Thursday, 24 October 2013

HOW TO BECOME AN ETHICAL HACKER ??

1.Dedication : Dedication is the main key to become an ethical hacker. Don't plan to become pen-tester because of money. If you really have interest, then go ahead.

2.Reading : Be a bookworm. Try to read books related to computer and its architecture. Buy books related to Security and Ethical hacking.

3.Know how hackers hack into: You can not solve the problem until you know what is behind the problem. So you have to learn method of hackers.

4.Programming and Scripting: Learn Some programming or scripting languages because most of time you will need to write a code to break into a system. Also, you have to know the coding for understanding how a system works,then only you can penetrate into. Ok, which language?! My suggestion is C. I Love C programming. It is one of best,powerful language and easy to learn. Some peoples prefer python. As far as i am concerned, once you learned one language, it is easy for you to learn any other languages. There are are plenty of online programming tutorial sites are out there.

5.Linux: Ok, it is time to switch from Windows to Linux. Learn to work with Linux.

6.BackTrack Linux Distribution: Backtrack Linux is one of the famous Penetration Testing Linux distribution. This backtrack is funded by Offensive Security. It has almost all penetration testing tools required for security professionals.

7.Get Certification for Ethical Hackers: Some organization recruits based on security certification. You can learn and get ethical certification from your nearest center. Search in google for these keywords "CEH","OSCP","security certifications". Anyway, if you have dedication and confidence, you don't need a certificate and get into a firm easily.

8.Forums: Participate in any Security or ethical Hacking related forums.

Download BBM for Android and iPhone -Things you Need to Know before Using it


BBM is finally rolling out BBM for Android and iPhone users(for real this time).BBM is available for download on Google Play, the App Store and in select Samsung App Stores.BBM for iPhone is also in a great demand.In just 7 hours about 1 million people started using the unreleased version of BBM.

How to Download BBM:

You can download BBM for your respective Operating systems from the below mentioned links.



Download BBM on your iPhone :-http://in.blackberry.com/support/apps/bbm/for-iphone.html


First you have to signup with your email and you will get an email regarding the download options.

Watch the below Videos before Getting Started:

How to add a contact by PIN :- http://www.youtube.com/watch?v=vgEyU-rbAHI

How to share pictures and more :- http://www.youtube.com/watch?v=sz4h9lRk5Tw



Know when your messages have been delivered and read :-http://www.youtube.com/watch?v=yKpEQk6Eut0

Creating and managing groups :- http://www.youtube.com/watch?v=MlJzsDzynF8

Wednesday, 23 October 2013

Google Malaysia hacked “Team Madleets”

Google’s Malaysian website came under a hacking attack from a Pakistani group named as Team “Madleets”.Well, i am actually thinking that if sites like google are not able to get rid of these attacks then what about our personal websites? OMG!

Google Malaysia remained offline for several hours on Thursday because of an attack on the DNS records of the Google’s website, what they actually did was that they changed the DNS records of Google Malaysia to the server’s controlled by Madleets.

Madleets group wrote a message on their Facebook page that mentioned:

We feel we need to alert anyone, that we don’t hack any country tlds for example google.com.my as a result of any kind of hate, We don’t hate anyone, We love all humanity, there is no obvious reason for stamping the tlds.

Least the reason is not any kind of hate.

Whatever the reason is we can’t explain except we love all of you.
Regard’s

H4x0rL1f3

The page information stated that “MadLeets is a Ethical and 1337 White Hat Hackers Community. We are Anti Hackers , we teach how to protect yourself from getting hacked.”

The link with in the source code was edited with an inclusion of a web address that takes to a music video and the most amazing thing to note is that music keeps playing automatically till the visitor stays on the website!

There seems to be not much reason behind it, only to prove that security is just an illusion. It does not exist. 

CSRF (Cross Site Request Forgery)

CSRF stands for Cross Site Request Forgery. It is a method used by an attacker to trick a user into loading a page that contains a malicious request written in the form of codes. This type of attack can be preformed to change a user’s email id, password, name or any other field or even make a purchase in some typical cases. There is no way any site can differentiate between pure request and forged request because this attack is performed when the victim is logged on and the victim clicks on some areas which have been manipulated by the attacker. The malicious script gets executed away from the user vicinity from un-trusted source, which is uploaded by the hacker. This type of attack can lead to leak of many sensitive data stored in the server like Credit Card Details or Bank Details.

