IT News. Powered by Blogger.

.

.
Showing posts with label News. Show all posts
Showing posts with label News. Show all posts

Thursday, 13 February 2014

6 US Drone Testing Centers Announced!

 6 US Drone Testing Centers Announced!



In order to bring drones to U.S. skies the Federal Aviation Administration (FAA) of America has selected six site operators to research and test unmanned aircraft across the country.
Three universities named the University of Alaska, Virginia Tech and Texas A&M University-Corpus Christi  as well as Griffiss International Airport in upstate New York, the state of Nevada and the North Dakota Department of Commerce were among the FAA's picks announced Monday.
Drones have been used mainly for military purposes and other government-sponsored activities like border surveillance and environmental monitoring. But the FAA has been working on regulations for the use of commercial drones, projected to be a multibillion-dollar industry.

Friday, 20 December 2013

A car powered by Air and is Made From Lego blocks

A car powered by Air and is Made From Lego blocks



A car has been made by an Australian entrepreneur and a Romanian technologist who have used more then 500,000 pieces of Lego to made their car which has top speed of 20km/h.



 And it is an air-powered car which use four air-powered engines and 256 pistons which are also built of Lego bricks which enables the car to move. 

The wheels of the car are also made of Lego Bricks. the Creators of the car said that 
"It took 18 months and a lot more money to build this car"
 




Thursday, 19 December 2013

World’s fastest wireless network hits 100 gigabits per second can scale to terabits [IT News]

World’s fastest wireless network hits 100 gigabits  per second can scale to terabits


 The German researchers successfully combined photonics and electronics to create a world-record-breaking wireless network that can send and receive data at a high rate of 100 gigabits per second (Gbps). This beats the same team’s previous world record of 40Gbps. At 100Gbps, or a transfer rate of 12.5 gigabytes per second  ten times faster than Google Fiber  you could copy a complete Blu-ray disc in a couple of seconds.
To achieve such a massive data rate, researchers from the Karlsruhe Institute of Technology (KIT) used a massive swath of bandwidth at around 240 GHz  close to the terahertz frequency range. To create the signal, two laser beams (carrying the data) are mixed together (using a photon mixer made by NTT Electronics). An electrical signal results, where the frequency of the signal (237.5 GHz in this case) is the difference between the two optical signals. A normal antenna is then used to beam the signal to the receiver, where a fancy chip fabricated out of fast-switching III-V transistors is required to make sense of the super-high-frequency signal.(see this pic of III-V transistors )


Fraunhofer’s Millilink chip, with III-V transistors capable of switching at 300GHz

 The Fraunhofer’s Millilink chip, with III-V transistors capable of switching at 300GHz
KIT’s 100Gbps wireless network is exciting for two reasons. The first is the most obvious: Yay, faster download speeds! Second, because the wireless signal is generated by a laser signal, it’s an ideal technology to tack on the end of a fiber network. For example, if you have high-speed fiber coming into a telephone exchange or mobile base station, you could then use KIT’s wireless tech to cover the last mile to your home. So far, KIT has only created a 100Gbps network over a distance of 20 meters in the lab — but last year’s 40Gbps world record was set using similar hardware over a range of one kilometer, across the rooftops of the city of Karlsruhe, Germany.
Hence most importantly, though, KIT transmitted 100Gbps using a single data stream. In the case of conventional WiFi, a single connection — between your router and laptop, for example — in reality consists of dozens of data streams, which are squeezed over the same channel with clever techniques such as multiplexing and MIMO (multiple antennae). These same techniques could be used on KIT’s 100Gbps data streams, boosting total link speed to terabits per second — or entire Blu-ray movies in just a fraction of a second. (See: Infinite-capacity wireless vortex beams carry 2.5 terabits per second.)
Both the 40Gbps and 100Gbps world record were part of the Millilink project, a project funded by the German government to bring broadband internet connections to rural and under-connected areas. The project’s entire budget was just two million euros ($2.7 million). It makes you wonder what could be done to the abysmal state of rural internet access in the US and elsewhere if we actually invested some money into it.

Chewbacca', a new Tor-based Banking Trojan Spotted by Researchers

Chewbacca', a new Tor-based Banking Trojan Spotted by Researchers


 The Activities of Cyber Criminal associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with Cyber criminals, to hide their bots and the botnet's Command-and-Control real location from the security researcher.

