Enter your email address:


Monday, September 17, 2012

Former Anonymous Spokesman Barrett Brown Arrested in Texas After Threatening FBI Agent




Former Anonymous Spokesman Barrett Brown 

Arrested in Texas After Threatening FBI Agent


Barrett Brown, former spokesman and leader of infamous hacker collective Anonymous was arrested by authorities in Dallas. This arrest took place on Wednesday just hours after he posted a YouTube video in which he appeared to threaten an FBI agent for allegedly harassing his mother. Brown was arrested shortly before 11 p.m. and turned over to FBI custody, according to Carmen Castro, a spokeswoman for the Dallas County Sheriff's Office. Castro could not say what he had been charged with. Brown's attorney, Jay Leiderman, told the press that his client was charged with making threats to a federal agent.  
In immediate response Anonymous on Thursday,  released a statement on Pastie detailing what it claimed were credit card numbers, addresses and phone numbers of 13 federal government employees. On Twitter, the hacker group said the release of the information was in retaliation for Brown's arrest, calling him "our controversial hated/loved friend."  But it seems that, these protest cant make any difference to Barrett Brown's future. We would like to remind you that in middle of last year Brown officially broke all his attachment with Anonymous. But still he has been under the eye of law enforcement for some time and In March, Brown's home was raided by the FBI, which confiscated his laptop, when authorities revealed that Hector Xavier Monsegur was the person behind Sabu, the colorful leader of LulzSecurity, an offshoot of Anonymous. Brown has been faulted by many members of Anonymous for using his real name and for being quoted as a representative of the group, which prides itself on being loosely knit and having no clear leaders. He is best known for threatening to hack into the computers of the Zetas, one of Mexico's deadly drug trafficking cartels. Brown did not immediately return a message left on his cell phone on Thursday. Several websites posted what they said was video of Brown conducting a web chat as officers arrived, yelling "get your hands up!"


-Source (CNBC & Huffington Post)

Cyber Crime Cost $8 Billion Loss For India in Last 12 Months



Cyber Crime Cost $8 Billion Loss For India in Last 12 

Months While Affecting 42 Million People 


In its annual cybercrime report, security firm Norton has estimated that India has lost more than $8 Billion; in Indian currency around 42,000 Crore in last twelve months. This big consumer cyber espionage has effected more than 42 million of people around the country. In terms of cost, this is a full 18 per cent increase. Against this, the global loss has been pegged at $110 billion. The study further notes that as many as 66 per cent of online adults in India have been a victim of cyber crime. During the past 12 months, as many as 56 per cent of online adults here have experienced cyber crime, over 1,15,000 victims per day, 80 victims per minute and over one every second.
According to the report, the average direct financial cost per victim is $192, which is up 18 per cent over 2011 when it was $163. One key finding this year is that both the cost per victim as well as social and mobile incidents are on the rise due to cybercrime. The study is based on the findings of self-reported experiences of over 13,000 adults across 24 countries, Norton by Symantec said in a statement. 
Globally, every second, 18 adults fall victim to cybercrime, resulting in over 1.5 million cybercrime victims each day. With losses totaling an average of $197 per victim across the world in direct financial costs, in the past 12 months, an estimated 556 million experienced cybercrime, representing 46 per cent of online adults, says the report. Last year, the figure was 45 per cent. "Cybercriminals are changing their tactics to target fast growing mobile platforms and social networks where consumers are less aware of security risks," says Norton by Symantec Asia director and internet safety advocate Effendy Ibrahim said. 
If we compare with other countries who are very much advance in IT then a very nasty truth will come appear, and that is being sound in IT still India is very much week and also careless of cyber security. This carelessness of Indian Govt has already cost maximum damage in terms of finance, defense, privacy and so on. India has already faced big damage in cyber space (both financially & reputation) from native countries like China, Pakistan, where sensitive data of Govt, defense, nuclear & space research has allegedly been stolen by cyber criminals. So far India was dam careless but couple of weeks ago things changed dramatically. And now the Indian Govt is working on a robust cyber security structure, Prime Minister of India Dr. Manmohan Singh himself confirmed that from now on wards India will pay as much attention as possible to make the cyber fence digitally safe and secured. 



