rss
@rohhy

WikiLeaks backlash: The first global cyber war has begun

As Julian Assange is held in solitary confinement at Wandsworth prison, the anonymous community of hacktivists takes to the cyber battlefields..

He is one of the newest recruits to Operation Payback. In a London bedroom, the 24-year-old computer hacker is preparing his weaponry for this week’s battles in an evolving cyberwar. He is a self-styled defender of free speech, his weapon a laptop and his enemy the US corporations responsible for attacking the website WikiLeaks.

He had seen the flyers that began springing up on the web in mid-September. In chatrooms, on discussion boards and inboxes from Manchester to New York to Sydney the grinning face of a Guy Fawkes mask had appeared with a call to arms. Across the world a battalion of hackers was being summoned.

“Greetings, fellow anons,” it said beneath the headline Operation Payback. Alongside were a series of software programs dubbed “our weapons of choice” and a stark message: people needed to show their “hatred”.

Like most international conflicts, last week’s internet war began over a relatively modest squabble, escalating in days into a global fight.

Before WikiLeaks, Operation Payback’s initial target was America’s recording industry, chosen for its prosecutions of music file downloaders. From those humble origins, Payback’s anti-censorship, anti-copyright, freedom of speech manifesto would go viral, last week pitting an amorphous army of online hackers against the US government and some of the biggest corporations in the world.

Charles Dodd, a consultant to US government agencies on internet security, said: “[The hackers] attack from the shadows and they have no fear of retaliation. There are no rules of engagement in this kind of emerging warfare.”

The battle now centres on Washington’s fierce attempts to close down WikiLeaks and shut off the supply of confidential US government cables. By Thursday, the hacktivists were routinely attacking those who had targeted WikiLeaks, among them icons of the corporate world, credit card firms and some of the largest online companies. It seemed to be the first sustained clash between the established order and the organic, grassroots culture of the net.

But the clash has cast the spotlight wider, on the net’s power to act as a thorn not only in the side of authoritarian regimes but western democracies, on our right to information and the responsibility of holding secrets. It has also asked profound questions over the role of the net itself. One blogger dubbed it the “first world information war”.

At the heart of the conflict is the WikiLeaks founder, the enigmatic figure of Julian Assange – lionised by some as the Ned Kelly of the digital age for his continued defiance of a superpower, condemned by his US detractors as a threat to national security.

Calls for Assange to be extradited to the US to face charges of espionage will return this week. The counteroffensive by Operation Payback is likely to escalate.

The targets include the world’s biggest online retailer, Amazon – already assaulted once for its decision to stop hosting WikiLeaks-related material – Washington, Scotland Yard and the websites of senior US politicians. There is talk of infecting Facebook, which last week removed a page used by pro-WikiLeaks hackers, with a virus that spreads from profile to profile causing it to crash. No one seems certain where the febrile cyber conflict will lead, only that it has just begun.

London

At 9.15am last Tuesday a thin, white-haired figure left the Frontline Club, the west London establishment dedicated to preserving freedom of speech, and voluntarily surrendered to police. After two weeks of newspaper revelations concerning countries from Korea to Nigeria, and figures such as Silvio Berlusconi and Prince Andrew, a warrant for Assange’s arrest had just been received by British police. It was from Swedish prosecutors eager to question him on unrelated allegations of rape.

The response to WikiLeaks’ cable release had been savage, particularly in the US. Mike Huckabee, a former Arkansas governor, said those who passed the secrets to Assange should be executed. Sarah Palin demanded Assange be hunted in the same way an al-Qaida operative would be pursued. The US attorney general Eric Holder ordered his officials to begin a criminal investigation into Assange with the intention of putting him on trial in the US. News of his arrest, even on unrelated charges, pleased the US authorities. “That sounds like good news to me,” said Robert Gates, US secretary of defence.

Yet even as Assange prepared to appear in a London court last week, an unlikely alliance of defenders had begun plotting to turn on the forces circling WikiLeaks. They were beginning to attack Amazon, which had been persuaded to sever links with WikiLeaks by Joe Lieberman, who heads the US Senate’s homeland security committee; they also hit every domain name system (DNS) that broke WikiLeaks.org’s domain name: Mastercard, Visa and Paypal, which stopped facilitating donations to the site, and the Swiss post office which froze WikiLeaks’ bank account.

