illuminations

illuminations illuminations about  subscribe in a reader enter your email address:delivered by feedburner archives november 2007 october 2007 august 2007 july 2007 june 2007 may 2007 april 2007 categories enterprise network security hardware architectures malware detection and containment standards and protocols trends in network security proud member of security bloggers network, a feedburner network. november 13, 2007 it's patch tuesday again.... so i thought i'd share an example of the timely updates that our customers receive on a daily basis from our nevis labs service.  subscribers obviously get a lot more information, and access to the threat encyclopedia that we maintain, but i've received a few requests to give a taste of the service, so thought today was a good day to do exactly that. vulnerabilities ms07-061 windows uri handling remote code execution vulnerability description windows uri handling remote code execution vulnerability refers to a vulnerability which exists in the way the windows shell handles specially crafted uris that are passed to it. an attacker could exploit this by including a specially crafted uri in an application or attachment, which could potentially allow remote code execution this vulnerability can be exploited through a variety of applications, including adobe pdf reader, mirc, firefox, outlook, netscape navigator, and others. impact windows xp service pack 2 windows xp professional x64 edition and service pack 2 windows server 2003 service pack 1 and service pack 2 windows server 2003 service pack 1 and service pack 2 windows server 2003 x64 edition and service pack 2 windows server 2003 with sp1 for itanium-based systems and sp2 severity critical solution on lanenforcer, update the cei profile to the latest version to check for cei profile version, type “show version” on the cli prompt of the lanenforcer. ms07-062 dns spoofing attack vulnerability description dns spoofing attack vulnerability refers to a vulnerability which exists in windows dns servers. it could allow non-administrative users to send malicious responses to dns requests, thereby spoofing or redirecting net traffic from legitimate locations. impact microsoft windows 2000 server service pack 4 windows server 2003 service pack 1 and windows server 2003 service pack 2 windows server 2003 x64 edition and windows server 2003 x64 edition service pack 2 windows server 2003 with sp1 for itanium-based systems and windows server 2003 with sp2 for itanium-based systems severity high solution on lanenforcer, update the cei profile to the latest version. to check for cei profile version, type “show version” on the cli prompt of the lanenforcer. posted at 04:34 pm | permalink | comments (0) | trackback (0) november 09, 2007 can we detect sleeper cell bots? think of a botnet as a terrorist sleeper cell. a terrorist sleeper cell consists of a group of terrorists that blend themselves into the society without attracting the attention of organizations such as the fbi. when they get commands to strike, they go blow up planes, disrupt power plants, detonate dirty bombs, etc. similarly, a botnet sleeper cell sneaks silently into computers; stays inactivated and undetected, until the botnet owner issues orders to attack. these orders can be anything including sending spam, performing a ddos attack, or recruiting more bots. terrorist sleeper cells can lead directly to the loss of life as well as great physical and physiological damage, while botnet sleeper cells could cripple network infrastructure and inflict economic losses, or worse. early this summer, estonia was pounded by a ddos. this displayed a tremendous amount of coordination and the destructive power of sleeper cell bots. today, storm worm is becoming more powerful by the day, and can easily overpower the world’s top supercomputers. terrorism prevails when both types of sleeper cells work together. with the rumors of al qaeda announcing cyber warfare starting this sunday, and with availability of electronic jihad 2.0, we have yet to see the impact, but might soon. detection of both types of sleeper cells can be done using behavior profiling. in both cases the steps are to understand normal behavior, look for suspicious triggers, narrow down the watch-list, and continue to observe the suspect more closely until the suspect is proven to be guilty or innocent. on the other hand, there are important differences that make detecting terrorist sleeper cells a harder problem than detecting sleeper cell bots. total surveillance is the first key component of sleeper cell detection. it is possible to have all the hosts under total surveillance in an enterprise (nevis does it), however, it is hard to watch every person in a nation 24/7 (even though it is attempted). the fbi has a watch-list and as of today there are about half a million people in there. watching half a million computers is much easier than watching half a million people. (perhaps the half a million people are best watched by primarily watching their computers.) characterization of behavior is the second key component of sleeper cell detection. the more characteristics you look for, the better the detection mechanism gets. instead of going after every muslim-like name (such as mine, but that is another and ongoing story), adding more information such as background, religion, bank and phone records, degree, age, sex, etc. would make the profile stronger and hence less false alarms. but the list of possible characteristics to include is nearly endless. on the other hand, while a few