Happy hackers at Maker Faire 2011

SAN MATEO, Calif.--From the size of the crowd at Maker Faire today, it's clear the world has a growing appetite for DIY innovation. More than 100,000 people were expected for the sixth annual event, taking place at the San Mateo County Event Center this weekend.

A diverse mix of science, engineering, design, and art--with everything from robots to knitting to exploding soda to steam rollers--Maker Faire is an otherworldly extravaganza that attracts kids and adults, leaving both wide-eyed at the marvelous maker creations.

Where else can you see four very realistic beeping R2D2s twirling around through gawking crowds?

iPad Owners Spend More Time Using in Bed than in Bathroom

Users of Apple's iPad and other tablets prefer to spend more time fiddling with their devices in bed than in the bathroom.

That’s the assessment of a new study by The Nielsen Co.

Nielsen recently surveyed 12,000 tablet, e-reader and smartphone owners in the U.S. to find out where and in what situations people like to use the gadgets.The study also measured how long people use their devices compared to other situations. Use while watching TV, lying in bed, hanging out with friends and family, waiting for a doctor's appointment, and in the bathroom were all gauged.

Users of tablets, e-readers and smartphones said they spend about 3 percent to 4 percent of their gadget time in the bathroom. By comparison, about 21 percent of a tablet user’s time is spent lying in bed, and 11 percent of smartphone usage is spent on the mattress, according to the survey. Sixty-one percent of e-reader owners cited bedtime as a great situation for opening an e-book. And 37 percent of e-reading time was spent lying in bed among those surveyed.

The most popular place to use tablets appears to be in front of the tube.

Seventy percent of tablet owners cited watching TV as the most popular situation for using a tablet. This was also the biggest time suck with 30 percent of a user's tablet time spent in front of the set.

The least popular situation to pull out the electronic gizmos?

Tablet owners said they are least likely to use the device while commuting. Smartphone owners are most reluctant to pull out their device during a class or meeting. And 9 percent of e-reader users surveyed say they leave their gadgets at home when shopping or running errands.

'Jeopardy!'-Winning Computer Delving Into Medicine

IBM's Watson computer system, best known for defeating the world's best "Jeopardy!" players, now delivers rapid-fire answers to questions about diseases and medicines.

The company says it could be suggesting diagnoses and treatments to doctors right at a patient's bedside in the next couple of years.
In the Server Room of Jeopardy Challenger 'Watson' Watch Video
Jeopardy: Man vs. Machine Watch Video
Buying High Watch Video

A recent demonstration showed how Watson's suggested diagnoses evolved as the computer was given more information about a patient, including where the patient lived. When told a patient was pregnant, it altered its treatment suggestion.

Watson is being fed a diet of medical textbooks and journals and taking training questions in plain language from medical students. A doctor who is helping IBM says its database might soon include entries from blogs.

Microsoft and Facebook team up to fight child porn

Facebook is expanding its efforts to fight child pornography using Microsoft technology, Redmond announced in a blog post yesterday.

The world's largest social network has joined the National Center for Missing and Exploited Children's PhotoDNA program. The service, which was developed by Microsoft Research and Dartmouth College in 2009, uses image-matching technology to find known depictions of child pornography across the Web. Facebook plans to use the technology across its network to ensure child pornography is not circulating through the site.

Microsoft has been using PhotoDNA with great success since the service's development. According to the company, it has analyzed more than 2 billion images through its Bing image search and SkyDrive. So far, it has found 1,500 matches and 1,000 matches on Bing and SkyDrive, respectively.

"Many of these images recirculate on the Internet time and time again, even many years after the original crime occurred and the abuser has been brought to justice," Ernie Allen, president and CEO of the National Center for Missing and Exploited Children wrote on Microsoft's blog. "And every time these crime scene images are viewed, the children in the images are re-victimized. PhotoDNA aims to break this cycle, so the images of abuse need not haunt these children online forever."