Read More : http://goo.gl/PhKBlQ

Li-Fi: Technology that Uses Light Bulb to Establish Internet

Photo: Li-Fi: Technology that Uses Light Bulb to Establish Internet

A team of Chinese experts and specialists have successfully developed, and experimented an innovative way of gaining access to the Digital World of the Internet using the signals sent through the Light Bulb instead of Radio Waves as in Wi-Fi.

Scientists named it Li-Fi.

In case if you don’t know, Wi-Fi operates in the frequency range between 2.4 and 2.483 GHz. IEEE 802 (11a operates in the frequency range from 5.725 to 5.850 GHz. These are often referred to as the “2.4 GHz” and “5GHz” bands).

The term Li-Fi may not be new to many ears; in fact it is around since 2011, when Harald Haas had first used it in his TED Global talk on Visible Light Communication on this very context.

The Li-Fi technology operates under the principle that light can be used to carry Signals as an alternative to traditional radio frequencies; it keeps serving as long as there is no blockage of any kind, between the Light source and a Computer.

Chi Nan, the I.T Professor at Shanghai’s Fudan University, who also leads the Li-Fi research team (which includes scientists from the Shanghai Institute of Technical Physics of the Chinese Academy of Sciences) have said that, “One-watt LED Light Bulb may establish an Internet connection for four Electronic Gadgets at once.”, she added that, “A light bulb with embedded microchips can produce data rate as fast as 150Mbps.”

A team of Chinese experts and specialists have successfully developed, and experimented an innovative way of gaining access to the Digital World of the Internet using the signals sent through the Light Bulb instead of Radio Waves as in Wi-Fi.

Scientists named it Li-Fi.

In case if you don’t know, Wi-Fi operates in the frequency range between 2.4 and 2.483 GHz. IEEE 802 (11a operates in the frequency range from 5.725 to 5.850 GHz. These are often referred to as the “2.4 GHz” and “5GHz” bands).

The term Li-Fi may not be new to many ears; in fact it is around since 2011, when Harald Haas had first used it in his TED Global talk on Visible Light Communication on this very context.

The Li-Fi technology operates under the principle that light can be used to carry Signals as an alternative to traditional radio frequencies; it keeps serving as long as there is no blockage of any kind, between the Light source and a Computer.

Chi Nan, the I.T Professor at Shanghai’s Fudan University, who also leads the Li-Fi research team (which includes scientists from the Shanghai Institute of Technical Physics of the Chinese Academy of Sciences) have said that, “One-watt LED Light Bulb may establish an Internet connection for four Electronic Gadgets at once.”, she added that, “A light bulb with embedded microchips can produce data rate as fast as 150Mbps.”

Wednesday, 9 October 2013

Android 4.4 KitKat: Seven things we know so far






Unlike Google's upcoming Nexus 5 smartphone, there's a relative vacuum of information about what to expect from the next Android OS, named KitKat, beside a global cross-promotion campaign with Nestle.

1. The Nestle tie-up

Since Nestle's KitKat has the honour of giving its name to Android's next OS, expect free-flowing puns from the company, which is planning to give away a bunch of Google's Nexus 7 tablets — which were among the first devices to ship with Jelly Bean Android 4.3. It's not clear whether the Nestle giveaway devices will ship with KitKat onboard, though presumably they will, given the marketing tie-up. Despite Google having notched up one billion Android activations to date, the partnership with Google on Android is meant to make it more mainstream than it already is. (Although I'd argue an OS that powers four in five of the world's smartphones is pretty mainstream to begin with.)

2. It's not Key Lime Pie

Given the Nestle partnership is all about making the Android brand more mainstream, it's perhaps no surprise Google didn't go with Key Lime Pie — its original choice for the name of the next Android OS — as the dessert isn't widely known outside the US.

3. An October release date

No one but Google (and possibly Nestle's marketing team) knows exactly when KitKat will be released, but current bets are on October. To that end, punters recently got a plausible confirmation via Nestle Germany's KitKat Facebook wall, in which the company indicated the OS will be released later this month.

4. The Nexus 5

It's thought the Nexus 5 will be the first device to come bearing KitKat — a logical pattern given the Nexus 4 was the first smartphone to hit the market with Jelly Bean. The heavily-leaked Nexus 5 from LG is thought to be due for release before the end of the month. Rumours also have the Nexus 5 coming with 32GB on board storage, and offering LTE support. Hopefully this time Google and LG have ironed out supply chain constraints that fans had to deal with in 2012 with the launch of the Nexus 4.

