Sunday, September 21, 2008

Geeks Evolution Started !!!!

Hacking has been around for more than a century. In the 1970s, several teenagers were flung off the country's brand new phone system by enraged authorities. Here's a peek at how busy hackers have been in the past 35 years.

Early 1960s

University facilities with huge mainframe computers, like MIT's artificial intelligence lab, become staging grounds for hackers. At first, "hacker" was a positive term for a person with a mastery of computers who could push programs beyond what they were designed to do.

Early 1970s

John Draper
John Draper
John Draper makes a long-distance call for free by blowing a precise tone into a telephone that tells the phone system to open a line. Draper discovered the whistle as a give-away in a box of children's cereal. Draper, who later earns the handle "Captain Crunch," is arrested repeatedly for phone tampering throughout the 1970s.

Yippie social movement starts YIPL/TAP (Youth International Party Line/Technical Assistance Program) magazine to help phone hackers (called "phreaks") make free long-distance calls.

Two members of California's Homebrew Computer Club begin making "blue boxes," devices used to hack into the phone system. The members, who adopt handles "Berkeley Blue" (Steve Jobs) and "Oak Toebark" (Steve Wozniak), later go on to found Apple Computer.

Early 1980s

Author William Gibson coins the term "cyberspace" in a science fiction novel called Neuromancer.

In one of the first arrests of hackers, the FBI busts the Milwaukee-based 414s (named after the local area code) after members are accused of 60 computer break-ins ranging from Memorial Sloan-Kettering Cancer Center to Los Alamos National Laboratory.

Comprehensive Crime Control Act gives Secret Service jurisdiction over credit card and computer fraud.

Two hacker groups form, the Legion of Doom in the United States and the Chaos Computer Club in Germany.

2600: The Hacker Quarterly is founded to share tips on phone and computer hacking.

Late 1980s

The Computer Fraud and Abuse Act gives more clout to federal authorities.

Computer Emergency Response Team is formed by U.S. defense agencies. Based at Carnegie Mellon University in Pittsburgh, its mission is to investigate the growing volume of attacks on computer networks.

At 25, veteran hacker Kevin Mitnick secretly monitors the e-mail of MCI and Digital Equipment security officials. He is convicted of damaging computers and stealing software and is sentenced to one year in prison.

First National Bank of Chicago is the victim of a $70-million computer heist.

An Indiana hacker known as "Fry Guy" -- so named for hacking McDonald's -- is raided by law enforcement. A similar sweep occurs in Atlanta for Legion of Doom hackers known by the handles "Prophet," "Leftist" and "Urvile."

Early 1990s

After AT&T long-distance service crashes on Martin Luther King Jr. Day, law enforcement starts a national crackdown on hackers. The feds nab St. Louis' "Knight Lightning" and in New York grab Masters of Deception trio "Phiber Optik," " Acid Phreak" and "Scorpion." Fellow hacker "Eric Bloodaxe" is picked up in Austin, Texas.

Operation Sundevil, a special team of Secret Service agents and members of Arizona's organized crime unit, conducts raids in 12 major cities, including Miami.

A 17-month search ends in the capture of hacker Kevin Lee Poulsen ("Dark Dante"), who is indicted for stealing military documents.

Hackers break into Griffith Air Force Base, then pewwwte computers at NASA and the Korean Atomic Research Institute. Scotland Yard nabs "Data Stream," a 16-year-old British teenager who curls up in the fetal position when seized.

A Texas A&M professor receives death threats after a hacker logs on to his computer from off-campus and sends 20,000 racist e-mail messages using his Internet address.

Kevin Mitnick
Kevin Mitnick [photo / AP ]
In a highly publicized case, Kevin Mitnick is arrested (again), this time in Raleigh, N.C., after he is tracked down via computer by Tsutomu Shimomura at the San Diego Supercomputer Center.

Late 1990s

Hackers break into and deface federal Web sites, including the U.S. Department of Justice, U.S. Air Force, CIA, NASA and others.

Report by the General Accounting Office finds Defense Department computers sustained 250,000 attacks by hackers in 1995 alone.

A Canadian hacker group called the Brotherhood, angry at hackers being falsely accused of electronically stalking a Canadian family, break into the Canadian Broadcasting Corp. Web site and leave message: "The media are liars." Family's own 15-year-old son eventually is identified as stalking culprit.

Hackers pierce security in Microsoft's NT operating system to illustrate its weaknesses.

Popular Internet search engine Yahoo! is hit by hackers claiming a "logic bomb" will go off in the PCs of Yahoo!'s users on Christmas Day 1997 unless Kevin Mitnick is released from prison. "There is no virus," Yahoo! spokeswoman Diane Hunt said.