-Source (Norton & msn)

WEP Cracker Using fern wifi cracker



A very good tutorial by my friend harpreet singh on Wep Cracking. He has used the tool "fern-wifi-cracker" which is easily avaliable on backtrack 5 R3.

So lets begin ...
Go to backtrack --> exploitation tools --> wireless exploitation tools --> 
WLAN exploitation --> fern-wifi-cracker

Now select the wireless interface you have ( it can be wlan0, wlan1 etc..)


























Now there's a button on which you can see wifi logo, click that and it will start the network scanning ( of-course its using airodump here).

Note*: if you double-click anywhere in the tool, you'll get a "settings" dialog box... you can set the channel there and also you can start the xterm.


























Now if you see closely, you'll note that the two buttons below the scan button will get enabled, the first button is the WEP cracking button and the second one is for WPA cracking.

Click the button for WEP cracking


























After clicking that button, a new dialog box will open. you can select the wep network from the list and then you can select the type of attack i.e arp replay attack, chop-chop attack or fragmentation attack. then click "Attack"...


























You'll be able to see the number of ivs are increasing.There's a progress bar at the end of the dialog box.When the progress bar reaches the end, this tool starts aircrack for cracking wifi password


























When the password is cracked, it will be shown at the bottom of the dialog box...

NOW COMES THE INTERESTING PART:
(before going further, i suggest you to connect to the internet for this)

Go to "toolbox" --> Geolocatory tracker.




















Give the bssid of the AP in the text box and click "Trace".




















I think everyone has already guessed what it will show...

YES... INDEED... IT WILL SHOW YOU THE LOCATION OF THE AP ON THE GOOGLE MAPS ... You can see the coordinates as well..




















And also you can see in the toolbox, there's a button for cookie hijacking called "cookie hijacker" ..

ok guys so that's it for now... :-)

Sunday, September 16, 2012

Computer Storage Memory From Bit To CoperByte


1 Bit = Binary Digit
8 Bits = 1 Byte
1024 Bytes = 1 Kilobyte
1024 Kilobytes = 1 Megabyte
1024 Megabytes = 1 Gigabyte
1024 Gigabytes = 1 Terabyte
1024 Terabytes = 1 Petabyte
1024 Petabytes = 1 Exabyte
1024 Exabytes = 1 Zettabyte
1024 Zettabytes = 1 Yottabyte
1024Yottabytes = 1 Brontobyte
1024 Brontobytes = 1 Geopbyte
1024 Geopbyte=1 Saganbyte
1024 Saganbyte=1 Pijabyte
Alphabyte = 1024 Pijabyte
Kryatbyte = 1024 Alphabyte
Amosbyte = 1024 Kryatbyte
Pectrolbyte = 1024 Amosbyte
Bolgerbyte = 1024 Pectrolbyte
Sambobyte = 1024 Bolgerbyte
Quesabyte = 1024 Sambobyte
Kinsabyte = 1024 Quesabyte
Rutherbyte = 1024 Kinsabyte
Dubnibyte = 1024 Rutherbyte
Seaborgbyte = 1024 Dubnibyte
Bohrbyte = 1024 Seaborgbyte
Hassiubyte = 1024 Bohrbyte
Meitnerbyte = 1024 Hassiubyte
Darmstadbyte = 1024 Meitnerbyte
Roentbyte = 1024 Darmstadbyte
Coperbyte = 1024 Roentbyte

AMAZING Facts ............ ^_^

Article by Ankit Sharma

About BlueStacks


BlueStacks runs Android OS and apps on Windows PCs with instant switch between Android and Windows - no reboot is required. End consumers can now enjoy their favorite Android apps on Windows PCs. Android apps can appear either as icons on the Windows desktop, or within a full-blown Android environment.