5. KitKat: an evolution not a revolution

Though there haven't been too many leaks about the new OS, but a recent one has shed light on a few features that may arrive in KitKat.

Gadget Helpline last week published details and pics of what it believed was an unfinished version of KitKat that still had the markings of its original name, Key Lime Pie. According to its review, Kit Kat is not a complete overhaul of Jelly Bean, but it was more polished, smoother and faster.

Jelly Bean brought features like dial pad autocomplete for phone numbers and names, improved tap-typing recognition, battery-saving wi-fi location options, Bluetooth Smart support, improved graphics, and restricted profiles for different apps.

Google's latest distribution figures show around half of Android device owners are on Jelly Bean, with relatively few on just 1.5 percent of the world's Android devices run Jelly Bean 4.3, while around 47 percent use 4.1 or 4.2.

6. New inbuilt features for payments and printing

Two new features that could be on the way in 4.4, according to Gadget Helpline's leaks, include a native printing option for Android devices and a payment feature that hints at built-in NFC payments (rather than via third-party apps).

KitKat could also include a Miracast-based feature for wireless video output to TVs and may bring a few minor changes to the dialler pad, such as a white notifications instead of blue ones.

Also, users could expect inbuilt photo editing options, such as Tilt-Shift and Center Focus, plus Negative and Posterize effects. There could also be formatting and colour controls for printing to networked printers.

7. Bundled productivity apps

Notably, beyond Google's core apps, the leaks suggest Google's productivity apps, such as Keep, Drive and QuickOffice (a Microsoft Office compatible product which it recently made free on Android and iOS) will all have a prominent place in the OS.

WhatsApp, AVG and Alexa Hacked Palestinian Hackers

A group of pro-Palestinian hackers aligned with Anonymous has successfully hacked a range of websites including WhatsApp, AVG and Alexa.

Over the past 24 hours a group calling themselves Kdms Team has claimed responsibility for hacking six different websites, including the homepages of the hugely popular messaging service WhatsApp and the top free anti-virus provider AVG.

The group is aligned with the Anonymous movement and the messages posted on the compromised websites indicate they group's aim is to promote Palestinian viewpoints.

Other websites compromised include those belonging to security firm Avira, web analytics company Alexa, porn website RedTube and hosting provider Leaseweb.

A number of security experts have pointed out that all compromised sites share a common domain registrar - Network Solutions - which indicates the Kdms Team hackers compromised this network rather than the individual company websites.

Network Solutions were unavailable for comment on the situation.

Compromised

"Last weekend the leaseweb.com website was unfortunately a direct target of cybercriminals itself. For a short period of time some visitors of leaseweb.com were redirected to another, non-Leaseweb IP address, after the leaseweb.com DNS was changed at the registrar," Leaseweb said in a post written over the weekend.

Identical messages (pic in the post) were posted on the homepages of AVG and WhatsApp, under the title: "You Got Pwned." The message from the pro-Palestinian group, reads:

"We want to tell you that there is a land called Palestine on the earth. This land has been stolen by Zionist. Palestinian people has the right to live in peace. Deserve to liberate their land and release all prisoners from Israeli jails. We want peace. Long live Palestine"

The group also embedded a YouTube clip of a patriotic rendition of the Palestinian national anthem.

Offline

The AVG website is currently not accessible as the company has no doubt taken it offline in order to fix the problem. The Avira and WhatsApp websites which were previously offline, are currently back in operation.

There is no suggestion that any customer data was compromised during any of the attacks.

Security researcher Graham Cluley said: It's possible that the hackers managed to change the website's DNS records, redirecting anyone who attempted to visitwww.whatsapp.com to a different IP address."

According to the Kdms Team Twitter account, the group yesterday compromised the porn website RedTube as well as the homepage of web analytics site Alexa, though both of these have now returned to normal operation it seems.

The emergence of KDMS Team follows the recent high-profile emergence of the Syrian Electronci Army, who have grabbed a lot of attention through their hacking of high-profile media outlets such as the Associated Press, Sky News and the BBC.

For HD Screenshot Visit Here :- http://i.imgur.com/mGbgKqk.jpg

Tuesday, 8 October 2013

Facebook expands 'Graph Search' within social network

Facebook said Monday it was expanding the capabilities of its "Graph Search" function to help users navigate and find information within postings on the world's biggest social network.

"Starting today, Graph Search will include posts and status updates. Now you will be able to search for status updates, photo captions, check-ins and comments to find things shared with you," the company said in a statement.