Operation Payback was hitting back alongside a fledgling offshoot, Operation Avenge Assange, both operating under the Anonymous umbrella. These are a loose alliance of hackers united by a near-obsessive desire for information libertarianism who congregate on the website 4Chan.org.

The cyberwar did not only involve obvious symbols of authority, though. For days, from their darkened chatrooms, the Anonymous ones had been watching a hacker called the Jester who seemed to be co-ordinating a series of attacks on internet service providers hosting WikiLeaks. They had noticed the Jester’s pro-censorship credentials, deducing he must be receiving help. Speculation mounted that the Jester was a shadowy conduit working at the behest of the US authorities. “We wondered who was really behind his anti-WikiLeaks agenda,” said a source.

Attempts to railroad WikiLeaks off the net quickly failed. Removing its hosting servers has increased WikiLeaks’ ability to stay online. More than 1,300 volunteer “mirror” sites, including the French newspaper Libération, have already surfaced to store the classified cables. Within days the WikiLeaks web content had spread across so many enclaves of the internet it was immune to attack by any single legal authority.

In some respects, WikiLeaks has never been safer or as aggressively defended. As Assange was remanded in custody and taken to Wandsworth jail, Anonymous vowed to “punish” the institutions that had axed links with the website under pressure from the US authorities. The websites of Visa, Mastercard and PayPal were brought down; so too the Swedish government’s.

One Anonymous hacker said: “I’ve rambled on and on about the ‘oncoming internet war’ for years. I’m not saying I know how to win. But I am saying the war is on.”

Stockholm

Unsurprisingly, the timing of Assange’s arrest and aspects of Sweden’s initial handling of the sexual allegations prompted his lawyer Mark Stephens to denounce the moves as politically motivated. A computer hacker himself, Assange, 39, achieved both instant notoriety and adulation when WikiLeaks published batches of damaging US files relating to the Afghan war in July. This fame led him to Stockholm a month later to deliver a lecture entitled: “Truth is the first casualty of war.” It was a sellout. One leftwing commentator likened it to “having Mick Jagger in town”.

That night – 14 August – Assange stayed with the conference organiser at her flat in Södermalm, a former working class area of the city centre that has become Stockholm’s equivalent of London’s Islington. Three days later, in keeping with his habit of regularly changing addresses, Assange stayed in Enköping, a town 100 miles from Stockholm, with another woman who had also attended his lecture on the importance of truth in a war zone.

Assange left Sweden on 18 August and the women went together to the police the next day. According to Claes Borgström, their lawyer, the women did not know each other before going to the police. Initially, he said, the women wanted some advice, but the police officer concluded a crime had been committed and contacted the duty public prosecutor.

In court last week Assange was alleged to have had sex with unlawful coercion with a woman who was asleep and to have sexually molested the other by having sex without a condom.

In Sweden, among the country’s community of hackers and left-leaning political activists, the timing is viewed as coincidental rather than conspiratorial.

“The Americans are very lucky indeed that Assange screwed around in Sweden, a society which takes rape allegations very seriously,” said Åsa Linderborg, culture editor of the leftwing Aftonbladet tabloid. Film-maker Bosse Lindquist, whose WikiLeaks investigation will be broadcast on Swedish TV tonight, and who has spent many hours with Assange over the past few months, said Assange’s attitude to women did not seem in any way striking.

“If you look at the two prosecutors involved in investigating the rape allegations, they are not types you would imagine bowing to any kind of pressure from, say, the Swedish government or the United States.”

A senior civil servant, who requested anonymity, also dismissed allegations of political plotting against Assange, arguing that Swedish culture is often misunderstood. “Swedes do not have an iconoclastic tradition in which you build people up then demolish their reputations. Even when people are celebrities, we accept that they may have questionable private lives. Swedes are capable of seeing the advantages of WikiLeaks while conceding that Assange may have unsavoury morals between the sheets.”

Linderborg, though, says there is a widespread sense in Sweden that Assange’s rise to fame fuelled his libido and ego.

“Plenty of women are attracted by his underdog status and the supposed danger of spending time with him. He has several women on the go at once. One person told me he screws more often than he eats,” Linderborg said.