BlueStacks helps PC manufacturers to ride the Android momentum by enabling Android apps on x86-based tablets, netbooks, notebooks, convertibles and AiO Windows PCs.

With the new hybrid convertible form factors, BlueStacks completely eliminates the need to carry two devices. In the end, the consumer will be getting the advantages of both Android and Windows on the same computer.

Here are some key features of "BlueStacks":

· Play Android apps fast and full-screen
· Push your favorite apps from your Android phone to your PC using BlueStacks Cloud Connect
· Run 10 pre-loaded apps "out of the box"
· Install up to 26 more of your favorite apps
· May not work fast on older netbooks and tablets

What's New in This Release: [ read full changelog ]

Better App Compatibility:
· Angry Birds, Fruit Ninja - even apps with hardcore graphics like Air Attack HD work now

Windowed and Fullscreen Modes:
· We added windowed mode to give you the option - due to popular demand!

Sync Apps Smoothly From Your Android Phone to PC:
· Our Cloud Connect App (Available for your phone in Google Play) is much simpler to use now.

New Interface:
· A more dynamic interface lets you explore and download apps quickly and easily

Direct AppStore Access:
· We've integrated with GetJar, 1Mobile and Amazon to let you download apps right from your PC

Popular Download Section:
· We suggest the latest popular apps for you to download with one click

Localization:
· We've translated BlueStacks to be easier to use worldwide

New Settings:
· Change the size of the app, uninstall apps easily and more

Article by Ankit Sharma

DNS Changer Facts And Precautions


85.255.112.0 through 85.255.127.255
67.210.0.0 through 67.210.15.255
93.188.160.0 through 93.188.167.255
77.67.83.0 through 77.67.83.255
213.109.64.0 through 213.109.79.255
64.28.176.0 through 64.28.191.255

ReInstallation Of Computer Computer If Found :/

Get This Downloaded Please :/
http://www.softpedia.com/get/Antivirus/TDSSKiller.shtml

If the infected PC is on a network, you'll have to check every other PC on the network for signs of infection, and then check your router's settings to ensure that it isn't affected (DNSChanger is programmed to change router DNS settings automatically, using the default usernames and passwords of most modern routers). To do this, copy down your router's DNS server IP addresses (located in your router's settings menu; read "How to Set Up a Wireless Router" for more information) and check them against the FBI's IP address database mentioned above. If your router is infected, reset the router and confirm that all network settings are restored to the manufacturer's defaults.

Check Your Internet Protocol Address .... :/
If You Find These Then Tat Means You Are Vulnerable To DNSCHANGER

And Please Use Windows Updating Yourself
And Clear It Fast ASAP :/

For More Reference You Can See This :/

Thanks For Reading It ...................

Article by Ankit Sharma

Artificial Intelligence



In artificial intelligence, an intelligent agent (IA) is an autonomous entity which observes through sensors and acts upon an environment using actuators (i.e. it is an agent) and directs its activity towards achieving goals (i.e. it is rational). Intelligent agents may also learn or use knowledge to achieve their goals. They may be very simple or very complex: a reflex machine such as a thermostat is an intelligent agent, as is a human being, as is a community of human beings working together towards a goal.


Artificial intelligence (AI) is the intelligence of machines and the branch of computer science that aims to create it. AI textbooks define the field as "the study and design of intelligent agents" where an intelligent agent is a system that perceives its environment and takes actions that maximize its chances of success.John McCarthy, who coined the term in 1955, defines it as "the science and engineering of making intelligent machines."
AI research is highly technical and specialized, deeply divided into subfields that often fail to communicate with each other. Some of the division is due to social and cultural factors: subfields have grown up around particular institutions and the work of individual researchers. AI research is also divided by several technical issues. There are subfields which are focused on the solution of specific problems, on one of several possible approaches, on the use of widely differing tools and towards the accomplishment of particular applications. The central problems of AI include such traits as reasoning, knowledge, planning, learning, communication, perception and the ability to move and manipulate objects. General intelligence (or "strong AI") is still among the field's long term goals. Currently popular approaches include statistical methods, computational intelligence and traditional symbolic AI. There are an enormous number of tools used in AI, including versions of search and mathematical optimization, logic, methods based on probability and economics, and many others.
The field was founded on the claim that a central property of humans, intelligence—the sapience of Homo sapiens—can be so precisely described that it can be simulated by a machine. This raises philosophical issues about the nature of the mind and the ethics of creating artificial beings, issues which have been addressed by myth, fiction and philosophy since antiquity. Artificial intelligence has been the subject of optimism, but has also suffered setbacks and, today, has become an essential part of the technology industry, providing the heavy lifting for many of the most difficult problems in computer science.

