Thursday, 24 October 2013

HOW TO BECOME AN ETHICAL HACKER ??

1.Dedication : Dedication is the main key to become an ethical hacker. Don't plan to become pen-tester because of money. If you really have interest, then go ahead.

2.Reading : Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.

3.Know how hackers hack into: You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers.

4.Programming and Scripting: Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.

5.Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.

6.BackTrack Linux Distribution: Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded by Offensive Security. It has almost all penetration testing tools required for security professionals.

7.Get Certification for Ethical Hackers: Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.

8.Forums: Participate in any Security or ethical Hacking related forums.

Download BBM for Android and iPhone -Things you Need to Know before Using it


BBM is finally rolling out BBM for Android and iPhone users(for real this time).BBM is available for download on Google Play, the App Store and in select Samsung App Stores.BBM for iPhone is also in a great demand.In just 7 hours about 1 million people started using the unreleased version of BBM.

How to Download BBM:

You can download BBM for your respective Operating systems from the below mentioned links.



Download BBM on your iPhone :-http://in.blackberry.com/support/apps/bbm/for-iphone.html


First you have to signup with your email and you will get an email regarding the download options.

Watch the below Videos before Getting Started:

How to add a contact by PIN :- http://www.youtube.com/watch?v=vgEyU-rbAHI

How to share pictures and more :- http://www.youtube.com/watch?v=sz4h9lRk5Tw



Know when your messages have been delivered and read :-http://www.youtube.com/watch?v=yKpEQk6Eut0

Creating and managing groups :- http://www.youtube.com/watch?v=MlJzsDzynF8

Wednesday, 23 October 2013

Google Malaysia hacked “Team Madleets”

Google’s Malaysian website came under a hacking attack from a Pakistani group named as Team “Madleets”.Well, i am actually thinking that if sites like google are not able to get rid of these attacks then what about our personal websites? OMG!

Google Malaysia remained offline for several hours on Thursday because of an attack on the DNS records of the Google’s website, what they actually did was that they changed the DNS records of Google Malaysia to the server’s controlled by Madleets.

Madleets group wrote a message on their Facebook page that mentioned:

We feel we need to alert anyone, that we don’t hack any country tlds for example google.com.my as a result of any kind of hate, We don’t hate anyone, We love all humanity, there is no obvious reason for stamping the tlds.

Least the reason is not any kind of hate.

Whatever the reason is we can’t explain except we love all of you.
Regard’s

H4x0rL1f3

The page information stated that “MadLeets is a Ethical and 1337 White Hat Hackers Community. We are Anti Hackers , we teach how to protect yourself from getting hacked.”

The link with in the source code was edited with an inclusion of a web address that takes to a music video and the most amazing thing to note is that music keeps playing automatically till the visitor stays on the website!

There seems to be not much reason behind it, only to prove that security is just an illusion. It does not exist. 

CSRF (Cross Site Request Forgery)

CSRF stands for Cross Site Request Forgery. It is a method used by an attacker to trick a user into loading a page that contains a malicious request written in the form of codes. This type of attack can be preformed to change a user’s email id, password, name or any other field or even make a purchase in some typical cases. There is no way any site can differentiate between pure request and forged request because this attack is performed when the victim is logged on and the victim clicks on some areas which have been manipulated by the attacker. The malicious script gets executed away from the user vicinity from un-trusted source, which is uploaded by the hacker. This type of attack can lead to leak of many sensitive data stored in the server like Credit Card Details or Bank Details.

Read More : http://goo.gl/PhKBlQ

Li-Fi: Technology that Uses Light Bulb to Establish Internet

Photo: Li-Fi: Technology that Uses Light Bulb to Establish Internet

A team of Chinese experts and specialists have successfully developed, and experimented an innovative way of gaining access to the Digital World of the Internet using the signals sent through the Light Bulb instead of Radio Waves as in Wi-Fi.

Scientists named it Li-Fi.

In case if you don’t know, Wi-Fi operates in the frequency range between 2.4 and 2.483 GHz. IEEE 802 (11a operates in the frequency range from 5.725 to 5.850 GHz. These are often referred to as the “2.4 GHz” and “5GHz” bands).

The term Li-Fi may not be new to many ears; in fact it is around since 2011, when Harald Haas had first used it in his TED Global talk on Visible Light Communication on this very context.

The Li-Fi technology operates under the principle that light can be used to carry Signals as an alternative to traditional radio frequencies; it keeps serving as long as there is no blockage of any kind, between the Light source and a Computer.

Chi Nan, the I.T Professor at Shanghai’s Fudan University, who also leads the Li-Fi research team (which includes scientists from the Shanghai Institute of Technical Physics of the Chinese Academy of Sciences) have said that, “One-watt LED Light Bulb may establish an Internet connection for four Electronic Gadgets at once.”, she added that, “A light bulb with embedded microchips can produce data rate as fast as 150Mbps.”

A team of Chinese experts and specialists have successfully developed, and experimented an innovative way of gaining access to the Digital World of the Internet using the signals sent through the Light Bulb instead of Radio Waves as in Wi-Fi.

Scientists named it Li-Fi.

In case if you don’t know, Wi-Fi operates in the frequency range between 2.4 and 2.483 GHz. IEEE 802 (11a operates in the frequency range from 5.725 to 5.850 GHz. These are often referred to as the “2.4 GHz” and “5GHz” bands).

The term Li-Fi may not be new to many ears; in fact it is around since 2011, when Harald Haas had first used it in his TED Global talk on Visible Light Communication on this very context.

The Li-Fi technology operates under the principle that light can be used to carry Signals as an alternative to traditional radio frequencies; it keeps serving as long as there is no blockage of any kind, between the Light source and a Computer.

Chi Nan, the I.T Professor at Shanghai’s Fudan University, who also leads the Li-Fi research team (which includes scientists from the Shanghai Institute of Technical Physics of the Chinese Academy of Sciences) have said that, “One-watt LED Light Bulb may establish an Internet connection for four Electronic Gadgets at once.”, she added that, “A light bulb with embedded microchips can produce data rate as fast as 150Mbps.”

Wednesday, 9 October 2013

Android 4.4 KitKat: Seven things we know so far






Unlike Google's upcoming Nexus 5 smartphone, there's a relative vacuum of information about what to expect from the next Android OS, named KitKat, beside a global cross-promotion campaign with Nestle.

1. The Nestle tie-up

Since Nestle's KitKat has the honour of giving its name to Android's next OS, expect free-flowing puns from the company, which is planning to give away a bunch of Google's Nexus 7 tablets — which were among the first devices to ship with Jelly Bean Android 4.3. It's not clear whether the Nestle giveaway devices will ship with KitKat onboard, though presumably they will, given the marketing tie-up. Despite Google having notched up one billion Android activations to date, the partnership with Google on Android is meant to make it more mainstream than it already is. (Although I'd argue an OS that powers four in five of the world's smartphones is pretty mainstream to begin with.)

