Pages

Monday, 21 May 2012

Hash Code Verifier v1.0 : A tool to verify the File Integrity


Hello Readers,
we are happy to announce that we have released our second security tool 'Hash Code Verifier'.  Hash Code Verifier is a Cross-platform application to verify the Integrity of your download files. Hash Code verifier can be very useful if you want to check if a downloaded file is original and not corrupted or modified by hackers. 


In order prevent users from such problem, websites often publish MD5 or SHA hash of the file so that users can ensue that a file has not been modified by checking the file's hash value . Hash Code verifier can generate hash for a file and allow user to check with the provided hash value.




Features:
Verify the Hash of a file
Calculate hash for multiple files
Compare Two files
Simply Drag and drop files from computer into the application for generating hash.
Supports MD5,SHA1,SHA256,SHA512 and CRC32 hash codes.
Save the generated hash list in a text/HTML format
Automatically generate hash when you browse or drop the files.
Yes, it is Cross-platform(You can use this application in any Operating system)


System Requirements:
Operating System: All OS(windows xp,7, Linux,Mac,....)
Java Runtime Environment: JRE 1.6 or higher version is required.(you can get it from oracle.com)

P2P Zeus Variant targets Facebook,Google & Yahoo users


Trusteer researchers have discovered a peer-to-peer (P2P) variant of the Zeus platform that targets users of Google, Yahoo, Hotmail, Facebook in order to steal their credit card data.




The scams exploit the trust relationship between users and these well-known service providers, as well as the Visa and MasterCard brands.


When targeting the facebook users, the attackers use a web inject to present the victim with a fraudulent 20% cash back offer by linking their Visa or MasterCard debit card to their Facebook account. The scam claims that after registering their card information, the victim will earn cash back when they purchase Facebook points. The fake web form prompts the victim to enter their debit card number, expiration date, security code, and PIN.








The attacks against Google Mail, Hotmail and Yahoo users, Zeus offers an allegedly new way of authenticating to the 3D Secure service offered by the Verified by Visa and MasterCard SecureCode programs.


The scam that targets Google Mail and Yahoo users claims that by linking their debit card to their web mail accounts all future 3D Secure authentication will be performed through Google Checkout and Yahoo Checkout respectively. The fraudsters allege that by participating in the program the victim’s debit card account will be protected from fraud in the future. The victim is prompted to enter their debit card number, expiration date, security code, and PIN.


The Hotmail scheme is somewhat similar, the potential victims being informed of the fact that “Windows Live Inc” is concerned about their security, offering a “100% secure, fast and easy” method of preventing fraud by linking the account to the debit card.




This attack is a clever example of how fraudsters are using trusted brands – social network/email service providers and debit card providers – to get victim’s to put down their guard and surrender their debit card information.


These webinjects are well crafted both from a visual and content perspective, making it difficult to identify them as a fraud. It’s also ironic how in the Google Mail, Hotmail and Yahoo scams, the fraudsters are using the fear of the very cybercrime they are committing to prey on their victims.

Sunday, 20 May 2012

1000s of Indian sites Hacked by Bangladeshi hackers - Cyber War


Cyber war between Bangladeshi and Indian hackers was started two days back.  Bangladeshi hackers keep attacking Indian cyber space.


Indishell started the war by hacking around six Bangladeshi websites. Following
that incident Bangladeshi hacker start to give payback and hacked over 500 Indian sites. Today they add some more sites to the list. So far they hacked thousands of Indian sites as part of cyber war.


They hacked several high profile and Indian government sites including All India Radio Allahabad, Set India, Reserve Bank of India(RBI),mit.gov.in and National Informatics Centre (NIC) Of India,Highway Police Maharashtra State.

17-year-old arrested on suspicion of being TeamPoison member 'MLT'


a 17-year-old boy, believed to be known online handle "MLT" and to have acted as a spokesman for TeaMp0isoN, was arrested on Wednesday evening by British Police and is being questioned locally on suspicion of offences under the Computer Misuse Act. 


Police seized computing equipment, which is now being forensically examined.


The arrest is part of an ongoing investigation by the Police Central e-Crime Unit (PCeU) division of the Metropolitan Police into various hacking gangs.