1998

Anti-hacker ad runs during Super Bowl XXXII. The Network Associates ad, costing $1.3-million for 30 seconds, shows two Russian missile silo crewmen worrying that a computer order to launch missiles may have come from a hacker. They decide to blow up the world anyway.

In January, the federal Bureau of Labor Statistics is inundated for days with hundreds of thousands of fake information requests, a hacker attack called "spamming."

Hackers break into United Nation's Children Fund Web site, threatening a "holocaust" if Kevin Mitnick is not freed.

Hackers claim to have broken into a Pentagon network and stolen software for a military satellite system. They threaten to sell the software to terrorists.

The U.S. Justice Department unveils National Infrastructure Protection Center, which is given a mission to protect the nation's telecommunications, technology and transportation systems from hackers.

Hacker group L0pht, in testimony before Congress, warns it could shut down nationwide access to the Internet in less than 30 minutes. The group urges stronger security measures.

Today in the senario of internet no body is safe there are some loopholes in every system. The Hackers are always giving their time to Pick Up The Right One....

BE SAFE.....Use Open Source System

Friday, September 19, 2008

BackTrack 3 final released !

BackTrack 3 Final - Release Information

It’s finally happening….BackTrack 3 Final is being released….Finally!
Max, Martin have slaved for weeks and months, together with the help of many remote-exploit’ers to bring you this fine release. As usual, this version overshadows the previous ones with extra cool things.

Saint
SAINT has provided BackTrack users with a functional version of SAINT, pending a free request for an IP range license through the SAINT website, valid for 1 year.

Maltego
The guys over at Paterva have created a special version of Maltego v2.0 with a community license especially for BackTrack users. We would like to thank Paterva for co-operating with us and allowing us to feature this amazing tool in BackTrack.

Nessus
Tenable would not allow for redistribution of Nessus.

Kernel
2.6.21.5. Yes, yes, stop whining….We had serious deliberations concerning the BT3 kernel. We decided not to upgrade to a newer kernel as wireless injection patches were not fully tested and verified. We did not want to jeopardize the awesome wireless capabilities of BT3 for the sake of sexiness or slightly increased hardware compatibilities. All relevant security patches have been applied.

Tools
As usual, updated, sharpened, SVN’ed and armed to the teeth. This release we have some special features such as spoonwep, fastrack and other cool additions.

Description: CD Image
Name:: bt3-final.iso
Size: 695 MB
MD5: f79cbfbcd25147df32f5f6dfa287c2d9
SHA1: 471f0e41931366517ea8bffe910fb09a815e42c7
Download:Click here

Description: USB Version (Extended)
Name:: bt3final_usb.iso
Size: 784 MB
MD5: 5d27c768e9c2fef61bbc208c78dadf22
SHA1: 3aceedea0e8e70fff2e7f7a7f3039704014e980f
Download: Click here

Description: VMware Image
Name: BACKTRACK3_VMWare.rar
Size: 689 MB
MD5: 94212d3c24cf439644f158d90094ed6a
SHA1: 21c9a3f9658133efff259adbe290723583b4fd82
Download: Click here

Tuesday, September 2, 2008

Image of Google Chrome :-




Google states that the reason for a new web browser is that the company believes that :-

1. Add value for users and, at the same time, help drive innovation on the web

2. Streamlined and simple" and "clean and fast".

3. Rendering engine is based on Webkit which is also used by Apple's Safari.

Security, Sandboxing, and Safe Browsing:-

Google Chrome is being developed with the assumption that you will encounter malware online. Each tab is contained within its own sandbox that stops malicious behavior.

Google will also continually download a list of phishing sites and list of malware sites to your computer, which will be used to warn you when you visit them. Site owners will be notified when their sites are put on either of the lists so false positives can be remedied.


Features include:

1. New JavaScript engine called V8 for faster performance
2. "Special tabs" above the window, not below the address bar (see image above)
3. Address bar auto-completion
4. Opera-like "Speed Dial" with thumbnails of your most visited 9 websites
5. Privacy mode
6. Web apps can be launched in their own window without addressbar/toolbar






The World's Most Dangerous Virus !!!

magine if a computer virus emerged that secretly attached itself to one of the most popular software programs ever. Imagine if the largest media outlets unwittingly praised this secret pairing, encouraging millions of people to install it. Imagine if none of the major antivirus programs would detect it. Imagine if once installed, it could alter anything on your computer without your consent or knowledge. Imagine if the virus was at the control of a greedy entity that has repeatedly trampled on consumers and smaller companies to advance its corporate agenda. Imagine if it could force everyone who wanted to communicate with you to also carry the virus so it would insidiously spread person to person. Sound like a scary sci-fi plot? It's not science fiction. This week MO3 will be released on the world. Here's how to detect it in your neighborhood and what you can do to protect yourself

The Trojan Horse

Press outlets will blanket the world with stories about Microsoft Office 2003. Most articles will tout seemingly innocuous features and feel good quotes from Microsoft like "this is our most important product release ever." Unfortunately the press won't talk about the dangerous software buried inside this release - MO3. This code will give Microsoft the ability to change anything on your computer at anytime they wish with no notification to you.