2. It's not Key Lime Pie

Given the Nestle partnership is all about making the Android brand more mainstream, it's perhaps no surprise Google didn't go with Key Lime Pie — its original choice for the name of the next Android OS — as the dessert isn't widely known outside the US.

3. An October release date

No one but Google (and possibly Nestle's marketing team) knows exactly when KitKat will be released, but current bets are on October. To that end, punters recently got a plausible confirmation via Nestle Germany's KitKat Facebook wall, in which the company indicated the OS will be released later this month.

4. The Nexus 5

It's thought the Nexus 5 will be the first device to come bearing KitKat — a logical pattern given the Nexus 4 was the first smartphone to hit the market with Jelly Bean. The heavily-leaked Nexus 5 from LG is thought to be due for release before the end of the month. Rumours also have the Nexus 5 coming with 32GB on board storage, and offering LTE support. Hopefully this time Google and LG have ironed out supply chain constraints that fans had to deal with in 2012 with the launch of the Nexus 4.

5. KitKat: an evolution not a revolution

Though there haven't been too many leaks about the new OS, but a recent one has shed light on a few features that may arrive in KitKat.

Gadget Helpline last week published details and pics of what it believed was an unfinished version of KitKat that still had the markings of its original name, Key Lime Pie. According to its review, Kit Kat is not a complete overhaul of Jelly Bean, but it was more polished, smoother and faster.

Jelly Bean brought features like dial pad autocomplete for phone numbers and names, improved tap-typing recognition, battery-saving wi-fi location options, Bluetooth Smart support, improved graphics, and restricted profiles for different apps.

Google's latest distribution figures show around half of Android device owners are on Jelly Bean, with relatively few on just 1.5 percent of the world's Android devices run Jelly Bean 4.3, while around 47 percent use 4.1 or 4.2.

6. New inbuilt features for payments and printing

Two new features that could be on the way in 4.4, according to Gadget Helpline's leaks, include a native printing option for Android devices and a payment feature that hints at built-in NFC payments (rather than via third-party apps).

KitKat could also include a Miracast-based feature for wireless video output to TVs and may bring a few minor changes to the dialler pad, such as a white notifications instead of blue ones.

Also, users could expect inbuilt photo editing options, such as Tilt-Shift and Center Focus, plus Negative and Posterize effects. There could also be formatting and colour controls for printing to networked printers.

7. Bundled productivity apps

Notably, beyond Google's core apps, the leaks suggest Google's productivity apps, such as Keep, Drive and QuickOffice (a Microsoft Office compatible product which it recently made free on Android and iOS) will all have a prominent place in the OS.

WhatsApp, AVG and Alexa Hacked Palestinian Hackers

A group of pro-Palestinian hackers aligned with Anonymous has successfully hacked a range of websites including WhatsApp, AVG and Alexa.

Over the past 24 hours a group calling themselves Kdms Team has claimed responsibility for hacking six different websites, including the homepages of the hugely popular messaging service WhatsApp and the top free anti-virus provider AVG.

The group is aligned with the Anonymous movement and the messages posted on the compromised websites indicate they group's aim is to promote Palestinian viewpoints.

Other websites compromised include those belonging to security firm Avira, web analytics company Alexa, porn website RedTube and hosting provider Leaseweb.

A number of security experts have pointed out that all compromised sites share a common domain registrar - Network Solutions - which indicates the Kdms Team hackers compromised this network rather than the individual company websites.

Network Solutions were unavailable for comment on the situation.

Compromised

"Last weekend the leaseweb.com website was unfortunately a direct target of cybercriminals itself. For a short period of time some visitors of leaseweb.com were redirected to another, non-Leaseweb IP address, after the leaseweb.com DNS was changed at the registrar," Leaseweb said in a post written over the weekend.

Identical messages (pic in the post) were posted on the homepages of AVG and WhatsApp, under the title: "You Got Pwned." The message from the pro-Palestinian group, reads:

"We want to tell you that there is a land called Palestine on the earth. This land has been stolen by Zionist. Palestinian people has the right to live in peace. Deserve to liberate their land and release all prisoners from Israeli jails. We want peace. Long live Palestine"

The group also embedded a YouTube clip of a patriotic rendition of the Palestinian national anthem.

Offline

The AVG website is currently not accessible as the company has no doubt taken it offline in order to fix the problem. The Avira and WhatsApp websites which were previously offline, are currently back in operation.

There is no suggestion that any customer data was compromised during any of the attacks.

Security researcher Graham Cluley said: It's possible that the hackers managed to change the website's DNS records, redirecting anyone who attempted to visitwww.whatsapp.com to a different IP address."

According to the Kdms Team Twitter account, the group yesterday compromised the porn website RedTube as well as the homepage of web analytics site Alexa, though both of these have now returned to normal operation it seems.

The emergence of KDMS Team follows the recent high-profile emergence of the Syrian Electronci Army, who have grabbed a lot of attention through their hacking of high-profile media outlets such as the Associated Press, Sky News and the BBC.

For HD Screenshot Visit Here :- http://i.imgur.com/mGbgKqk.jpg

Tuesday, 8 October 2013

Facebook expands 'Graph Search' within social network

Facebook said Monday it was expanding the capabilities of its "Graph Search" function to help users navigate and find information within postings on the world's biggest social network.

"Starting today, Graph Search will include posts and status updates. Now you will be able to search for status updates, photo captions, check-ins and comments to find things shared with you," the company said in a statement.

"Search for the topics you're interested in and see what your friends are saying, like 'Dancing with the Stars' or 'Posts about Dancing with the Stars by my friends.'"

Facebook launched the service in January in an effort to help members better navigate the vast amount of information on Facebook, which is not available on Web search engines such as Google. But at the time, it lacked detailed information from member postings.

Facebook emphasized that the new effort is not Web search, but can help find certain information archived within the network and in the content of friends. It uses Microsoft's Bing search engine to scour content in Facebook.

The company said the expanded Graph Search is rolling out slowly to "a small group of people who currently have Graph Search and we will continue to improve this experience by listening to feedback."

Facebook has said Graph Search will respect privacy, and that people can only see content that has been shared with them or publicly available posts.

IPv6 Security Overview: a Small View of the Future


Introduction

The current version of Internet Protocol is IPv4. This is used to send data over the Internet and makes interaction between different services possible. As all experts know, this protocol has significant limitations, such as the maximum addressing space and some known security issues. The security problems, in many ways, depend on the original development project, which certainly did not have “security” as a determining factor, and the whole final environment was considered a friendly one. However, over the years, as response to these deficiencies and in consideration of a global network in rapid growth, new technologies, like SSL/TLS and IPSec, have been introduced to remedy these issues.

