Thursday, July 9, 2009

Google Announces PC Operating System to Compete with Windows …

· 0 comments

Google is releasing a lightweight, open-source PC-operating system later this year, the company announced Tuesday night, a move that threatens the very heart of Microsoft, long seen as Google’s biggest rival.

Chrome OS is intended to be a very lightweight, quick-starting operating system whose central focus is supporting Google’s Chrome browser. Applications will run mostly inside the browser, making the web — not the desktop — into the computer’s default operating system.

It’s a sign that Google truly believes in the age of cloud computing — where the usefulness of a computer is in its connection to the net where data is stored remotely and information processing happens in a dance between a browser and remote servers.

The Linux-based OS is the second for Google, following on Android, another open-source OS that intended for small devices such as mobile phones. Chrome OS will first be on netbooks — the popular lightweight and inexpensive notebook computers — in the second half of 2010, the company said in a blog post. Desktops will come later.

The code itself will be released under an unspecified open-source license at the end of the year.

The announcement included some not so veiled jabs at Microsoft.

People want to get to their email instantly, without wasting time waiting for their computers to boot and browsers to start up. They want their computers to always run as fast as when they first bought them. [...] Even more importantly, they don’t want to spend hours configuring their computers to work with every new piece of hardware, or have to worry about constant software updates.

Google has already laid the ground work for a web OS by revolutionizing webmail with Gmail’s speed, features and capacity (now over 7GB). It followed that with free online word processing and spreadsheet software. Add in its online photo sharing services, and the myriad other online applications from Facebook to customized radio station Pandora, and most common uses of a computer can be done through a browser.

With Tuesday’s announcement, Google is going after Microsoft’s most lucrative and dominant business — the operating system.

Google is implicitly making the argument that there’s no need to pay the premium for a Microsoft OS, when there is lighter, faster and free. And Google is arguing, rather persuasively, that the Web and modern, standards-based browsers like Chrome, Safari, Opera and Firefox are where innovative third-party development is taking place these days.

Speed, simplicity and security are the key aspects of Google Chrome OS. We’re designing the OS to be fast and lightweight, to start up and get you onto the web in a few seconds. The user interface is minimal to stay out of your way, and most of the user experience takes place on the web. And as we did for the Google Chrome browser, we are going back to the basics and completely redesigning the underlying security architecture of the OS so that users don’t have to deal with viruses, malware and security updates. It should just work.

More to the point, more web usage equals more money for Google, which basically makes more money the more people use the web — thanks to its dominant ad platform that brought in more than $5 billion in revenue in the first three months of 2009.

Microsoft has been looking forward to the fall release of Windows 7, its successor to the not-well received Vista. Windows 7 beta releases have gotten good reviews. It’s a bit more complicated in the enterprise space, where IT departments are slow to migrate to anything, but for the average consumer the question now becomes, why ever pay again for a Microsoft operating system, unless you are a gamer or run custom, legacy software?

If indeed Google puts out a fast, easy to use operating system that lets netbooks soar and free users from constant software patches, Microsoft will find it very hard to explain to consumers why they should continue to use its software, other than just out of a foolish consistency.

Don’t be evil, Google’s unofficial motto, has long been understood as code for “Don’t be Microsoft.” Perhaps, it ought now it to be augmented with the commandment, “Leave no Microsoft product unchallenged.

from Wired

Njoy ..

Tuesday, June 30, 2009

New Firefox knows where you live !!!

· 0 comments

 

The all new Firefox v. 3.5 is finally out for download … with lots of new features and enhancements … but the feature i am talking about is … embedded Google technology called .. Geo-location … so , now new firefox browser can know your geographical location from your IP !!! …

I don’t know about others out there , but for me , i sure don’t like this feature .. ( i am not paranoid about my identification but still i don’t like this feature ) … so , i do very little reading about it … and found that its easy to disable this feature ( lucky for me that i am not alone to think this feature is invasion on privacy just same like google do every time we use google search  or any of its services ) …

to disable this feature … just type …

about:config

in browser address bar … and it will show warning page indicating that , now firefox warranty will expire if we change this options !!! ( i never had any idea that softwares DO COME with warranty ) … just say OK … and in FILTER … just type GEO , it will list all strings starts with GEO … just locate ..

geo.enabled

.. and make it FALSE …

 

geo_location

and you are done with it …

 

enjoy …

Thursday, June 11, 2009

Pirated Windows 7 Builds Botnet with Trojan

· 0 comments

Attackers pushing pirated, malware-laced copies of Microsoft's upcoming Windows 7 operating system have been actively trying to build a botnet.

Windows7According to researchers at Damballa, attackers hid a Trojan inside of pirated copies of the operating system and began circulating them on BitTorrent sites. Damballa reported that it shut down the botnet's command and control server May 10, but by that time infection rates had risen as high as 552 users per hour.

"Since the pirated package was released on April 24th, my best guess is that this botnet probably had at least 27,000 successful installs prior to our takedown of its CnC [command and control] on May 10th," said Tripp Cox, vice president of engineering at Damballa.

Targeting users through pirated software is nothing new for hackers. Earlier in 2008, for example, attackers sought to build a Mac botnet on the backs of users of pirated versions of iWork '09 and the Mac version of Adobe Photoshop CS4.

Even aside from the malware threat, piracy is big business. A joint report by the BSA and IDC estimated software companies experienced $50 billion in losses in 2008 due to piracy.

In the case of Windows 7 RC, pirated copies were leaked on BitTorrent sites with a Trojan horse that, once downloaded, attempts to install a bundle of other malware on the infected machine. Blocking infections is tricky, as many anti-virus tools do not yet support Windows 7 and the operating system is infected before the tools can even be installed, according to Damballa.

"We continue to see new installs happening at a rate of about 1,600 per day with broad geographic distribution," Cox said. "Since our takedown, any new installs of this pirated distribution of Windows 7 RC are inaccessible by the botmaster. The old installs are accessible. The countries with the largest percentage of installs are the U.S. (10 percent), Netherlands (7 percent) and Italy (7 percent)."

from EWeek ..

Njoy !!!

Tuesday, June 9, 2009

Conficker still infecting 50,000 PCs per day

· 0 comments

The Conficker worm is still infecting systems at a brisk rate and continues to snag computers in Fortune 1000 companies, according to security researchers.

The worm is infecting about 50,000 new PCs each day, according to researchers at Symantec, who reported that the U.S., Brazil and India have been hit the hardest.. "Much of the media hype seems to have died down around Conficker/Downadup, but it is still out there spreading far and wide," Symantec said in a blog post.

Conficker began spreading late last year, taking advantage of a recently patched flaw in Microsoft's Windows operating system to infect entire networks and also using removable storage devices to hop from PC to PC. Security experts say it has now infected millions of computers worldwide, which now comprise the world's biggest botnet network.

"We can see that companies that spend literally millions of dollars on equipment and gear to prevent infections … these Fortune companies have had this infection and it's stayed in their networks for a long period of time," said Rick Wesson, CEO of Support Intelligence and a member of the Conficker Working Group. "It's really hard and really expensive, and if the Fortune companies can't stop it, how can you expect small businesses to do it?"

The Working Group has set up so-called sinkhole servers that can communicate with infected machines. It has spotted infections within many Fortune 1000 companies, Wesson said. "Everybody got hit," he said. "Even Microsoft still has infections."

The worm got a lot of media attention in late March, and while the news stories have tapered off, the worm isn't going anywhere.

Some worried that an April 1 change in the way Conficker received updates could mark the beginning of a new round of Internet attacks, but in reality the Conficker network has been only lightly used, security experts say.

"It's still a significant botnet. It hasn't done anything of significance, but it has not gone away," said Andre DiMino, cofounder of The Shadowserver Foundation and a member of the Working Group. "The remediations need to ramp up."