The Security Ploy

Post 9/11, few people question actions taken under the guise of "improved security" and this is how MO3 will be foisted onto computer users - as a feature to 'make you safer.' Computer users have understandably tired of the near daily worm and virus warnings, as well as the time-consuming patch process due to Microsoft's lax software standards and its focusing not on building secure products, but products that secure its monopoly market positions. To improve the predicament which they've created, Microsoft is forcing consumers to accept MO3 embedded into every computer. Listen closely and you'll hear Microsoft mouth pieces speak of "turning software into a service" which really means they will be changing the software on your computer whenever they feel like it. They will slowly limit your ability to run non-Microsoft software. They will restrict choices on your computer to only those products they approve. They will make changes which cripple other software programs or reduce their ability to interoperate with your computer so you will be forced to use exclusively Microsoft approved products.

History Repeats Itself

Microsoft may use this newfound power to fix some holes in their software, but they will also abuse this power to further their corporate monopoly and increase their control and profits. Microsoft has already embedded the MO3 virus into another operating system they have deployed, called Xbox. They now have the power at anytime to change all existing Xboxes which connect to the Internet, and they are already misusing it. They have deleted files from users' computers without their knowledge or permission. They have added software which has removed the ability to run competitor's software. They have been changing users' systems without their consent and notification. They will do the same on Microsoft Windows based computers once MO3 is installed.

Microsoft management has shown to be deceitful and dishonest and will continue this behavior. Twice Microsoft has been found guilty by the Federal government of using illegal tactics to drive competitors out of business and extend their monopoly. December 1st, 2003 a trial will take place in Seattle Washington where more of Microsoft's past behaviors will come to light.

Infecting Friends

Microsoft Word (.doc) file open in StarOffice 7
To stop the advance of competing products and to force users into purchasing new software with the MO3 virus, Microsoft is making certain Microsoft Office 2003 files unreadable by all older versions of Microsoft Office and all competing office suites. Products like Sun's StarOffice are getting extremely good at interoperating with Microsoft word processing, presentation and spreadsheet files making it possible for people to spend close to $50 for an office suite instead of giving $400 or more to Microsoft. To blunt this and force users of older versions of Microsoft Office to buy new software, Microsoft has changed the specifications for some files.

Again under the umbrella of "security," Microsoft is implementing features which limit who can open and edit documents to further thwart competition. Microsoft Office 2003 gives its users the ability to control who can read and edit certain documents, but only if they use the latest Microsoft software. If one user within an office uses this feature, all others will be unable to use any other office suite to access that document. They will not be permitted to run Linux software, they will be required to purchase and run additional copies of Microsoft Office 2003. Since documents are frequently emailed around via the Internet, this will force others to accept Microsoft's software or be unable to communicate. Microsoft refers to this as IRM for "information rights management," but it's really an "infection relay method" designed to force everyone to adopt MO3. They will be using scare tactics about leaked memos or misdirected emails to persuade unwitting computer users to deploy this technology. Doing so will create a viral growth of MO3 which will give MS unlimited power over every computer.

Universal MO3

MO3 will not only come with Microsoft Office 2003, but with future Microsoft products as well. The same technology will be embedded into the next version of Microsoft's operating system software so all users will have to accept it with their new computer. Latest estimates indicate this new software will not ship until 2006, so between now and then, watch for Microsoft to secretly embed MO3 into updates or security patches that they promote for their existing product line.

Protect Yourself

Microsoft Excel (.xls) file open in StarOffice 7
There are precautionary measures you can take to fend off MO3. First off, do not purchase and install Microsoft Office 2003. Also, discourage those around you from purchasing Microsoft Office as well, since one infection will quickly grow. If you need a new office suite, check out the solid and affordable StarOffice 7.0 which runs equally well on Microsoft Windows or Linux computers, and can be purchased online and immediately downloaded and installed. Encourage those penning articles and reviews to fully inform their readers of the dangers of Microsoft Office 2003. Finally, encourage them to do in-depth reviews of Microsoft Office 2003 vs. Sun's StarOffice 7.0 so people can make informed decisions about the benefits and risks of either product.

Security Center: Why write viruses?

Security Center: Why write viruses?