Despite these enhancements, however, the whole architecture is still missing that level of security and flexibility expected. As result of these known limitations, a new project for a new Internet Protocol has been designed by the IETF in the early 90′, having in mind “ease-of-configuration”, performance and security.

In this paper we will analyze the features of the new suite of internet protocols, its advantages and disadvantages, as well as the possible implications from a security point of view. This document has no pretension to be exhaustive, and must be considered as the result of an independent author’s study activity.

The Old Version Four

To better understand the actual new features of IPv6, we must first know its predecessor’s. As already mentioned, IPv4 was designed with no security in mind. This means that security in communications through this suite of protocols must or should be guaranteed by “end-nodes”. If I need to send or receive highly sensitive data, and then use a secure channel (encryption?), it’s the responsibility of that application to provide that service.

Currently, the Internet works this way. This, and many others characteristics that will not be covered in this document, has allowed various types of threats to take off in the digital world. The most famous of these are certainly:

1) Reconnaissance Attacks:

This type of attack takes place thanks to the relative small size of IPv4 addressing, because a whole network can be scanned to find open and/or unpatched services. In fact, it is quite easy to perform a reconnaissance scan of a class C network in a few minutes. In this category we can add “Ping Sweep” (sweep a network with ICMP ping messages that solicit a reply), “Port Scan” (to find active and reachable services) and “Application Vulnerability Scan” (to find known vulnerabilities in discovered services).

2) Denial of Service Attacks:

In this type of attack, a service is rendered unavailable through a flood of large amounts of illegitimate requests. It’s possible to mention for this category the smurf attack (remember?).

3) Man-in-the-middle Attacks:

The lack of its own authentication mechanism in communications allows hackers to intercept data in transit.

4) ARP poisoning Attacks:

In IPv4, ARP (Address Resolution Protocol) is responsible for mapping a host’s IP address with its physical MAC address. This information is stored locally (ARP Table) by each host which is part of the communication. The “ARP Poisoning” attack occurs when an arbitrary ARP reply with incorrect information inside is sent to a host which is part of the communication, implying that legitimate packets will arrive at unforeseen destinations.

5) Address Spoofing Attacks:

In the current communication protocols, one of the keys to complete cyber attacks is the ability to modify the source address of a packet. IPv4 allows this possibility since it does not provide any type of source-to-end authentication mechanism.

Today these types of attacks are used to spread spam, malware and also to perform DoS/DDoS attacks. IP spoofing also allows masking the true origin of the malicious packets, making the tracking operations more complex.

6) Malware Attacks:

Malware, today, remains one of the biggest security-related problems. Currently, with IPv4, malware can not only damage the host affected, but also saturate (or use part of) the network resources in place. It’s necessary to clarify that, with the advent of IPv6, there was no way to eradicate these threats, and the conception of the potential damage by malware infection will essentially remain the same. It’s possible to assume that, however, due to the broader spectrum of addressing, its spread could be slower.

What’s New in IPv6?

As previously stated, IPv6 is not IPv4′s upgrade but a totally new suite of protocols.

This means that the differences between the two are very marked:

1) Address Space:

IPv4 provides as many as 2^32 addresses. IPv6 provides as many as 2^128 addresses.

2) Hierarchical Addressing:

In IPv6 we can find 3 major types of addresses: Unicast, Multicast and Anycast. Unicast addresses are assigned to a single node. Multicast addresses are assigned to multiples node within a single multicast group while anycast addresses are assigned to groups of nodes.

3) QoS (Quality-of-Service) and Performances:

The IPv6 packet header provides for fields that facilitate the support for QoS. In addition, the new standard is a big step forward in terms of performance.

4) Security:

The use of IPSec in IPv6 is not optional, but mandatory.

5) Extensibility:

Despite the new features and the considerable increase of addressing space, the IPv6 header is only slightly larger than that of IPv4 (practically just twice, 40 bytes). The IPv6 header does not include any optional fields or a checksum.

In IPv4, the IPv4 header is followed by data of transport protocol (TCP, UDP), also known as “payload".

IPng vs Old Attacks

In this section we will analyze some of the most popular cyber attacks in a perspective focused on the comparison and on the possible impact of these with the IPng.

1) Reconnaissance Attacks:

Reconnaissance attacks, in IPv6, are different for two major reasons: The first is that “Ports Scan” and/or “Ping Sweep” are much less effective in IPv6, because of, as already said, the vastness of the subnet into play. The second is that new multicast addresses in IPv6 will allow finding key systems in a network easier, like routers and some type of servers. In addition, the IPv6 network has a much closer relationship with ICMPv6 (compared to the IPv4 counterparty ICMP) which does not allow too aggressive filters on this protocol. For the rest, the techniques remain the same.

2) Over the Wall:

This class will discuss the type of attacks in which an adversary tries to exploit little restrictive filtering policies. Currently, we are used to developing access lists (ACLs) to restrict unauthorized access to the network we want to be protected by set specific policies on gateway devices in between the IPv4 endpoints. The need for access control is the same in IPv6 as in IPv4. In IPv6, the basic functions for mitigation of unauthorized access are the same. However, considering the significant differences between the headers of the two protocols, it is possible to imagine different ways to implement them.

3) Spoofing Attacks:

While L4 spoofing remains the same, due to the globally aggregated nature of IPv6, spoofing mitigation is expected to be easier to deploy. However the host part of the address is not protected. Layer 4 spoofing attacks are not changed, because L4 protocols do not change in IPv6 with regard to spoofing.

4) DDoS Attacks:

In IPv6, we cannot find the broadcast address. This means that all resulting amplification attacks, like smurf, will be stopped. IPv6 specifications forbid the generation of ICMPv6 packets in response to messages to IPv6 multicast destination address, a link-layer multicast address or a link-layer broadcast address. In general, through the adoption of the new standard, we should find an improvement in this regard.

5) Routing Attacks:

Routing attacks refer to activities that try to redirect traffic flow within a network. Currently, routing protocols are protected using cryptographic authentication (MD5 with Pre-Shared Key) between peers. This protection mechanism will not be changing with IPng. BGP has been updated to carry IPv6 routing information.

6) Malware:

There is no particular implementation in IPv6 which will allow changing the classical approach to malware. However, worms that use the internet to find vulnerable hosts may find difficulties in propagation due to the large address space.

7) Sniffing:

This is the classical attack that involves capturing data in transit across a network. IPv6 provides the technology for the prevention of these types of attacks with IPSec, but it does not simplify the problems for keys management. For this reason, this technique can still continue to be practiced.

