round, back in
2007... De'Veon Smith is
hoping to be NEXT. Sports
Director Ryan Allison caught up
with the Michigan tailback,
and THREE time member of our Big
22...on the eve of the NFL
Draft.
[15870]20170426 DEVEON SMITH
NFL-PK
HOWLAND GRADUATE, DE'VEON
SMITH: "THIS WHOLE
ENTIRE PROCESS HAS BEEN... I
DON'T EVEN KNOW HOW TO DESCRIBE
IT...
IT'S KIND OF SOMETHING YOU'VE
WAITED FOR YOUR WHOLE LIFE, BUT
YOU CAN'T WAIT FOR IT TO BE
OVER."
RYAN ALLISON: DE'VEON SMITH HAS
ALREADY MET AND INTERVIEWED WITH
ALL 32 NFL TEAMS... AND HE
DEFINITELY HAS A FEW
FAVORITES... BUT
GOOD LUCK GETTING IT OUT OF HIM.
DE'VEON SMITH: "NAH, I CAN'T
EVEN SAY THAT. IT'S ALL 32
TEAMS, 32
TEAMS LET ME KNOW. I ONLY NEED
ONE TEAM HONESTLY. I JUST
NEED ONE TEAM. GIVE ME A SHOT."
RYAN ALLISON: DE'VEON WILL GET
HIS SHOT THIS WEEKEND, AND WHEN
THAT MOMENT COMES...
SMITH: "I ALREADY KNOW WHAT THE
MOMENT IS GOING TO BE LIKE.
THERE'S GOING TO BE A LOT OF
TEAR SHEDDING. FOR SURE MY MOM
IS
GOING TO BE THE FIRST TO
BREAKDOWN. I'M GOING TO BREAK
DOWN TOO, ALL MY BROTHERS AND MY
LITTLE SISTER."
RYAN ALLISON: THIS ISN'T THE
FIRST TIME DE'VEON HAS BEEN
EXCITED TO
JOIN A NEW TEAM... WHEN HE
COMMITTED TO MICHIGAN 5 YEARS
AGO... HE TOLD US ABOUT A VIDEO
GAME VERSION OF HIMSELF WITH THE
WOLVERINES. SMITH: YEAH, I
ACTUALLY
CREATED MYSELF ON THE NCAA
FOOTBALL GAME. I WAS JUST SEEING
WHAT I'D LOOK LIKE IN THE MAIZE
AND BLUE, SEE WHAT KIND OF STUFF
I
WOULD WEAR, SO I HAVE IMAGINED
THAT YEAH.
NATS - "SMITH WILL RUN IT AGAIN,
AND HE SCORES."
RYAN ALLISON: "AND IF YOU'RE
WONDERING WHETHER HE'S HAD
THE SAME DIGITAL DEBUT IN MADDEN
N-F-L?
SMITH: DEFINITELY, I DEFINITELY
MADE A PLAYER, CREATED A PLAYER
TO SEE WHAT UNIFORM FIT ME THE
BEST. WHAT NUMBER WAS
AVAILABLE AND JUST HAVING FUN
WITH IT.
RYAN ALLISON: OVER THE LAST 4
YEARS IN ANN ARBOR, DE'VEON
SMITH HAS RUSHED FOR OVER 21
HUNDRED YARDS AND SCORED 22
TOUCHDOWNS... SOME OF WHICH,
WERE SPECTACULAR.
NATS - "DE'VEON SMITH BREAKS
FREE, AND SCORES"
RYAN ALLISON: BUT HIS BIGGEST
ASSET... MAY BE BLOCKING, AND
MORE IMPORTANTLY PROTECTING THE
QUARTERBACK...
AND IF YOU ASK HIM THE ADVANTAGE
HE HAS OVER EVERY OTHER BACK.
SMITH: THAT I'M THE BEST PASS
PROTECTOR IN THIS DRAFT CLASS. I
DON'T THINK THERE'S ANY PASS
PROTECTOR THAT CAN PROTECT LIKE
ME HONESTLY. I MEAN ONLY TIME
WILL TELL, GOING TO HAVE TO
PROVE
THEM WRONG. WHATEVER TEAM PICKS
ME, THERE GOING TO SEEM,
AND THE OTHER TEAMS THAT DIDN'T
-------------------------------------------
Jason Crittenden VLOG April 26, 2017 MY WIFE IS FIRE - Duration: 4:21.
Well, I'm taking the morning off from work to help my wife.
She's doing a Lularoe show over at Dobmeier's house today, and she's gonna sell some stuff!
So I'm heading out from Alison's Lularoe pop up today.
Heading over to a client testimonial video shoot.
I was just thinking...I don't know how many of you guys know my wife, but...
DANG IS SHE PRETTY!
Awesome man!
I can't believe it.
This is one of my favorite sights right here.
Check out that smoker.
YEAH BUDDY!
Check this little girl out, she's so fast!
So, pretty stoked about this.