Of course, given the nature of the web, the allegations have triggered a series of attacks on both women’s characters with lurid claims of “women who cry rape” and “bitches trying to send an innocent man to prison”.

Operation Payback

Those monitoring the chatrooms used by Operation Payback say its hackers have set aside the sexual allegations, instead concentrating their efforts on amassing greater potency for the next phase of the WikLeaks fightback. The weapons deployed last week were “denial of service” attacks in which online computers are harnessed to jam target sites with mountains of requests for data, knocking them out of commission.

The initial attacks against the Swiss PostFinance required about 200 computers, according to one Anonymous source. Yet within a day hackers were able to recruit thousands more pro-WikiLeaks footsoldiers. By the time the Visa and Mastercard websites were disrupted last Wednesday, close to 3,000 computers were involved.

Anonymous leaders began distributing software tools to allow anyone with a computer to join Payback. So far more than 9,000 users in the US have downloaded the software; in second place is the UK with 3,000. Germany, the Netherlands, Canada, France, Spain, Poland, Russia and Australia follow with more than 1,000. The 11th country embroiled in the attacks is Sweden, where WikiLeaks’s massive underground servers are housed, with 75 downloads.

Sean-Paul Correll, a cyber threat analyst at Panda Security, who has monitored Operation Payback since its conception, said it was impossible to “profile” those involved. “They are anonymous and they are everywhere,” he said. “They have day jobs. They are adults and kids. It is just a bunch of people.” Middle-class professional members working alongside self-styled anarchists.

Ostensibly, Anonymous is a 24-hour democracy run by whoever happens to be logged on; leaders emerge and disappear depending on the target that is being attacked and the whims of members. Correll said: “This group does not exist with some sort of hierarchy. It exists with a few organisers but these can change at any time. That gives the group great power in that it is impossible to trace and define. At the same time it is also a source of weakness as its actions can be unfocused.”

Ideas are floated on internet bulletin boards, whose location moves daily to evade detection. Ultimately a proposal hits a democratic “tipping point” and action is taken.

A major test of Payback’s mounting firepower will be Amazon, given the size of its servers. The attempt to attack the site last Thursday was half-hearted, but nevertheless audacious. Now sources estimate they would need between 30,000 and 40,000 computers to hurt Amazon and there is a growing feeling among hacktivists that it could happen. If it does, the retailer could lose millions of dollars during the Christmas season.

So far, though, most of the attacks have been principally designed to register protest rather than destabilise companies financially, opting for their public websites rather than their underlying infrastructure.

Two of the internet’s most important social networking sites – Twitter and Facebook – are also becoming targets of elements within Anonymous.

Twitter upset hackers last week by removing the Anonymous account – which had 22,000 followers – amid speculation that it was preventing the term #wikileaks appearing on its trending topics. The Anonymous page on Facebook was removed for violating its conditions, a move that has similarly annoyed a cohort of hackers. Both Facebook and Twitter have won praise in recent years as outlets for free speech, yet both also harbour corporate aspirations that hinge on their ability to serve as advertising platforms for other companies.

Their use by Anonymous to direct people planning attacks has, according to many analysts, placed both in a difficult position. Facebook, which still has sites eulogising murderer Raoul Moat and Holocaust deniers, said it drew the line on groups that attack others, a bold move considering the site’s WikiLeaks page boasts more than 1.3 million supporters. Any evidence that both sites yielded to US pressure and the gloves would be off. So too for any organisation that yields to American demands over WikiLeaks.

Evgeny Morozov, author of The Net Delusion, a book which argues the internet has failed to democraticise the world successfully, believes the attacks are already viewed by Washington “as striking at the very heart of the global economy”.

Another emerging target in the weeks ahead is the US government itself. For a brief time last Tuesday, senate.gov – the website of every US senator – went down. Cyberguerillas claim it is a possible sign of things to come.

The future

The trajectory of the WikiLeaks controversy is almost impossible to predict. On Tuesday Assange will attend his next bail hearing. Although supporters have stumped up £180,000, it is expected bail will be refused, pending a full hearing of Sweden’s extradition request. However his lawyer may also reveal fresh claims of US interference in the saga.

Regardless of the fate of its founder, WikiLeaks will continue releasing declassified cables. At the moment only several hundred of 250,000 cables have been publicised.