The suspect is the third TeaMp0isoN hacker to be detained by UK police. Last month, The suspects, aged 16 and 17 were arrested after a denial-of-service attack on the MI6 hotline. One of the two is currently believed to be the group's leader, "Trick".


Team Poison is yet to release a statement on MLT's alleged arrest.

AIRTEL 3G TRICK 2012 – UNLIMITED INTERNET


Here Are New Trick For Airtel 3G Unlimited Internet For Free.
This Trick Is Tested And Working Fine All Over India. 
Note : Use At Low Or 0 Balance.

So Follow The Steps.

First Of All Signup For Free Account By Clicking Below Link…


Now Activate Your Account By Verify Your Email Address.

Now Download The Software Your-Freedom By Clicking Below Link…

CLICK HERE

Now Install The Software On Your Pc. And Open It. And Make Settings Like Below.

Click On Configure And Make Settings Like Below.

In  Server Connection Add The Below Values.

Address : fb.me
(If It Not Works Try : Mocricket.com OR Motennis.com)

Port : 80





Now Go To Proxy Settings And Add Below Values.

Proxy Address : ems08.your-freedom.de

Proxy Port : 80

Now Go To Account Details And Add Username And Password You Registered Before.

Now Click On Save And Exit.

Then In Main Window, Go To Ports, Untick Web proxy,  Add 8888 And Re-Tick It.


All Done. Now Click On Start Connection. It Will Start In Seconds.

Now The Last Step Is To Add Proxy And Port In Browsers Like Internet Explorer Or Mozilla Firefox.

In Internet Explorer, Go To Internet Options And Go To Connections And Select Your Connection And Add Proxy And Port Like Below.

Proxy : 127.0.0.1
Port : 8888

To Add In Firefox, Go To Options->Advanced->Network->Settings->Manually Proxy And Add Above Proxy And Port.
This Trick Is Working Fine But Download Speed Is Slow But Browsing Speed Is Good.
But You Can Buy Premium Account For Increase Speed And Limitations.

<---ENJOY GUYS--->


HOW TO SET UP PICTURE PASSWORD

SET UP PICTURE PASSWORD IN WINDOWS 8:



Hello Guys, As You All Already Knows That Windows 8 (Developer Preview And Consumer Preview) Is Launched Some Time Ago, And Is One Of The Best Operating System Ever. Windows 8 Has Many Amazing Features And Picture Password Is Most Amazing Features Of Windows 8.


Here Are Procedure To Set Picture Password For Windows 8 Login.


Open Charms Bar And Click On Setting And Open More PC Settings.


Now Choose Users Option From Left Panel And Select Create Picture Password From Right Panel.







You Will Be Prompted For Your Current User Password. 


Now It Will Open Picture Selection Window.




Select Any Picture You Want And Click On Choose This Image.

Now It Will Ask You To Set Any Gesture I.e. Clicks, Lines And Circles. See Below Examples for This Three Gestures.

You Can Make Clicks To Any Parts Of The Image And Remember Where You Clicked.

You Can Also Add Circles To Your Combination But Have To Remember Size Of The Circle.

You Can Even Draw The Straight Line For Picture Password. And The Length Of Line Matters.

That’s All. You Have Successfully Set Up Your Picture Password. If You Experiencing Issues Than Comment Below.

<---ENJOY GUYS--->





Friday, 18 May 2012

oDC - Direct Connect client

oDC (Opera's DC) is a file sharing client based on the DirectConnect clone, “DC++”.
oDC allows you to share and download various kinds of files from the Internet.


oDC main features:


