Sunday, May 23, 2010

SHRINK-WRAP AND CLICK WRAPP IN ONE-CLICK-VIEW

You can observe all the time on our computers a box that includes the word "ACCEPT" or agree. This occurs when you purchase or download things.Have you ever ask yourself what do these words mean?why we should mention them ?and what will happen if you ignore to mention?
The date of These type of  agreements  back to the early days of home computers, when software were introduced to the markets.. Whether you realized it or not, by simply tearing off the plastic wrapper, you were accepting the terms and conditions of the software company. Those became known as "shrink-wrap" agreements. Now they're called "click-wrap" agreements -- taking effect with the click of a mouse.
As a case let me point out Concord business man"Terry Shoaff".he says when he aimed to  log onto his Bank for checking his accounts, "This pop-up blocker came in, two and a half pages of single-spaced, typewritten, no spacing, no paragraphs. I mean, it wasn't an everyday type of explanation or contract that the average person would be able to respond to without having legal council."

Shoaff's problem? Until he clicked "ACCEPT," his online account was blocked. So he drove to his local branch for an explanation.  




  • Step 2
    Place your item in between two pieces of shrink wrapped evenly. You can also place your item in the gift bag if you choose to use gift bag.



  • Step 3
    Start shrink wrapping with your hair dryer from back to front. That way it pulls from the front and it will be completely flat on the front side. It can take a long time depending on the object to get it completely shrink wrapped so be patient. You either shrink wrapped it completely closed or if you doing a basket tie the top with a ribbon.



  • Tuesday, May 18, 2010

    FACEBOOK THIEVES


    Social networks like Facebook are getting very popular nowadays and most of the people spend their times to communicate with their friends and family members via this virtual community. A new weblog named FBHive created a discussion board for the users to introduce the security gaps in Facebook. According to the recent news which this weblog alerted the users about that is a new security hole in Facebook which will let the hacker to view the basic information of the users such as Location, Gender, Relationship status and … .

    In the first look it doesn’t seem too much critical but it will be a problem when you find out that this basic information can be the password hint for user’s accounts. The same problem was reported by this blog last year which was solved by the Facebook several months ago.
    This weblog tries to introduce such the problem to Facebook security team to fill the gaps as soon as possible.

    Source:
    http://news.cnet.com/8301-13577_3-10270002-36.html

    Thursday, May 13, 2010

    WELCOME TO HACKER SPACE FESTIVAL

    The first and second  hacker space festival was held  in France in  June 2008 and 2009.It should be suggested that during  festival  week in 2008, about 300 people came to visit and participate. This festival was  A good mix of Art, Hack, Politics and even Religion (Worship the Hot Potato!) along with excellent self-organization make very good memories.By regarding success of this festival the next ceremony has been considered split in three monthes of April ,May and july in this year.

    Blogs,Press,Photos and videos

    Saturday, May 8, 2010

    UNAUTHORIZED ACCESS TO SARAH PALIN'S YAHOO PASSWORD



    After guessing sarah palin's Yahoo password  last week,her former student in U-T Knoxville  was convicted to unauthorized access in a federal jury .NEWS +  VIDEO
    Professor Joseph Kizza believes :"People tend to use very simple passwords, like their dogs names or daughters and sons names and birthdays and so on".Kizza mentioned that good passwords have three features including length of eight characters or more,Complexity and combination, like upper and lower case, symbols, and numbers. Kizza added :"t is highly unlikely that somebody who has come close to password trying to guess it would know the first word, the first character is in capital letters, the next one is lower and so on and so on".
    Professor Kizza says that due to professional using of internet somebody needs 15-passwords built one solid string, and then cycling the back to the front to create new key.

    PUBLIC VIDEO FOR UNAUTHORIZED ACCESS NEWS


    Tuesday, May 4, 2010

    A KIND OF SPOOFING PROBLEM



    Spoofing is a engage in a profession whereby the user on the internet attempts to hide its IP address to conceal its true identity. Many crackers steal databases of credit cards or other sensitive information.

    The concept of IP spoofing, was initially discussed in academic circles in the 1980’s.While the popularity of such cracks has decreased due to the coming to the end of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.

    For example Buffalo Spammer is an infamous spammer who was accused of sending more than 800 million unrequested emails from illegal earth link accounts.

    He also stole credit cards and identities to fraudulently by 343 earth link accounts to send shady and unsolicited mails to different people. On long investigation the identity of this spammer was found to be that of Mr. Howard Carmack who sent out millions of emails that included advertisements for computer virus scripts, software for bulk mailing and list of addresses to be used by other spammers. He was arrested in New York.

    Saturday, May 1, 2010

    COMPUTER VIRUS

    Dr Gasson, A computer specialist at University of Reading tested a new threat for human beings recently. As using the micro-chips in different parts of human bodies to improve their health is becoming worldwide this researcher tried to implant one of these chips to his body to see how much vulnerable could it be in case of malfunction of the chip by a computer virus.

    Nowadays using these micro computers in medical science makes the scientist to be worry about the threats that these electronic devices might have for human beings. Dr Gasson attached one of these micro-chips to his hand to make a secure connection with his university building and his mobile phone. As he mentioned when this device implanted in his body it became a part of his body and whatever happened to the function of this device will affect him. The results of his experience as the first human being who has infected by a computer virus were presented at the IEEE International Symposium on Technology and Society in Australia in June 2010.
    This scientist threatens us about the dangers we might encounter in the near future because of using such the technologies to enhance ourselves.