Saturday, 17 August 2013

Hackers Attack

Who is a Hackers?
In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network . Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context. They are subject to the long standing hacker definition controversy  about the true meaning of the term hacker. In this controversy, the term hacker is reclaimed by computer programmers who argue that someone breaking into computers is better called a cracker, not making a difference between computer criminals (black hats) and computer security experts (white hats). Some white hat hackers claim that they also deserve the title hacker, and that only black hats should be called crackers.

Example of attacks:
Password cracking
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.
Packet sniffer
A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.
Spoofing attack (Phishing)
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.
Social engineering
When a hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.
Hackers who use this technique have to be quite savvy and choose the words they use carefully, in order to trick the system administrator into giving them information. In some cases only an employed help desk user will answer the phone and they are generally easy to trick. Another typical hacker approach is for the hacker to act like a very angry supervisor and when his/her authority is questioned they will threaten the help desk user with their job. Social engineering is very effective because users are the most vulnerable part of an organization. All the security devices and programs in the world won't keep an organization safe if an employee gives away a password. Black hat hackers take advantage of this fact. Social engineering can also be broken down into four sub-groups. These are intimidation, helpfulness, technical, and name-dropping:
  • Intimidation As stated above, with the angry supervisor, the hacker attacks the person who answers the phone with threats to their job. Many people at this point will accept that the hacker is a supervisor and give them the needed information.
  • Helpfulness Opposite to intimidation, helpfulness is taking advantage of a person's natural instinct to help someone with a problem. The hacker will not get angry and instead act very distressed and concerned. The help desk is the most vulnerable to this type of social engineering, because it generally has the authority to change or reset passwords, which is exactly what the hacker needs.
  • Name-dropping Simply put, the hacker uses the names of advanced users as "key words", and gets the person who answers the phone to believe that they are part of the company because of this. Some information, like web page ownership, can be obtained easily on the web. Other information such as president and vice president names might have to be obtained via dumpster diving.
  • Technical Using technology is also a great way to get information. A hacker can send a fax or an email to a legitimate user in hopes to get a response containing vital information. Many times the hacker will act like he/she is involved with law enforcement and needs certain data for record keeping purposes or investigations.
Trojan horses
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with the conceptually similar function of deceiving defenders into bringing an intruder inside.)
Computer virus
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells.
While some are harmless or mere hoaxes, most computer viruses are considered malicious.
Computer worm
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.


Tuesday, 13 August 2013

YouTube

Overview
YouTube is a video-sharing website, created by three former PayPal  employees in February 2005 and owned by Google since late 2006, on which users can upload, view and share videos. The company is based in San Bruno. California, and uses Adobe Flash Video and HYML5 technology to display a wide variety of user-generated video content, including movie clips, TV clips, and music videos, as well as amateur content such as video blogging, short original videos, and educational videos.
Most of the content on YouTube has been uploaded by individuals, although media corporations including CBS, the BBC, Vevo, Hulu, and other organizations offer some of their material via the site, as part of the YouTube partnership program. Unregistered users can watch videos, while registered users can upload an unlimited number of videos. Videos considered to contain potentially offensive content are available only to registered users at least 18 years old. YouTube, LLC was bought by Google for US$1.65 billion in November 2006 and now operates as a Google subsidiary.

How it got started
According to a story that has often been repeated in the media, Hurley and Chen developed the idea for YouTube during the early months of 2005, after they had experienced difficulty sharing videos that had been shot at a dinner party at Chen's apartment in San Francisco. Karim did not attend the party and denied that it had occurred, while Chen commented that the idea that YouTube was founded after a dinner party "was probably very strengthened by marketing ideas around creating a story that was very digestible".
Karim said that the inspiration for YouTube came from Janet Jackson's role in the 2004 Super Bowl incident, when her breast was accidentally exposed during her performance. Karim could not easily find a video clip of the incident online, which led to the idea of a video sharing site. Hurley and Chen said that the original idea for YouTube was a video version of an online dating service, and had been influenced by the website Hot or Not.
YouTube began as a venture-funded technology startup, primarily from a $11.5 million investment by Sequoia Capital between November 2005 and April 2006. YouTube's early headquarters were situated above a pizzeria and Japanese restaurant in San Mateo. California. The domain name www.youtube.com was activated on February 14, 2005, and the website was developed over the subsequent months.