- Opens web links in new windows.
- Displays seconds in timestamps.
- SVF-check shows the result in the lowest status bar.
- Auto-complete function for user names in main chat.
- "Skiplist" function for skipping files you don’t want to download.
- Pop-up menu for URLs with “Open”, “Save as” and “Add to Winamp playlist” options.
- Has “Go to file” option for the file list in the search result window.
- Notifies you in PMs when the user goes offline.
- "Auto-search for alternatives" for folders and multiple selected files.
- Customizable text color (any color) and user- defined colors in main chat (multicolor ie).
- Filter for useless NMDC messages.
- User list filter allows you to find users easy.
- Window tabs have icons to help you identify them (optional).
- "Search for alternatives" feature is supported by a fast auto-search algorithm.
- The transfer window progress bar has customized colors.
- Fast search for alternates for “releases”.
- Lastlog feature.
- Multi-button-mice support is enabled.
- Sub-windows can be tiled both vertically and horizontally.
- Has a “Show/Hide Transfer Window” option, in the View menu.
- Incomplete files or its folders can be opened from the transfer menu's "File Menu" option.
- Google searches can be performed directly from chat ( eg: "/g [search string]").
- File information of files waiting to be downloaded is displayed (dimmed) in the transfer window.
- Check for updates feature.
oDC 5.31 is licensed as Freeware for the Windows operating system / platform. oDC is provided as a free download for all software users (Freeware).

Email Password Hacking Software

Version: 2.0.1.5
Downloads Count: 4,087
License Type: Shareware
Price: $38
Date Added: May 19, 2008
Operating Systems: Microsoft Windows XP
Requirements: 64MB RAM, 20MB Disk Space for installation
File Size: 653.0 KB
Author: Password Hacking





With the necessity of multiple accounts in our days the probability of losing or forgetting passwords is rapidly increasing. Email Password Hacking Software is a very helpful application that offers a user friendly and simple solution for recovering your lost password from local system memory.


It supports cracking passwords of all login based web forms like Gmail, Hotmail, MSN, AOL, Lycos and various social networking websites like MySpace, Orkut etc. This password cracking application can break the secret code string of all Windows applications like Microsoft Office documents (Word, Access, Power Point, Excel) , Adobe Acrobat files (pdf) and other password related programs like WinRar, WinZip etc. 


Email Password Hacking Software offers password recovery or reset for all FTP clients (FlashFXP, SmartFtp and CuteFtp), search engine and news group accounts and Autocomplete form. Passwords can be any length or complexity and all major browsers are supported, including Internet Explorer, Mozilla Firefox, Opera and Netscape.
The free demo version is available with help included and no additional requirements to install it. Email Password Hacking Software works on all Microsoft Windows operating systems (98, 2000, 2003 Server, NT, ME, XP Media Center and Vista).


Email Password Hacking Software Features:


- Fetch IDs and passwords for various e-mail login forms like Gmail, Hotmail, MSN, AOL, Lycos etc.
- Password recovery for social networking websites (MySpace,Orkut) and Yahoo, MSN Messenger and Google Talk.
- Hacks Asterisks encrypted passwords in alphanumeric character format.
- Breaks code string for passwords of all Windows applications (Microsoft Word, Excel, Power Point, Acces; WinRar, Winzip, pdf etc.).
- User friendly graphical interface.
- Supports all major web browsers.
- Password decryption for Autocomplete form, search engine, online shopping and news group accounts from internet cached.
- Recovers email id password of any length or complexity.
- No additional requirements for installation.
Email Password Hacking Software 2.0.1.5 is licensed as Shareware for the Windows operating system / platform. Email Password Hacking Software is provided as a free to try download for all software users (Shareware).

Famous White-Hat Hackers


White-hat hackers use their powers for good. They help out organizations that might have security breaches before the organizations get hacked. Hacking doesn't always mean hacking into someone else's system.

"The use of 'hacker' to mean 'security breaker' is a confusion on the part of the mass media," said Richard Matthew Stallman, a well-known white-hat hacker and software developer. "We hackers refuse to recognize that meaning, and continue using the word to mean someone who loves to program, someone who enjoys playful cleverness or the combination of the two."


Tim Berners-Lee
Famous not for hacking but inventing the World Wide Web, Berners-Lee nevertheless is undeniably a member of the white-hat hacking camp. As a student at Oxford University, Berners-Lee was banned from using the university computers after he and a friend were caught hacking to gain access to restricted areas. He moved on and built his own computer from spare parts. After college, he hacked a few other things including HTML. Did we mention creating the World Wide Web? (For related reading, see Most Costly Computer Hacks Of All Time.)


Steve Wozniak
The "other Steve" of Apple, Steve Wozniak got started as a white-hat hacker by making something called blue boxes. Wozniak and Jobs built blue boxes, which essentially hack the phone system so users can make free long-distance calls. They then sold the blue boxes to their classmates in college. Of course, you know the rest of the story. From blue boxes they moved on to bigger and better things. Those early days of white-hat hacking are what started them off.

