Skip to main content

Posts

Showing posts from 2011

Google co-founder donates $ 500,000 to Wikipedia

Google co-founder donates $ 500,000 to Wikipedia Sunday, November 20, 2011,12:54 [IST] Moscow, Nov 20: World's most popular Internet serach engine Google Inc co-founder Sergi Brin has donated $500,000 to world’s biggest user-created encyclopaedia wikipedia. According to the RIA Novosti report Brin given $500,000 from The Brin Wojcicki Foundation, the charity fund run by him and his wife, Anne Wojcicki.Meanwhile, Wikipedia has launched its fund rising campaign with the personal request from its founder Jimmy wales. The  online  free  encyclopedia in last year have raised $16 million. Moreover, Wales has repeatedly said that there..... Read More

Visiting other sites? Facebook can track you easily

V isiting other sites? Facebook can track you easily Sunday, November 20, 2011,17:03 [IST] London, Nov 20: World's most famous social networking site, Facebook has confessed tracking which sites its users visit even after they log out. According to the 'USA Today' report, social networking site used a tracking cookie technologies similar to the controversial  systems  used by Google, Adobe, Microsoft, Yahoo and others in the online advertising industry to track their users visited sites.Now you can know how Facebook's  tracking cookie works: Every time one logs onto Facebook it inserts a "session cookie" and a "browser..... Read More

Google shuts down production of cheap renewable energy, 7 things you must know to use Google Music

Google shuts down production of cheap renewable energy ] San Francisco, Nov 23: World's most popular Internet search engine, Google Inc has decided not to produce renewable energy cheaper than coal. Chief Executive Larry Page's said that it was pulling the plug on seven projects, including Renewable Energy Cheaper than Coal as well as a Wikipedia-like online encyclopedia service known as Knol.The major development has come as Google is facing sharp competition in mobile computing and social networking from Apple Inc and Facebook, and as some investors have groused about rising spending..... Read More 7 things you must know to use Google Music ] London, Nov 21: Google Inc has recently launched its Google Music service which is mostly self-explanatory. To accesss it one have to go music .google.com and start uploading or purchasing music that you can then listen to on your computer, or on your Android phone, Google TV, or  iPhone . But it is not so esay

Google to toss out more products for promising growth

Google to toss out more products for promising growth San Francisco, Nov 24: Google Inc, Chief Executive Larry Page has announced  that the company is tossing out some of its products to focus resources on more promising  projects . The major development has come as Google is facing sharp competition in mobile computing and social networking from Apple Inc and Facebook, and as some investors have groused about rising spending at the world's No.1 Internet search company. Google  Senior  Vice  President  of Operations, Urs Holzle in the blog post revealed, "to recap, we're in the process of shutting down a number of products which haven't had the impact we'd hoped for, integrating others as features into our broader product efforts, and ending several which have shown us a different path forward." The world's most popular Internet search giant also said that the Wave collaborative communication tool that it stopped developing more than a

CBI registers case under IT Act

Site hacking: CBI registers case under IT Act New Delhi, Dec 4: After facing a cyber attack to its official website, the Central Bureau of Investigation (CBI) has filed a case against unknown persons for the attack.CBI, on Saturday, Dec 4, registered the case under various sections of..... Read More CBI site hacking: A threat for outsourcing? Bangalore: Dec 4: Once, our national leaders cried for the 'brain drain' happened to India. Even now, US President Barack Obama urging Americans to compete with India 'brainees'. But the hacking of Central Bureau of Investigation (CBI)'s website exposed the 'real'..... Read More Centre to frame National Security Strategy Saturday, July 14, 2007,15:06 [IST] Kolkata, Jul 14: With the aim of reducing burgeoning cyber crime in the country, the Centre will frame a National Security Strategy (NSS). Speaking at a seminar on Cyber Security organised by Bengal Chamber of Commerce..... Read M