Njoy !!!

Saturday, June 6, 2009

Darpa to take humans out of network management

· 0 comments

The Defense Advanced Research Projects Agency (Darpa) is researching computer networks that can organise and run themselves without human intervention, and dramatically increase available radio spectrum.

The organisation has been outlining its research goals to Congress in its 2009 Strategic Plan (PDF). One area is the design of a network infrastructure that can configure and maintain itself. It is initially intended for linking participants in battle, but could also have civilian uses.

"At the core of this concept are robust, secure and self-forming networks. These networks must be at least as reliable, available, secure and survivable as the weapons and forces they connect. They must distribute huge amounts of data quickly and precisely," says the report.

"But in order for these networks to realise their full potential, they must form, manage, defend and heal themselves, so they always function at the enormously high speeds that provide their advantages. This means that people can no longer be central to establishing, managing and administering them."

Some of the systems are in a very advanced stage, the agency reports. The Network Centric Radio System is already in operation, and can set up a self-healing ad hoc network gateway to link radio and network communications systems.

Darpa is also funding research into how to use existing spectrum more efficiently. Its neXt Generation Communications technology is being used to allocate spectrum dynamically, so that devices can use spectrum assigned to other uses when it is not being used. Tests have shown a tenfold increase in spectrum efficiency using this method.

from VUnet

Njoy …

Friday, June 5, 2009

All new UBUNTU 9.04 ....

· 0 comments

Well , its not so new ... it has been about two months since the release of Ubuntu 9.04 aka Jaunty Jackalope ... being perhaps the easiest version of so called OS of Geeks , its even very easy for noob like me ... so i have been using this from past couple of years ... and i must say that i learned lot from it ...

Origianlly i involved in learning Ubuntu was because I found that , linux / unix is home of devil ... the dark forces are very strong in this side of computing ... ( :D starwars ?? ) ... and being easy to use , ubuntu still holds power of mighty linux ...

actually i wanted to install this at time when i had downloaded (which happens to be about 2 months before) , but due to volatile experiments with my HDD ... i wasn't able to use it for long time at that time ...

Here are couple of things that i liked in new version ...

New Themes ... now Ubuntu looks even more sexy then its previous versions without any makeup :D ..

Newer Kernel ... Under the surface, Jaunty sports the 2.6.28 Linux kernel, the latest stable release (2.6.29.1 is the latest stable kernel as of 7 April). While most of the new features in the kernel are of little consequence to most desktop users, changes most likely to affect the desktop include a more feature-rich wireless stack with support for a broader range of devices, which will be a welcome improvement among users who previously had to install wireless drivers manually.

New Gnome ... Ubuntu 9.04 comes with Gnome 2.26 desktop environment , which, unsurprisingly, is responsible for the lion’s share of new features useful to desktop users.

One thing that i liked the most is , now i don't need to install / patch my atheros wifi drivers with madwifi ... because they are available as built-in !!! just look at the screenshot ...




and another useful tool is , no more use of command line to remove unused packages from system !!!

Well , I'm not an expert to review anything ... these are just couple of features i like of reincarnation of my beloved OS ...

Njoy ...

Wednesday, June 3, 2009

The Impact of Computing : 78% More Each Year

· 0 comments

Anyone who follows technology is familiar with Moore's Law and its many variations, and has come to expect the price of computing power to halve every 18 months.  But many people don't see the true long-term impact of this beyond the need to upgrade their computer every three or four years.  To not internalize this more deeply is to miss investment opportunities, grossly mispredict the future, and be utterly unprepared for massive, sweeping changes to human society.

Today, we will introduce another layer to the concept of Moore's Law-type exponential improvement.  Consider that on top of the 18-month doubling times of both computational power and storage capacity (an annual improvement rate of 59%), both of these industries have grown by an average of approximately 15% a year for the last fifty years.  Individual years have ranged between +30% and -12%, but let's say these industries have grown large enough that their growth rate slows down to an average of 12% a year for the next couple of decades.

So, we can crudely conclude that a dollar gets 59% more power each year, and 12% more dollars are absorbed by such exponentially growing technology each year.  If we combine the two growth rates to estimate the rate of technology diffusion simultaneously with exponential improvement, we get (1.59)(1.12) = 1.78.

The Impact of Computing grows at a screaming rate of 78% a year.

Sure, this is a very imperfect method of measuring technology diffusion, but many visible examples of this surging wave present themselves.  Consider the most popular television shows of the 1970s, such as The Brady Bunch or The Jeffersons, where the characters had virtually all the household furnishings and electrical appliances that are common today, except for anything with computational capacity.  Yet, economic growth has averaged 3.5% a year since that time, nearly doubling the standard of living in the United States since 1970.  It is obvious what has changed during this period, to induce the economic gains.

In the 1970s, there was virtually no household product with a semiconductor component.  Even digital calculators were not affordable to the average household until very late in the decade.

In the 1980s, many people bought basic game consoles like the Atari 2600, had digital calculators, and purchased their first VCR, but only a fraction of the VCR's internals, maybe 20%, comprised of exponentially deflating semiconductors, so VCR prices did not drop that much per year.

In the early 1990s, many people began to have home PCs.  For the first time, a major, essential home device was pegged to the curve of 18-month halving in cost per unit of power.

In the late 1990s, the PC was joined by the Internet connection and the DVD player, bringing the number of household devices on the Moore's Law-type curve to three.

Today, many homes also have a wireless router, a cellular phone, an iPod, a flat-panel TV, a digital camera, and a couple more PCs.  In 2006, a typical home may have as many as 8 or 9 devices which are expected to have descendants that are twice as powerful for the same price, in just the next 12 to 24 months.

To summarize, the number of devices in an average home that are on this curve, by decade :

1960s and earlier : 0

1970s : 0

1980s : 1-2

1990s : 3-4

2000s : 6-12

If this doesn't persuade people of the exponentially accelerating penetration of information technology, then nothing can.

One extraordinary product provides a useful example, the iPod :

First Generation iPod, released October 2001, 5 GB capacity for $399

Fifth Generation iPod, released October 2005, 60 GB capacity for $399, or 12X more capacity in four years, for the same price.

Total iPods sold in 2002 : 381,000

Total iPods sold in 2005 : 22,497,000, or 59 times more than 2002.

12X the capacity, yet 59X the units, so (12 x 59) = 708 times the impact in just three years.  The rate of iPod sales growth will moderate, of course, but another product will simply take up the baton, and have a similar growth in impact.

Now, we have a trend to project into the near future.  It is a safe prediction that by 2015, the average home will contain 25-30 such computationally advanced devices, including sophisticated safety and navigation systems in cars, multiple thin HDTVs greater than 60 inches wide diagonally, networked storage that can house over 1000 HD movies in a tiny volume, virtual-reality ready goggles and gloves for advanced gaming, microchips and sensors embedded into several articles of clothing, and a few robots to perform simple household chores.

Not only does Moore's Law ensure that these devices are over 100 times more advanced than their predecessors today, but there are many more of them in number.  This is the true vision of the Impact of Computing, and the shocking, accelerating pace at which our world is being reshaped.

I will expand on this topic greatly in the near future.  In the meantime, some food for thought :

Visualizing Moore's Law is easy when viewing the history of video games.

The Law of Accelerating Returns is the most important thing a person could read.

How semiconductors are becoming a larger share of the total economy.

Economic Growth is Exponential and Accelerating, primarily due to information technology becoming all-encompassing.

from The Futurist

Njoy …

Monday, June 1, 2009

New Cyber-Security Standards for N. American Power System

· 0 comments

It was recently in news that N. American Power Grid was hacked / breached by foreign hackers and that was perhaps the greatest threat , so finally Government has revised cyber-security standards for the North American bulk power system were approved by the North American Electric Reliability Corporation's (NERC) independent board of trustees.