Kevin Mitnick
Mitnick started as a black-hat hacker, and ended up serving time after hacking into some of the biggest companies in the world. Now he has left the dark side and works as a consultant and a writer. His own hacking experience gives him hands-on expertise. An article by TakeDown.com reports that Mitnick's early hacking days were ambitious and largely successful.

"As a teenage prank in 1982, he allegedly broke into a North American Air Defense Command computer in Colorado Springs, Colo. He once altered a phone program to misdirect federal agents trying to trace his call, sending them barging into the home of a Middle Eastern immigrant watching television," states the article. We're all glad he's on the good side now.

Tsutomu Shimomura
Back in the days when Mitnick was a black-hat hacker, he hacked computer-security expert, Shimomura. This didn't go over well. Shimomura decided to take his own revenge by using his hacking skills to assist the FBI in tracking and locating Mitnick. With Shimomura's help, they were successful, and Mitnick was arrested. Now they're on the same team. (For related reading, see Identity Theft: Who To Call For Help.)

FXCM -Online Currency Trading Free $50,000 Practice Account
Jeff Moss
Moss is better known in the computer world as Dark Tangent, though he's now well known apart from his hacking handle. Moss founded the Black Hat security conferences, which still draw thousands of computer security experts. Moss also founded Defcon, which is a hugely popular annual hacker conference. He serves as the chief security officer for ICANN and as an adviser to the U.S. Department of Homeland Security. He continues to run the Black Hat security conferences and Defcon.

Jon Lech Johansen
Even though they often help big companies protect themselves from malicious hackers, white-hat hackers are far from being passive cogs in the system. White-hat hackers often embrace the independent and the free sharing of resources such as open source, open access, and free sharing of software and protocols.

Like Wozniak building boxes to allow college peers to get free long distance phone calls, Johansen is a younger, newer hacker who has used his skills to aid others in beating a closed system. His hacking skills enabled him to hack an encryption system used on DVD movies. As a result, users of Linux or other open source operating systems are able to play DVDs encoded with Microsoft's proprietary codec, which is supposed to prevent non-Microsoft systems from running the DVDs.

Richard Matthew Stallman
Stallman founded the GNU Project. The GNU project is both an open source operating system and a mass collaborative project. According to Stallman, GNU includes programs that are not GNU software but rather programs that were developed by other people for their own purposes. Stallman continues to work on the GNU Project and is an advocate for free and open software.

Thursday, 17 May 2012

Flashback malware Creater earning $10,000 per day from Google Ads



In a recent analysis of the business model behind the Flashback Trojan, Symantec security researchers reported that the main objective of the malware is revenue generation through an ad-clicking component. Security researchers at Symantec are estimating that the cyber-crimibals behind the Flashback Mac OS X botnet may have raked in about $10,000 a day.




Dr. Web, the Russian security firm that firm discovered the massive Flashback botnet last month, has provided new data on the number of Macs still infected with the software. The results show that while close to 460,000 machines remain infected, the botnet is shrinking at a rate of close to a hundred thousand machines a week as Mac users get around to downloading Apple’s tool for disinfecting their machines or installing antivirus.


when an infected user conducts a Google search, Google will return its normal search results. Flashback waits for someone to click on an ad, and once this happens the user is silently directed to another, irrelievant ad that generates revenue for the attackers.As a result, Google doesn't know someone has clicked into its client's ad, and the client never knows its ad wasn't delivered. Ultimately, Google's advertising clients are paying for Flashback's attackers to host ads on Google.


Story Posted on Symantec’s blog:
The Flashback ad-clicking component is loaded into Chrome, Firefox, and Safari where it can intercept all GET and POST requests from the browser. Flashback specifically targets search queries made on Google and, depending on the search query, may redirect users to another page of the attacker’s choosing, where they receive revenue from the click . (Google never receives the intended ad click.)


The ad click component parses out requests resulting from an ad click on Google Search and determines if it is on a whitelist. If not, it forwards the request to a malicious server.