Article by Ankit Sharma

About Goosh: Google Shell


Goosh goosh.org 0.5.0-beta #1 Mon, 23 Jun 08 12:32:53 UTC Google/Ajax

Welcome to goosh.org - the unofficial google shell.

This google-interface behaves similar to a unix-shell.
You type commands and the results are shown on this page.

goosh is powered by google.
goosh is written by Stefan Grothkopp <grothkopp@gmail.com>
it is NOT an official google product!
goosh is open source under the Artistic License/GPL.

Screenshot:


Enter help or h for a list of commands.

get 2 GB of free online storage: Dropbox.com

Loading local settings...

Article by Ankit Sharma

GPU C Programming





#include <stdio.h>
#include <stdlib.h>
#include <string.h>

size_t
foo_len (const char *s)
{
return strlen (s);
}

int
main (int argc, char *argv[])
{
const char *a = "This is a test string";

printf ("size of a = %d\n", foo_len (a));

exit (0);
}

Article by Ankit Sharma

Secrecy of source code and other implementation details

Secrecy of source code and other implementation details is a very weak approach to security. In fact, the secrecy of your source code is probably not nearly as good as you think. So build your applications considering that an attacker has a copy of the source code. There is no reason that having the source code makes a secure system impossible.


In most organizations, the source code for applications is stored in a Source Code Control System designed for integrity, not secrecy.

Think who has access to the code and where it might have been stored. There's likely to be a full copy of the source code on every developer's machine. They may have made backup copies in home directories or other storage. They may have taken a copy to work on at home (or possibly to reuse on other projects). The code is also probably stored on backup tapes.

The source code is also probably stored on compile servers and machines that are a part of the build process. The code (in compiled form) is also likely to have found its way to test machines, developer machines, staging servers, and also production. Compiled code is easy to reverse engineer, especially with bytecode-type languages like Java and .NET.

To say that many of these places are not as well protected as production environments is a serious understatement. So consider the threat (in your actual environment, not the way the standards say it is supposed to be) of an attacker being able to get a copy of the source code.

The good news is that having the source code shouldn't provide much of an advantage to an attacker, if you've build it with that in mind. The cryptographic community has followed this principle for decades, but many organizations cling to the notion that the secrecy of the code is critical to the security of their application.

NOTE: Some source code contains intellectual property, such as trade secret algorithms and other business processes. The secrecy of the source code is an important part of protecting this IP.

Source From : https://www.owasp.org/

Update From This ...... :D

Advantages And Disadvantages Of Manual And Automated Fuzzing Testing

Advantages

Automated Testing and Manual Testing


• If you have to run a set of tests repeatedly automation is a huge gain

• If Test Cases have to be run a small number of times it's more likely to perform manual testing
• Helps performing "compatibility testing" - testing the software on different configurations • It allows the tester to perform more ad-hoc (random testing)
• It gives you the ability to run automation scenariosto perform regressions in a shorter time • Short term costs are reduced
• It gives you the ability to run regressions on a code that is continously changing • The more time tester spends testing a module the grater the odds to find real user bugs
• Can be run simultaneously on different machines thus decreasing testing time
• Long term costs are reduced

Disadvantages


Automated Testing and Manual Testing


• It's more expensive to automate. Initial investments are bigger than manual testing • Manual tests can be very time consuming
• You cannot automate everything, some tests still have to be done manually • For every release you must rerun the same set of tests which can be tiresome
OTHER FACTORS
• The performance of yout test tools
• The knowledge level of your testing team
• The continous growth of software to be tested
• Number of necessary regressions