Analysts now describe the organisation’s structure as a “networked enterprise”, a phrase that has been used in the past in relation to al-Qaida.

For all the US attempts, it is clear the attacks on WikiLeaks have made minimal impact and are unlikely to affect the availability of the information that WikiLeaks has already leaked.

Meanwhile, Senator Lieberman has indicated that the New York Times and other news organisations using the WikiLeaks cables may be investigated for breaking US espionage laws. At present, who will win the “world’s first information war” remains unclear.

Morozov said: “There will be many more people from the CIA and NSA [National Security Agency] hanging out around them.”

But the conflict increasingly seems likely to target the real profits of US corporations. Today a 24-year-old from London will ready his weapons for the battle ahead.

@rohhy

Office 2010 Reaches RTM!

microsoft-office2010From: Microsoft Office 2010 Engineering (The official blog of the Microsoft Office product development group)

I am very excited to share some great news with you. Earlier today we reached the release-to-manufacturing (RTM) milestone for Office 2010, SharePoint 2010, Visio 2010 and Project 2010!

RTM is the final engineering milestone of a product release and our engineering team has poured their heart and soul into reaching this milestone. It is also an appropriate time to re-emphasize our sincere gratitude to the more than 5,000 organizations and partners who have worked with us on rapid deployment and testing of the products. Since the start of our public beta in November 2009, we’ve had more than 7.5 million people download the beta version – that’s more than 3 times the number of 2007 beta downloads! The feedback that we’ve received from all these programs has shaped the set of products we’re excited about, and that I’m sure will delight our customers.

Our Volume License customers with active Software Assurance (SA) on these products will be one of the first to receive the 2010 set of products. They will be able to download the products in English via the Volume Licensing Service Center starting April 27. Customers without SA will be able to purchase the new products through Volume Licensing from Microsoft partners starting May 1. 

Earlier this year we announced that we will officially launch Office 2010 to our business customers on May 12 with Stephen Elop, President of Microsoft’s Business Division, delivering a keynote as part of our virtual launch. Our virtual launch will allow people from around the globe to participate in our launch by going to http://www.the2010event.com. The virtual launch site will showcase product demos, customer and partner testimonials, and interviews with product managers and executives, and we hope this will give you another great way to explore, learn, and get excited about the 2010 releases.

Office 2010 will first become available in retail stores in June in the US, and customers can pre-order these retail versions of Office 2010 at http://store.microsoft.com/OfficePreorder today to receive Office when it becomes available.

On behalf of the Office team, I want to thank all of the customers and partners who have helped us reach this milestone. We look forward to continue learning from you and all the great things you will do with our products!

-- Takeshi Numoto
Corporate Vice President, Microsoft Office

Under Sea Cable

A breakdown in an international undersea cable network badly disrupted Internet links to India and Egypt on Wednesday. Egypt's Telecommunications Ministry said a communications cable in the Mediterranean was cut, disrupting 70 percent of the country's Internet network. The ministry said in a statement it was not known how the cable was cut but that services would probably take several days to return to normal. India reported serious disruptions to its services and one Indian Internet service provider linked the problem to the Egyptian outage.

"There has been a cable cut on several cable systems in Alexandria, Egypt which has impacted internet connectivity in India," Videsh Sanchar Nigam Ltd (VSNL), an internet service provider, said in a statement. VSNL said its service had been "largely restored" by diverting to another cable.

India said it had lost more than half of its capacity. "There has been a 50 to 60 percent cut in bandwidth," Rajesh Chharia, president of the Internet Service Providers' Association of India, told Reuters. He told the Headlines Today news channel that a "degraded" service would be activated by Wednesday night, but full restoration will take 10 to 15 days. Chharia said companies, including some of India's many outsourcing businesses, had been affected.

 

image001 image002 image003 image004 image005 image006 image007 image008 image009 image010 image011 image012 image013 image014 image015 image016 image017

With iPads in the wild, buyers react

Already the iPad has been estimated to have outsold the original iPhone in opening weekend sales. After waiting in line or for UPS to deliver, the first customers are unboxing their new iPads, and their reactions to the gadget are beginning to come in.