of us use computers in a diverse way, the huge majority do so in ways that are far easier to characterize than a person, even a mundane blog-writing cubical worker. correlation across suspected bots is more fruitful than correlation across suspected terrorists. the detection of a single bot in the botnet sleeper cell can often result in the capture of the entire botnet. however, the capture of a single terrorist may not necessarily lead to the capture of the entire terrorist network (even with waterboarding). the impact of false alarms varies in both cases. false positives in terrorist sleeper cell detection can have a wide range of damage from a cop showing up at your doorstep to a person ending up in guantanamo. false positives in sleeper cell bot detection can range from a guest user being cut-off from a network for a few minutes to extra work for a sys-admin, or even taking down a large chunk of the network and damaging the enterprise financially. arguably, false negatives in the case of terrorists are worse than they are in the case of bots; even a single terrorist can lead to substantial loss of life. while the fundamental theory behind detecting sleeper cells remains the same, the fbi’s job is much more difficult than mine. so, i’ll keep my job as well as cube life which the fbi secretly classifies as: d8dbqfhm6/reraj9o7wot0qb7xmpmacbbxfq4plmkwyuxbomfglno1ga4ÇgÊpœ/td^ÖÐÚÒÅ%iõÜ/'no7*‰o{¶ˆ0öp%‑ÎupuŠ4'ÅÞ©(8¹ //khushboo shah, ph.d. posted at 03:00 pm in malware detection and containment | permalink | comments (4) | trackback (0) november 08, 2007 nac deployments under scrutiny... lisa vaas over at eweek is reporting on a new nac survey coming out of the aberdeen group. in carol baroudi's "who's got the nac? best practices in protecting network access" report (it's free if you discount the sponsor sending bugging you for the next few weeks), she surveys close to 400 nac adopters and attempts to benchmark who is doing a good job of controlling access to their networks (while also reviewing some the processes and technologies they are using). it's interesting reading and reviewing the deployments rather than the technologies and vendors is a refreshing take on a nac survey. here's the take away for me. those who are considered best in class in the report have a strong focus on a holistic approach to nac and prioritise the post-connect functionality and the need to persistently monitor and control endpoints and users in a meaningful way after they get on the network (and we're not just talking about doing an endpoint posture check every 10 minutes). they also believe that operational considerations and the end user experience are of paramount importance to success. here is what those best in class organization say are the most important things to expect out of a nac solution: - prevents unauthorized users from accessing the network - causes minimal operational impact on users, help desk and network performance - supports/enforces policies specific to different user groups - logs all network access events for auditing - prevents unauthorized devices from accessing the network - centrally records all events - can be installed without directly impacting network performance - is transparent to the user - supports enforcement for remote users - can quarantine unhealthy machines without cross-infection - assesses endpoint security status this certainly gels with what our customers are telling us as well. i think point number 2 is where most nac solutions fall flat on their faces. most vendors have given very little consideration to getting the solution into the network seamlessly and ensuring there is a transparent user experience. i'm proud to say that our customers have no such worries. if you'd like to read an impartial, blow by blow, daily account of the evaluation and operational deployment of a nac product into a sizeable production network, head over to justin gerharter's blog at www.bumpinthewire.com //dom posted at 10:12 pm in enterprise network security | permalink | comments (0) | trackback (0) november 02, 2007 why blacklisting doesn’t work after reading mike fratto’s post on “why blacklisting works” i feel some comments are in order. the default allow (or “blacklisting”) vs. default deny (“whitelisting”) debate seems to go on and on ad infinitum. let me state up front that i am unabashedly in the default-deny camp, and here’s why. sure it sounds easier in principle to just deny the bad stuff, thus avoiding the trouble of figuring out just what the good stuff is (and maybe avoiding a few irate help desk calls in the process), but, as you actually point out, it’s really not good security. but we have to accommodate customers of either persuasion and, truthfully, your nac product should let you do it whichever way you want. we opted for default deny. why? because it’s clearly the best security practice, based on many years of many people’s experience. we just couldn’t make a firewall default allow and still think of ourselves as security people. besides, when you put an acl on a file, do you normally make it default allow and blacklist just those who shouldn’t be granted access? i think not. but, honestly, it shouldn’t be that big a deal to append an allow-all rule if that’s what you really want to do. in fact, we ship our product with an allow-all sample policy configured on all secure interfaces, since we found that most of our evals and deployments want to start out by monitoring what’s happening on their network – since unfortunately, they don’t really know how bad of a problem they