Pak hacking: CBI fails to restart official website

Pak hacking: CBI fails to restart official website New Delhi, Dec 5: Central Bureau of Investigation (CBI) continuous to embarrass itself in the eyes of the whole world by failing to restart its official website after the cyber attack by Pakistan hackers. CBI officials told on Saturday, Dec 4 that they were working to restart the website, which was hacked by unknown person who claimed as "Pakistan Cyber Army". But till now the CBI official site (http://cbi.nic.in/) has not been fixed. While trying to login to the site, it is showing error message, which states that the site is still offline. The hackers have infiltrated up to the root level, which makes it difficult to fix the issues. On Friday, Dec 3, a group of Pakistan hackers attacked Indian sites including CBI site. Hackers left a note reading that it was a response to attack on Pakistan websites by Indian hackers.

CBI website hacked by 'Pak Cyber Army'

   CBI website hacked by 'Pak Cyber Army'  New Delhi:   In a major embarrassment, the website of the Central Bureau of Investigation (CBI) was hacked on Friday night by programmers identifying themselves as "Pakistani Cyber Army". The home page of the CBI website had a message from the 'Pakistani Cyber Army' warning the Indian Cyber Army not to attack their websites. The CBI website, supposed to be one of the most secure websites, is connected to the command centre of world police organisation - Interpol - 24x7. The message from the hackers also spoke about the filtering controls provided by the National Informatics Centre (NIC), a body which mans computer servers across the country. It also claims to have hacked another 270 websites. Intelligence agencies have been often warning the government that proper cyber security was not being ensured in government offices and that no security audit was being carr

Steve Jobs got the last laugh everytime

Steve Jobs got the last laugh everytime Steve Jobs in an interview with All Things D. After  Steve Jobs  anointed  Walter Isaacson  as his authorized biographer in 2009, he took Isaacson to see the Mountain View, California, house in which he had lived as a boy. He pointed out its "clean design" and "awesome little features." He praised the developer, Joseph Eichler, who built more than 11,000 homes in California subdivisions, for making an affordable product on a mass-market scale. And he showed Isaacson the stockade fence built 50 years earlier by his father, Paul Jobs. "He loved doing things right," Jobs said. "He even cared about the look of the parts you couldn't see." Jobs, the brilliant and protean creator whose inventions so utterly transformed the allure of technology, turned those childhood lessons into an all-purpose theory of intelligent design. He gave Isaacson a chance to play by the sam

EMail Hacking

-: EMail Hacking :- All email communications on the internet are possible by two protocols: 1)  Simple Mail Transfer Protocol (SMTP port-25) 2)  Post Office Protocol (POP port-110) E-Mail hacking consists of various techniques as discussed below. 1) EMail Tracing :-  Generally, the path taken by an email while travelling from sender to receiver can be explained by following diagram. The most effective and easiest way to trace an email is to analyze it's email headers. This can be done by just viewing the full header of received email. A typical email header looks something like this: From Barr Thu Jan 3 05:33:26 2008 X-Apparently-To: prasannasherekar@yahoo.co.in via 203.104.16.34; Thu, 03 Jan 2008 05:25:38 +0530 X-YahooFilteredBulk: 189.160.34.89 X-Originating-IP: [189.160.34.89] Return-Path: Authentication-Results: mta113.mail.in.yahoo.com from=destatis.de; domainkeys=neutral (no sig) Received: from 189.160.34.89 (HELO dsl-189-160-34-89.prod-infinitum.com.mx) (18

Password Hacking

-: Password Hacking :- Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password. Most passwords can be cracked by using following techniques : 1) Hashing :-  Here we will refer to the one way function (which may be either an encryption function or cryptographic hash) employed as a hash and its output as a hashed password. If a system uses a reversible function to obscure stored passwords, exploiting that weakness can recover even 'well-chosen' passwords. One example is the LM hash that Microsoft Windows uses by default to store user passwords that are less than 15 characters in length. LM hash breaks the password into two 7-character fields which are then hashed separately, allowing each half to be attacked separately. Hash functions like SHA-512, SHA-1, and MD5 are considered impossible to invert when used correctly. 2) Guess