This isn't Facebook's first move to stem the proliferation of child pornography on the Web. Last year, the company, along with MySpace, joined forces with then-Attorney General Andrew Cuomo, now governor of New York, to develop a "digital fingerprints" database. The tool would be used by the social networks to analyze a photo before it's uploaded to see if it matches the database of pornographic images. If so, the upload process would be blocked.

"Protecting Facebook users, especially the many young people who use our site, has always been a top priority and we devote significant resources to developing innovative systems to proactively monitor the site for suspicious activity and the rare cases of illegal content," Facebook Chief Security Officer Joe Sullivan said last year after Facebook announced its partnership with the attorney general.

Facebook plans to make an official announcement on its partnership with the National Center for Missing and Exploited Children on PhotoDNA later today. Those who are interested in hearing more about its plans can watch live starting at 12 p.m. PT. Users can also ask questions and have them answered by a panel discussing the launch.

PG Auto Pro Classifieds Software Shell Upload

###########################################################################################################
## PG Auto Pro classifieds software (FCKeditor) Arbitary File Upload ##
## Author : kaMtiEz (kamtiez@exploit-id.com) ##
## Homepage : www.indonesiancoder.com | www.exploit-id.com | www.magelangcyber.web.id ##
## Date : 14 May, 2011 ##
###########################################################################################################

[ Software Information ]

[+] Vendor : http://www.pgautopro.com/
[+] Download : – ( because not free :( )
[+] Price : PG Auto Pro $499.00 ( http://www.pgautopro.com/pricing.php )
[+] version : -
[+] Vulnerability : File Upload
[+] Dork : “CiHuY”
[+] LOCATION : INDONESIA – JOGJA

###########################################################################################################

[ Vulnerable File ]

http://127.0.0.1/[kaMtiEz]/system/plugins/fckeditor/editor/filemanager/connectors/test.html

[ Shell ]

http://127.0.0.1/[kaMtiEz]/uploads/file/YourFile.txt

[ DEMO ]

http://demo.pgautopro.com/system/plugins/fckeditor/editor/filemanager/connectors/test.html

http://sparkimotors.com/system/plugins/fckeditor/editor/filemanager/connectors/test.html

[ FIX ]

dunno :”>

###########################################################################################################

[ Thx TO ]

[+] INDONESIANCODER – EXPLOIT-ID – MAGELANGCYBER TEAM – MALANGCYBER CREW – KILL-9
[+] Tukulesto,arianom,el-farhatz,Jundab,Ibl13Z,Ulow,s1do3L,Boebefa,Hmei7,RyanAby,AlbertWired,GonzHack
[+] Lagripe-Dz,KedAns-Dz,By_aGreSiF,t0r3x,Mboys,Contrex,Gh4mb4S,jos_ali_joe,k4l0ng666,n4sss,r3m1ck,
[+] yur4kh4,xr0b0t,kido,trycyber,n4ck0,El k4mpr3t0 dan teman2 semuanya yang saya tak bisa sebutkan satu2 :D

[ NOTE ]

[+] For Wantexz .. Get Well Soon My Friends :)
[+] Special Thx to my brotherhood in DejavuNet :D
[+] Jangan Takut , Luka Pasti Akan Sembuh :)

[ QUOTE ]

[+] INDONESIANHAXOR still r0x
[+] nothing secure ..