The first YouTube video was entitled Me at the zoo, and shows co-founder Jawed Karim at the San Diego ZooThe video was uploaded on April 23, 2005, and can still be viewed on the site.

The first Video on YouTube


PS4


DUALSHOCK®4 Controller - PS4™

PlayStation 4: The Best Place to Play

The PlayStation 4 system is the best place to play with dynamic, connected gaming, powerful graphics and speed, intelligent personalisation, deeply integrated social capabilities, and innovative second-screen features. Combining unparalleled content, immersive gaming experiences, all of your favorite digital entertainment apps, and PlayStation exclusives, the PS4 system focuses on the gamers.

Gamer Focused, Developer Inspired

The PS4 system focuses on the gamer, ensuring that the very best games and the most immersive experiences are possible on the platform. The PS4 system enables the greatest game developers in the world to unlock their creativity and push the boundaries of play through a system that is tuned specifically to their needs. The PS4 system is centered around a powerful custom chip that contains eight x86-64 cores and a state of the art 1.84 TFLOPS graphics processor with 8 GB of ultra-fast GDDR5 unified system memory, easing game creation and increasing the richness of content achievable on the platform. The end result is new games with rich, high-fidelity graphics and deeply immersive experiences.

 

PlayStation®Plus

PlayStation Plus


Designed to bring games and gamers together, and to fuel the next generation of gaming, PlayStation Plus helps you discover a world of extraordinary gaming experiences. PlayStation Plus is a membership service that takes your gaming experience to the next level. Each month members receive access to an Instant Game Collection of top rated blockbuster and innovative Indie games, which they can download direct to their console.
PlayStation Plus gives you exclusive access to a diverse range of immersive online multiplayer experiences to suit all players' tastes, from Killzone Shadow Fall to DRIVECLUB, Watch_Dogs  and Destiny. Play and chat with your friends and a community of like-minded gamers from all over the world who love the same games as you do. One payment gives you access to PlayStation Plus on your PlayStation 4, PlayStation 3 and PlayStation Vita systems.
.


                                                                       

Nokia Lumia 1020

The first question that comes up on our mind is?
Will this phone be better than the Apple and Samsung phones since all those companies are competing each other for the innovation and creativity. The customer is the one who can answer that question, as long the customer find the phone satisfying, that phone will be the best.

Nokia Lumia 1020
This phone is known for it camera which is very amazing. The Nokia Lumia 1020 takes photos and video that no other smartphone can match with a 41 megapixel camera sensor, PureView technology, Optical Image Stabilization and amazing high-resolution zoom. Nokia Pro Camera on the Nokia Lumia 1020 lets you shoot in super high resolution, which means you can zoom in close to your shot after you've taken it. Then rotate, reframe, crop and share new images as many times as you want. Take your photos to a new level by adjusting focus, shutter speed, white balance and more with easy and intuitive controls. Capture sharp, detailed HD video, and zoom in up to six times without losing quality. And with Nokia Rich Recording, you can capture distortion -free, stereo sound – so you can relive the moment as if you were there again. The camera is the absolute advantage for this phone.

Here is the trailer video of Nokia Lumia 1020


Building Securty Systems

Definition:

The Building Security System is being designed to reduce the amount of stolen
equipment from the Senior Design Labs in the Information Technologies Engineering
building. It makes use of card swipes for user authentication along with a locking system
on the doors to allow entry only to authorized students. The doors open from the inside
without authentication for compliance with fire codes and for an acceptable level of
usability. For ease of application the authentication is transmitted wirelessly throughout
the building from door unit to authentication unit. This main authentication unit is
capable of allowing entry to designated labs, logging traffic, and is easily programmable.
Residing on a Windows based PC the program to control authentication and access
logging is easily portable to most of today’s PC market.

The Building Security System also protects units in the room from thief by means of
radio frequency tracking. Small transmitter devices concealed within units trigger an
alarm when removed from the room.

The combination of these two subsystems composes the Building Security System. The
ability to track user access and protect devices at the same time should allow the labs to
operate under normal conditions while preventing the theft of expensive devices used
within the labs.