L7 Attacks:

Here we refer to all those types of attacks performed at Layer 7 of the OSI model. Also considering a worldwide adoption of IPSec, this type of attacks will remain almost unchanged. Buffer Overflow, Web Applications Vulnerability, etc., cannot be stopped through the IPv6 adoption. There is also another consideration: if IPSec will be implemented as a standard for communication between endpoints, all devices such as IDS/IPS, firewalls and antivirus will only see encrypted traffic, promoting this type of attacks.

9) Man-in-the-Middle:

The IPv6 is subjected to the same security risks that we may encounter in a man-in-the-middle attack that affects the suite of IPSec protocols.

10) Flooding Attacks:

The core principles of a flooding attack remain the same in IPv6.

Conclusions

Without a doubt, IPv6 represents a big step forward compared to its predecessor. The entire suite of protocols has been designed to bring improvements in both functionality and security. However, despite these, IPv6 raises new challenges in both these fields, without considering the transition problems that occur. In short, it is definitely something that will give much fun to Information Security professionals.

Quick elementary OS 0.2 Luna Overview




Two years after the "Jupiter" release, elementary OS 0.2 Luna (stable) has been made available for download recently. With a bit of a delay, here's a quick overview of what to expect from Luna, along with screenshots and of course, a video.

Based on Ubuntu 12.04 LTS, which will be supported until April 2017, elementary OS Luna ships with its own shell called Pantheon and applications that respect the elementary OS philosophy: beautiful, fast and minimalistic.

elementary OS Luna uses a window manager called Gala, based on libmutter, which comes with smooth animations along with a really cool workspace switcher (Super + s) and a beautiful Expose-like feature (Super + w):

Slingshot, the menu / application launcher used by default in elementary OS Luna, lets you either search for the application you want or browse the available application categories:

The top panel, called Wingpanel, doesn't come with the "wing" design used in its first versions (though you can achieve that by following these instructions), but it still stands out from other panels such as the Unity panel, thanks to the cool design used by the indicators:

For the application switcher, elementary OS Luna uses Plank, a dock that supports intellihide along with other hide modes as well as some Unity features such as badges, progress indicators or quicklists.

Plank, along with other aspects of the desktop can be customized by using Switchboard, elementary's system settings which comes with some custom "plugs" such as the Desktop plug, which lets you set the wallpaper, change the dock icon size, hide mode or theme as well as set hot corners.

As for the artwork, Daniel Fore's beautiful GTK and icon themes are of course used by default. Through the Luna development, both have received various improvements: for instance, Luna uses new folder icons and the GTK theme has received new switches, infobars, spin buttons and much more. You can see these changes throughout the screenshots in this article.

Elementary OS 0.2 Luna is truly special: the beautiful indicators, the smart dock, the lightweight default applications of which most are especially designed for elementary OS and the classy effects fit really well together and offer a clean, consistent desktop. And all of this, on top of Ubuntu 12.04 LTS which means you have access to all the applications available for Ubuntu and the long term support.

However, since besides the default applications there are very few apps that follow the elementary OS design guidelines, this consistency can easily be broken by simply installing a few extra applications and this takes away some of elementary's charm.

Another issue, some would say, is the lack of various options / customizations for some of the default elementary OS applications. The main reason behind this is that the elementary team tries to provide a good set of defaults so you don't have to tweak anything yourself.

Default applications include:

Pantheon Files - a Marlin fork which is very fast and features multiple views, including Miller Columns as well as optional extensions for Ubuntu One or Dropbox;

Noise (Music) - the default music player offers multiple views, including a browser based on album covers, an equalizer, iPod sync, Last.fm integration and more;

Geary - an email client developed by Yorba (the team behind Shotwell) and the elementary team, has replaced Postler, and features new email notifications, multiple accounts support and more;

Other applications included by default in elementary OS are Maya (calendar), Scratch (text editor), Pantheon Terminal, Midori (web browser), Empathy, Totem, Simple Scan, Shotwell and of course, Ubuntu Software Center.

Powerful New Ubuntu PC Unveiled By System76



A powerful new Ubuntu PC has been revealed by Linux computer company System76.

The 4th generation of their Leopard Extreme series is a veritable beast of a machine, boasting the latest Intel Haswell processors, support for up to 64GB of high-speed RAM, and a choice of graphics cards that would struggle to so much as wheeze under Steam for Linux.

Pricing starts at $1699.00 for the ‘base’ model:

Quad-core Intel Core i7-4820K @ 3.70Ghz
8GB DDR3 RAM (1866 MHz)
1GB nVidia GeForce GTX 650 (384 CUDA Cores)
120 GB Intel 520 Series Solid State Drive

Note that the base model does not include any form of disc drive or Wi-Fi.

But the best bit? It manages to pack all that power into a PC case smaller than that used by its predecessors.

As with all System76 models buyers can tailor systems to suit their needs, budgets or tastes. The Leopard Extreme is no exception, with the following configurable components on offer:

Quad channel memory with up to 64 GB of high performance 1866 MHz RAM

Optional 6 GB nVidia Geforce GTX TITAN GPU featuring 2,688 CUDA cores

Intel 4th Generation Processors featuring up to 6 cores

Configure as much as 12 TB in redundant storage

480 GB Intel 520 Series Solid State Drive

Tempted? You can learn more about the Leopard Extreme 4, as well as configure and buy, over on the System76 website.

If you’re in the market for a new PC but find desktop towers to be a bit old hat I do recommend taking a look at the System76 Sable Complete.

Monday, 30 September 2013

Securing DNS using DNS Forwarder Architecture


I. What is DNS Forwarder?

A DNS forwarder is a DNS in the network which used to forward queries related to public sites to external Internet DNS Servers.

II. Why DNS Forwarders?

1) Internal DNS Security
There are chances that your company users want to access a public website, which can't be resolved by the internal DNS Servers (which mainly handle records internal resources) in that case internal DNS servers will try to forward the query to extnernal DNS servers.

To provide extra security to DNS Servers, network administrators might not want Internal DNS servers to communicate directly with external Public DNS servers. We will implement a DNS server in DMZ network to communicate to external public DNS servers.Hence, you can resolve names without exposing your network to outside servers.

2) Less WAN Link Utilization

If all the Internal DNS servers start communicating to external Internet DNS servers ( which is via WAN link) the overall WAN link speed will go down. So we will just have a DMZ Network which will keep cahce of most queried extneral sites and reduce need for external queries.

III. DNS Forwarder Architecture

All Internal DNS Server should be set to forward query to Forwarder DNS Server, which is in our case hosted in DMZ Domain.
The Forwarder DNS Server should have good capacity to maintain cache to reduce external queries.
Forwarder DNS Server should be responsible for taking care of query until the query is resolved using help of External Internet DNS Servers.
(Refer to diagram to understand complete query process)


DOS VS DDOS – WHAT IS THE DIFFERENCE?