have. and this makes it easier to get the box up and running. and we also ship with a “pre-login” sample policy that allows just enough access to things like active directory to let windows boot and get gpos, and let users get tickets to login and open browsers, and which of course has to be customized with the specific server addresses for the particular network. i don’t really understand why you couldn’t configure the consentry box to do the same thing and whether this was for endpoint compliance or for post-connect, but i suspect it is because they only allow you to set policies for udp and tcp. so if you had a default deny but want to allow some other ip protocol, such as icmp or gre, you can’t do it. but i digress. on your impossible-to-manage points, we think you can avoid a lot of the headaches inherent in a traditional monolithic perimeter firewall rule set by composing policies for users based on group memberships. this way, the access granted to particular user classes can be more readily managed. speaking of managing policies, i wish lan security could be as simple as you want would like just by blacklisting, but as far as i am concerned it’s only an illusion. if you forget to deny your sales people access to one of those r&d servers, say, nobody might ever know until it is too late. so have you really solved your security problem, or just temporarily made it appear to go away? i can get behind your thought processes, though. when we were developing the nevis secure switches i have to confess that even i thought the same as you, at least for a while. i pondered, isn’t lan security a different species than perimeter security? at the perimeter it’s like at the front door, you only want to let friends in and anyone who is not your friend is clearly sote, but on the lan, it’s like you’re roaming among the cube farm: everyone can pretty much go anywhere they want to because everyone is your friend. inside, you really only need to make a few places like the ceo’s office off limits and remember to lock up those few file cabinets with sensitive stuff in them when you step out. most people are honest and adhere to company policies, right? and guests need an escort. to put it differently, at the perimeter you typically want to deny most ingress but allow most egress, but on the lan you are more concerned about what different classes of users can or maybe shouldn’t access. and until recently there have been limited options for providing an escort for your guests to keep them from running amok. so how to architect a lan security firewall, should it default to deny or allow? -- joe posted at 02:09 pm | permalink | comments (0) | trackback (0) october 18, 2007 i'll see your new chips, and raise you... eric ogren has a nice blog over at computerworld, but his post this week left me shaking my head. eric anticipates that the new generation of intel and amd chips with built-in security processing is going to change the playing field for security appliance manufacturers. more importantly, he states, “it is becoming increasingly difficult to justify the large engineering investments in custom-built asics or hardware that is not built on a standard platform”. this assertion couldn’t be further from the truth, and doesn’t anticipate where the ultimate direction of all the emerging security services is going. security has become increasingly complex due to the sophisticatation of blended malware attacks, among other reasons. the increase in mobile systems, as well as non-employees on corporate networks have reduced the effectiveness of the perimeter and requires security services within the network infrastructure. from nevis’ perspective, the switch is the ideal security enforcement point because it can block threats in microseconds at the lowest common factor, the port. existing departmental firewalls or out of band appliances cannot keep malware off the network because, by definition, the malware is already inside the corporate lan before they even detect it. the future of lan security is a fully secure access layer – both wireless and wired. many of the people we speak to get this message. secure switching at wirespeed is now a reality. many of the traditional switch vendors understand this dynamic and are planning to build ‘stateful’, application aware switches that are secure. the challenge thus far in the market has been with performance. obviously switches are blazingly fast and designed with performance and scalability in mind. lan technologies require high performance and low cost. traditionally, security products have been low performance and high cost. as security merges into the network fabric, secure switches need to remain cost competitive and fast. something has to give. if you are going to layer in deep packet inspection and analysis, and do it on every packet, you can’t sacrifice the performance that people expect. access layer switches are now shipping with multiple 10 gbps interfaces. many of the fastest ips devices in the market struggle to cope with this level of traffic. eric might be surprised to learn that the fastest intel and amd silicon can scale to ‘maybe’ 1 gbps of traffic when running l4-l7 services. how then can we secure tens of gigabits per second of traffic at the access layer, while keeping them cost competitive? the only answer is the development of customized asics or multicore processors that have hardware acceleration for the key l4-l7 services. nevis was built on the vision of high performance and low cost stateful services. key to our success has been the development of our supernova™ security asic – which has 24 cores and 96 threads, architected to drive security services and application recognition. it mght surprise eric to learn that 10 of intel’s fastest cpu’s cannot keep up with 1 supernova. don’t believe me, listen to what one of our customers had to say. 10:1 price performance – now that’s impressive. posted at 05:01 pm in hardware architectures | permalink | comments (0) | trackback (0) october 12, 2007 welcome parveen.... so, i see consentry have a new president and ceo. no announcement, just quietly slipped onto their website management page. does this mean that the fanfare and fireworks over their new round of funding had a bittersweet side (where did tom go?)