WordPress EditorMonkey (FCKeditor) Remote File Upload

## WordPress EditorMonkey (FCKeditor) Remote File Upload
## Author : kaMtiEz (kamtiez@exploit-id.com)
## Homepage : www.indonesiancoder.com | www.exploit-id.com | www.magelangcyber.web.id
## Date : 14 May, 2011

[ Software Information ]

[+] Vendor : http://rajprasad.wordpress.com/plugins/editormonkey/
[+] Download : http://www.kumovies.com/wp-content/plugins/editormonkey.tar.gz
[+] version : 2.5 or lower maybe also affected
[+] Vulnerability : File Upload
[+] Dork : “CiHuY”
[+] LOCATION : INDONESIA – JOGJA

#############################################################################################################

[ Vulnerable File ]

http://127.0.0.1/[kaMtiEz]/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html

[ Shell ]

http://127.0.0.1/[kaMtiEz]/UserFiles/YourFile.txt

[ DEMO ]

http://ideashaveconsequences.org/wp-content/plugins/editormonkey/fckeditor/editor/filemanager/upload/test.html

[ FIX ]

dunno :”>

#############################################################################################################

[ Thx TO ]

[+] INDONESIANCODER – EXPLOIT-ID – MAGELANGCYBER TEAM – MALANGCYBER CREW – KILL-9
[+] Tukulesto,arianom,el-farhatz,Jundab,Ibl13Z,Ulow,s1do3L,Boebefa,Hmei7,RyanAby,AlbertWired,GonzHack
[+] Lagripe-Dz,KedAns-Dz,By_aGreSiF,t0r3x,Mboys,Contrex,Gh4mb4S,jos_ali_joe,k4l0ng666,n4sss,r3m1ck,El k4mpr3t0
[+] yur4kh4,xr0b0t,kido,trycyber,n4ck0,dan teman2 semuanya yang saya tak bisa sebutkan satu2 :D

[ NOTE ]

[+] For Wantexz .. Get Well Soon My Friends :)
[+] Special Thx to my brotherhood in DejavuNet :D
[+] Jangan Takut , Luka Pasti Akan Sembuh :)

[ QUOTE ]

[+] INDONESIANHAXOR still r0x
[+] nothing secure ..

Is Google’s Chromebook The Death Knell For Antivirus?

Updated and corrected below.

The antivirus industry likely let out a collective groan when Google first made a familiar-sounding boast Wednesday: that the just-launched laptops it’s calling Chromebooks have “security built-in so there is no anti-virus software to buy and maintain.”Similar claims from Apple (that its computers are safe “right out of the box“) or from Oracle (that its machines are “unbreakable“) have only been invitations to the security industry to prove otherwise. But this time is different: Google may have built something so simple that it renders security add-ons–and the industry that sells them–irrelevant.

Chromebooks are built to run nothing but a browser–unless they’re jailbroken, no executable files can be installed, neither antivirus software, nor the malicious software it’s meant to protect against. And if that web-only strategy catches on–still a big if, admittedly–it could spell real trouble for antivirus companies like McAfee, Symantec, Kaspersky and Trend Micro.

Charlie Miller, a researcher for Independent Security Evaluators who has made a career out of disproving Apple’s security claims, has owned a Chromebook since February, when the machines were sent as freebies to winners of the Pwn2Own hacking competition in Vancouver. He hasn’t dug deeply into the device’s security, but he says the Web-only security model works in theory. While a hacker might exploit bugs in the Chrome browser to run code on a user’s machine, that exploit would only allow the attacker to access the user’s data for a single session, and would disappear the moment the browser closed. “The way you stay persistent [as a hacker] is by installing software,” says Miller. “This is designed not to allow any persistence. You turn it off and on and you’re good to go.”

Update and correction :
A critical response post at Tom’s Tech Blog points out a few issues I missed here. Google is releasing a software development kit for native applications, which could potentially introduce security vulnerabilities. And with regard to Charlie Miller’s quote above, even a hijacked browser could potentially steal a user’s credentials, which could allow access to his or her cloud-stored data. (Though the point remains that this isn’t an issue that necessarily can be fixed by antivirus software.) Apologies for these oversights.