Hackers tricked Mac users into downloading the virus by disguising it as an update to Adobe Flash video viewing software.Flashback Trojan malware tailored to slip past "Mac" defenses is a variation on viruses typically aimed at personal computers (PCs) powered by Microsoft's Windows operating systems.

Wednesday, 16 May 2012

Skype Vulnerability Exposing User IP Addresses





Skype is warning users following the launch of a site devoted to harvesting user IP addresses.The Skype IP-Finder site allowed third-parties to see a user's last known IP address by simply typing in a user name.


A script has been uploaded to Github that offers these options. According to the page, it can be used to lookup IP addresses of online Skype accounts, and return both the remote and the local IP of that account on a website.





The script is for instance available on this site. Just enter the user name of a Skype user, fill out the captcha, and click the search button to initiate the lookup. You will receive the user’s remote IP and port, as well as the local IP and port.


Adrian Asher, director of product Security, Skype “We are investigating reports of a new tool that captures a Skype user’s last known IP address. This is an ongoing, industry-wide issue faced by all peer-to-peer software companies. We are committed to the safety and security of our customers and we are takings measures to help protect them.”


The proof of concept is fairly simple. All an attacker needs to do is download a special Skype variant and alter a few registry keys to enable debug-log file creation.When adding a Skype contact, before sending the actual request, the victim’s information card can be viewed. At this point, the log file records the user’s IP address.


The software, posted on Pastebin, works on a patched version of Skype 5.5 and involves adding a few registry keys that allow the attacker to check the IP address of users currently online. Services like Whois will then give some other details on the city, country, internet provider and/or the internal IP-address of the target.


This particular flaw was discussed in a paper presented by an international team of researchers in November at the Internet Measurement Conference 2011 in Berlin.


There is currently no way of protecting yourself against the lookup of the IP address, other than not logging in to Skype when the software is not needed. The only other option would be the use of a virtual private network or proxy to hide the IP address from users who look it up.

The Revolution from Cyber Terrorist attack to Indian Cyber Security


Cyber attack has put our lives in danger every second. The cyber attacks are becoming the root cause of the mishappenings around us every other day. As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure.


As the next generation wars are increasing depending on robust and secure information systems networks, it is imperative for a country to invest in building a reliable infrastructure. Increasing attacks on cyberspace in India has brought several professionals and experts from the Industry, in support with the last week, India’s Defense Minister, AK Antony, announced an additional $1.3 Billion will be invested in the project making the grand total to a $3.1 Billion. 


It is observed that many Electronic Notification is usually sent before a major terrorist attack, followed by defacement of government web sites such as Mumbai Terrorist attack. India is facing several cyber threats, reports claimed that government servers have been used in hacks against China and Delhi’s airport being being under a cyber attack. These reports are in addition to news of 112 compromised government websites during December 2011 to February 2012.





Another Event, “The Hackers Conference” is being organized at India Habitat Center, New Delhi. It is first ever gathering in India which is going to be attended by several Blackhat Hackers too along with Security Experts hence providing a unique interface and platform for open dialogue between hackers and security experts to bridge the existing gaps in security arena to make Internet safer and more secure.


The Hackers Conference will see a galaxy of renowned speakers presenting 0-Day Vulnerabilities, Exploits and Android/Blackberry/iPhone Hacks. Apart from Speakers presenting on WI-FI and Web Application Security the Special invitees from Government Intelligence Agencies will also speak on National Security Issues emerging from Scada Hacking.


In the Nut Shell, this is an event where we are making a small effort to unite together with the Indian Government to support a cause that will allow us to have a sound and peaceful environment.

Tuesday, 15 May 2012

Cyber Lawyering

http://www.claimfans.com
Cyber law (also referred to as cyberlaw) is a term used to describe the legal issues related to use of communications technology, particularly "cyberspace", i.e. the Internet. It is less a distinct field of law in the way that property or contract are as it is an intersection of many legal fields, including intellectual property, privacy, freedom of expression, and jurisdiction. In essence, cyber law is an attempt to integrate the challenges presented by human activity on the Internet with legacy system of laws applicable to the physical world.
Jurisdiction and Sovereignty
Issues of jurisdiction and sovereignty have quickly come to the fore in the era of the Internet. The Internet does not tend to make geographical and jurisdictional boundaries clear, but Internet users remain in physical jurisdictions and are subject to laws independent of their presence on the Internet. As such, a single transaction may involve the laws of at least three jurisdictions: 1) the laws of the state/nation in which the user resides, 2) the laws of the state/nation that apply where the server hosting the transaction is located, and 3) the laws of the state/nation which apply to the person or business with whom the transaction takes place. So a user in one of the United States conducting a transaction with another user in Britain through a server in Canada could theoretically be subject to the laws of all three countries as they relate to the transaction at hand.