Security Researchers belonging to anti-virus firm Kaspersky Lab have Found a new Tor-based banking trojan, dubbed "ChewBacca" ("Trojan.Win32.Fsysna.fej") ,that steal banking credentials and hosted on a Tor .onion domain.

This protects the location of a server as well as the identity of the owner in most cases. Still there are drawbacks preventing many criminals from hosting their servers within Tor. Due to the overlay and structure, Tor is slower and timeouts are possible. Massive botnet activity may influence the whole network, as seen with Mevade, and therefore let researchers spot them more easily.

ChewBacca is not first that adopt Tor for anonymity. Recently a new Zeus Trojan variant was also found in the wild that also based on Tor network and aimed at 64-bit systems.

 Researchers did not told that how they discovered Chewbacca, or the extent to which it has spread, but they Found that the Malware is compiled with Free Pascal 2.7.1.



When malware is executed on the victim's windows system, it drops as spoolsv.exe in the startup folder and also drops a copy of Tor 0.2.3.25, which runs with a default listing on "localhost:9050". The Trojan then logs all keystrokes and sends the data back to the botnet controllers via Tor anonymity network.

The Malware also enumerates all running processes and reads their process memory. According to the Kaspersky  researchers, The Command-and-Control server is developed using LAMP, that is based on Linux, PHP, MySQL and Apache.

Chewbacca is currently not offered in public (underground) forums, like other toolkits such as Zeus. Maybe this is in development or the malware is just privately used or shared.

The botnet's Command-and-Control server login page have an image of a character (ChewBacca) from the film series Star Wars.
Cyber Criminal activity associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with online criminals, to hide their bots and the botnet's Command-and-Control real location from the security researchers

Cyber Criminal activity associated with the financial Trojan programs has increased rapidly during the past few months. However, the Tor-based architecture is the favorite one with online criminals, to hide their bots and the botnet's Command-and-Control real location from the security researchers

Wednesday, 18 December 2013

What Happens To Our Body After Drinking CocaCola?

Have you ever wondered what exactly Coca Cola is?

After 10 minutes: Ten tea spoons of sugar contained in a glass of Cola, cause devastating “strike” on the organism and the only cause, by reason of not vomiting, is the phosphoric acid which inhibits the action of sugar.

After 20 minutes: A leap of insulin levels in bloodstream occurs. The liver converts all the sugar into fat.


After 40 minutes: Ingestion of caffeine is finally completed. The eye pupils are expanding. Blood pressure rises, because the liver disposes more sugar into bloodstream. The adenosine receptors get blocked, thereby preventing drowsiness.

After 45 minutes: Body raises production of dopamine hormone, which stimulates the brain pleasure center. Heroin has the same principle of operation.

After 1 hour: Phosphoric acid binds calcium, magnesium and zinc in the gastrointestinal tract, which supercharges metabolism. Releasing of calcium through urine also rises.

After more than 1 hour: Diuretic effect of the drink enters in “the game”. The calcium, magnesium and zinc are removed out of the organism, which are a part of our bones, as well as sodium. At this time we have already become irritable or subdued. The whole quantity of water, contained in a coca cola, is removed by the urine.
Watch the video below :



If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Google Steals Microsoft’s Top Engineer

                                 image of Agüera y Arcas
Microsoft best engineer  Agüera y Arcas will be leaving microsoft and joined google . He work with microsoft since 2006, when the company acquired his Seadragon startup.

Agüera y Arcas went on to become a key software architect, helping develop and build Microsoft’s Bing Maps and the image-stitching Photosynth software. When he moves to Google he will be working on machine learning, reports The New York Times. This could prove a little annoying to Microsoft, who have also been focusing intensley on machine learning recently.

Microsoft no doubt will feel the loss of Agüera y Arcas. The announced depature was revealed only a few days after a new Photosynth preview was shipped to the web. In a statement to The New York Times, a spokesperson from Microsoft said: “he was a great colleague and we wish him the best in his future endeavors.”
It’s not very often that we see Microsoft empolyees leaving to join Google. When Google employed the former vice president, Kai-Fu Lee, Microsoft sued the company, emphasizing the strong rivalry between these two high-profile companies.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Google Glass Updated to allow users to wink and take photos

 Google Glass Updated to allow users to wink and take photos.