The Chromebook’s security model means the antivirus industry is facing a new kind of PC more similar to the iPhone than a netbook, argues Perimeter E-Security chief technology officer Andrew Jaquith: a limited device with security inherent in its restrictions . When Jaquith was still an analyst for Forrester Research last August, he wrote a widely-read post arguing the folly of Intel’s McAfee acquisition. One point in that argument was that McAfee is less relevant than ever before, as the burden for security in post-PC devices like tablets and smartphones shifts to the vendor–Apple, Google or RIM–instead of the security industry.

The Chromebook contributes to that larger post-PC problem for McAfee and its ilk, Jaquith argues. He points to data from Gartner Research that predicts sales of 1.4 billion post-PC devices (a category that he construes as including the Chromebook) by 2015 compared with 540 million traditional PCs. “Very few of these will need AV. That’s terrible news for security vendors because three-quarters of the market for their traditional products is about to go away,” says Jaquith. “That’s what happens when you build security in, instead of relying on the market to bolt it on. It’s great for customers, and terrible for the security aftermarket.”

When I asked McAfee chief executive David DeWalt about the problem that the security faces with regard to restricted devices like smartphones last month, he pointed out that McAfee has an opportunity to help businesses integrate those post-PC devices securely and that McAfee’s mobile software can help consumers track lost phones and back up their data, as well as protect them from malware. He also brought up a string of rogue apps that recently appeared in Google’s Android market as evidence of the need for post-PC security.

But integrating Chromebooks into an organization is easy enough–they don’t store any data locally, so they pose little risk of causing a data breach. Tracking lost phones and performing backups is hardly enough of a task to sustain giant antivirus operations like McAfee and Symantec. And in that Android outbreak that DeWalt referenced, Google flipped its remote kill switch, remotely wiping the offending apps without any security company’s intervention–hardly a demonstration of McAfee’s relevance in mobile.

The Chromebook is locked down even tighter than Android, and reduces antivirus’s foothold from slim to near-zero. The ultra-simple devices may catch on, or not. But either way, they’re a reminder that the PC world is facing an incursion by post-PC devices, and that those devices will be post-antivirus, too.

Free Domain List

Following web address that can register free domain :

1. co.cc

2. co.nr

3. uni.cc

4. dot.tk

5. co.tv

Sony to pay compensation over PlayStation security breach

SONY will compensate millions of PlayStation users whose personal details were hacked in a massive security breach.

And yesterday the electronics giant’s CEO Sir Howard Stringer also apologised for the first time to all those affected.

On the PlayStation website Sir Howard said: “As a company, we – and I – apologise for the inconvenience and concern caused by this attack.”

He then offered compensation to US PlayStation Network and other online product users in the form of a year-long free enrolment in an identity protection programme. It includes a £600,000 ID theft insurance policy. To try to reassure Sony customers, he added: “To date, there is no confirmed evidence any credit card or personal information has been misused.”

Sony revealed last month that hackers had swiped the names, addresses and possibly credit card details of more than 100 million accounts used for accessing games and music over the internet.

One expert warned security concerns could hit sales of Sony’s gadgets and hurt growth prospects for its network services. But Peter Walshe, of global brands research agency Millward Brown, insisted the main Sony brand should bounce back.

Yesterday, online vigilante group Anonymous denied being behind the cyber-attack. A posting on its blog said: “Let’s be clear, we are legion but it wasn’t us. You are incompetent, Sony.”

LastPass May Have Been Hacked, Virgin Media Outsources To Accenture, BlackBerry PlayBook Successor

LastPass, a company that allows its users to manage their passwords online, has revealed that it has detected anomalous traffic at its data center which might be due to hackers. The company said on its website that "We know roughly the amount of data transferred and that it's big enough to have transferred people's email addresses, the server salt and their salted password hashes from the database."

A couple from Wyoming has accused a national computer rental company of spying on its customers using webcams and other means. According to a report on Trib, Brian and Crystal Byrd have accused Aaron’s of spying on them without their knowledge. The couple alleged in the lawsuit that the company used a special device to spy on its customers’ electronic communication and even photographed them unknowingly via webcam.