 

 

grid1 The revised standards were passed by the electric industry last week with an 88 percent approval, according to NERC officials, which noted the majority approval indicated strong support in the industry for the more stringent standards.

"The approval of these revisions is evidence that NERC's industry-driven standards development process is producing results, with the aim of developing a strong foundation for the cyber security of the electric grid," said Michael Assante, Vice President and Chief Security Officer at NERC, in a statement.

The standards, according to the statement, are comprised of approximately 40 'good housekeeping' requirements designed to lay a solid foundation of sound security practices. The revisions approved address concerns raised by the Federal Energy Regulatory Commission when it conditionally approved the standards currently in effect. The revisions notably include the removal of the term "reasonable business judgment," said NERC officials.

The standards "if properly implemented, will develop the capabilities needed to secure critical infrastructure from cyber security threats," the statement noted. Entities that fail to comply can be fined up to $1 million per day, per violation in the U.S., with other enforcement provisions in place throughout much of Canada, said NERC. Audits for compliance will begin on July 1, 2009.

The changes come on the heels of a Wall Street Journal report last month that cited national-security officials who claimed cyberspies from China, Russia and other countries had successfully penetrated the U.S. electrical grid and left behind software programs that could be used to disrupt the system. However, Assante stressed in his statement that the changes were part of a process that was launched last July and was already well underway.

"It's important to note, however, that these standards are not designed to address specific, imminent cyber security threats," he said. "We firmly believe carefully crafted emergency authority is needed at the government level to address this gap."

The revised Critical Infrastructure Protection reliability standards are available here. A second phase of revisions will be presented to the board in 2010.

From CSO

Njoy …

Tuesday, May 26, 2009

The Best Firewall for FREE !!! … just for today …

· 0 comments

 

Online Armor - is a Personal Firewall to protect your money, identity and your Data. Whether you’re browsing , Transacting or receiving Email; Online Armor can protect you. This award winning software is easy to use right of the box.

The powerful “HIPS” functions, which is designed to stop all unrecognized programs from running on your computer, makes it possible to protect yourself against new threats and attacks.

online-armor-firewall_177_216

In standard mode, most decisions are made completely automatically based on Online Armor’s whitelist - users never need answer a complex firewall prompt again.

Online Armor protects your passwords and private information from being stolen by blocking keyloggers as they try to activate. Online Armors behaviour detection ensures that even specially created or new keyloggers are detected and prevented.

The version given in GOTD is a full paid version which has following features … which are way more then any other firewall gives you for free !!!

ONLINE ARMOR had also been reviewed by many other people and nearly all of them found this firewall , perhaps the best in its category … some reviews are …

Matousec … an independent software testing company ..

Scot Finnie’s … Scot’s News letter

CNET

 

and just for today … my favorite site … Give away of the day .. is giving it away for free with 1 year subscription … perhaps it is one of the best giveaway by GOTD …

you can download online armor from here … GOTD site

Njoy …

Friday, May 22, 2009

GPS system 'close to breakdown' ???

· 0 comments

It has become one of the staples of modern, hi-tech life: using satellite navigation tools built into your car or mobile phone to find your way from A to B. But experts have warned that the system may be close to breakdown.

realtime_diff_GPS

US government officials are concerned that the quality of the Global Positioning System (GPS) could begin to deteriorate as early as next year, resulting in regular blackouts and failures – or even dishing out inaccurate directions to millions of people worldwide.

The warning centres on the network of GPS satellites that constantly orbit the planet and beam signals back to the ground that help pinpoint your position on the Earth's surface.

The satellites are overseen by the US Air Force, which has maintained the GPS network since the early 1990s. According to a study by the US government accountability office (GAO), mismanagement and a lack of investment means that some of the crucial GPS satellites could begin to fail as early as next year.

"It is uncertain whether the Air Force will be able to acquire new satellites in time to maintain current GPS service without interruption," said the report, presented to Congress. "If not, some military operations and some civilian users could be adversely affected."

The report says that Air Force officials have failed to execute the necessary steps to keep the system running smoothly.

Although it is currently spending nearly $2bn (£1.3bn) to bring the 20-year-old system up to date, the GAO – which is the equivalent of Britain's National Audit Office – says that delays and overspending are putting the entire system in jeopardy.

"In recent years, the Air Force has struggled to successfully build GPS satellites within cost and schedule goals," said the report. "It encountered significant technical problems … [and] struggled with a different contractor."

The first replacement GPS satellite was due to launch at the beginning of 2007, but has been delayed several times and is now scheduled to go into orbit in November this year – almost three years late.

The impact on ordinary users could be significant, with millions of satnav users potential victims of bad directions or failed services. There would also be similar side effects on the military, which uses GPS for mapping, reconnaissance and for tracking hostile targets.

Some suggest that it could also have an impact on the proliferation of so-called location applications on mobile handsets – just as applications on the iPhone and other GPS-enabled smartphones are starting to get more popular.

Tom Coates, the head of Yahoo's Fire Eagle system – which lets users share their location data from their mobile – said he was sceptical that US officials would let the system fall into total disrepair because it was important to so many people and companies.

"I'd be surprised if anyone in the US government was actually OK with letting it fail – it's too useful," he told the Guardian.

"It sounds like something that could be very serious in a whole range of areas if it were to actually happen. It probably wouldn't damage many locative services applications now, but potentially it would retard their development and mainstreaming if it were to come to pass."

The failings of GPS could also play into the hands of other countries – including opening the door to Galileo, the European-funded attempt to rival America's satellite navigation system, which is scheduled to start rolling out later next year.

Russia, India and China have developed their own satellite navigation technologies that are currently being expanded …fingerscrossed

Njoy …

Tuesday, May 12, 2009

WiMAX challenges Wi-Fi

· 0 comments

When most people hear “wireless Internet,” they think “Wi-Fi.” The technology has allowed millions of computers and mobile devices to browse the Web without the snarl of cords. But there’s another wireless standard out there – one that’s arguably more tempting if it can get its act together.

WiMAX delivers the Web similar to Wi-Fi, but covers wide areas like a cellphone tower. While the range of a Wi-Fi router is measured in yards – enough to blanket a house or office – WiMAX can broadcast for miles. This added range has attracted interest from local governments looking into citywide wireless networks.

Several early citywide Wi-Fi plans were abandoned because they underestimated the cost of installing enough hot spots. But with WiMAX, “Instead of needing 20 or 30 Wi-Fi access points per square mile, you need one,” says Craig Settles, an independent wireless analyst. And many cities won’t need to brainstorm creative places to stick a WiMAX antenna, because it can be attached to current cell phone towers. Sprint rolled out a pilot WiMAX program in Baltimore last year. The network delivers average download speeds of two to four megabits per second, half the rate of cable Internet but several times faster than the 3G mobile service used by many of today’s smart phones, according to Sprint’s tests. The company plans to introduce WiMAX in 10 American cities this year and five more in 2010.

“But here’s the big problem,” says Mr. Settles. “How many iPhones have a WiMAX chip in them? None.”

In fact, barely any devices understand a WiMAX signal because it uses different frequencies from Wi-Fi. This incompatibility issue has exacerbated the normal chicken-and-egg problem that plagues new technology: People won’t buy WiMAX devices until there are more WiMAX networks, but why build the network when Wi-Fi is doing so well? Sprint’s plan requires a proprietary antenna that plugs into laptops, similar to the early Wi-Fi cards that have since been built into computers.