Google has updated its Google Glass and added a new feature to , which allows users to take a photo with a "wink of the eye".

Google  claims that this feature is  faster than the camera button or the voice action and has also the ability to do works even when the display is off.

The update to Google Glass, dubbed version XE12, also added a screen lock feature and also the ability to upload and share videos on YouTube.

Google said the wink feature of their Glass could have various other uses in the future.

"Imagine a day where you're riding in the back of a cab and you just wink at the meter to pay," it was said by a firm in Blogspot .

"You wink at a pair of shoes in a shop window and your size is shipped to your door. You wink at a cookbook recipe and the instructions appear right in front of you - hands-free, no mess, no fuss," it added.





Student made bomb threats to get out of a final exam


You like exams ? i don't know your answer is yes or no but mostly peoples don't like exams , Same happened in Harvard University .

Eldo Kim, 20-year-old was charged for sending a hoax email claiming bombs were in four buildings on the Harvard University’s main campus in Cambridge, according to CBS Boston.

On Dec. 16th 2013, University officials, president of the Harvard Crimson, received an anonymous email with a subject "Bombs placed around campus".

"shrapnel bombs placed in:science center, sever hall, emerson hall, thayer hall
2/4. guess correctly. be quick for they will go off soon." The email reads.

University immediately notified the FBI.  After investigation, FBI find out the sender used a Temporary mail service 'Guerrilla Mail' and TOR to hide his identity.

If you don't know how "Tor Browser " Be Used Check The Link Below

http://wwalert.blogspot.com/2013/12/unblock-youtube-and-other-websites-in.html

After further investigation, they University determined Kim accessed the TOR using the Harvard's university wireless network.



If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Tuesday, 17 December 2013

Pakistan Block Mobiles without IMEI

Pakistan Telecommunication Authority not allowing import of cellphones/smartphones that ship without any IMEI or with fake IMEI number.

According to a report published in Dawn.com, PTA has written a letter to Federal Board of Revenue (FBR) and has asked the board to not to clear consignments of cellular phones if the importer has not obtained clearance from PTA.

Importers and manufacturers will now have to submit these specification details to the PTA to get approval under section 29 of the Pakistan Telecommunications (Re-Organisation) Act, 1996.

Pakistan Telecommunication Authority has long been working to block the sale of phones that come without IMEI.

Mobile phone manufacturers, to keep the cost low, ship phones without IMEI. This IMEI, a 14 digit unique identifier of each and every phone, is obtained by mobile phone manufacturers from GSMA against a cost.

It merits mentioning here that import of phones without IMEI is banned in various other regional markets.

Phones without IMEI numbers are usually not traceable and potentially become a threat for National Security and law and order situation in the country.

To further straighten the situation in the country, Pakistan Telecommunication Authority may block all such phones (without IMEI) that are operating in Pakistan.

This development will hamper low-cost Chinese phones, that are notorious for having no IMEI numbers.


If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com

Steal Data With Mic And Speaker


You know that you can steal any type of data from an infected computer ??
hahaha you think that's impossible ?? hmm but it's possible as you know that nothing is impossible, computer scientist's says that it is possible .
A German researcher at Fraunhofer Institute for Communication, Information Processing, and Ergonomics, says that this malware can transmit data using inaudible sounds.
It can steal your keystrokes or confidential data using nothing more just from a normal speaker and microphone even don't need internet connection.
They often suggest don't connect the systems which has sensitive data to Internet so that cyber criminals can't reach them.
But now, It can steal from audio sounds without network connection.  So what now?! Then, Let us remove the audio devices.
The researchers has described their idea in their paper entitled "On Covert Acoustical Mesh Networks in Air".  You can find the research paper here.

If you like this article must share it  with your friends , if you have any problem related to this topic comment below, Keep visiting wwalert.blogspot.com
confidential data
can transmit data using inaudible sounds.
Fraunhofer Institute for Communication, Information Processing, and Ergonomics, -

Facebook tops Google searches for UK in 2013

Facebook tops Google searches for UK in 2013

 

The FaceBook(Social Network) was the most searched-for term on Google UK in 2013. It was also the most asked "what is" question 


Google has Relased that Facebook topped its list of the most searched-for terms of 2013 in the UK.