? interesting to see that parveen comes most recently from a fundamental security player (mcafee) and was the founder and ceo of intruvert, an idp player. i think they've realised that to be a credible secure switching or lan security solution you do have to put the fundamentals into the security piece of the equation. nevis made the investment early on and have maintained that with a cadre of security educated phd's and researchers who contribute to the security community on a daily basis, alongside a strong team of networking engineers. to realize the vision of security ubiquity in the network fabric you have to be able to talk the talk and walk the walk. welcome to the lan security market space parveen. i look forward to meeting you and hearing your perspective on the evolution of enterprise networking and security. //dom posted at 11:07 pm in enterprise network security | permalink | comments (2) | trackback (0) it's nac survey season... tim wilson over at dark reading is reporting on a recent applied research west survey on nac (it sounds like it was sponsored by symantec, but i'm not sure): 300 security professionals interviewed70% have already deployed nac or plan it in the next 12 months86% had no problem deploying21% had difficulty integrating with security hardware and software 18% said nac used too many resources16% complained of lack of industry standards (well this flies in the face of all the so called industry experts who keep telling us that no-one will adopt until standards are defined. we all want standards but they take time)54% want an all in one product from a single vendor (not possible with an out of band vendor i'm afraid, there are too many moving parts)61% say vendors should adopt standards (i wholeheartedly agree, which is why we continue our efforts with ietf, tcg and microsoft.) 27% use nac for guest access80% use it to prevent unauthorized users accessing the network66% use it to protect critical business assets and prevent data loss(this is totally inline (no pun intended) with what we see from our customers) 30% say they have no plans to adopt nac in next 12 months35% of those say it's too costly27% of those say it's not interoperable with their existing infrastructure20% of those say it's too disruptive(hmmm, they should take a look at our solution, it addresses all those points) 63 % prefer nac enforement to take place in the network rather than at the endpoint(the logical enforcement point since the endpoint can and usually is the place where exploits occur) we have done our own survey, which was a little more focused, and the results will pubish over the next week or so. look out for that, it's interesting for trends, but i'd be interested to hear from it professionals if they think it's in-line (there's that pun again) with their thinking overall it sounds like the industry and customers are starting to settle on some fundamental architectural building blocks: the primary requirement for nac is to police unauthorized access and protect critical assets don't rely on enforcement on the endpoint, the network is the place to do it provide a turnkey solution that's easy to drop in build ubiquitous security into the network minimize the resources required to manage nac plan for interoperability and standards make nac more affordable now i can honestly say, hand on heart (that's a big deal for a marketing guy because we don't have hearts, but if it helps i started life as an engineer), that we have satisfied each and everyone of those requirements. i'm very proud of what we have done to mature nac beyond it's infancy to a holistic lan security solution that can stand up to both technical and fiscal scrutiny. we don't have all the answers (yet), but our architecture and approach will stand the test of time. //dom update: tim greene at nww has also picked up this story posted at 10:35 pm in trends in network security | permalink | comments (2) | trackback (0) october 05, 2007 a switch by any other name.... it was nice to see consentry finally get a decent win for their nac switch.  we've had our fair share of wins with our secure switch in the past year, and it's great to see more customers recognise the fact that the switching infrastructure is the perfect place to deliver scalable, ubiquitous advanced services, like security, in the long term.  many of our own customers, spanning verticals like high tech, pharma, finance/legal and outsourcers, have embraced the secure switch, and continue to place regular, quarterly repeat orders as they migrate their wiring closet infrastructures.  but let's not detract from the fact that consentry did some dragon slaying here in the us, and in fsu they found a customer willing to speak with their check book about their dissatisfaction with cisco's nac and the lack of identity based services available in switching overall.  