If WiMAX takes off, its performance could drop off quickly, says Settles, because fewer towers means that each station needs to juggle more requests. “Some testers were stunned at the difference in reliability as more people join,” he says. “3G has about a 90 percent uptime. WiMAX is around 70% .” In the US, WiMAX has an additional hurdle because it relies on frequencies that are regulated by the government, so companies will need to pay extra for broadcast rights.

While Settles questions WiMAX’s chances, he says there’s a middle solution. “Locally owned” service provider B2X Online harnesses WiMAX-like towers to deliver broadband Internet to Franklin County, Va. The towers, which transmit over an unlicensed frequency, allow the small company to circumvent the expensive process of laying Internet cables to rural areas.

from the CSMonitor

Njoy …

Monday, May 11, 2009

An invention that could change the internet for ever

· 0 comments

The new system, Wolfram Alpha, showcased at Harvard University in the US last week, takes the first step towards what many consider to be the internet's Holy Grail – a global store of information that understands and responds to ordinary language in the same way a person does.

image 

Although the system is still new, it has already produced massive interest and excitement among technology pundits and internet watchers.

Computer experts believe the new search engine will be an evolutionary leap in the development of the internet. Nova Spivack, an internet and computer expert, said that Wolfram Alpha could prove just as important as Google. "It is really impressive and significant," he wrote. "In fact it may be as important for the web (and the world) as Google, but for a different purpose.

Tom Simpson, of the blog Convergenceofeverything.com, said: "What are the wider implications exactly? A new paradigm for using computers and the web? Probably. Emerging artificial intelligence and a step towards a self-organizing internet? Possibly... I think this could be big."

Wolfram Alpha will not only give a straight answer to questions such as "how high is Mount Everest?", but it will also produce a neat page of related information – all properly sourced – such as geographical location and nearby towns, and other mountains, complete with graphs and charts.

The real innovation, however, is in its ability to work things out "on the fly", according to its British inventor, Dr Stephen Wolfram. If you ask it to compare the height of Mount Everest to the length of the Golden Gate Bridge, it will tell you. Or ask what the weather was like in London on the day John F Kennedy was assassinated, it will cross-check and provide the answer. Ask it about D sharp major, it will play the scale. Type in "10 flips for four heads" and it will guess that you need to know the probability of coin-tossing. If you want to know when the next solar eclipse over Chicago is, or the exact current location of the International Space Station, it can work it out.

Dr Wolfram, an award-winning physicist who is based in America, added that the information is "curated", meaning it is assessed first by experts. This means that the weaknesses of sites such as Wikipedia, where doubts are cast on the information because anyone can contribute, are taken out. It is based on his best-selling Mathematica software, a standard tool for scientists, engineers and academics for crunching complex maths.

"I've wanted to make the knowledge we've accumulated in our civilization computable," he said last week. "I was not sure it was possible. I'm a little surprised it worked out so well."

Dr Wolfram, 49, who was educated at Eton and had completed his PhD in particle physics by the time he was 20, added that the launch of Wolfram Alpha later this month would be just the beginning of the project.

"It will understand what you are talking about," he said. "We are just at the beginning. I think we've got a reasonable start on 90 per cent of the shelves in a typical reference library."

The engine, which will be free to use, works by drawing on the knowledge on the internet, as well as private databases. Dr Wolfram said he expected that about 1,000 people would be needed to keep its databases updated with the latest discoveries and information.

He also added that he would not go down the road of storing information on ordinary people, although he was aware that others might use the technology to do so.

 

Wolfram Alpha has been designed with professionals and academics in mind, so its grasp of popular culture is, at the moment, comparatively poor. The term "50 Cent" caused "absolute horror" in tests, for example, because it confused a discussion on currency with the American rap artist. For this reason alone it is unlikely to provide an immediate threat to Google, which is working on a similar type of search engine, a version of which it launched last week.

"We have a certain amount of popular culture information," Dr Wolfram said. "In some senses popular culture information is much more shallowly computable, so we can find out who's related to who and how tall people are. I fully expect we will have lots of popular culture information. There are linguistic horrors because if you put in books and music a lot of the names clash with other concepts."

He added that to help with that Wolfram Alpha would be using Wikipedia's popularity index to decide what users were likely to be interested in.

With Google now one of the world's top brands, worth $100bn, Wolfram Alpha has the potential to become one of the biggest names on the planet.

Dr Wolfram, however, did not rule out working with Google in the future, as well as Wikipedia. "We're working to partner with all possible organizations that make sense," he said. "Search, narrative, news are complementary to what we have. Hopefully there will be some great synergies."

from Independent

Njoy …

Sunday, May 10, 2009

Black Holes of Internet !!!

· 0 comments

There are plenty of places online that you would do well to steer clear of. A brief visit to some unsavoury websites, for instance, could leave your computer infected with worms or viruses. Then there are the "black holes" to worry about.

If your emails mysteriously disappear, or your favorite website is suddenly unobtainable, you might have run into one. Though nowhere near as destructive as their cosmological cousins, information black holes can create all kinds of problems for surfers. Essentially they are points on the network at which data packets simply disappear due to broken connections, say, or misconfigured routers - devices that maintain lists of addresses and which help direct internet traffic. A team including computer scientist Ethan Katz-Bassett at the University of Washington in Seattle has detected almost 1.5 million black holes since it began looking in 2007. The majority persist for over 2 hours, he says. Unfortunately it is tough to predict where they will appear next, so it's hard for the average surfer to avoid them.

Far easier to avoid are a kind of online chatroom called Internet Relay Chat channels. Though the majority are legitimate, a few IRC channels have a very dark reputation, and are run as open markets for stolen goods. One 2007 survey found $37 million worth of illegal stuff in IRC channels, including 80,000 credit card numbers and bank account details. And if that is not bad enough, some of these chatrooms are also used by hackers to send commands to their networks of malicious software bots, or botnets. When a PC is infected by a virus or malicious software it may be hijacked and used as part of a botnet to launch spam or cyber-attacks elsewhere.

Then there are significant pockets of cyberspace - some 5 per cent of all internet addresses - that are not fully connected to the rest of the net. Dubbed the "dark internet", they are often the result of faulty routers or networks with strict security policies that block traffic.

Amongst these dark regions are blocks of seemingly unused internet addresses that may suddenly and briefly flare into activity. Although this behavior might have an innocent explanation, it can also hint at dubious activities.

A three-year study by online security consultants Arbor Networks revealed that dark internet addresses can be a source of cyber-attacks and junk email. The study suggests that hackers or spammers hijack routers and use them to create false addresses which are left dormant until the hackers bring them to life to facilitate their nefarious ends. These dark addresses seem to be multiplying in proportion to the growth of the net, says Arbor Networks' Craig Labovitz.

from New Scientist ..

Njoy …

Friday, May 8, 2009

Hiding Identity under the Onion … How To of TOR software

· 0 comments

 

Just like i said before … Tor is really good application … in this post i will show how this thing works and anonymize our identity on internet !!!

first all you need is to download the TOR from TOR project website … i chose , the 2nd option, “ Tor Browser Bundle for Windows (Contains Tor, Vidalia, Torbutton, Polipo, and Firefox) “ … its 0.2.1.14-rc … they says its UNSTABLE so … may give unexpected results or may be it will not make you much “anonymous” around the internet but i really don’t know the actual reason .. sigh … i use this version because , NO NEED TO INSTALL or SETUP anything and its PORTABLE …

once you download it , extract it on a usb drive ( if you are planning to use it on any other pc )or in any folder of computer ( to use only in that machine ) …

image

now , simply double click on that Vidalia icon … it will run the script and automatically

image

once connected to Tor network , it will launch Tor’s old buddy …. the Firefox … you can make sure that you are connected by viewing , the Vidalia control panel , which shows CONNECTED TO THE TOR NETWORK message with green onion …

 image

 

as it will launch FF, you will see the welcome message just like above ( ofcouse IP will be different ) … just remember to NOT TO CLOSE FIREFOX , because it will automatically exit TOR … ( i think you can change that option ) …

 

image

 

the thing is , i was using google’s chrome too , now see when is check the website … www.whatismyip.com

 

image 

the chrome shows my real IP , but the TORed firefox shows the IP that others will SEE when i use TOR … hmm …thats TORrific .. right ??

and if you ever wonder what is the route to that IP from ur IP , and how you are anonymized … just try to see the routing path of TOR … it shows TOR NETWORK MAP … as you know TOR uses onion routing , so after passing through these much number of nodes … its really hard to find your real IP ( that’s the best part ) … !!!