A group of researchers in Japan are currently developing a “kissing simulator” which will allow people to kiss over the internet. The research carried out by the Kajimoto Research Laboratory at the University of Electro-Communications focuses towards building a machine that records the motion of the tongue and sends it across the other side of the web, at the target.

UK telecom giant Virgin Media is planning a major overhaul in its IT infrastructure by awarding an outsourcing contract to Accenture. Sources have told The Register that the company’s move to outsource its IT might have an immediate impact on 174 people including 90 redundancies. The report comes as the company announced its plans to close down its call centre in Trowbridge, Wiltshire.

According to recent rumours, the BlackBerry phone maker Research in Motion (RIM) is going to unveil the successor of its BlackBerry PlayBook tablet with a massive 10 inch screen. The rumours came into being following an unconfirmed report published in the tech website Boy Genius Report.

Source

Sony apologizes, offers insurance after hacking

Sony Corp. Chairman Howard Stringer apologized and offered U.S. users of its PlayStation Network and Qriocity online services a year of free identity-theft protection after the system was crippled by hackers.

Japan's biggest consumer-electronics exporter will offer a $1 million insurance policy per user, covering legal expenses, identity-restoration costs and lost wages that occur after data is stolen, Sony said in a blog post. Austin-based Debix Inc. was hired to provide the monitoring service and similar programs for customers in other countries are being considered.

The announcement follows last month's hacking of Sony's online entertainment and games platforms when the Tokyo-based company was criticized by U.S. lawmakers for not informing users of the breach quick enough.

"I welcome Sony's strong first step toward protecting millions of consumers whose personal and financial information has been compromised," U.S. Senator Richard Blumenthal, a Democrat from Connecticut, said in a statement.

"This is an unprecedented case of information theft in terms of the number of accounts involved," said Nobuo Kurahashi, an analyst at Mizuho Financial Group Inc. in Tokyo. "There are lots of uncertainties including lawsuits, making it difficult to estimate the company's overall expense."

U.S. subscribers have until June 18 to sign up for Debix's AllClear ID Plus protection program, said Patrick Seybold, a Sony spokesman for the video-games unit.

'Frustrating Time'

Sony didn't say whether the program will cover identity theft that isn't related to the mid-April breach of the PlayStation and Qriocity networks, which affected 77 million accounts. Some 24.6 million users of the Sony Online Entertainment platform were also affected, the company said.

"I know this is a frustrating time for all of you," Stringer said in the blog post. "Let me assure you that the resources of this company have been focused on investigating the entire nature and impact of the cyber attack we've all experienced and on fixing it."

Kazuo Hirai, Sony's executive deputy president in charge of consumer products and network services, apologized May 1 for the breach and said the company aims to restore the online gaming center by the end of the month after upgrading security. Hirai and two other officials bowed in apology at a press conference in Tokyo, and said Sony can't rule out credit card numbers and expiry dates having been stolen. The company is cooperating with authorities, including the Federal Bureau of Investigation.

Legal Backlash

The console maker has faced a legal and political backlash over delays in the time it took to warn customers their accounts had been compromised. Users were alerted of the breach April 27, six days after the shutdown of the movie and music-streaming services. The company hired technical experts to find out the problem.

"I wish we could have gotten the answers we needed sooner, but forensic analysis is a complex, time-consuming process," Stringer wrote. "Hackers, after all, do their best to cover their tracks. It took some time for our experts to find those tracks and begin to identify what personal information had, or had not, been taken."

'Anonymous'

Sony said on May 2 that the April attack also gave hackers access to data from Sony Online Entertainment, which offers role-playing games. That exposed 23,400 credit-card and debit records from non-U.S. customers, and the personal account information of 24.6 million account holders.

The inventor of Walkman music players was subpoenaed by New York Attorney General Eric Schneiderman over the data braches, a person familiar with the probe said.