There seem to be few complaints from new owners though one issue did come up almost immediately. Some users who have connected their iPad via USB are getting a notification that says "not charging." Apple's support site says some USB ports--typically older computers or USB hubs--are not powerful enough to charge the iPad while it is in use, or may do so slowly.

Apple told MacWorld that it's recommended to charge the iPad via the included USB wall charge adapter because you can still use it while it's charging. However, if using a lower-power USB port or hub, the iPad will still charge, but only while it's in sleep mode, not while in use.

Otherwise, reactions seem pretty positive. A search of "iPad" on Twitter revealed almost 1,000 new mentions of the device every five minutes. Most were positive, including some saying the iPad was a "big hit at Easter dinner."

Roman Mittermayr of Seattle was spotted trying out his new iPad in a San Francisco Starbucks on Saturday. He said his first experience with the device was positive, but said he could already foresee some drawbacks to not having purchased the 3G version.

"Wi-Fi only is fine for coffee shops, but I travel for business, and hotel Wi-Fi you usually have to pay for. So that could be an issue," he said. He also said he was not a huge fan of the case, which can be used as an iPad stand. The case does not provide the most comfortable viewing angle, he said.

Gizmodo found some issues typing on the virtual keyboard, calling it "serviceable but not without strange moments."

The more curious among us couldn't just be satisfied swiping, pinching, and typing on their new iPad. iFixit did a teardown of the device Saturday, revealing what the tablet looks like on the inside.

And the members of the iPhone Dev Team, whose mission is to unlock the software of every new iPhone OS version, have turned their attention to the iPad. The team claims to have jailbroken the iPad after one day.

Enjoy Your Photos Like Never Before!

See Your Photos turn to PhotoToys, 3D Screensavers and Wallpaper Collages



























No matter how many wallpapers you have, you'll eventually grow tired of them... and this is where PhotoJoy comes in handy!


This fun app creates fresh desktop images based on a variety of background designs, over which PhotoJoy arranges your pictures in nice, original collages. The program includes several types of backgrounds (abstract, nature, animals...) and produces really nice results, though you can't select which photos will be selected for the wallpaper.

But that's not all. PhotoJoy also uses your photos to create amazing three-dimensional screensavers that you can preview in the program and set as default screensaver on your system right away. Plus the program includes the so-called PhotoToys, small desktop widgets (similar to Vista gadgets) that let you browse your photos in very original ways: like a magazine, a 3D puzzle, and more.

The main drawback about PhotoJoy is, as you can infer from all those three-dimensional features, that you need quite a powerful machine to run it without problems.

 
Download it here!
http://www5l.photojoy.com/photojoy/setup/2009042701/downloader/PhotoJoy_Install.exe

Paint.Net an alternative to Photoshop!

Paint.NET is free image and photo editing software for computers that run Windows. It features an intuitive and innovative user interface with support for layers, unlimited undo, special effects, and a wide variety of useful and powerful tools. An active and growing online community provides friendly help, tutorials, and plugins.


It started development as an undergraduate college senior design project mentored by Microsoft, and is currently being maintained by some of the alumni that originally worked on it. Originally intended as a free replacement for the Microsoft Paint software that comes with Windows, it has grown into a powerful yet simple image and photo editor tool. It has been compared to other digital photo editing software packages such as Adobe® Photoshop®, Corel® Paint Shop Pro®, Microsoft Photo Editor, and The GIMP.