DoS = Denial Of Service

DDoS = Distributed Denial Of Service

What is the difference between the two?

Whilst DoS and DDoS sound remarkably similar there are in fact differences between the two -

DoS

This means that one computer and one internet connection is used to flood a server with packets (TCP / UDP). The point of such a denial of service attack is to overload the targeted server’s bandwidth and other resources. This will make the server inaccessible to others, thereby blocking the website or whatever else is hosted there.

DDoS

In most respects it is similar to a DoS attack but the results are much, much different. Instead of one computer and one internet connection the DDoS attack utilises many computers and many connections. The computers behind such an attack are often distributed around the whole world and will be part of what is known as a botnet. The main difference between a DDoS attack vs a DoS attack, therefore, is that the target server will be overload by hundreds or even thousands of requests in the case of the former as opposed to just one attacker in the case of the latter.

Therefore it is much, much harder for a server to withstand a DDoS attack as opposed to the simpler DoS incursion.

HOW To ARP POISON A LAN

ARP poisoning is also known as ARP Spoofing, ARP Flooding and ARP Poisoning Routing. So what basically is ARP poisoning ? It is technique which allows an attacker sniffs traffic from Local Area Network (LAN), monitors it and even stop it. ARP poisoning is done by sending fake or spoofed messages to an Ethernet LAN card. By doing so an attacker manages to associate its MAC address with IP address of another node on network (which is basically default gateway IP). Then the traffic meant for gateway first goes to attacker and then to gateway thus allowing attacker to sniff traffic from network. To launch APR poisoning attack the attacker’s system must be connected in LAN if wired else it should be at least in range of wireless network. This is just a tutorial on ARP poisoning so we will discuss its anatomy someday later.

Read Full Tutorial @ http://teamiha.tumblr.com/post/26343443114/how-to-arp-poision-a-lan

Three Reasons Why PC-s Crash You Must Know...?

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1. Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource iswww.driverguide.com
. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2. Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3. BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Microsoft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

Apple admits, ‘iPhone 5s Fingerprint Database To Be Shared With NSA’

Now-a-days, Apple is famous in the markets because its new iPhone 5S has a Fingerprint Sensor (Touch ID) as a security feature—everyone is getting amazed with that feature and eager to use.

That Fingerprint scanner has been hacked already by German Hackers group ‘CCC’ but one more thing to concern about that—’will Apple share that Fingerprint database with NSA’ and the answer is YES.

Tim Richardson, District Manager of Apple’s North America Marketing Department admits about the sharing of Database with NSA, he said to Jane M. Agni (A freelance writer in nationalreport.net.):
Absolutely the databases will be merged. This whole ‘fingerprint scan’ idea originated from someone in our Government. They just didn't expect to be outed by Snowden, you know.”

NSA and FBI have been compiling a special database for over a year now to use with the new Apple technology. Fingerprints from all over the nation. Cold cases. Fugitives of the law. Missing persons, Richardson added.

When Mr. Richardson asked for a response to individual’s concerns about privacy, he told:
“Frankly, if a person is foolish enough to allow something as specific and criminally implicit as their fingerprints to be cataloged by faceless corporations and Government officials… Well, you can’t exactly blame us for capitalizing upon it, can you? Personally, I believe this effort will support a greater good. Some of the folks they’re hoping to apprehend are quite dangerous. Besides, it’s not like this is covered in the Constitution.”

If we talk about the constitution as Richardson added above, Apple and the NSA may be completely within their rights to use information volunteered by its customers but it is a Bitter Truth for some of the users.

One of the user told Jane—That’s not America and that’s not freedom…” but the user also stated, “I’m old. I’m not good at remembering passwords.” “I like the idea of easily being able to unlock my Apple device with a fingerprint. But I also shouldn’t have to worry about being tied to a string of murders I commuted in the 70′s…

Update: The Source (National Report) is said to be a Parody site and the news they published is a rumor, that’s why we want to inform to all the users, “This News is awaiting confirmation”

Android users can now lock their lost devices remotely

Google's Android Device Manager lets users remotely lock a lost or stolen device with a new password.

Worried about data from your lost Android phone or tablet getting into the wrong hands? You can now lock down your device remotely.

Released in August, Google's Android Device Manager is a handy service that allows you to see the location of a lost or stolen Android device. You can also remotely tell the device to ring as well as erase all of its data. Now, you can add one more feature to that list.

The latest update to Android Device Manager enables remote password locking. If you want to prevent others from accessing your missing device, you can send a new password to secure it.

The feature is easy enough to implement. On your Android device, open the Android Device Manager. Check the options to remotely locate your device and to allow remote lock and factory reset if not already checked.

Browse to the Android Device Manager Web site and scan for your device. You should see three options: "Ring," "Lock," and "Erase." To send a new lock code to your device, click on "Lock." Enter and confirm the new password and then click on the "Lock" button. Your device will display an alphanumeric keypad requiring someone to key in the new password to access the device.

I tried the process with my Galaxy 3, and it worked like a charm. I highly recommend it for any Android user, but especially for those of you who travel with your device and want to make sure your data is safe from prying eyes.

Hacker's Dictionary

Are you new to the realm of hacking?

Do you feel dumb when you don't know the meaning of a certain term?Well, then this will certainly help you out! This Dictionary Is Provided By Cyber elite. If you are ever unsure about anything, simply scroll down and find that specific word, then read the definition.

Anything includes: Abbreviations, Phrases, Words, and Techniques.*The list is in alphabetical order for convenience!*

Abbreviations


★ DDoS = Distributed Denial of Service



★ DrDoS = Distributed Reflected Denial of Service Attack, uses a list of reflection servers or other methods such as DNS to spoof an attack to look like it's coming from multiple ips. Amplification of power in the attack COULD occur.



★ FTP =File Transfer Protocol. Used for transferring files over an FTP server.



★ FUD = Fully Undetectable



★ Hex =In computer science, hexadecimal refers to base-16 numbers. These are numbers that use digits in the range: 0123456789ABCDEF. In the C programming language (as well as Java, JavaScript, C++, and other places), hexadecimal numbers are prefixed by a 0x. In this manner, one can tell that the number 0x80 is equivalent to 128 decimal, not 80 decimal.



★ HTTP =Hyper Text Transfer Protocol. The foundation of data communication for the World Wide Web.



★ IRC = Internet Relay Chat. Transmiting text messages in real time between online users.



★ JDB =Java drive-by, a very commonly used web-based exploit which allows an attacker to download and execute malicious code locally on a slave's machine through a widely known java vulnerability.



★ Malware =Malicious Software



★ Nix = Unix based operating system, usually refered to here when refering to DoS'ing.