this stuff is not easy to do while maintaining switching performance, which is why you have to make an investment in purpose built silicon, rather than using general purpose cots (commercial off the shelf) chipsets that don't make the grade. now, you'll notice that i called the consentry switch a "nac switch" at the start of this post.  this is deliberate despite the fact that they position it as a secure switch.  in the mind of most security and networking professionals we talk to, a secure switch needs to at least attempt to be secure, and it also has to be able to maintain switching performance while delivering that security and other application intelligent services.  without any pattern matching capabilities, a very large proportion of threats are free to march right through the consentry nac switch.  to be fair, i have spoken at a couple of conferences in the recent past with michelle from consentry and she openly admits that threat detection and mitigation is not a focus for their company.  they've built in some anomaly detection capabilities for some level of value add, but their focus is clearly nac and lan segmentation (it says so right there on their website).  that's why i'm confused as to why they call it something it isn't.  we chose to take a more holistic approach to the problem, so we spent a bit more time on our asic and product line.  this enables us to provide threat signature matching to address a broad range of lan threats, and hardware accelerated application intelligence, all at a full 10gbps and switching latencies.  when you integrate this functionality and performance together with access control and nac, and tie in identity at all stages, you get a secure switch worthy of the title. //dom posted at 03:40 pm | permalink | comments (0) | trackback (0) october 03, 2007 is your nac glass half empty or half full?? mike fratto wrote an interesting article debating whether nac is ready for primetime or not, and, unsurprisingly, mike rothman congratulates mikef for having the "stones" to take that position. personally i don't think this is about stones, pebbles or grains of sand. mikef makes some very valid points about the readiness of nac products to address a broad set of use cases in diverse enterprise environments, but he also makes some great points about the readiness of it teams to implement the technology. in fact in my reading of his article, i think mikef raises more points about the readiness of enterprise it teams for nac than the products themselves. this is an important point that i think miker has missed in this and several of his previous posts. the reality is that just as products have to mature, customers also have to come up to speed on what this new technology can do for them in their environment. the good news is that customers are coming up to speed and fast. not only that, but they are recognising the potential of the technology and helping to redefine and extend nac. what's really gratifying is that nac has evolved more and more into the vision of lan security that we set out more than 2 years ago. so, let's get this straight, it's a good thing when our customers come to us and tell us what they need. sometimes we see a trend that can be applied across many customers and we embrace it because it means we can add value that people will be willing to pay for. we also innovate and take ideas and features back to customers because we think we have seen a way to help that perhaps the customer didn't think technically possible. in this manner, products and markets evolve and the reason i have remained on the vendor side of the industry is because their is no bigger kick than seeing your product being used to solve a problem or create an initiative that wasn't possible before. we are lucky enough to be closely plugged into early adopters and are not only seeing our rate of customer acquisition increase at a very healthy rate, but also a huge increase quarter by quarter in the number of rfi/rfps that we are being invited to respond to. while not everyone is ready to roll out corporate wide today, many are certainly biting off managable high priority projects and deploying pilots. our customers range from specific projects with fortune 100's to full global deployments with large enterprises and campus deployments with medium enterprises. this is perhaps "security incite" that the two mike's are not a party to so they assume that things aren't moving along. so come on guys, less of the negativity, and start writing about the cool things customers are already doing with our technology rather than the nits about what can't be done. as one of our customers said, "look at the problem you want to solve, find a vendor who's thinking the same way and that you can partner with and jump in with both feet". if we all sat around waiting for everything to be perfect we'd still be living in caves. //dom posted at 09:58 pm in trends in network security | permalink | comments (0) | trackback (0) is secret sharing for convenience really keeping a secret? i grew up with the maxim “security by obscurity bad, real security good” ringing in my head. that’s why i find it so hard to be amused when i hear arguments that obscurity can provide security if it is more “convenient.” and then i see products that actually embrace security-by-obscurity-for-convenience out there in the market – and being shipped by companies claiming to be security vendors. this has come up recently in the context of captive portal login certificate warnings. the beauty of captive portal is that it uses a