The FaceBook(social networking) site beat the search company's own YouTube video service to the top spot. Google itself made it in to third place.

Shopping sites has proved popular with web users with eBay, Amazon and Argos all making an appearance in the top 10.

Google also noted that what questions people typed in to its search engine and from this they compiled a top "what is" list. Facebook topped this too with a substantial number of UK-based searchers who were wanting to know what the social networking site was.



The second question was, "What is love?"

Other popular "what is" topics included searches for energy, cancer and blood pressure. Perhaps reflecting economic news throughout the year "What is the minimum wage" and "What is Universal Job match" made it in to the top 10 most-asked. Universal Job match is a government-run jobs-listing site.

Explaining the position of Facebook at the top of the most searched and "what is" lists, Chris Green - an analyst at the Davies Murphy Group consultancy - said that: "Facebook has now established itself very well as a hub on the internet, making it a destination for surfers to do multiple tasks such as communications, shopping, gaming,  information gathering. and photo-sharing.

Google's Top 10 search terms

1. Facebook
2. YouTube
3. Google
4. Hotmail
5. Ebay
6. BBC News
7. Amazon
8. Daily Mail
9. Argos
10. Yahoo






 

Monday, 16 December 2013

Pirate Bay relocates to Peru while working on ‘domain-irrelevant’ browser



The Pirate Bay has moved again, this time to a .Pe domain based in Peru. As the battle to take down the world’s largest BitTorrent site continues, the website says it is developing a new system which will make domain names completely “irrelevant.”
The .Pe domain is the file-sharing website’s third domain in just a matter of days. The website was operating under thepiratebay.sx, based in Sint Maarten, until it was seized by authorities last week, TorrentFreak reported. But just hours after the seizure, thousands of users breathed a collective sigh of relief as the website resurfaced under a new .AC domain, based in the Ascension Islands – a UK controlled territory.
But the stopover on the isolated volcanic island did not last long; The Pirate Bay set sail for safer shores on Monday, finding a new docking place in the South American republic of Peru. The website underlined earlier that its landing at thepiratebay.ac was just a temporary measure, as it feared it would soon face the same problems that it faced under Sint Maarten’s .SX domain.
The website’s operators said earlier that along with Peru, it had a number of options, for its new domain. They added, however, that they do not plan to be on the run permanently.
The website’s team is working on updating its massively popular web browser, allowing users the opportunity to store and share files without the need for central hosting and domain names, TorrentFreak reported.
Addressing Dutch anti-piracy organization BREIN “and friends,” The Pirate Bay warned that while shutting down domains may currently be an irritant, that loophole will not be open forever.
“They should wait for our new PirateBrowser, then domains will be irrelevant,” the source told TorrentFreak. “Once that is available then all links and sites will be accessible through a perfectly legal piece of browser software and the rest of it will be P2P, with no central point to attack via the legal system.”
The new system will reportedly appear as independent software and Firefox and Chrome plugins.
Meanwhile, The Pirate Bay co-founder Gottfrid Svartholm Warg, known under the alias ‘Anakata,’ is facing hacking charges. The 29-year-old has been jailed in Denmark since November, after being extradited from Sweden.
His mother, Kristina Svartholm Warg, described the conditions her son is being kept in as “torture.” In an interview with RT, she said that Svartholm Warg is denied access to books, media, and computers, and is banned from communicating with other inmates. She personally believes that her son is innocent.
Hacktivist group Anonymous launched an online campaign to protest against the prison’s treatment of Svartholm Warg, calling it “wholly unacceptable” and “inhumane.”
The group demands fair treatment of Svartholm Warg and an end to his isolation. “He is not a terrorist,” it said in a statement.
The group called on supporters to join them on Monday in a ‘tweetstorm,’ using the hashtag #Freeanakata.

Website of North Wales Transport Committee Taith Hacked by Pakistani

Taith website hacked by Pakistani
Khan, who claims to be a Pakistani hacker living in Italy, has breached and defaced the official website of Taith (taith.gov.uk), a joint committee of six county authorities from North Wales that handles transport and travel planning.