★ POP3 =This is the most popular protocol for picking up e-mail from a server.



★ R.A.T = Remote Administration Tool



★ SDB = Silent drive-by, using a zero day web-based exploit to hiddenly and un-detectably download and execute malicious code on a slave's system. (similar to a JDB however no notification or warning is given to the user)



★ SE = Social Engineering



★ Skid =Script Kid/Script Kiddie



★ SMTP =A TCP/IP protocol used in sending and receiving e-mail.



★ SQL =Structured Query Language. It's a programming language, that used to communicate with databases and DBMS. Can go along with a word after it, such as "SQL Injection."



★ SSH =Secure Shell, used to connect to Virtual Private Servers.



★ TCP = Transmission Control Protocol, creates connections and exchanges packets of data.



★ UDP =User Datagram Protocol, An alternative data transport to TCP used for DNS, Voice over IP, and file sharing.



★ VPN =Virtual Private Network



★ VPS =Virtual Private Server



★ XSS (CSS) = Cross Site Scripting


Words


★Algorithm = A series of steps specifying which actions to take in which order.



★ANSI Bomb = ANSI.SYS key-remapping commands consist of cryptic-looking text that specifies, using ansi numeric codes to redefine keys.



★Back Door = Something a hacker leaves behind on a system in order to be able to get back in at a later time.



★Binary = A numbering system in which there are only two possible values for each digit: 0 and 1.



★Black Hat = A hacker who performs illegal actions to do with hacking online. (Bad guy, per se)



★Blue Hat =A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.



★Bot = A piece of malware that connects computer to an attacker commonly using the HTTP or IRC protocal to await malicous instructions.



★Botnet = Computers infected by worms or Trojans and taken over by hackers and brought into networks to send spam, more viruses, or launch denial of service attacks.



★Buffer Overflow = A classic exploit that sends more data than a programmer expects to receive. Buffer overflows are one of the most common programming errors, and the ones most likely to slip through quality assurance testing.



★Cracker = A specific type of hacker who decrypts passwords or breaks software copy protection schemes.



★DDoS = Distributed denial of service. Flooding someones connection with packets. Servers or web-hosted shells can send packets to a connection on a website usually from a booter.



★Deface =A website deface is an attack on a site that changes the appearance of the site or a certain webpage on the site.



★Dictionary Attack = A dictionary attack is an attack in which a cyber criminal can attempt to gain your account password. The attack uses a dictionary file, a simple list of possible passwords, and a program which fills them in. The program just fills in every single possible password on the list, untill it has found the correct one. Dictionary files usually contain the most common used passwords.



★DOX = Personal information about someone on the Internet usualy contains real name, address, phone number, SSN, credit card number, etc.



★E-Whore = A person who manipulates other people to believe that he/she is a beautiful girl doing cam shows or selling sexual pictures to make money.



★Encryption = In cryptography, encryption applies mathematical operations to data in order to render it incomprehensible. The only way to read the data is apply the reverse mathematical operations. In technical speak, encryption is applies mathematical algorithms with a key that converts plaintext to ciphertext. Only someone in possession of the key can decrypt the message.



★Exploit = A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it.



★FUD = Fully undetectable, can be used in many terms. Generally in combination with crypters, or when trying to infect someone.



★Grey Hat = A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.Hacker (definition is widely disputed among people...) = A hacker is someone who is able to manipulate the inner workings of computers, information, and technology to work in his/her favor.



★Hacktivist = A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks.



★IP Address = On the Internet, your IP address is the unique number that others use to send you traffic.



★IP Grabber = A link that grabs someone's IP when they visit it.



★Keylogger = A software program that records all keystrokes on a computer's keyboard, used as a surveillance tool or covertly as spyware.Leach = A cultural term in the warez community referring to people who download lots of stuff but never give back to the community.



★LOIC/HOIC = Tool(s) used by many anonymous members to conduct DDoS attacks. It is not recommended to use these under any circumstances.



★Malware =Software designed to do all kinds of evil stuff like stealing identity information, running DDoS attacks, or soliciting money from the slave.



Neophyte = A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.



★smith = Somebody new to a forum/game.



★OldFag = Somebody who's been around a forum/game for a long time.



★Packet = Data that is sent across the Internet is broken up into packets, sent individually across the network, and reassembled back into the original data at the other end.



★Phreak =Phone Freaks. Hackers who hack cell phones for free calling. Free Long distance calling. Etc.



★Phreaking = The art and science of cracking the phone network.



★Proxy = A proxy is something that acts as a server, but when given requests from clients, acts itself as a client to the real servers.



★Rainbow Table = A rainbow table is a table of possible passwords and their hashes. It is way faster to crack a password using rainbow tables then using a dictionary attack (Bruteforce).



★Remote Administration Tool =A tool which is used to remotely control (an)other machine(s). These can be used for monitoring user actions, but often misused by cyber criminals as malware, to get their hands on valuable information, such as log in credentials.



★Resolver =Software created to get an IP address through IM (instant messenger, like Skype/MSN) programs.



★Reverse Engineering = A technique whereby the hacker attempts to discover secrets about a program. Often used by crackers, and in direct modifications to a process/application.



★Root = Highest permission level on a computer, able to modify anything on the system without restriction.



★Rootkit (ring3 ring0) =A powerful exploit used by malware to conceal all traces that it exists. Ring3 - Can be removed easily without booting in safemode. Ring0 - Very hard to remove and very rare in the wild, these can require you to format, it's very hard to remove certain ring0 rootkits without safemode.



★Script Kiddie = A script kid, or skid is a term used to describe those who use scripts created by others to hack computer systems and websites. Used as an insult, meaning that they know nothing about hacking.



★Shell = The common meaning here is a hacked web server with a DoS script uploaded to conduct DDoS attacks via a booter. OR A shell is an script-executing unit - Something you'd stick somewhere in order to execute commands of your choice.



★Social Engineer = Social engineering is a form of hacking that targets people's minds rather than their computers. A typical example is sending out snail mail marketing materials with the words "You may already have won" emblazoned across the outside of the letter. As you can see, social engineering is not unique to hackers; it's main practitioners are the marketing departments of corporations.



★Spoof = The word spoof generally means the act of forging your identity. More specifically, it refers to forging the sender's IP address (IP spoofing). (Spoofing an extension for a RAT to change it from .exe to .jpg, etc.)



★SQL Injection =An SQL injection is a method often used to hack SQL databases via a website, and gain admin control (sometimes) of the site. You can attack programs with SQLi too.



★Trojan = A Trojan is a type of malware that masquerades as a legitimate file or helpful program with the ultimate purpose of granting a hacker unauthorized access to a computer.