The shell: command



The shell: command can be used to open a special folder directly from the Start, Search menu or from the Run dialog. For example, the command shell:sendto opens the SendTo folder (%userprofile%\sendto) of your user profile. To launch the Documents folder of your user profile, you'd type shell:Personal. Below is a complete shell: commands listing for Windows 7/XP/Vista. The entire listing is stored in the following registry key in Windows 7 & Vista:
HKEY_LOCAL_MACHINE \ SOFTWARE \ Microsoft \ Windows \ CurrentVersion \ explorer \ FolderDescriptions

Credits to MS-MVP Keith Miller for this tip.
New shell: commands in Windows 7

In addition to most of the shell commands in Windows Vista, Windows 7 also has these new commands in addition:

shell:Libraries
shell:MusicLibrary
shell:VideosLibrary
shell:OtherUsersFolder
shell:Device Metadata Store
shell:PublicSuggestedLocations
shell:SuggestedLocations
shell:RecordedTVLibrary
shell:UserProgramFiles
shell:DocumentsLibrary
shell:User Pinned
shell:UsersLibrariesFolder
shell:PicturesLibrary
shell:ImplicitAppShortcuts
shell:UserProgramFilesCommon
shell:Ringtones
shell:CommonRingtones

shell: commands in Windows Vista

shell:Common Programs
shell:GameTasks
shell:UserProfiles
shell:MyComputerFolder
shell:SyncSetupFolder
shell:DpapiKeys
shell:SamplePlaylists
shell:Favorites
shell:My Video
shell:SearchHomeFolder
shell:System
shell:CommonVideo
shell:SyncResultsFolder
shell:LocalizedResourcesDir
shell:Cookies
shell:Original Images
shell:CommonMusic
shell:My Pictures
shell:Cache
shell:Downloads
shell:CommonDownloads
shell:AppData
shell:SyncCenterFolder
shell:My Music
shell:ConflictFolder
shell:SavedGames
shell:InternetFolder
shell:Quick Launch
shell:SystemCertificates
shell:Contacts
shell:TreePropertiesFolder
shell:Profile
shell:Start Menu
shell:Common AppData
shell:PhotoAlbums
shell:ConnectionsFolder
shell:Administrative Tools
shell:PrintersFolder
shell:Default Gadgets
shell:ProgramFilesX86
shell:Searches
shell:Common Startup
shell:ControlPanelFolder
shell:SampleVideos
shell:SendTo
shell:ResourceDir
shell:ProgramFiles
shell:CredentialManager
shell:PrintHood
shell:MAPIFolder
shell:CD Burning
shell:AppUpdatesFolder
shell:Common Start Menu
shell:LocalAppDataLow
shell:Templates
shell:Gadgets
shell:Programs
shell:Recent
shell:SampleMusic
shell:Desktop
shell:CommonPictures
shell:RecycleBinFolder
shell:CryptoKeys
shell:Common Templates
shell:Startup
shell:Links
shell:OEM Links
shell:SamplePictures
shell:Common Desktop
shell:NetHood
shell:Games
shell:Common Administrative Tools
shell:NetworkPlacesFolder
shell:SystemX86
shell:History
shell:AddNewProgramsFolder
shell:Playlists
shell:ProgramFilesCommonX86
shell:PublicGameTasks
shell:ChangeRemoveProgramsFolder
shell:Public
shell:Common Documents
shell:CSCFolder
shell:Local AppData
shell:Windows
shell:UsersFilesFolder
shell:ProgramFilesCommon
shell:Fonts
shell:Personal