Download it here:
http://www.dotpdn.com/files/Paint.NET.3.5.4.Install.zip

Hacker Psychology

Who is a hacker? A hacker is someone who looks like you and me! but who thinks outside the box. It's someone who discards conventional rules wisdom, and does something else instead. It's someone who think beyond the limits. It's someone who sees a set of rules and wonders what happens if you don't follow them. A hacker is someone who experiments with the limitations of systems. A normal man ask his wife “how many teeth in your mouth?” but a good hacker would have simply counted his wife's teeth without her knowing about it, while she was asleep. A bad hacker might remove some of them, to prove his skill (Well that is next stage of hacking which called cracking!)
Computers are the perfect playground for hackers, as we do all the works and transactions online in this technical age. The best way to defeat your enemy is to know their mindset! So we will discuss how hacker works and what he/she thinks? How they work?
How hacker works? Hacker have several ways to hack information like login and password, it depends who you are, where you are and how the hacker reaches you.
1. Mind Reading This can do anyone! They no need to be specialized for this. A hacker thinks what can their victims can set as password? They start with guesses like date of birth, family names, pet names or address information.
2. Common words What if, I set my password as 12345678? or abcd? These are the most easy to break passwords.
3. Proxy If the hacker is just standing behind you, He will see what you entered from the keypad? This may happen at cybercafé or ATM!
4. Trojan Horse Tools: There are many hacking tools are available on the internet, that can be easily downloaded and used on someone’s machine. {Due to security reason the tool names and how to use is now given here} These software use to extract passwords from cookies saved on local machine!
Key Logger: This is more worst then previous one! This will track entire activity from your keyboard and send the information through email to the hacker. There is also some hardware based key logger that can be fitted before keyboard plug as show below;
Key Logger
5. IP address Hacker can get your IP address and tack back the activity on the IP address by sending some “Trojan horse”. How they get your IP address? Well that’s very easy, If you write comments on my Wordpress blog I’ll have your IP address! {Feel free to write comments at my blog, Coz I’m not a hacker! or interested in doing so!}
6. Try and Try Hackers can program a server to give different passwords to open someone’s account, but after some false try the login screen ask to solve the CAPTCHA CODE that can’t be solved by machine only human’s can solve it {Not so far! now servers also solves CAPTCHA CODE!}
CAPTCHA
The above are some examples only, more can be done by a hacker! After understanding how a hacker hacks some one’s password. we will understand how to make a complex password?
Password complexity A good password is like; 5eR3$1♥x9%#DF (if you able to remember it!)
Keys can be entered from keyboard:
Capital Letters26
Small Letters26
Numerals10
Symbols32
Total Characters94
Suppose you chose 1 letter as you password e.g. “r” so there is maximum number of tries will be 94 {remember this is maximum, minimum could be 1!}. But if you choose 2 letters e.g. “mk”, the number of tries will be 94^2 = 8836 (94x94)
To make a real complex password you have put some special characters like;
CodeKey
9786
9829
9835
There are 65535 symbols that you can put! they can be entered by holding down the Alt key and entering the number from number pad in the right of your keyboard {remember number pad in right of your keyboard, not the above number line on top of QWERTY}
So the above table can be reviewed like this:
Capital Letters26
Small Letters26
Numerals10
Symbols32
Symbols (With Alt)65535
Total65629
Suppose you chose 1 letter as you password e.g. “r” so there is maximum tries now will be 65629!  {but still the minimum is 1 if some get rite guess as the first attempt!!} and think about 2 letters! it will be 65629 x 65629 = 4307165641!! So make the password more complex and hard to guess.

Why they hack?
1. Personal gain Now a days most of hackers gain access to someone’s account or get access to machine and encrypt all files in hard drive, they decrypt your data if you pay them what they want!
2. For fun Some hackers only hack for their own fun, or to prove their skills!
3. Revenge Some time revenge is also a fact to hack some one. As we see often terrorist hacks government websites.
4. Ethical hacking Well ethical hacking is also a part of hacker’s life. Some time to rescue some one or to prevent damage to someone, they have to do hacking which is called ethical hacking.
Hacker targets celebrities to get fame and to be in limelight, as sometime before Britney Spears’ account was hacked!
Note: This article is not to teach hacking or to appreciate it in any manner! this is just to improve your knowledge and to protect you from password hacks! :)
–Rohy

Add anything to MY Computer!

Here is a simple but useful trick to add your favorite software to access from My Computer {now it called ‘Computer’ only! not ‘My Computer’} window, all you have to do is just copy and paste those shortcuts which you like to appear in Computer:

Rohhy

1. Go to following folder:
%userprofile%\AppData\Roaming\Microsoft\Windows\Network Shortcuts
The user %userprofile% is the location like; ‘C:\Users\ABC’ where ‘ABC’ is the user name

So in my case I would open;
image C:
image Users
imageABC
imageAppData
imageRoaming
imageMicrosoft
imageWindows
imageNetwork Shortcuts

2. Copy a shortcut 
For e.g. I’ve copied Calculator from start menu by right clicking on it and selecting ‘Copy’ option.

3. Paste the shortcut in “Network Shortcuts” folder

4. Start ‘Computer’ from start menu and you will see those shortcuts you have added, under ‘Network Location’.

You can add files, folders, and application in this folder! and have direct access to theme through ‘MY Computer’!