★VPS = The term is used for emphasizing that the virtual machine, although running in software on the same physical computer as other customers' virtual machines, is in many respects functionallyequivalent to a separate physical computer, is dedicated to the individual customer's needs, has the privacy of a separate physical computer, and can be configured to run server software.



★Warez = Software piracy



★White Hat = A "white hat" refers to an ethical hacker, or a computer security expert, who specializes in penetration testing and in other testing methods to ensure the security of a businesses information systems. (Good guy, per se)



★Worm = Software designed to spread malware with little to no human interaction.



Zero Day Exploit = An attack that exploits a previously unknown vulnerability in a computer application, meaning that the attack occurs on "day zero" of awareness of the vulnerability. This means that the developers have had zero days to address and patch the vulnerability.



Hope we helped the new learners..............

Friday, 27 September 2013

Government to ban use of Gmail, Facebook and Yahoo for official purposes:-

After the spied by the NSA surveillance program on India, where NSA collected almost 13.5 billion of the
data , now Indian Government is looking forward to have a security rise over the country's officials work.
Yesterday, Central Government is working on the new policy on email use for official communication.
According to the new policy Central Government may banned from using Gmail, Yahoo or any other email
services that are based abroad to prevent transfer of data. The new draft of new policy recently have been
submitted by the government before the court. The court has been informed that the new policy would be
finalized within four weeks.
N. Govindacharya a leader of Bharatiya Janata Party , stats that, the use of the emails accounts whose server are outside the country and transfer of nation’s official data using this medium was violation of the Public Records Act. Sensitive data that were stored on the server of outside of the country and could be accessed by the foreign governments.
Viraag Gupta stated that, "Some of the Indian officials use Facebook, Yahoo, Gmail and other social networking sites for official communications instead of using the government server provided by the National Informatics Centre". Gupta also provided the copies of contact information as a proofs.
After this steps hope government officials use our own mail server provide by the NIC. Disscussion on this
issue was made earlier also.

Thursday, 26 September 2013

12 interesting computer Facts

1)Over 6,000 new computer viruses are released every month.
2)The first computer mouse, constructed in 1964, was made out of wood.(by Doug Engelbart)
3)The average human being blinks 20 times a minute – but only 7 times a minute when using a computer.
4)The first electro-mechanical computer was developed in 1939.
5)By the end of 2012 there will be 17 billion devices connected to the internet.
6)5 out of every 6 internet pages are porn related.
7)Over 1 million domain names are registered every month.
8)With it’s 800 million interent users, Facebook would be the third largest country in the World.
9)The first hard drive was created in 1979 and could hold 5MB of data.
10)The nVidia GeForce 6800 Ultra video card contains 222 million transistors.
11)20% of online viruses are released by organized crime units.
12The engineers who developed the IBM PC were known as “The Dirty Dozen”

Tuesday, 24 September 2013

This post is for everyone out there who actually want to become a true hacker

1) Never trust sites that ask you for money in return of Hacking Softwares or who claim to Hack Email Id?s in return of money. All such things are Scam . Nothing Works.

2) There is NO DIRECT SOFTWARE to Hack Facebook , Google , Yahoo or any other big website. All the softwares that claim to do so are scam. They are just meant to take your money and in worse cases, those softwares have trojans or keyloggers in them. As a result your account gets hacked trying to hack others.

3) NEVER EVER use the keyloggers or trojans you find as freeware on internet. Hackers are not fools. They compile keyloggers and trojans almost with any such software and when you install them , you are already hacked before even trying to hack others.

4) You are never going to be a good hacker without the knowledge of programming and scripting languages. When you are going to use only readymade software?s and would depend on them for hacking anything then your functionality would be limited up to the functionality of the software. When you are not going to use your brain, just doing the copy paste thing, then how can you even think of being a good hacker?

5) If you are a good Hacker, you already become a good programmer, a good script writer, a good web developer and an excellent security expert. Well any good Hacker will/should have good knowledge of various aspects and programming languages. to do XSS (Cross Site Scripting ) , PHP INJECTION , SQL INJECTION , PHISHING, FOOTPRINTING etc? you will have to be good at programming and scripting. And when you know the various loop holes, vulnerabilities and security tips, you already become a Computer Security Expert.

So Never Ever Under estimates the term Hacker. A Hacker Is Not a person who just hacks email id?s or servers but a True Hacker is a Computer Genius who the knowledge of computers more than anyone.

Cypersecurity pro on Nasdaq website: 'I needed 10 minutes to hack'


Ilia Kolochenko, head of Swiss information security company High-Tech Bridge, says he’s repeatedly warned Nasdaq.com that hackers could steal users’ browser history or confidential data, but claims the exchange has done nothing to fix the problem. 'It is quite frightening when you think about it,' he says.

One of America's most important stock exchanges is vulnerable to computer hackers who have the potential to gain full access to its website, a leading cybersecurity expert charges.

Nasdaq.com — the website of the Nasdaq exchange — was tipped off by the expert three weeks ago that hackers could steal users’ browser history and cookies or perform phishing attacks to steal confidential data — but the financial market has done nothing to fix the problem, he contends.

Brazil plans to go offline from US-centric internet

Brazil plans to divorce itself from the US-centric internet over Washington’s widespread online spying, a move that many experts fear will be a potentially dangerous first step toward politically fracturing a global network built with minimal interference by governments.

President Dilma Rousseff has ordered a series of measures aimed at greater Brazilian online independence and security following revelations that the US National Security Agency intercepted her communications, hacked into the state-owned Petrobras oil company’s network and spied on Brazilians who entrusted their personal data to US tech companies such as Facebook and Google.

“The global backlash is only beginning and will get far more severe in coming months,” said Sascha Meinrath, director of the Open Technology Institute at the Washington-based New America Foundation think-tank. “This notion of national privacy sovereignty is going to be an increasingly salient issue around the globe.”

While Brazil isn’t proposing to bar its citizens from US-based Web services, it wants their data to be stored locally as the nation assumes greater control over Brazilians’ internet use to protect them from NSA snooping.Ms. Rousseff says she intends to push for new international rules on privacy and security in hardware and software during the UN General Assembly meeting later this month.

Most of Brazil’s global internet traffic passes through the United States, so Ms. Rousseff’s government plans to lay underwater fibber optic cable directly to Europe and also link to all South American nations to create what it hopes will be a network free of US eavesdropping.
Ms. Rousseff is urging Brazil’s Congress to compel Facebook, Google and other US companies to store all data generated by Brazilians on servers physically located inside Brazil in order to shield it from the NSA.

If that happens, and other nations follow suit, Silicon Valley’s bottom line could be hit by lost business and higher operating costs.

Brazil also plans to build more internet exchange points, places where vast amounts of data are relayed, in order to route Brazilians’ traffic away from potential interception.