shell: commands in Windows XP

shell:Common Programs
shell:Favorites
shell:My Video
shell:System
shell:CommonVideo
shell:LocalizedResourcesDir
shell:Cookies
shell:My Pictures
shell:Cache
shell:AppData
shell:My Music
shell:InternetFolder
shell:Profile
shell:Start Menu
shell:Common AppData
shell:ConnectionsFolder
shell:Administrative Tools
shell:PrintersFolder
shell:ProgramFiles
shell:Common Startup
shell:ControlPanelFolder
shell:SendTo
shell:ResourceDir
shell:ProgramFiles
shell:PrintHood
shell:CD Burning
shell:Common Start Menu
shell:Templates
shell:Programs
shell:Recent
shell:Desktop
shell:CommonPictures
shell:RecycleBinFolder
shell:Common Templates
shell:Startup
shell:Common Desktop
shell:NetHood
shell:Common Administrative Tools
shell:SystemX86
shell:History
shell:Common Documents
shell:Local AppData
shell:Windows
shell:Fonts
shell:Personal

The Silva Method: Focused Thinking



The Silva Method is a comprehensive program designed to train you to make better use of your mental processes. When your thought processes are improved, you act better, and your outlook on life generally gets better. The Silva Method has two main parts, the Silva Life System (SLS) and the Silva Intuition System (SIS).


STARTING UP WITH SLS
In the first part of the Method, the Silva Life System teaches you specialized techniques to put yourself in greater contact with your true potential by training you to use guided imagery and focused awareness to achieve your goals.
Simply and clearly, you are taught how to calm your self, to tune out the static of everyday challenges, and to open untapped aspects of your mentality. The Method is a form of modern-day meditation that is directed to make you a fuller, better, more enriched individual, ready to cope with and surmount any obstacle in your path.
MOVING ON WITH SIS
The second part of the Method, the Silva Intuition System, trains you to recognize and take control of your intuition, that part of you that feels a hunch, or has a sudden insight into a situation before you. With intuition you are able to fully understand something not easily apparent by rational or logical means alone.
Intuition can be utilized in every part of your life. It is of inestimable value in making decisions and choosing the best options. With the SIS training you will be guided to listen to the small voice of intuition within you, and you will learn how to apply intuition to create a new and breathtaking reality for yourself.
YOU'RE WORTH IT
In just two weekends you can elevate your personal awareness and manage all of life's challenges with less stress and an enhanced personal confidence.
Become a member of the best, most reliable time-honored personal development program in the world. Think of it as a toolkit for your mind.
"At this very moment you are writing your own book. No one else writes your book. Doesn't it make sense to write a happy ending?" [The Brothers Grimm]
Smart is the new rich.
Get smart.
Get the Method.

Forward Engineering





Forward engineering is the set of engineering activities that consume the products and artifacts derived from legacy software and new requirements to produce a new target system



In current forward engineering practice informal requirements are somehow converted into a semi-formal
specification using domain notations without underlying precise semantics like e.g. data-flow diagrams, entity-relationship diagrams, natural language descriptions, or other problem specific informal or semiformal
notations. The program then is constructed manually (i.e. in an error prone way) from the specification by a
creative agent, the programmer.
Hidden in this creative construction of the program from the specification are a set of obvious as well as
non-obvious design decisions about how to encode certain parts of the specification in an efficient way using available implementation mechanisms to achieve performance criteria (the why of the design decisions).
As an example, a specification fragment requiring associative retrieval using numeric keys may be implemented using hash tables, achieving good system reaction time. These decisions are usually not documented.
Over time the program code is modified to remove errors and to adapt the system to changed requirements.
The requirements may change to allow usage of alphanumeric keys and to be able to handle large amounts
of data, and the implementation revised to use disk-based B-trees. Unfortunately, often these changes take
place without being reflected correctly in the specification. The gap between the original specification and
the program becomes larger and larger. The result is a program code without a proper specification and with
untrustworthy design information (such as comments describing the hash tables!). The code becomes difficult to understand and, thus, difficult to maintain.
To overcome this deficiency, it is important to change the specification first and then reflect the changes in
the program code. A necessary precondition for this is to have reliable information about the relationship
between the specification and the program code. The design and its rationale describe the how and why of
this relationship; however, they are not documented in current practice.


Related Posts