-Rohy Chopda

follow me @rohhy

Microsoft confirms 17-year-old Windows bug

Google engineer reveals ancient flaw in all 32-bit versions of Windows


 

Computerworld - Microsoft late yesterday issued its second advisory of the last week, warning users that a 17-year-old bug in the kernel of all 32-bit versions of Windows could be used by hackers to hijack PCs.
The vulnerability in the Windows Virtual DOS Machine (VDM) subsystem was disclosed Tuesday by Google engineer Tavis Ormandy on the Full Disclosure security mailing list. Coincidentally, Ormandy received credit for reporting the single vulnerability that Microsoft fixed last week on its regular Patch Tuesday.
The VDM subsystem was added to Windows with the July 1993 release of Windows NT, Microsoft's first fully 32-bit operating system. VDM allows Windows NT and later to run DOS and 16-bit Windows software.
Yesterday's advisory spelled out the affected software -- all 32-bit editions of Windows, including Windows 7 -- and told users how to disable VDM as a workaround. Windows' 64-bit versions are not vulnerable to attack.
It was Microsoft's second advisory in seven days; last week, the company posted a warning of a critical flaw in Internet Explorer after Google said its corporate computers had been hacked by Chinese attackers. That bug is to be patched later today.
"An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode," said the newest advisory. "An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights."
Jerry Bryant, a program manager with the Microsoft Security Response Center (MSRC), said that the company had not seen any actual attacks using the vulnerability, and also downplayed the threat if hackers do exploit the flaw. "To exploit this vulnerability, an attacker must already have valid logon credentials and be able to log on to a system locally, meaning they must already have an account on the system," Bryant said in an e-mail.
Typically, Microsoft ranks this kind of vulnerability -- which it classified as an elevation of privilege flaw -- as "important," the second-highest of the four ratings in its four-step system.
Ormandy said that the vulnerability goes back nearly 17 years to Windows NT 3.1's release, and exists in every version of Windows since. He reported the bug to Microsoft more than seven months ago.
"Regrettably, no official patch is currently available," Ormandy wrote on Full Disclosure Tuesday. "As an effective and easy-to-deploy workaround is available, I have concluded that it is in the best interest of users to go ahead with the publication of this document without an official patch." The workaround Ormandy included in his message was the same as Microsoft's: Edit group policies to block 16-bit applications from running.
Although Ormandy divulged information about the vulnerability, even posted attack code that works on Windows XP, Server 2003, Vista, Server 2008 and Windows 7, Microsoft didn't take him to task in the advisory for prematurely revealing the bug, as it almost always does researchers who spill the beans before a patch is ready. Presumably, Microsoft will issue a fix for the flaw at some point, but as is its practice in security advisories, it didn't promise to do so.

Internet

History and Evolution of Inter-connected Network!

The History
1957 The Cold War!
In 1957, at the heights of the Cold War, the Soviet Union scored one against the United States when it successfully put in place the world’s first artificial satellite, Sputnik I. To up the ante with the Soviets, the US Department of Defense set up a division dedicated to extreme technology research, ARPA (Advanced Research Project Agency), which later fashioned ARPANET. For the first time in history, computers were able to exchange information electronically. From 1957 to till today the Internet is growing more and more..!







Hardware requirements
For Dial-up connection:
1. Modem
2. Phone Cable
3. Pentium or better Computer
DSL Cable/Broad Band:
1. DSL Modem/Hub
Mobile/Wireless Devices:
1. GPRS enabled phone
2. Data cable (to connect with PC)
Infrared or Bluetooth

Software requirements
Microsoft:
Windows Internet Explorer
Other:
Firefox
Opera
Netscape Navigator
Utilities:
Download accelerator+

The Words:
www World Wide Web
FTP File Transfer Protocol
HTTP Hyper Text Transfer Protocol
HTML Hyper Text Markup Language
TCP Transfer Control Protocol
IP Internet Protocol
ISP Internet Service Provider
DNS Domain Name Server
Surfing/Browsing
Web site/Web page
Follow me @rohhy