1124170844-1

and the thing is , i am sitting in public library which has restricted access to sites and can’t access to youtube ( no offence ) … but i really like to watch cartoons on it … so before i can’t use it because it has been blocked by firewall and filters … but now ?? … nothing is between me and my favorite show ( expect my g/f .. hehehe ) …

so that is the way how can you anonymize your identity on internet using tor … but you need to remember that TOR is all free , open to public and non profit thing , so may be you won’t feel glitch when you surf the internet , but you will feel a bit leggy performance when you watch video on youtube …and about security , TOR CAN NOT secure your connection outside the TOR network , means hacker sitting at the end of exit node can intercept / sniff your packets and crack your password  ( for security, TOR recommends SSL connection between End to End Connection )…  also , many times the search results are different then what you expected or language is different … this is because , now you have IP of another geographic location , the search engine  thinks you are from that place so it will display results according to it ( its good if you surf porn sites a lot , because they will not get your real location ….. huh, wait a minute … do you really want it  ??? ) …

 

fingerscrossedNjoy …

Tuesday, May 5, 2009

Windows 7 RC goes public …

· 0 comments

 

Just like they have said in their windows blog … the Latest Operating System from microsoft … Windows 7 … is available to public … but this time , its Release Candidate version …. v. 7100 … which means , its better then beta … and most of this will come as it is in final version of windows 7 ….

dwhiuuyd7c7glv6w6my

This RC version is available to download till JULY,and  will expire on 1st of June 2010 … to download it you need to have account with any of microsoft services … and product key will be given at time of downloading …

 

Njoy … fingerscrossed

Monday, May 4, 2009

Hiding Identity under the Onion !!!

· 0 comments

 tor_sticker

Vidalia … a sweet onion , great in taste indeed and better choice for eating raw compared to other breeds … but the vidalia onion i am talking about is something different … its the TOR Project , which has symbol of vidalia onion, because it uses onion routing concept … Tor is a software , which allows user to surf internet anonymously …

Logic behind the Onion …

Onion routing is a technique for anonymous communication over a computer network. Messages are repeatedly encrypted and then sent through several network nodes called onion routers. Each onion router removes a layer of encryption to uncover routing instructions, and sends the message to the next router where this is repeated. This prevents these intermediary nodes from knowing the origin, destination, and contents of the message. Here, volunteers provide their network node ( at their expense of bandwidth and $$$ ofcourse ) …

But Tor is not the magic wend of fairy god-mother that will make user completely anonymous on internet … it has its own limitation and rules … it does not guarantee for security of data transmitted , once it leaves tor network … so to ensure end-to-end security, measures need to be taken ( SSL connection for example ) … because it has been already proved that , a user ( a hacker , to be more precise )  sitting at end node of network can sniff / capture data leaving tor network and can use it too …

onionroutingfig7

But if you are an adventurer just like me … who just want to try tor for study and experiment … then its really amazing …

the tor software which runs from usb drive gives you ultra portability , ease of use … you don’t even need to install anything in pc … and more good , we can use it anywhere …  is just amazing …

i want to write about  it but some another time …

history about tor

tor official site

till then …

Njoy … fingerscrossed

Sunday, May 3, 2009

Antivirus that lives in the Cloud …

· 0 comments

 

Now a days , everything seem to be adopting itself for cloud computing … the latest edition is an antivirus by PANDA ANTIVIRUS … they call its Cloud Antivirus … which according to panda , lives in the cloud and , consumes least memory … yet provides the best protection against everything threat that internet posses to average joe !!! … But still its in BETA … and so only time can say who much successful it will be in reality … but good thing is , panda thinks to keep it free even after releasing its final version … at present its available only for XP and Vista ( too bad for me , as user of 7 and Jaunty Jackalope ) … but they are planning to release version for windows 7 too beer

till then , read this article from my favorite site about cloud antivirus …

With threats like Conficker fresh in the public's mind, security remains a top concern for Windows users. Panda Security, publishers of Panda Internet Security and Panda Antivirus, is set to take antivirus where it hasn't been yet: into the clouds. Panda Cloud Antivirus beta bets that nearly three years of development can pay off into a better protection system for users. To that end, Panda's willing to make the client free for personal use--even after it leaves beta testing.

 panda_cloud_AV_scanning_610x420

the program uses Panda's proprietary cloud computing technology, which they call Collective Intelligence, to detect viruses, malware, rootkits, and heuristics. It takes advantage of "millions of users," according to Panda, to identify new malware almost in real time. Panda says that Collective Intelligence can classify new malware in under six minutes, and that it handles more than 50,000 new samples per day. The Cloud Antivirus works by classifying threats into executables that must be scanned immediately, and non-executables that are checked at a lower priority--usually when the computer is idle.

In exchange for using consumer data to build the Collective Intelligence database, Panda decided to offer the Panda Cloud Antivirus for free, said Pedro Bustamante, senior research adviser at Panda Security.

panda_cloud_AV_1_610x379

The new program reportedly takes up around 50 MB on the hard drive and eats around 17 MB of RAM when in use. That compares well against the industry average that Panda provided of 60 MB, and Bustamante said that they're aiming for 12 MB of RAM when in use.

Cloud computing may make sense from a system resources point of view, but what happens to system security when the computer isn't connected to the Internet? "The model we've implemented is to break down the traditional antivirus to client and server, so when the user is not connected they keep a local cache copy of Collective Intelligence, including detections for what Collective Intelligence sees is spreading through the community," he said.

Panda Cloud Antivirus is for Windows XP and Windows Vista, with planned support for Windows 7 when it's released. Bustamante added that it will stay in beta as it's being accepted by users, although they hope it will leave beta by the end of this summer.

from CNET

Njoy … fingerscrossed

Friday, May 1, 2009

Is Internet running out of fuel ???

· 0 comments

 

Internet users face regular “brownouts” that will freeze their computers as capacity runs out in cyberspace, according to research to be published later this year.

Experts predict that consumer demand, already growing at 60 per cent a year, will start to exceed supply from as early as next year because of more people working online and the soaring popularity of bandwidth-hungry websites such as YouTube and services such as the BBC’s iPlayer.

It will initially lead to computers being disrupted and going offline for several minutes at a time. From 2012, however, PCs and laptops are likely to operate at a much reduced speed, rendering the internet an “unreliable toy”.

When Sir Tim Berners-Lee, the British scientist, wrote the code that transformed a private computer network into the world wide web in 1989, the internet appeared to be a limitless resource. However, a report being compiled by Nemertes Research, a respected American think-tank, will warn that the web has reached a critical point and that even the recession has failed to stave off impending problems.

“With more people working or looking for work from home, or using their PCs more for cheap entertainment, demand could double in 2009,” said Ted Ritter, a Nemertes analyst. “At best, we see the [economic] slowdown delaying the fractures for maybe a year.”

In America, telecoms companies are spending £40 billion a year upgrading cables and supercomputers to increase capacity, while in Britain proposals to replace copper cabling across part of the network with fibreoptic wires would cost at least £5 billion.