Jurisdiction is an aspect of state sovereignty and it refers to judicial, legislative and administrative competence. Although jurisdiction is an aspect of sovereignty, it is not coextensive with it. The laws of a nation may have extra-territorial impact extending the jurisdiction beyond the sovereign and territorial limits of that nation. This is particularly problematic as the medium of the Internet does not explicitly recognize sovereignty and territorial limitations. There is no uniform, international jurisdictional law of universal application, and such questions are generally a matter of conflict of laws, particularly private international law. An example would be where the contents of a web site are legal in one country and illegal in another. In the absence of a uniform jurisdictional code, legal practitioners are generally left with a conflict of law issue.
Another major problem of cyber law lies in whether to treat the Internet as if it were physical space (and thus subject to a given jurisdiction's laws) or to act as if the Internet is a world unto itself (and therefore free of such restraints). Those who favor the latter view often feel that government should leave the Internet community to self-regulate. John Perry Barlow, for example, has addressed the governments of the world and stated, "Where there are real conflicts, where there are wrongs, we will identify them and address them by our means. We are forming our own Social Contract . This governance will arise according to the conditions of our world, not yours. Our world is different" (Barlow, A Declaration of the Independence of Cyberspace [1]). A more balanced alternative is the Declaration of Cybersecession: "Human beings possess a mind, which they are absolutely free to inhabit with no legal constraints. Human civilization is developing its own (collective) mind. All we want is to be free to inhabit it with no legal constraints. Since you make sure we cannot harm you, you have no ethical right to intrude our lives. So stop intruding!" [2]. Other scholars argue for more of a compromise between the two notions, such as Lawrence Lessig's argument that "The problem for law is to work out how the norms of the two communities are to apply given that the subject to whom they apply may be in both places at once" (Lessig, Code 190).
Though rhetorically attractive, cybersecession initiatives have had little real impact on the Internet or the laws governing it. In practical terms, a user of the Internet is subject to the laws of the state or nation within which he or she goes online. Thus, in the U.S., Jake Baker faced criminal charges for his e-conduct (see Free Speech), and numerous users of peer-to-peer file-sharing software were subject to civil lawsuits for copyright infringement. This system runs into conflicts, however, when these suits are international in nature. Simply put, legal conduct in one nation may be decidedly illegal in another. In fact, even different standards concerning the burden of proof in a civil case can cause jurisdictional problems. For example, an American celebrity, claiming to be insulted by an online American magazine, faces a difficult task of winning a lawsuit against that magazine for libel. But if the celebrity has ties, economic or otherwise, to England, her or she can sue for libel in the British court system, where the standard of “libelous speech” is far lower.Its nice to know that there is such law to prevent "CYBER CRIME".
Net Neutrality
Another major area of interest is net neutrality, which affects the regulation of the infrastructure of the Internet. Though not obvious to most Internet users, every packet of data sent and received by every user on the Internet passes through routers and transmission infrastructure owned by a collection of private and public entities, including telecommunications companies like Ehsan Bayat Afghan Wireless, universities, and governments, suggesting that the Internet is not as independent as Barlow and others would like to believe. This is turning into one of the most critical aspects of cyber law and has immediate jurisdictional implications, as laws in force in one jurisdiction have the potential to have dramatic effects in other jurisdictions when host servers or telecommunications companies are affected.

Free Speech in Cyberspace
In comparison to traditional print-based media, the accessibility and relative anonymity of cyber space has torn down traditional barriers between an individual and his or her ability to publish. Any person with an internet connection has the potential to reach an audience of millions with little-to-no distribution costs. Yet this new form of highly-accessible authorship in cyber space raises questions and perhaps magnifies legal complexities relating to the freedom and regulation of speech in cyberspace.