We are closing on a deal on Friday.
I got the pre-audit settlement statement for our seller from title yesterday and the seller
is contributing some closing costs.
The way the contract reads, it says "up to 3% of closing costs".
Not 3%...but UP TO 3%.
And, so, I...the settlement sheet had said, the number was literally 3%.
Which I knew was incorrect.
So I asked, "Hey, does this guy, the buyer, literally have this much in closing costs?"
They said "Well, let us balance with the lender and I'll get it back".
They were just sending that over...which is...whatever.
So, they sent it back over with all of the fees and I noticed they were prepaying the
buyer's HOA for an entire year!
Now that used to be legit.
They used to be able to do that.
But they changed the contract back in February.
February 1st.
And um, I got educated on it.
My team took classes to make sure we understood all of the contract changes and how it affected
our buyers and sellers.
But a lot of agents didn't.
Even some title and lenders, they don't fully understand the new contract.
So, I caught this right away.
The way the contract NOW reads is the seller contributions can ONLY, ONLY (key word) be
used for lender costs, which HOA pre-paids are not for an entire year...for pre-paid
or escrow fees, title fees, taxes, insurance, and VA if applicable.
And that's basically it.
So, they can't be used to prepay HOA for a year.
So I fought it and fought it and the agent, the lender, title, they all kind of fought
me on it until I reminded title that they have a fiduciary responsibility to all parties
equally.
Now this is buyer's title, they can't favor anybody and they know that, but...they probably
have some sort of relationship with each other.
So they fought me on it until I mentioned that and this morning I got an email that
said "Hey, you're right.
We removed it."
And it was just fantastic news for my sellers because I just saved them like $870.
So it's just awesome.
I'm just super pumped!
I'm glad that I took the time to get educated on that piece of the puzzle and I was able
to fight for my client and made sure that they win.
I just got home and I saw my daughter sleeping on the couch.
This is probably the funniest I've ever seen... she's out.
So it's the end of the night again and I just got done watching our client testimonial video
that was shot yesterday and today with Tarl Johnson and it was so neat!
He said the nicest things about me ever and it was just touching.
It was super cool.
So, today was an awesome day.
Today was a really good day.
I hope that you guys had an awesome day too and I am out!
-------------------------------------------
New Chinese aircraft carrier '6 times more powerful' than existing Liaoning - Duration: 1:36.
China has launched its second aircraft carrier but the first it has ever built from scratch.
It marks the latest milestone in China's superpower ambitions.
The new mega-ship is said to have six times more military strength than Beijing's existing
Liaoning.
With more on this and other news in East Asia..we turn to Ro Aram...
Aram.. the launch of this carrier shows how far China's naval know-how has come on over
the years,... let's hear the specs
Yes Mark... the Type 001A carrier weighs about 50-thousand tons which is 10-thousand tons
less than the Liaoning, but it's slightly longer.
It is powered by conventional steam turbines, which makes it slower than U.S. carriers,
but quicker than the Liaoning.
The vessel also houses a ski jump-style deck for taking off, which experts say is cheaper
to run than the catapults used by the U.S., but limits the diversity of aircrafts on board
to smaller fighter jets.
The new carrier aims to carry 36 Shenyang J-15 multirole fighter jets, which is 12 more
than what the Liaoning can carry.
After sea trials and the arrival of its full air complement, the yet-to-be-named carrier
is expected to be operational by 2020.
Although it still has some way to go to catch up with American carriers, the new ship is
part of Beijing's bigger plan to build a navy that is unrivaled in Asia...and another carrier
- the Type 002 - is reportedly under construction in Shanghai.
-------------------------------------------
Youngstown's progress after steel: 'The transformation is pretty amazing' - Duration: 2:29.
And I'm Mandy Noell. The City of
Youngstown held a town hall
meeting
tonight to talk about what's
happening in the city.
Often to plan for the future...
you have to look to the past.
But we're going to focus on one
part of the meeting -- the
speech by Finance
Director Dave Bozanich. Drawing
from his years of experience --
he
explained how the city
progressed post-steel -- while
at the same time answered the
critics.
Bozanich on Youngstown is our
top story at 11.
[A9]20170426 YNG TOWN HALL 27-PK
Stan Boney-WKBN 27 first news:
Dave Bozanich started working
for the
city of Youngstown in 1980. He's
been Finance Director for 25
years. He's most
knowledgeable on how the city
works.
Dave Bozanich-Youngstown City
Finance Director:
"IF YOU LOOK BACK ON OUR HISTORY
IN TERMS OF WHERE WE WERE AT 30
YEARS AGO, AND WHERE WE'RE AT
TODAY, THE TRANFORMATION IS
PRETTY AMAZING." Stan Boney-WKBN
27 first news:
At this evening's 2nd annual
town hall meeting -- Bozanich
told how the city first
bought all of Youngstown's old
steel mill sites.