Yet sites such as YouTube, the video-sharing service launched in 2005, which has exploded in popularity, can throw the most ambitious plans into disarray.

The amount of traffic generated each month by YouTube is now equivalent to the amount of traffic generated across the entire internet in all of 2000.

The extent of its popularity is indicated by the 100 million people who have logged on to the site to see the talent show contestant Susan Boyle in the past three weeks.

Another so-called “net bomb” being studied by Nemertes is BBC iPlayer, which allows viewers to watch high-definition television on their computers. In February there were more than 35 million requests for shows and iPlayer now accounts for 5 per cent of all UK internet traffic.

Analysts express such traffic in exabytes – a quintillion (or a million trillion) bytes or units of computer data. One exabyte is equivalent to 50,000 years’ worth of DVD-quality data.

Monthly traffic across the internet is running at about eight exabytes. A recent study by the University of Minnesota estimated that traffic was growing by at least 60 per cent a year, although that did not take into account plans for greater internet access in China and India.

While the net itself will ultimately survive, Ritter said that waves of disruption would begin to emerge next year, when computers would jitter and freeze. This would be followed by “brownouts” – a combination of temporary freezing and computers being reduced to a slow speed.

Ritter’s report will warn that an unreliable internet is merely a toy. “For business purposes, such as delivering medical records between hospitals in real time, it’s useless,” he said.

“Today people know how home computers slow down when the kids get back from school and start playing games, but by 2012 that traffic jam could last all day long.”

Engineers are already preparing for the worst. While some are planning a lightning-fast parallel network called “the grid”, others are building “caches”, private computer stations where popular entertainments are stored on local PCs rather than sent through the global backbone. Telephone companies want to recoup escalating costs by increasing prices for “net hogs” who use more than their share of capacity.

Is it just a theory .. or will it become nightmare of technology …. only time will answer this question … in world of today , where applications are transforming them selves into web applications …. it will surely death call for them rose_wilted ….

from TimesOnline

Njoy … fingerscrossed

Tuesday, April 28, 2009

Hide your tracks at work ???

· 0 comments

 

We all spend some of our time at work doing things that have nothing to do with our job. We surf the Web. We play games. Sure, we all need our downtime, and the enlightened manager knows that. But still, we'd rather just surf in private than deal with the raised eyebrows.

That's why we need ways to ensure that when our boss surprises us or sneaks up behind us, she'll think that we're actually working. Here's a list of apps and services that help.

Camouflaged Web services

SpreadTweet If you're a Twitter fanatic, try SpreadTweet. The software hides your Twitter stream in what looks like an Excel window. It displays everything in plain text to make it look like a real spreadsheet. It's sure to fool any boss.

1cup1coffee 1cup1coffee looks like a Windows Explorer pane (so don't use it on a Mac), but all those Word documents and Powerpoint presentations are actually a collection of Flash games. 1cup1coffeeSimply click on one of the "files" and you can play a game in what looks like your Windows Explorer window. If you hear your boss, you can hit the back button and you'll be brought back to the file listing.

Anonymizer If you don't want the IT folks to know what you're up to, spend $30 and get Anonymizer. The software redirects your Web traffic through its servers to not only safeguard your IP from outside sources, but also to get your employer's IT people off your trail.

C.H.I.M.P. Rearview Monitor Mirror chimpWhile playing a game or doing something you shouldn't, just glance up at the C.H.I.M.P. Rearview Monitor Mirror to see if your boss is approaching from behind. The mirror won't hide what you're doing, but it will give you some time to switch to something more appropriate. And in case you're wondering, C.H.I.M.P. stands for Chimp Has Invincible Monkey Powers. Yeah, I don't get it either. But it is worth the $6.99 price tag.

Don's Boss Page Don's Boss Page (no relation) is full of great boss trickery. If you want to aimlessly browse the Web, but make it sound like you're working, you can keep clicking the site's keyboard audio clips to make others think you're typing.

Quick tip: Resize your windows When I was an accountant, I used Outlook. To make everyone think I was so engrossed in my e-mail, I resized Firefox to fit perfectly in the Outlook preview pane. Anyone who walked by thought I was just reading an e-mail. If they ever got too close, I'd switch to another message. It worked beautifully.

Don't Panic 1.2 If you don't want to get busted by the boss, try installing Don't Panic 1.2 onto your Windows machine. The software will allow you to minimize multiple windows at the same time. You can also maximize multiple windows simultaneously to ensure your boss will be happy when they walk by.

Or just use keyboard shortcuts Brush up on your knowledge of keyboard shortcuts. Whenever you hear someone coming, you can quickly drop a few keys and you'll immediately look like you're working.  

StealthSwitch You'll have to pay $40 to get it, but StealthSwitch is worth the price -- until your boss finds it. Once connected to your computer via USB, StealthSwitch sits on the floor. While playing a game or doing something you shouldn't at work, you can quickly tap the StealthSwitch when you hear your boss approaching. It immediately makes the current window invisible and brings you back to a window that's related to your work. Once your boss walks away, you can tap the StealthSwitch again to get back to your game.

panicbuttonThe Last ( and my fav. too smile_tongue)  $25 USB Panic Button is similar, if you're quicker with your hands than your mouse and don't mind a garish missile-launch control button sitting on your desk. Simply push the plastic covering up, press the red button, and the tool will automatically change the screen on your computer to a spreadsheet, your favorite picture, your company's Web site, or anything else you set it to switch to.

from CNET

Njoy … (your work) … fingerscrossed

Saturday, April 25, 2009

Hackers created 1.6m security threats last year !!!

· 0 comments

 

Hackers were responsible for creating 1.6 million new security threats last year, says Symantec.

According to the security vendor's Internet Security Threat Report, the web was the primary source of infection, with hackers relying on methods to embed malicious code into websites.

"As malicious code continues to grow at a record pace we're also seeing that attackers have shifted away from mass distribution of a few threats to micro-distribution of millions of distinct threats," said Stephen Trilling, vice president at Symantec Security Technology and Response.

The report also revealed that 90 percent of attacks were designed to steal personal information such as names, addresses and credit card details.

"The unfortunate reality is that innocent web surfers can visit a compromised website and unknowingly place their personal and financial information at risk," added Marc Fossi, executive editor of the report.

"Computer users have to be extra vigilant about their security practices."

Symantec said that phishing websites had increased by 66 percent since 2007, with 55,389 found on the web. Spam also increased by 192 percent.

Symantec said that 349 billion spam messages were received in 2008, compared to the 119 billion in 2007. The security vendor blamed botnets, saying were responsible for 90 percent of the spam received.

from PCADVISOR

Njoy … fingerscrossed

Friday, April 24, 2009

H-1B visa filing drops by 50 percent !!!

· 0 comments

 

he protectionist measures and the economic slump in the U.S. have hit the demand for the H -1B visas as the U.S. Citizen and Immigration Council (USCIS) is yet to reach the targeted cap of 65,000 petitions for fiscal 2010. The council has received around 42,000 applications, which is just 'about half' the applications it needs for the quota to be filled.

H-1B-visa2

"The visa cap has not been met yet as there is not enough business in the U.S. The visa update also validates our argument that H-1Bs are not being used to replace American workers, because if that was so, companies would have flocked to file petitions amid lay-offs in the US. That has not happened," said Nasscom President, Som Mittal told Business Line. The Indian firms, which had filed around 11,000 visas last year have opted for less applications this year.
Poorvi Chothani, a U.S. immigration attorney based in Mumbai, admits her firm has seen a 50 percent drop in H-1B filings this time. "Besides the fact that the basic demand is less, other factors such as a possible fear of a backlash in employing foreign professionals, and Troubled Assets Relief Program (TARP) curbs are likely to have influenced the filings," she said. The USCIS maintained that due to the lowered rate of filing, it will continue accepting petitions till it receives the required number of petitions to meet the respective caps.