The attacker has defaced the Taith website’s main page with a protest message against the intention of some UK officials to ban Muslim girls and young women from wearing veils (hijab) in public places.

In addition to the Taith website, the hacker has also targeted eight other websites belonging to various UK companies, including a model agency, a car service firm, and a couple of inns. In each case, the attacker claimed to have deleted their databases.

At the time of writing, all the websites have been restored. Mirrors of the defacements are available on Khan’s zone-h.org profile.

It’s worth noting that this isn’t the first time when the hacker targets government websites. Back in July, he managed to deface the English website of Russia’s Federal Customs Service.

Domain Registery Of Gambia Hacked

Today Official Domain Registery of Gambia Stamped by LeeTs-PoinT.net &
TiGER-M@TE. Hacker Don't Deface The Main Index.php But They Add One File With the Name TM.php

Message On The Hacked Site :


Infected Site: http://www.nic.gm/TM.php

Mirro : http://www.add-attack.com/mirror/450011/nic.gm/tm.php

Local Stack buffer overflow Vulnerability in Quickheal antivirus


A Security researcher from Vulnerability Lab has discovered a local stack buffer overflow vulnerability in the QuickHeal AntiVirus 7.0.0.1 (b2.0.0.1) Pro software.

Researcher says improper handling of buffers in the 'pepoly.dll' module on certain conditions leads to a stack overflow.  Disabling the Core scanning server service could trigger the vulnerable point and crash the system.

"The vulnerability is located in the generated PE file `*.text` value. It can be overflowed by manipulating import of a malicious PE file.The issue is a classic (uni-code) stack buffer overflow"


A local attacker with low privilege can exploit this vulnerability to take control of the system or simply crash the quickheal software system process.  The security risk of this vulnerability has been estimated as medium.

Researcher also provided a solution to fix the vulnerability: "It can be patched by a secure filter and size restriction of the PE file name text flag".

The proof of concept is available Here.

Via : ehackingnews
Sponsored Links
A Security researcher from Vulnerability Lab has discovered a local stack buffer overflow vulnerability in the QuickHeal AntiVirus 7.0.0.1 (b2.0.0.1) Pro software.
 
Researcher says improper handling of buffers in the 'pepoly.dll' module on certain conditions leads to a stack overflow.  Disabling the Core scanning server service could trigger the vulnerable point and crash the system.

"The vulnerability is located in the generated PE file `*.text` value. It can be overflowed by manipulating import of a malicious PE file.The issue is a classic (uni-code) stack buffer overflow"


A local attacker with low privilege can exploit this vulnerability to take control of the system or simply crash the quickheal software system process.  The security risk of this vulnerability has been estimated as medium.

Researcher also provided a solution to fix the vulnerability: "It can be patched by a secure filter and size restriction of the PE file name text flag".

The proof of concept is available here.
- See more at: http://www.ehackingnews.com/2013/12/local-stack-buffer-overflow.html#sthash.uejmOFZI.dpuf

Use Facebook on Phones for Free With Mobilink Jazz, Jazba



Mobilink  announced the re-launch of Facebook Zero, a light-weight Facebook interface for customers to get in touch with their friends and family on Facebook without any charges.
All Mobilink prepaid customers can use Facebook Zero (0.facebook.com) on their mobile phones without paying anything.
Facebook Zero is a project by Facebook in which it partners with network carriers, around the world, to offer their customers a light weight version of Facebook at no charge.
Customers need to on to 0.facebook.com from their phone browsers (on supported networks, Mobilink in this case) and get connected to the free and fast version of Facebook.
Facebook Zero includes all key features of the standard Facebook mobile site, and allows you to update your status, view your News Feed, Like or Comment on posts, send and reply to messages, or write on your friends’ Wall just as you do on regular Facebook.com.
Mobilink had earlier launched Facebook Zero in 2010, which they re-launched now with enhanced features. Ufone also offered Facebook Zero for limited time.
The following Terms & Conditions apply to the usage of Facebook Zero offer:
  • This service is available for Mobilink Prepaid subscribers only, including all Jazz & Jazba subscribers.
  • This service is not available for Blackberry devices.
  • Facebook Zero can be accessed only via default internet browsers on handsets and below mentioned versions of Opera Mini.
  • Use jazzconnect.mobilinkworld.com for using Facebook Zero. Subscribers using jazzwap.mobilinkworld.com may get charged.
  • Facebook Zero URLs should be entered without writing www and https before these.
  • Facebook Zero should not be accessed via proxy server.
  • Though viewing photos, videos or external link is just one click away, standard GPRS charges as per package plan will apply.
  • Subscriber may get charged for any mobile phone applications consuming data in background. This can be controlled by turning off such applications.
  • This is a limited time offer.
  • Supported Browsers:
  • J2ME Opera Mini 44.2.22714
    J2ME Opera Mini 55.1.22296
    J2MEOpera Mini 6All versions
    Android6.0.24212
    S605.1.22783
    iOS6.X