International spies, not just from the United States, also will adjust, experts said. Laying cable to Europe won’t make Brazil safer, they say. The NSA has reportedly tapped into undersea telecoms cables for decades.

Mr. Meinrath and others argue that what’s needed instead are strong international laws that hold nations accountable for guaranteeing online privacy.

“There’s nothing viable that Brazil can really do to protect its citizenry without changing what the US is doing,” he said.

NSA purchased zero-day exploits from French security firm Vupen

The National Security Agency bought hacking tools from a security firm, based on documents unearthed by a FOI request.

The bombshell media leaks that exposed the U.S. National Security Agency's surveillance projects were easily one of the main stories of the year -- with international and political repercussions -- but now a Freedom of Information request has unearthed the additional purchase of hacking tools.

Ex-NSA contractor Edward Snowden is wanted by the U.S. government for leaking confidential documents to the media which exposed the agency's surveillance techniques used not only on American citizens, but allegedly other countries and their residents.

While Snowden is currently living in Russia under guard and silent, revelations continue to surface. One of the latest reports claims that the NSA is able to access data from Apple iPhones, BlackBerry devices, and phones that use Google's Android operating system. In addition, following document leaks which suggested the NSA was accessing email records, a number of companies offering secure email shut down, and in their place, encrypted mobile phone communication applications have risen.

A fresh report, brought on by a Freedom of Information (FOI) request by government transparency site MuckRock, shows that the NSA purchased data on zero-day vulnerabilities and the software to use them from French security company Vupen.

According to the documents, the NSA signed up to a one-year "binary analysis and exploits service" contract offered by Vupen last September.

Vupen describes itself as "the leading provider of defensive and offensive cyber security intelligence and advanced vulnerability research." In other words, the security firm finds flaws in software and systems and then sells this data on to governments.

In addition, Vupen offers offensive security solutions, including "extremely sophisticated and government grade zero-day exploits specifically designed for critical and offensive cyber operations."

Zero-day vulnerabilities are security flaws in systems discovered by researchers and cyberattackers which have not been found or patched by the vendor. These flaws can then be exploited to gain access to a system and its information, or the vulnerabilities can be sold on the black market. White-hat hackers may reveal the flaw to the vendor for free or as part of a 'bug bounty' program.

The finding isn't all that surprising, considering a report released in May previously claimed that the United States is the world's "biggest buyer" of malware.

Germany’s Chaos Computer Club (CCC) has managed to hack Apple’s Touch ID

Germany’s Chaos Computer Club (CCC) has managed to hack Apple’s Touch ID. What’s interesting about it is that the CCC’s biometrics hacking team used a method which they outlined in 2004, and which only requires materials that can be found in almost every household.

When the iPhone 5S was launched, Apple advertised Touch ID as being more secure than previous fingerprint technology. Some even offered a reward to anyone who managed to hack it.

However, the hackers claim that the only difference between Apple’s sensor and others is that it has a higher resolution. This means that the Touch ID can be cracked with the same basic process that has been used against the majority of other sensors.

The CCC simply photographed the fingerprint at a resolution of 2,400 dpi, and printed it onto a transparent sheet at 1,200 dpi. Then, pink latex was put on top of it to create the fingerprint impression. Finally, the latex sheet was removed and used to unlock the iPhone.

Watch Video Here : http://www.youtube.com/watch?feature=player_embedded&v=HM8b8d8kSNQ

Sunday, 22 September 2013

10 hidden features of iOS 7




When Apple first took the veil off its new mobile operating system iOS 7 at this year’s WWDC and then again during the launch of the new iPhone's, it highlighted a number of new features. From a flatter look and updated camera features to all-new Control Center and Notifications Bar,This Post Has Been Posted by Cyber Elite. Apple showed what a radical departure its new OS is compared to its predecessor, the iOS 6.

While many of the 200 new features that Apple has introduced with iOS 7 are quite in-your-face and easy to find, there are a few that users may find difficult to locate easily. Here is a look at 10 such not-so-overt features of Apple’s new iOS 7 operating system.

=> Swipe to return

In iOS 6 and older versions, you had to press the Back button on top-left corner to return to the previous menu in most apps. With iOS 7, you can move one step back in most apps with just a swipe from the left to right.

=> Spotlight search

For six generations of iOS, Apple kept the Spotlight Search at the extreme left of the Home Screen, just beside the first app menu page. In iOS 7, however, you need to swipe down from the middle of the screen (not from top) in order to open Spotlight Search.

=> Better message view

When you used to type messages in iOS 6 and earlier versions, you could not scroll up to look at previously sent texts in the same thread. You were forced to hit the Send button in order to see previous messages.

However, this has been fixed with the new update, allowing you to move up and down the thread without the need of sending the message.

=> Unlimited apps in folders

If you are among those who download hundreds of apps in their iPads or iPhone's, then you cannot not have folders to manage them better and unclutter the home screen. While Apple allowed you to put a maximum of 16 apps in a folder until now, it has pulled out all stops with iOS 7, so the folders now support unlimited number of apps in a single folder.

=> Shake to undo

Accidentally deleted a mail? Want it back immediately? Just shake your iPhone or iPad to retrieve it from the annals of history. This also applies when you mistakenly archive a message. Of course, shake to undo also works on contacts, call logs, text messages etc.

=> Signal strength dots

If you have already updated your Apple device to iOS 7, one look at the Notification Bar will show you the network the device is working on, but it won’t show the bars that represent signal strength. Apple has replaced the age-old bars with five dots that appear on the top left side. The lesser the signal, the fewer the dots will be.

=> Better file management

Using a connected device usually means that you may be transferring a lot of data, whether it is photos, videos, contacts or documents. In iOS 7, all the data you receive from other devices will be sorted in their respective places. So new photos will go in Album and documents will be sent to iWork and so on.


=> Shared Links

Twitter users will be glad to see that viewing the websites that people they follow on the microblogging site share has become much easier with iOS 7. In the new operating system, Apple's Safari browser integrates your Twitter feed and lists all the links that people you are following post under the Shared Links tab, making it much easier to read the web pages.

=> Siri searches Twitter, Wikipedia and Bing

Apple’s digital voice assistant Siri, which recently shed the beta tag, will now also be able to search Microsoft's search engine Bing to find answers for your queries. In order to make searches more relevant, it will also scour Wikipedia and Twitter to get you the best possible results.

If Siri does not pronounce your name properly, you can even teach the software how to do so in iOS 7.

=> Find My iPhone gets new beefier

In case your iPhone is lost or stolen, you can not only wipe all data it contains off the device, but also make it harder for the unauthorized finder to sell it, or use it again. if you have actived Find My iPhone, it will now delete the data and ask you to enter your Apple ID and password to reactivate it. You cannot use the device unless the credentials last used on the phone are provided.