 

from SiliconIndia

Njoy … fingerscrossed

Thursday, April 23, 2009

DOD says … We're always under cyberattack

· 0 comments

 

In an interview for an upcoming edition of 60 Minutes, CBS News anchor Katie Couric asked Gates about the nation's cybersecurity after hackers stole specifications from a $300 billion fighter jet development program as well as other sensitive information.

In a series of spy attacks, hackers stole information about the Pentagon's F-35 Joint Strike Fighter project and the Air Force's air traffic control system, according to a Wall Street Journal report Tuesday.

The computer spies copied several terabytes of data from the Joint Strike Fighter project, the most expensive in Defense Department history, pertaining to the electronics and design systems of the aircraft, several current and former officials told the Journal. Officials said the separate incursion into the air traffic control system could allow intruders to interfere with military aircraft.DoD_Logo

Gates would not discuss the specifics of the attacks, but said, "I believe we still have security of the sensitive systems." Generally, "We think we have pretty good control of our sensitive information both with respect to intelligence and equipment systems, but we, like everybody else, is under attack. Banks are under attack. Every country is under attack," Gates told Couric.

But, he said, "It's sometimes very difficult to figure out a home address on these attacks so one of the things that I am doing in the budget is significantly increasing the resources for cyber experts. We're going to more than quadruple the number of experts that we have in this area. We're devoting a lot more money to it."

The source of the espionage appears to be China, according to a former official, though the origin of any attacks could be masked. Chinese officials deny any involvement and say U.S. suspicion is the result of a "Cold War mentality." Similar attacks have become more frequent in recent months, underscoring the increasingly heated battles taking place in cyberspace. Earlier this month, the Wall Street Journal reported that Russian and Chinese spies gained access to the U.S. electrical grid, inserting software that could disrupt the system.

In the Joint Strike Fighter attack, officials said that while spies made off with some data, the most sensitive information is stored on separate, non-networked computers. But the vulnerability lies in the Pentagon's reliance on private defense contractors, some foreign, who have less-than-secure networks. The breaches apparently took place in Turkey and another U.S. ally nation, according to the report.

While there is no U.S. agency currently dedicated solely to cybersecurity, the Obama administration is expected tode propose a senior White House post to coordinate military efforts to guard against further breaches. The White House may also look to extend a $17 billion security initiative originally planned by the Bush administration.

"This is going to be an enduring problem and it is going to be a challenge not just for the Department of Defense but for the entirety of the United States," Gates said.

from ZDnet ..

Njoy ??? … fingerscrossed

Wednesday, April 22, 2009

Supporting Piracy !!!

· 0 comments

 

The convictions and prison sentences handed down to the defendants in The Pirate Bay case have prompted Sweden's youth to action. The Pirate Party reports booming support as demonstrators turn out in force on Saturday.

The Pirate Party organized demonstrations against the convictions at several cities across Sweden on Saturday. More than 1,000 people turned out in Stockholm to show support for The Pirate Bay defendents and the practice of file sharing.
"We young people have a whole platform on the internet, where we have all our social contacts - it is there that we live. The state is trying to control the internet and, by extension, our private lives," said Malin Littorin-Ferm of the party's Ung Pirat youth league to the assembled crowd in Stockholm on Saturday. Since the Stockholm district court passed judgment on April 17th the Pirate Party confirmed on Saturday afternoon that its membership has swelled to 21,000. The party's youth league is now, with its 10,000 members, larger than all of the parliamentary party youth organizations.
To claim seats in the European parliament, to which elections will be held on June 7th in Sweden, the party must gain at least four percent of the vote and the support of Sweden's younger voters will be crucial to achieving this.
In the last European parliamentary elections the Swedish voter turnout was a mere 27 percent.
The debate around file sharing and the future of the internet has piqued the interest of many young people and could increase the voter turnout among the unusually large number of first time voters, concluded Henrik Oscarsson, a political scientist at Gothenburg University.
"If they can mobilize their passive support to the voting booth on June 7th then voter turnout could increase among this group. It is a long way to the four percent threshold," he pointed out.
The Pirate Party's leader Rickard Falkvinge is confident of the attraction of the party's platform.
"These citizens have never previously had a significant issue with which to become involved. It is not that politics does not interest young people - it is that the former generation's problems and political solutions do not interest the youth," he said.

Just a day before this demonstration … Internet service providers refuse to cooperate with an entertainment industry group's demand to shut down The Pirate Bay. The International Federation of the Phonographic Industry (IFPI) is demanding that Pirate Bay website be shut down.
But Internet service providers (ISPs) refuse to cooperate, reports the Svenska Dagbladet newspaper.
Neither has the judgement slowed down file sharing. Several minutes after the Stockholm District Court delivered the verdict, almost ten billion files were being downloaded.
The ISPs maintain that the ruling doesn't apply to them.
"In part, this is not a legally binding decision, but above all, this is a judgement against Pirate Bay and nothing that effects any service provider. We will not take any action (to block) the contents if we are not compelled to do so," Patrik Hiselius, a lawyer at Telia Sonera, told Svenska Dagbladet. Bredbandsbolaget and Com Hem had the same reply. Jon Karlung, managing director of Bahnhofs, said the judgement does not change anything.
"We will not censor sites for our customers; that is not our job. I am against anything that contradicts the principle of a free and open Internet."

By reading all these news , it seems that these pirate guys will not be convicted … or even if they will be , then they will not be charged notably … which will be not good , because it will encourage more piracy all around the world !!!smile_zipit

 

from theLocal ….

Njoy … fingerscrossed

Saturday, April 18, 2009

PIN Crackers Nab Holy Grail of Bank Card Security ….

· 0 comments

 

Hackers have crossed into new frontiers by devising sophisticated ways to steal large amounts of personal identification numbers, or PINs, protecting credit and debit cards, says an investigator.  The attacks involve both unencrypted PINs and encrypted PINs that attackers have found a way to crack, according to an investigator behind a new report looking at the data breaches.

The attacks, says Bryan Sartin, director of investigative response for Verizon Business, are behind some of the millions of dollars in fraudulent ATM withdrawals that have occurred around the United States.

"We're seeing entirely new attacks that a year ago were thought to be only academically possible," says Sartin. Verizon Business released a report Wednesday that examines trends in security breaches. "What we see now is people going right to the source ... and stealing the encrypted PIN blocks and using complex ways to un-encrypt the PIN blocks."

The revelation is an indictment of one of the backbone security measures of U.S. consumer banking: PIN codes. In years past, attackers were forced to obtain PINs  piecemeal through phishing attacks, or the use of skimmers and cameras installed on ATM and gas station card readers. Barring these techniques, it was believed that once a PIN was typed on a keypad and encrypted, it would traverse  bank processing networks with complete safety, until it was decrypted and authenticated by a financial institution on the other side.

But the new PIN-hacking techniques belie this theory, and threaten to destabilize the banking-system transaction process. Information about the theft of encrypted PINs first surfaced in an indictment last year against 11 alleged hackers accused of stealing some 40 million debit and credit card details from TJ Maxx and other U.S. retail networks. The affidavit, which accused Albert "Cumbajohnny" Gonzalez of leading the carding ring, indicated that the thieves had stolen "PIN blocks associated with millions of debit cards" and obtained "technical assistance from criminal associates in decrypting encrypted PIN numbers."

But until now, no one had confirmed that thieves were actively cracking PIN encryption.