Sony Announces Pen-Drives for Android Phones

Sony 2 in 1 USB open 1024x866 Sony Announces Pen Drives for Android Phones
Japanese Electronics maker, Sony, has launched the world’s first pen drive, which can be connected to your Android smartphone or tablet.
This new drive is a “2-in-1 device”, with MicroUSB and standard USB2.0 plugs into a tiny package, allowing users to connect it with both desktop computers and smartphones.
It is devised to grant flexibility to the Android users by making the file transfer between mobile devices simple and brisk, without the requisite of any Wireless Connectivity.
In order to make it work with your device, your phone must need to run Android 4.0 or higher since it is explicitly intended for devices with Android’s On The Go (OTG) connectivity, which is usual in most phones running Android 4.0 Ice Cream Sandwich and above.
It will work without any added drivers, however it comes with an app which is available to download from Google Play Store.
“These new drives combine convenience, peace of mind and performance and are perfect for mobile multi-tasking.”, Viviano Cantu – director of consumer media marketing – said.
These Dual-USB pen drives have a Black base, but their locking caps are available in three different colors including white, black and blue, with the capacities 8, 16 and 32GB.
According to Sony, the flash drives will hit global markets in January next year.
The new USB flash drives will be available January 2014 at Sony retail stores (www.store.sony.com) at the following prices:
  • 8 GB – $19.99
  • 16 GB – $29.99
  • 32 GB – $62.99
Via Sony Official Blog

Check Who Use Your Wifi.

Check the devices related to your router.

The first factor you would like to try to to is login to your router's body console by typewriting its scientific discipline address directly into the browser address bar -- usually 192.168.0.1 or 192.168.1.1 depending on that router you've got. If you do not recognize your router's default address scrutinize this guide or just head to the prompt (Start ; Run/Search for cmd) and enter ipconfig. The address you would like ought to be next to Default entrance below your native space association.

Alternatively, if you're on a waterproof, you'll realize the default address by planning to Network below System Preferences. It ought to be listed right next to "Router:" if you're exploitation local area network, or by clicking on "Advanced…" and heading to the "TCP/IP" tab if you're exploitation Wi-Fi. Next, purpose your browser thereto address and enter your login details -- if you haven't modified the default settings it ought to be a mix of "admin" and "password" or blank fields. Here's a default username and arcanum list (PDF) you would possibly realize helpful, however we have a tendency to advocate you alter this after.




Once within your router's body console search for a vicinity associated with connected devices or wireless standing. In my previous DIR-655 from D-Link it's obtainable beneath standing Wireless however you will find it as "Attached Devices" in Netgear routers, beneath DHCP shoppers Table on Linksys routers, "Device List" if you're victimisation the Tomato firewall, and so on.


This should give a table with the ip, mack address and different details of each device presently connected to the router. make certain list against your gear to seek out any intruders. you'll be able to ascertain the MAC/IP address of your computers by getting to the prompt once more and getting into 'ipconfig /all'. The mack address are going to be shown because the physical address. i will allow you to figure it out for mobile devices like smartphones and media players since i can not presumably list all choices.


Taking action


The best and simplest resolution is to line up a strong password WPA2 or WPA -- WEP is extremely straightforward to crack thus avoid that if doable. There area unit another ways you'll be able to use to support security, like shift off the SSID broadcast (which prevents it from advertising the name of your network to near  Wi-Fi devices) or setup a filter for allowed or blocked devices by waterproof address. It will not stop the foremost determined interloper however it'll slow him down.

