Tuesday, June 15, 2010

SPOOFING DIMENSIONS



Spoofing is a engage in a profession whereby the user on the internet attempts to hide its IP address to conceal its true identity. Many crackers steal databases of credit cards or other sensitive information.

The concept of IP spoofing, was initially discussed in academic circles in the 1980’s.While the popularity of such cracks has decreased due to the coming to the end of the services they exploited, spoofing can still be used and needs to be addressed by all security administrators.
For example Buffalo Spammer is an infamous spammer who was accused of sending more than 800 million unrequested emails from illegal earth link accounts.
He also stole credit cards and identities to fraudulently by 343 earth link accounts to send shady and unsolicited mails to different people. On long investigation the identity of this spammer was found to be that of Mr. Howard Carmack who sent out millions of emails that included advertisements for computer virus scripts, software for bulk mailing and list of addresses to be used by other spammers. He was arrested in New York.


Friday, June 11, 2010

WILD WEST FEEL TO THE INTERNET



Cybersquatting was born by internet.If you aim to type post-gazzette.com,you will find yourself in a site with ticket,hotel and different classification of ads.If you go to this site:whois.com,you can see t is registered to a guy named Brad in Surrey, British Columbia.Brad earn a great amount of money by linkage to ad sites.His web popularity was got by post-gazette.com ,and by those persons such as Techman which is Fumble-fingered .it is is a typosquatting.Domain name was a sort of the wild west,any registration can be accomplished by any one.this kind of activity was announced  illegal under the Anticybersquatting Consumer Protection Act passed by Congress in 1999.



 

Tuesday, June 8, 2010

CYBERSTORM III



By: Abbas Saghali

Previous cyberstorm  was related to attacks to networks in internet or spread malicious software on different systems in government area.Cyberstorm III is expected to aim attacks against  the underlying control systems of The US  and  their critical infrastructure , dams and systems that protect energy facilities.Philip Reitinger, director of the National Cybersecurity Center at the Department of Homeland Security in the US believed that risk of community and community nations is growing regarding these attacks and global economy seriously address this problem.

Thursday, June 3, 2010

PROBLEMATIC ISSUE OF DATA

As the new portable devices such as Mobile phones, Flash memories and Mp3 players are getting more and more popular, a new security threat is showing up in the networks where the employees are bringing such the things to their workplace for their personal use.
Recently two computer scientists from University of Strathclyde, in Glasgow published an article in “International Journal of Electronic Security and Digital Forensics” which shows the illegal usage of these new portable devices in the workplace computing systems. These two researchers are introducing two methods in their article to decrease the numbers of data theft and malwares distribution via these devices into the computer networks.

The main problem with these devices is because of their large capacity and web connectivity capabilities which let even the normal users to carry huge amounts of data in a very small portable device and also can transfer them to internet or send them as email with Wi-Fi.Their suggestion to the organizations is that they should ban these portable devices to be brought to the workplace which contains valuable and confidential information by their employees. But as we know there is no possible way to remove the data leakage in the workplace completely.
sciencedaily

Sunday, May 23, 2010

SHRINK-WRAP AND CLICK WRAPP IN ONE-CLICK-VIEW

You can observe all the time on our computers a box that includes the word "ACCEPT" or agree. This occurs when you purchase or download things.Have you ever ask yourself what do these words mean?why we should mention them ?and what will happen if you ignore to mention?
The date of These type of  agreements  back to the early days of home computers, when software were introduced to the markets.. Whether you realized it or not, by simply tearing off the plastic wrapper, you were accepting the terms and conditions of the software company. Those became known as "shrink-wrap" agreements. Now they're called "click-wrap" agreements -- taking effect with the click of a mouse.
As a case let me point out Concord business man"Terry Shoaff".he says when he aimed to  log onto his Bank for checking his accounts, "This pop-up blocker came in, two and a half pages of single-spaced, typewritten, no spacing, no paragraphs. I mean, it wasn't an everyday type of explanation or contract that the average person would be able to respond to without having legal council."

Shoaff's problem? Until he clicked "ACCEPT," his online account was blocked. So he drove to his local branch for an explanation.  




  • Step 2
    Place your item in between two pieces of shrink wrapped evenly. You can also place your item in the gift bag if you choose to use gift bag.



  • Step 3
    Start shrink wrapping with your hair dryer from back to front. That way it pulls from the front and it will be completely flat on the front side. It can take a long time depending on the object to get it completely shrink wrapped so be patient. You either shrink wrapped it completely closed or if you doing a basket tie the top with a ribbon.



  • Tuesday, May 18, 2010

    FACEBOOK THIEVES


    Social networks like Facebook are getting very popular nowadays and most of the people spend their times to communicate with their friends and family members via this virtual community. A new weblog named FBHive created a discussion board for the users to introduce the security gaps in Facebook. According to the recent news which this weblog alerted the users about that is a new security hole in Facebook which will let the hacker to view the basic information of the users such as Location, Gender, Relationship status and … .

    In the first look it doesn’t seem too much critical but it will be a problem when you find out that this basic information can be the password hint for user’s accounts. The same problem was reported by this blog last year which was solved by the Facebook several months ago.
    This weblog tries to introduce such the problem to Facebook security team to fill the gaps as soon as possible.

    Source:
    http://news.cnet.com/8301-13577_3-10270002-36.html