"Search for the topics you're interested in and see what your friends are saying, like 'Dancing with the Stars' or 'Posts about Dancing with the Stars by my friends.'"

Facebook launched the service in January in an effort to help members better navigate the vast amount of information on Facebook, which is not available on Web search engines such as Google. But at the time, it lacked detailed information from member postings.

Facebook emphasized that the new effort is not Web search, but can help find certain information archived within the network and in the content of friends. It uses Microsoft's Bing search engine to scour content in Facebook.

The company said the expanded Graph Search is rolling out slowly to "a small group of people who currently have Graph Search and we will continue to improve this experience by listening to feedback."

Facebook has said Graph Search will respect privacy, and that people can only see content that has been shared with them or publicly available posts.

IPv6 Security Overview: a Small View of the Future


Introduction

The current version of Internet Protocol is IPv4. This is used to send data over the Internet and makes interaction between different services possible. As all experts know, this protocol has significant limitations, such as the maximum addressing space and some known security issues. The security problems, in many ways, depend on the original development project, which certainly did not have “security” as a determining factor, and the whole final environment was considered a friendly one. However, over the years, as response to these deficiencies and in consideration of a global network in rapid growth, new technologies, like SSL/TLS and IPSec, have been introduced to remedy these issues.

Despite these enhancements, however, the whole architecture is still missing that level of security and flexibility expected. As result of these known limitations, a new project for a new Internet Protocol has been designed by the IETF in the early 90′, having in mind “ease-of-configuration”, performance and security.

In this paper we will analyze the features of the new suite of internet protocols, its advantages and disadvantages, as well as the possible implications from a security point of view. This document has no pretension to be exhaustive, and must be considered as the result of an independent author’s study activity.

The Old Version Four

To better understand the actual new features of IPv6, we must first know its predecessor’s. As already mentioned, IPv4 was designed with no security in mind. This means that security in communications through this suite of protocols must or should be guaranteed by “end-nodes”. If I need to send or receive highly sensitive data, and then use a secure channel (encryption?), it’s the responsibility of that application to provide that service.

Currently, the Internet works this way. This, and many others characteristics that will not be covered in this document, has allowed various types of threats to take off in the digital world. The most famous of these are certainly:

1) Reconnaissance Attacks:

This type of attack takes place thanks to the relative small size of IPv4 addressing, because a whole network can be scanned to find open and/or unpatched services. In fact, it is quite easy to perform a reconnaissance scan of a class C network in a few minutes. In this category we can add “Ping Sweep” (sweep a network with ICMP ping messages that solicit a reply), “Port Scan” (to find active and reachable services) and “Application Vulnerability Scan” (to find known vulnerabilities in discovered services).

2) Denial of Service Attacks:

In this type of attack, a service is rendered unavailable through a flood of large amounts of illegitimate requests. It’s possible to mention for this category the smurf attack (remember?).

3) Man-in-the-middle Attacks:

The lack of its own authentication mechanism in communications allows hackers to intercept data in transit.

4) ARP poisoning Attacks:

In IPv4, ARP (Address Resolution Protocol) is responsible for mapping a host’s IP address with its physical MAC address. This information is stored locally (ARP Table) by each host which is part of the communication. The “ARP Poisoning” attack occurs when an arbitrary ARP reply with incorrect information inside is sent to a host which is part of the communication, implying that legitimate packets will arrive at unforeseen destinations.

5) Address Spoofing Attacks:

In the current communication protocols, one of the keys to complete cyber attacks is the ability to modify the source address of a packet. IPv4 allows this possibility since it does not provide any type of source-to-end authentication mechanism.

Today these types of attacks are used to spread spam, malware and also to perform DoS/DDoS attacks. IP spoofing also allows masking the true origin of the malicious packets, making the tracking operations more complex.

6) Malware Attacks:

Malware, today, remains one of the biggest security-related problems. Currently, with IPv4, malware can not only damage the host affected, but also saturate (or use part of) the network resources in place. It’s necessary to clarify that, with the advent of IPv6, there was no way to eradicate these threats, and the conception of the potential damage by malware infection will essentially remain the same. It’s possible to assume that, however, due to the broader spectrum of addressing, its spread could be slower.

What’s New in IPv6?

As previously stated, IPv6 is not IPv4′s upgrade but a totally new suite of protocols.

This means that the differences between the two are very marked:

1) Address Space:

IPv4 provides as many as 2^32 addresses. IPv6 provides as many as 2^128 addresses.