standard web browser as a nice gui for someone logging in. since it talks to a more or less standard web server, the way to secure passwords sent over the link is to use tls. but to use tls, the server needs a public key certificate, and browsers want (or, should want) to verify the names in these certificates and who issued them, mostly for web commerce but in this case to protect against password sniffing or classic spoofing attacks. many products provide a throw-away temporary certificate for evaluation purposes. this almost always is a self-signed certificate so that customer’s passwords are at least encrypted using a new private key for that deployment. but this gives a browser warning about the certificate not having been issued by a known ca. so some products try to avoid this major inconvenience by using http as the default. since this is clearly insecure and most customers will want to turn on tls, these vendors oblige by shipping a “free” certificate. this way customers don’t get the nasty warning and will see the padlock (if they care), and on newer browsers don’t see red backgrounds in their urls. end of story, security restored. unfortunately, it isn’t. these products get rid of the warning by using a vendor public domain name and baking the same certificate into their software. that means everybody has the same private key, too. how many of these customers actually click on the browser padlock and view the name in the certificate? do you do this when you go to your bank or order on amazon? unfortunately, too many people aren’t in the habit. i was taught that a secret shared with everyone is not a secret at all. if you’re going to provide a security mechanism, do it right – make it clear that what’s shipped by default is strictly for evaluation and let people put in their own real certificate. that is, if they care about security in the security product they are purchasing. isn’t that the whole point? posted at 02:11 pm in enterprise network security | permalink | comments (1) | trackback (0) recent posts it's patch tuesday again.... can we detect sleeper cell bots? nac deployments under scrutiny... why blacklisting doesn’t work i'll see your new chips, and raise you... recent comments khushboo shah on can we detect sleeper cell bots? khushboo shah on can we detect sleeper cell bots? sixten research on can we detect sleeper cell bots? dana hendrickson on can we detect sleeper cell bots? dominic wilde on it's nac survey season... castan on it's nac survey season... name withheld on request on welcome parveen.... subscribe to rss headline updates from: http://feeds.feedburner.com/security-bloggers-networkpowered by feedburner powered by typepad

Acceuil

suivante

illuminations  IngentaConnect Etudes sur les Illuminations de Rimbaud.  IngentaConnect De la lettre a lesprit: pour lire Illuminations.  LYON PHOTOS - Fte des lumires 2005 en photo  LYON PHOTOS - Fte des lumires 2004 en photo  Illuminations + Lido  Nols en Bretagne au Chteau de Quintin - Festival de contes ...  The Illuminations of Hildegard von Bingen  Illuminations de Nol  Forum - Devenir co-citoyen - notre-planete.info  Amazon.co.uk: Illuminations: Books: Walter Benjamin,Hannah Arendt ...  Illuminations Lighting Design  Vivre Dax  Posie:Aube (Arthur Rimbaud, Illuminations)  Les Champs Elyses de Paris, France- Les illuminations en 1998 de ...  Posies, Une saison en enfer, Illuminations, Arthur Rimbaud ...  Yahoo! Questions/Rponses - Cot cologique des illuminations de ...  Nadine Jeanne, lue socialiste de Puteaux: Montant des ...  illuminations  Illuminations de Noel - Vidos Musica Arte - Ma-Tvideo France2  Alenon.maville.com - Neuilly-sur-Eure se prive d'illuminations  Concours dilluminations de Nol : 2 dition !  Rafic Hariri  XavierZimbardo Illuminations : toiles d'araignes enchantes  Muse Marmottan Monet: The Illuminations  Muse Marmottan Monet: The Illuminations  Les illuminations de la Tour Eiffel  The Cantigas de Santa Maria: Illuminations  Lnterpretautotextualit Les Illuminations  "Illuminations"  l'union > Illuminations de Nol Champguyon  Une lecture iconique de quelques Illuminations de Rimbaud  Achat Bouilloire 1.7L Illuma illuminations bleues [EPD1112001 ...  Mairie de Puteaux - illuminations de Nol  Menton.maville.com - A quand les illuminations?,Tous les avis  Groupe LCX - Matre en Lumires  l'union > Illuminations de Nol Courgivaux  Illuminations de Nol : avenue Montaigne  Illuminations de Nol : Avenue des Champs-Elyses  LYON LUMIERES - ILLUMINATIONS DU 8 DECEMBRE  Arthur Rimbaud > Illuminations  ARTHUR RIMBAUD [1854] - [1891] ILLUMINATIONS (1886) APRS LE ...  illuminations: Berkeley's online magazine of research in the arts ...  Illuminations de Nol comparer les prix avec LeGuide.com  Galerie de photos 123 Savoie:Autres / Reportages photo / 2003 ...  Galerie de photos 123 Savoie:Illuminations 2003  Cancer Doctors and Information about Cancer Treatment at Mass ...  March - Illuminations : vidos les plus commentes  Illuminations: Bronner  Les Illuminations de Rimbaud, textes complets  Marine (Illuminations) de Rimbaud expliqu  8 dcembre - Fte des Lumires - Site Officiel de la Ville de Lyon  Illuminations  Illuminations de Arthur Rimbaud - Fluctuat.net  Illuminations de nol en musique ! Vidos sur les ftes - VIDEOS ...  CESTPASCHER.COM - VUES DE PARIS - ILLUMINATIONS DE NOEL ...  Somerville Arts Council: Illuminations Tour  Fete des lumieres - Lyon la nuit en photos - illuminations du 8 ...  Le Mans se couvre d'illuminations pour l'ĂtĂ,  The Cambridge Illuminations  HTP - ILLUMINATIONS - pyrotechnie - sfx - Thz - 35