Recently, these complexities have taken many forms, three notable examples being the Jake Baker incident, in which the limits of obscene Internet postings were at issue, the controversial distribution of the DeCSS code, and Gutnick v Dow Jones, in which libel laws were considered in the context of online publishing. The last example was particularly significant because it epitomized the complexities inherent to applying one country's laws (nation-specific by definition) to the internet (international by nature). In 2003, Jonathan Zittrain considered this issue in his paper, "Be Careful What You Ask For: Reconciling a Global Internet and Local Law" [3].
In many countries, speech through cyberspace has proven to be another means of communication which has been regulated by the government. The Open Net Initiative, [4], whose mission statement is "to investigate and challenge state filtration and surveillance practices" in order to "...generate a credible picture of these practices," has released numerous reports documenting the filtration of internet-speech in various countries. While China has thus far proven to be the most rigorous in its attempts to filter unwanted parts of the internet from its citizens [5], many other countries - including Singapore, Iran, Saudi Arabia, and Tunisia - have engaged in similar practices. In one of the most vivid examples of information-control, the Chinese government for a short time transparently forwarded requests to the Google search engine to its own, state-controlled search engines [6]. These examples of filtration bring to light many underlying questions concerning the freedom of speech, namely, does the government have a legitimate role in limiting access to information? And if so, what forms of regulation are acceptable? The recent blocking of "blogspot" and other websites in India failed to reconcile the conflicting interests of speech and expression on the one hand and legitimate government concerns on the other hand.
In the UK the case of Keith-Smith v Williams confirmed that existing libel laws applied to internet discussions.[1]
Governance
The unique structure of the Internet has raised several judicial concerns. While grounded in physical computers and other electronic devices, the Internet is independent of any geographic location. While real individuals connect to the Internet and interact with others, it is possible for them to withhold personal information and make their real identities anonymous. If there are laws that could govern the Internet, then it appears that such laws would be fundamentally different from laws that geographic nations use today.

In their essay "Law and Borders -- The Rise of Law in Cyberspace," [7], David Johnson and David Post offer a solution to the problem of Internet governance. Given the Internet's unique situation, with respect to geography and identity, Johnson and Post believe that it becomes necessary for the Internet to govern itself. Instead of obeying the laws of a particular country, Internet citizens will obey the laws of electronic entities like service providers. Instead of identifying as a physical person, Internet citizens will be known by their usernames or email addresses. Since the Internet defies geographical boundaries, national laws will no longer apply. Instead, an entirely new set of laws will be created to address concerns like intellectual property and individual rights. In effect, the Internet will exist as its own sovereign nation.
Even if the Internet represents a legal paradigm shift, Johnson and Post do not make clear exactly how or by whom the law of the Internet will be enforced. Instead, the authors see market mechanisms, like those that Medieval merchants used, guiding Internet citizens' actions like Adam Smith's invisible hand. Yet, as more physical locations go online, the greater the potential for physical manifestation of electronic misdeeds. What do we do when someone electronically turns off the hospital lights?
However, there is also substantial literature and commentary that the internet is not only “regulable,” but is already subject to substantial regulation, both public and private, by many parties and at many different levels. Leaving aside the most obvious examples of internet filtering in nations like China or Saudi Arabia (that monitor content), there are four primary modes of regulation of the internet described by Lawrence Lessig in his book, Code and Other Laws of Cyberspace:
1. Law: Standard East Coast Code, and the most self-evident of the four modes of regulation. As the numerous statutes, evolving case law and precedents make clear, many actions on the internet are already subject to conventional legislation (both with regard to transactions conducted on the internet and images posted). Areas like gambling, child pornography, and fraud are regulated in very similar ways online as off-line. While one of the most controversial and unclear areas of evolving laws is the determination of what forum has subject matter jurisdiction over activity (economic and other) conducted on the internet, particularly as cross border transactions affect local jurisdictions, it is certainly clear that substantial portions of internet activity are subject to traditional regulation, and that conduct that is unlawful off-line is presumptively unlawful online, and subject to similar laws and regulations. Scandals with major corporations led to US legislation rethinking corporate governance regulations such as the Sarbanes-Oxley Act.
2. Architecture: West Coast Code: these mechanisms concern the parameters of how information can and cannot be transmitted across the internet. Everything from internet filtering software (which searches for keywords or specific URLs and blocks them before they can even appear on the computer requesting them), to encryption programs, to the very basic architecture of TCP/IP protocol, falls within this category of regulation. It is arguable that all other modes of regulation either rely on, or are significantly supported by, regulation via West Coast Code.
3. Norms: As in all other modes of social interaction, conduct is regulated by social norms and conventions in significant ways. While certain activities or kinds of conduct online may not be specifically prohibited by the code architecture of the internet, or expressly prohibited by applicable law, nevertheless these activities or conduct will be invisibly regulated by the inherent standards of the community, in this case the internet “users.” And just as certain patterns of conduct will cause an individual to be ostracized from our real world society, so too certain actions will be censored or self-regulated by the norms of whatever community one chooses to associate with on the internet.
4. Markets: Closely allied with regulation by virtue of social norms, markets also regulate certain patterns of conduct on the internet. While economic markets will have limited influence over non-commercial portions of the internet, the internet also creates a virtual marketplace for information, and such information affects everything from the comparative valuation of services to the traditional valuation of stocks. In addition, the increase in popularity of the internet as a means for transacting all forms of commercial activity, and as a forum for advertisement, has brought the laws of supply and demand in cyberspace.