2) Hierarchical Addressing:

In IPv6 we can find 3 major types of addresses: Unicast, Multicast and Anycast. Unicast addresses are assigned to a single node. Multicast addresses are assigned to multiples node within a single multicast group while anycast addresses are assigned to groups of nodes.

3) QoS (Quality-of-Service) and Performances:

The IPv6 packet header provides for fields that facilitate the support for QoS. In addition, the new standard is a big step forward in terms of performance.

4) Security:

The use of IPSec in IPv6 is not optional, but mandatory.

5) Extensibility:

Despite the new features and the considerable increase of addressing space, the IPv6 header is only slightly larger than that of IPv4 (practically just twice, 40 bytes). The IPv6 header does not include any optional fields or a checksum.

In IPv4, the IPv4 header is followed by data of transport protocol (TCP, UDP), also known as “payload".

IPng vs Old Attacks

In this section we will analyze some of the most popular cyber attacks in a perspective focused on the comparison and on the possible impact of these with the IPng.

1) Reconnaissance Attacks:

Reconnaissance attacks, in IPv6, are different for two major reasons: The first is that “Ports Scan” and/or “Ping Sweep” are much less effective in IPv6, because of, as already said, the vastness of the subnet into play. The second is that new multicast addresses in IPv6 will allow finding key systems in a network easier, like routers and some type of servers. In addition, the IPv6 network has a much closer relationship with ICMPv6 (compared to the IPv4 counterparty ICMP) which does not allow too aggressive filters on this protocol. For the rest, the techniques remain the same.

2) Over the Wall:

This class will discuss the type of attacks in which an adversary tries to exploit little restrictive filtering policies. Currently, we are used to developing access lists (ACLs) to restrict unauthorized access to the network we want to be protected by set specific policies on gateway devices in between the IPv4 endpoints. The need for access control is the same in IPv6 as in IPv4. In IPv6, the basic functions for mitigation of unauthorized access are the same. However, considering the significant differences between the headers of the two protocols, it is possible to imagine different ways to implement them.

3) Spoofing Attacks:

While L4 spoofing remains the same, due to the globally aggregated nature of IPv6, spoofing mitigation is expected to be easier to deploy. However the host part of the address is not protected. Layer 4 spoofing attacks are not changed, because L4 protocols do not change in IPv6 with regard to spoofing.

4) DDoS Attacks:

In IPv6, we cannot find the broadcast address. This means that all resulting amplification attacks, like smurf, will be stopped. IPv6 specifications forbid the generation of ICMPv6 packets in response to messages to IPv6 multicast destination address, a link-layer multicast address or a link-layer broadcast address. In general, through the adoption of the new standard, we should find an improvement in this regard.

5) Routing Attacks:

Routing attacks refer to activities that try to redirect traffic flow within a network. Currently, routing protocols are protected using cryptographic authentication (MD5 with Pre-Shared Key) between peers. This protection mechanism will not be changing with IPng. BGP has been updated to carry IPv6 routing information.

6) Malware:

There is no particular implementation in IPv6 which will allow changing the classical approach to malware. However, worms that use the internet to find vulnerable hosts may find difficulties in propagation due to the large address space.

7) Sniffing:

This is the classical attack that involves capturing data in transit across a network. IPv6 provides the technology for the prevention of these types of attacks with IPSec, but it does not simplify the problems for keys management. For this reason, this technique can still continue to be practiced.

L7 Attacks:

Here we refer to all those types of attacks performed at Layer 7 of the OSI model. Also considering a worldwide adoption of IPSec, this type of attacks will remain almost unchanged. Buffer Overflow, Web Applications Vulnerability, etc., cannot be stopped through the IPv6 adoption. There is also another consideration: if IPSec will be implemented as a standard for communication between endpoints, all devices such as IDS/IPS, firewalls and antivirus will only see encrypted traffic, promoting this type of attacks.

9) Man-in-the-Middle:

The IPv6 is subjected to the same security risks that we may encounter in a man-in-the-middle attack that affects the suite of IPSec protocols.

10) Flooding Attacks:

The core principles of a flooding attack remain the same in IPv6.

Conclusions

Without a doubt, IPv6 represents a big step forward compared to its predecessor. The entire suite of protocols has been designed to bring improvements in both functionality and security. However, despite these, IPv6 raises new challenges in both these fields, without considering the transition problems that occur. In short, it is definitely something that will give much fun to Information Security professionals.