That should be over enough for many users however if you wish to really capture who's been breaking into your network it's doable to pinpoint his physical location employing a tool referred to as MoocherHunter. you will need to burn a Live CD in addition your laptop computer with and walk around to trace down unauthorized wireless purchasers. consistent with the program's description, it detects traffic on your network and might notice the supply inside a pair of meters accuracy.

Facebook can Record everything you type


Jennifer Golbeck, Head of the HCI Lab and Teacher at the University of Maryland, States that these discarded thoughts don’t completely discard. 

Instead Facebook is using a code that keeps track of every time you delete a would-be message and sends metadata about that message back to its own data bases.

A new article written by Facebook data scientists and Ph.D. student Sauvik check the reasons for Facebook users’ “self-censorship” and  look at millions of users’ Deleted status, posts on other friend’s timelines, and comments on friend's’ posts.

Facebook is maintaining a record of all the data with self-censored posts such as when it was almost posted and when it was set to be posted on a friend’s page or on Wall. 

Developer say that Facebook desire to understand all the reasons that people decide against posting because the company “loses value from the lack of content generation” every time a would-be post get discard.

Golbeck say that: “Facebook’s want to get users to post absolutely everything that comes into their mind is somewhat perverse because the company is essentially encouraging the users to share each and everything  with their friends.


Facebook considers your thoughtful discretion about what to post , because its valueable from Facebook and from other users, she writes. Facebook records those all unposted thoughts to better understand there users, in order to build a system according to user's behavior.

Sunday, 15 December 2013

Hacker fined with $183,000 for just one-Minute of DDoS attack

Hacker fined with $183,000 for just one-Minute of DDoS attack  

Eric Rosol, A 38-year-old hacker who joined an Anonymous hacker attack for just one minute has been sentenced to two years of federal probation and ordered to pay $183,000 fine. Yes you read right! $183,000 fine for just 1 Minute of DDoS attack.

 In 2011, Eric participated in a distributed denial-of-service (DDoS) attack organized by hacker collective Anonymous against the servers of Koch Industries. The DDoS attack was organized in opposition to Koch Industries’ reported weakening of trade unions. He used a software called a Low Orbit Ion Cannon Code, LOIC is a popular DDoS tool used by anonymous hackers and other hackers to perform the DDoS attack. Rosol pleaded guilty and was agreed to direct pay for the losses as a result of the attack on the company website i.e. around $5,000 only, but Koch Industries had argued that it hired a consulting group to protect its web sites at a cost of approximately $183,000. Unfortunately, the company website was knocked offline for just 15 minutes and now Eric has to pay the bill of the Cyber Security consulting group. Similar crimes have also carried heavy punishments i.e. Jeremy Hammond, 28, Anonymous group member was sentenced last month to 10 years in prison for hacking various government agencies and a global intelligence company - Stratfor.

Hacker fined with $183,000 for just one-Minute of DDoS attack Mohit Kumar, The Hacker News - Wednesday, December 11, 2013 StumbleUpon4 Reddit6 32 669 534 Two year in Prison and 183000 fine for One Minute DDoS attack Eric Rosol, A 38-year-old hacker who joined an Anonymous hacker attack for just one minute has been sentenced to two years of federal probation and ordered to pay $183,000 fine. Yes you read right! $183,000 fine for just 1 Minute of DDoS attack. In 2011, Eric participated in a distributed denial-of-service (DDoS) attack organized by hacker collective Anonymous against the servers of Koch Industries. The DDoS attack was organized in opposition to Koch Industries’ reported weakening of trade unions. He used a software called a Low Orbit Ion Cannon Code, LOIC is a popular DDoS tool used by anonymous hackers and other hackers to perform the DDoS attack. Rosol pleaded guilty and was agreed to direct pay for the losses as a result of the attack on the company website i.e. around $5,000 only, but Koch Industries had argued that it hired a consulting group to protect its web sites at a cost of approximately $183,000. Unfortunately, the company website was knocked offline for just 15 minutes and now Eric has to pay the bill of the Cyber Security consulting group. Similar crimes have also carried heavy punishments i.e. Jeremy Hammond, 28, Anonymous group member was sentenced last month to 10 years in prison for hacking various government agencies and a global intelligence company - Stratfor.

Read more: http://thehackernews.com/2013/12/Anonymous-hacker-sentenced-ddos-attack.html