Sartin, whose division at Verizon conducts forensic investigations for companies that experience data breaches, wouldn't identify the institutions that were hit or indicate exactly how much stolen money was being attributed to the attacks, but according to the 2009 Data Breach Investigations report, the hacks have resulted in "more targeted, cutting-edge, complex, and clever cybercrime attacks than seen in previous years." "While statistically not a large percentage of our overall caseload in 2008, attacks against PIN information represent individual data-theft cases having the largest aggregate exposure in terms of unique records," says the report. "In other words, PIN-based attacks and many of the very large compromises from the past year go hand in hand."

Although there are ways to mitigate the attacks, experts say the problem can only really be resolved if the financial industry overhauls the entire payment processing system. "You really have to start right from the beginning," says Graham Steel, a research fellow at the French National Institute for Research in Computer Science and Control who wrote about one solution to mitigate some of the attacks. "But then you make changes that aren't backwards-compatible."

PIN hacks hit consumers particularly hard, because they allow thieves to withdraw cash directly from the consumer's checking, savings or brokerage account, Sartin says. Unlike fraudulent credit card charges, which generally carry zero liability for the consumer, fraudulent cash withdrawals that involve a customer's PIN can be more difficult to resolve since, in the absence of evidence of a breach, the burden is placed on the customer to prove that he or she didn't make the withdrawal. Some of the attacks involve grabbing unencrypted PINs, while they sit in memory on bank systems during the authorization process. But the most sophisticated attacks involve encrypted PINs.

Sartin says the latter attacks involve a device called a hardware security module (HSM), a security appliance that sits on bank networks and on switches through which PIN numbers pass on their way from an ATM or retail cash register to the card issuer. The module is a tamper-resistant device that provides a secure environment for certain functions, such as encryption and decryption, to occur.

According to the payment-card industry, or PCI, standards for credit card transaction security, PIN numbers are supposed to be encrypted in transit, which should theoretically protect them if someone intercepts the data. The problem, however, is that a PIN must pass through multiple HSMs across multiple bank networks en route to the customer's bank. These HSMs are configured and managed differently, some by contractors not directly related to the bank. At every switching point, the PIN must be decrypted, then re-encrypted with the proper key for the next leg in its journey, which is itself encrypted under a master key that is generally stored in the module or in the module's application programming interface, or API.

"Essentially, the thief tricks the HSM into providing the encryption key," says Sartin. "This is possible due to poor configuration of the HSM or vulnerabilities created from having bloated functions on the device." Sartin says HSMs need to be able to serve many types of customers in many countries where processing standards may be different from the U.S. As a result, the devices come with enabled functions that aren't needed and can be exploited by an intruder into working to defeat the device's security measures. Once a thief captures and decrypts one PIN block, it becomes trivial to decrypt others on a network.

Other kinds of attacks occur against PINs after they arrive at the card-issuing bank. Once encrypted PINs arrive at the HSM at the issuing bank, the HSM communicates with the bank's mainframe system to decrypt the PIN and the customer's 16-digit account number for a brief period to authorize the transaction.

During that period, the data is briefly held in the system's memory in unencrypted form. Sartin says some attackers have created malware that scrapes the memory to capture the data. "Memory scrapers are in as much as a third of all cases we're seeing, or utilities that scrape data from unallocated space," Sartin says. "This is a huge vulnerability." He says the stolen data is often stored in a file right on the hacked system. "These victims don't see it," Sartin says. "They rely almost purely on anti-virus to detect things that show up on systems that aren't supposed to be there. But they're not looking for a 30-gig file growing on a system."

Information about how to conduct attacks on encrypted PINs isn't new and has been surfacing in academic research for several years.  In the first paper, in 2003, a researcher at Cambridge University published information about attacks that, with the help of an insider, would yield PINs from an issuer bank's system.

The paper, however, was little noticed outside academic circles and the HSM industry. But in 2006, two Israeli computer security researchers outlined an additional attack scenario (.pdf) that got widespread publicity. The attack was much more sophisticated and also required the assistance of an insider who possessed credentials to access the HSM and the API and who also had knowledge of the HSM configuration and how it interacted with the network. As a result, industry experts dismissed it as a minimal threat. But Steel and others say they began to see interest for the attack research from the Russian carding community. But until now no one had seen the attacks actually being used in the wild.

Steel wrote a paper in 2006 that addressed attacks against HSMs (.pdf) as well as a solution to mitigate some of the risks. The paper was submitted to nCipher, a British company that manufactures HSMs and is now owned by Thales. He says the solution involved guidelines for configuring an HSM in a more secure manner and says nCipher passed the guidelines to customers.

Steel says his solution wouldn't address all of the types of attacks. To fix the problem would take a redesign. But he notes that "a complete rethink of the system would just cost more than the banks were willing to make at this time."

Thales is the largest maker of HSMs for the payment-card and other industries, with "multiple tens of thousands" of HSMs deployed in payment-processing networks around the world, according to the company. A spokesman said the company is not aware of any of the attacks on HSMs that Sartin described, and noted that Thales and most other HSM vendors have implemented controls in their devices to prevent such attacks. The problem, however, is how the systems are configured and managed. "It's a very difficult challenge to protect against the lazy administrator," says Brian Phelps, director of program services for Thales. "Out of the box, the HSMs come configured in a very secure fashion if customers just deploy them as is. But for many operational reasons, customers choose to alter those default security configurations — supporting legacy applications may be one example — which creates vulnerabilities." Redesigning the global payment system to eliminate legacy vulnerabilities "would require a mammoth overhaul of virtually every point-of-sale system in the world," he says.

Responding to questions about the vulnerabilities in HSMs, the PCI Security Standards Council said that beginning next week the council would begin testing HSMs as well as unattended payment terminals. Bob Russo, general manager of the global standards body, said in a statement that although there are general market standards that cover HSMs, the council's testing of the devices would "focus specifically on security properties that are critical to the payment system." The testing program conducted in council-approved laboratories would cover "both physical and logical security properties."

From Wired

Njoy … fingerscrossed

Sunday, April 12, 2009

Man Says He Has USB Drive in Prosthetic Finger ??

· 0 comments

 

It is the story of Jerry Jalava, 29, a self-described software developer from Finland who lost part of his left ring finger in May in a motorcycle accident.

Now, he says, he wears a prosthetic finger made of silicone, which looks fairly natural -- except that he can peel back the tip to uncover a USB drive tucked inside. Jalava's finger of the future has become a small Internet sensation.

cen_usb_finger_090318_mn

The USB drive -- also called a flash drive or thumb drive or memory stick -- contains 2 gigabytes of memory and can plug into almost any currently sold computer. Jalava keeps several computer programs on it, he says, and hopes eventually for an upgraded version.

My friends take it same way as I do," he told . "First, they are terrified, hearing about the lost finger, but then they are relieved and laughing after hearing about the USB finger."

Digitally Enhanced Digit

"It is not attached permanently into my body; it is removable prosthetic, which has USB memory stick inside it," he writes, in slightly broken English, on his blog protoblogr.net. "When I'm using the USB, I just leave my finger inside the slot and pick it up after I'm ready."

Jalava said he has two different prosthetic fingertips that he can use. The other is conventional, made to look like a natural finger, but Jalava says he does not plan to keep it that way.

"Right now I use it mostly when I need to do network inspections or memory testing on computers in our office," he said, "but when I get the latest one ready, it will be my single sign-on to my computer and my e-mails."

All this began one day last spring, Jalava says, when he was driving his motorcycle home from work. He hit a deer, slid a couple of hundred feet and lost the tip of his finger. He was taken by ambulance to a hospital in nearby Helsinki.

from ABC

Njoy … fingerscrossed

Supporting the Cause

Creative Commons

Translate into your Language

New Day New Giveaway

Powered By Blogger