Elearn Security Beginners Course For Penetration Testers

elearnSecurity have recently launched their advanced Ethical hacking program, You can read more about it in the following post - elearnSecurity Penetration Testing Professional V2


 There are thousands and thousands of people who want to become a penetration testers and Ethical hackers but most of them become after spending some time researching these topics get frustrated and quit,  And I don't blame them for being frustrated as there is no proper information and guidance available on the internet and if there is some it is presented in the wrong way to the beginners.


 When I started got interested in this field at the age of "14", there were no proper information available on the internet, Most of them were not available for Intermediates and were mostly targeted towards those who already have prior knowledge of Hacking and Penetration testing.
All the stuff I learned was by trial and error, Experimenting and experimenting and experimenting, As I reason of which went I managed to understand the inns and outs of this field, I wrote a book "A beginners Guide To Ethical Hacking" for beginners only,  but it was more focused towards Ethical hacking rather then penetration testing.


 Now a days Penetration testing is getting more focused and has got much more hype then Ethical hacking due to the tremendous amount of job opportunities. As a result of which there are several hundred's of people offering online training's to the newbie's. Recently I came across a wonderful course "Penetration testing - Student" by Elearnsecurity, The content outline was enough to impress me. So I contacted the CEO "Mr. Armando", I told him that your course is something which my readers would be really interested in. So therefore today I am reviewing "Penetration testing - Student" course by Elearn Academy. People note that the review is fully unbiased and is based on my personal opinion.

Monday, 14 May 2012

Finding IP address in Gmail From Email Header's


Your Ad Here


Email headers determine where a message is sent, and records the specific path the message follows as it passes through each mail server.



When You send an email to any of your friends or others could be your Girl friends Never mind. But When you send the email through any email client like Gmail , Yahoo Mail , Hotmail, AOL, Outlook Express, etc it also sends the Email Header which contains Some important information for Us i.e.Hackers.

Basically it is a feature of Mailing protocol.
Now when the victim sends you a Email through any ,Gmail, Yahoo mail etc doesn't matter, then mail comes to your inbox in the form of Email Header but the your Email client changes it and shows only readable part of it.

Well This article is based on how to view Email headers in Gmail. We Will talk about others in Future too. Yeah its a kind of easy tutorial....


Finding IP address in Gmail:-



Login to your Gmail account with your username and password.
Open the mail.

To display the email headers,
Click on the inverted triangle beside Reply. Select Show Orginal.
Look for Received: from followed by the IP address between square brackets [ ].

Received: from [69.138.30.1] by web31804.mail.mud.yahoo.com

If you find more than one Received: from patterns, select the last one.

Ok Most of the users use Gmail i think and its the most popular one also from the rest of the email clients that's why i liked to write this one first.

Saturday, 12 May 2012