Dave Bozanich-Youngstown City
Finance Director: "WE
PROCEEDEDTO TURN THOSE FORMER
BROWNFIELD SITES INTO ECONOMIC
DEVELOPMENT OASES FOR THE CITY
OF YOUNGSTOWN." Stan Boney-WKBN
27 first news:
Those oases include industrial
parks -- that have created seven
thousand jobs and 3.5
billion dollars in investments.
Dave Bozanich-Youngstown City
Finance Director:
"YOU GO TO OUR SALT SPRINGS ROAD
SITE, WE HAVE 26 PROJECTS
THAT WE DID IN A PERIOD OF FOUR
YEARS."
Stan Boney-WKBN 27 first news:
"BOZANICH WAS ALSO CRITICAL OF
CAMPBELL AND STRUTHERS,
YOUNGSTOWN'S NEIGHBORS TO THE
SOUTH, FOR FAILING TO CONTINUE
THE DEVELOPMENT
ALONG THE MAHONING RIVER --
ALONG WHAT IS BILLED AS THE
CORRIDOR OF OPPORTUNITY."
Dave Bozanich-Youngstown City
Finance Director:
"BUT THERE IS NO ECONOMIC
DEVELOPMENT THERE. IT HAS
BEEN A CORRIDOR OF NON
OPPORTUNITY."
Stan Boney-WKBN 27 first news:
At it's meeting last night --
several school board members
were critical of city council's
constant passing of tax
abatements --
which Bozanich called a bad rap.
Dave Bozanich-Youngstown City
Finance Director:
"TAX ABATEMENTS SHOULD BE GIVEN
BY THE SCHOOL BOARD BECAUSE
THEY ARE GETTING THE LION SHARE
OF THOSE TAX ABATEMENTS OVER
A PERIOD OF TIME." Stan
Boney-WKBN 27 first news:
He talked about water. How
Youngstown -- in the 1930s --
paid for the
bulk of Meander Reservoir and
now is being criticized for
selling the water at
rates much higher than for city
residents.
Dave Bozanich-Youngstown City
Finance Director:
"SOMEBODY WANTS TO COMPLAIN, A
BOARDMAN OR AUSTINTOWN OR
CANFIELD FOR THAT MATTER. THEY
HAVE THE RIGHT TO COME IN
AND NEGOTIATE. WHEN THEY COME IN
WE SAY WE WANT PART OF
YOUR INCOME TAX FOR GIVING YOU A
LOWER WATER RATE. THEY SAY NO
THANKS AND THEY WALK OUT. THEN
WE HAVE THE RIGHT TO SET THE
WATER RATES WHERE WE SO DESIRE."
Dave Bozanich says you can't do
economic development on a small
scale. It has to
be done in a way that changes
the town. He says a little bit
is just fanfare
We have his entire speech -- all
16 minutes of it -- posted on
-------------------------------------------
Nutra Nuggets Dog Food Lamb and Rice - Duration: 2:18.
Diamond Dog Food
Nutra Nuggets Lamb Meal and Rice Formula Dog Food
Nutra Nuggets Lamb dry dog food review
hi it's AlaskaGranny I recently bought super-premium Nutra Nuggets
lamb meal and rice formula adult dog food for my little AlaskaSammy
the flavor of dry dog food I I chose from Nutra Nuggets by Diamond was lamb
meal and rice formula for adult dogs premium dog food
I like that Nutra Nuggets comes in a four pound bag
I don't want to buy a 20 or 50 pound bag
of dog food to try out on a 10 pound dog
that would be like you buying 300 pounds
of food for yourself to see if you like it
the ingredients in Nutra Nuggets are listed on the bag
the ingredients come from food grade suppliers and
are certified hormone and
antibiotic-free no artificial
preservatives are used on the Nutra Nuggets dog food
read on the bag for any dog food
that you choose and make sure it has the
AAFCO statement you want to choose a
product that contains complete nutrition
for your dog the back of the bag of Nutra Nuggets shows
you all of the omega-6 and omega-3s the
glucosamine and the chondroitin why
would you want probiotics and
antioxidants in your dog's food dogs
just like humans have good and bad
bacteria probiotics help maintain their
healthy balance by suppressing the bad
bacteria in their intestines the bag of nutra nuggets dog food is
a heavy quality plastic you can't just
pull it open like a chip bag you have to
cut it open the nuggets are small about
the size of a pea three of the dog food nuggets would
equal about the size of a penny which is
nice because my dog is small
Will my AlaskaSammy enjoy Nutra Nuggets lamb and rice dog food
yes AlaskaSammy will eat it
he loves it if you're looking for a
reasonably priced food for your dog look
for the Nutra Nuggets I paid about $4.79
4 dollars and 79 cents for a four pound
bag where I live in Alaska it may be
cheaper where you live or from another
store my dog likes nutra nuggets it's a high
quality nutritional food and it's
something that he's willing to eat happily
please subscribe to the AlaskaSammy channel
Không có nhận xét nào:
Đăng nhận xét