Quick elementary OS 0.2 Luna Overview




Two years after the "Jupiter" release, elementary OS 0.2 Luna (stable) has been made available for download recently. With a bit of a delay, here's a quick overview of what to expect from Luna, along with screenshots and of course, a video.

Based on Ubuntu 12.04 LTS, which will be supported until April 2017, elementary OS Luna ships with its own shell called Pantheon and applications that respect the elementary OS philosophy: beautiful, fast and minimalistic.

elementary OS Luna uses a window manager called Gala, based on libmutter, which comes with smooth animations along with a really cool workspace switcher (Super + s) and a beautiful Expose-like feature (Super + w):

Slingshot, the menu / application launcher used by default in elementary OS Luna, lets you either search for the application you want or browse the available application categories:

The top panel, called Wingpanel, doesn't come with the "wing" design used in its first versions (though you can achieve that by following these instructions), but it still stands out from other panels such as the Unity panel, thanks to the cool design used by the indicators:

For the application switcher, elementary OS Luna uses Plank, a dock that supports intellihide along with other hide modes as well as some Unity features such as badges, progress indicators or quicklists.

Plank, along with other aspects of the desktop can be customized by using Switchboard, elementary's system settings which comes with some custom "plugs" such as the Desktop plug, which lets you set the wallpaper, change the dock icon size, hide mode or theme as well as set hot corners.

As for the artwork, Daniel Fore's beautiful GTK and icon themes are of course used by default. Through the Luna development, both have received various improvements: for instance, Luna uses new folder icons and the GTK theme has received new switches, infobars, spin buttons and much more. You can see these changes throughout the screenshots in this article.

Elementary OS 0.2 Luna is truly special: the beautiful indicators, the smart dock, the lightweight default applications of which most are especially designed for elementary OS and the classy effects fit really well together and offer a clean, consistent desktop. And all of this, on top of Ubuntu 12.04 LTS which means you have access to all the applications available for Ubuntu and the long term support.

However, since besides the default applications there are very few apps that follow the elementary OS design guidelines, this consistency can easily be broken by simply installing a few extra applications and this takes away some of elementary's charm.

Another issue, some would say, is the lack of various options / customizations for some of the default elementary OS applications. The main reason behind this is that the elementary team tries to provide a good set of defaults so you don't have to tweak anything yourself.

Default applications include:

Pantheon Files - a Marlin fork which is very fast and features multiple views, including Miller Columns as well as optional extensions for Ubuntu One or Dropbox;

Noise (Music) - the default music player offers multiple views, including a browser based on album covers, an equalizer, iPod sync, Last.fm integration and more;

Geary - an email client developed by Yorba (the team behind Shotwell) and the elementary team, has replaced Postler, and features new email notifications, multiple accounts support and more;

Other applications included by default in elementary OS are Maya (calendar), Scratch (text editor), Pantheon Terminal, Midori (web browser), Empathy, Totem, Simple Scan, Shotwell and of course, Ubuntu Software Center.

Powerful New Ubuntu PC Unveiled By System76



A powerful new Ubuntu PC has been revealed by Linux computer company System76.

The 4th generation of their Leopard Extreme series is a veritable beast of a machine, boasting the latest Intel Haswell processors, support for up to 64GB of high-speed RAM, and a choice of graphics cards that would struggle to so much as wheeze under Steam for Linux.

Pricing starts at $1699.00 for the ‘base’ model:

Quad-core Intel Core i7-4820K @ 3.70Ghz
8GB DDR3 RAM (1866 MHz)
1GB nVidia GeForce GTX 650 (384 CUDA Cores)
120 GB Intel 520 Series Solid State Drive

Note that the base model does not include any form of disc drive or Wi-Fi.

But the best bit? It manages to pack all that power into a PC case smaller than that used by its predecessors.

As with all System76 models buyers can tailor systems to suit their needs, budgets or tastes. The Leopard Extreme is no exception, with the following configurable components on offer:

Quad channel memory with up to 64 GB of high performance 1866 MHz RAM

Optional 6 GB nVidia Geforce GTX TITAN GPU featuring 2,688 CUDA cores

Intel 4th Generation Processors featuring up to 6 cores

Configure as much as 12 TB in redundant storage

480 GB Intel 520 Series Solid State Drive

Tempted? You can learn more about the Leopard Extreme 4, as well as configure and buy, over on the System76 website.

If you’re in the market for a new PC but find desktop towers to be a bit old hat I do recommend taking a look at the System76 Sable Complete.