In a letter to U.S. lawmakers, the company said while looking into the Sony Online Entertainment breach, it discovered that intruders had "planted a file on one of those servers named 'Anonymous,' with the words, 'We are Legion.'"

The company noted that weeks earlier, several Sony divisions had been the "target of a large-scale, coordinated denial-of-service attack" by Anonymous, a hacker-activist group.

Sony was singled out in a statement by 'Anonymous' after the company sued George Hotz, a 21-year-old hacker who publicized instructions for playing unauthorized games on the PlayStation console.

Legal and technology costs are likely to increase because of the incident, further hurting Sony's credit profile, Moody's Japan K.K. said in a statement May 2. Sony has an A3 rating at Moody's with a 'stable' outlook.

"We are absolutely dedicated to restoring full and safe service as soon as possible and rewarding you for your patience," wrote Stringer. "We will settle for nothing less."

Apple Supplier Foxconn Forces employees to Sign No Suicide Pact

Apple’s iPhone and iPad supplier Foxconn forced its employees to sign a ‘no suicide’ pact after a series of suicides by employees in Foxconn factories across China.

The new revelation is a part of a report released by The Centre for Research on Multinational Companies and the human rights group Students And Scholars Against Corporate Misbehaviour (SACOM), which found that staff are forced to sometimes forced to put in 98 hours of overtime per month, Thinq reports.

Foxconn forced its staff to make written promises that they won’t commit suicide after 14 Foxconn workers committed suicide and several others tried but survived in the company’s factories in Chengdu and Shenzhen districts.

The report also revealed that workers in Foxconn factories were forced to work 7 days a week manufacturing Apple’s iPad device. Apple’s own code of conduct for suppliers advises them to make the workers work no more than 60 hours per week.

Foxconn representatives denied that the suicides were related to forced overtimes with an executive adding that workers were committing suicides to get compensation for their families.

The report, which interviewed around 500,000 workers, revealed that workers lived in dormitories that looked like prison blocks and were treated like machines.

Source

Google, Facebook Both Looking To Team Up With Skype

Facebook and Google are both reportedly trying to strike a deal with popular VoIP service provider Skype.

Sources have told Reuters that Facebook CEO Mark Zuckerberg is mulling an all-out acquisition of the company while another source revealed that the company might form a joint venture with Skype.

Meanwhile, search engine giant Google is also in talks with Skype. Google already offers VoIP services via Google Talk and Google Voice.

However, the source revealed that the talks are in very early stages and ran a danger of collapsing midway. It is also not clear which company Skype is likely to go with.

On one hand, there is Facebook, with its 500 million + users that could give Skype the platform it needs to expand. Google is also moving big into the enterprise cloud services market and could use Skype to boost its portfolio.

Skype is also planning its first initial public offering, most likely in the second half of 2011. The company is expected to raise around a billion dollars from the IPO. With more companies moving into VoIP services, some analysts have speculated that Skype will need to work with a larger company to survive future competition.

Source

Why Standard & Pro iPhone 5 Handsets Don't Make Sense

Last week, a blog reported that Apple may be releasing two versions of the iPhone 5, one which may be billed as a "standard" one while the other will be presented as the "pro" one.

The author of the post on iPhoneDownloadBlog, Alex, quotes anonymous sources saying that the better version will have "the very best of what you can get right now" in terms of components, before adding that "Apple is ordering better quality components for the same function".

We're dubious about this rumour for a number of reasons; firstly, Apple doesn't do "pro" and "standard" versions. The straight-forwardness of its product range is one of the company's main selling points.

The only differentiators between the current iPhone models are the inherent network technology, the colour and the capacity; using only these parameters yields 12 stock keeping units, which would double to 24 if IDB is to be believed.

A single product like the iPhone 4 ensures a coherent user experience across the whole spectrum; from playing games, to reading emails or browsing the internet.

Introducing an iPhone 5 'Lite' dilutes that experience and may confuse the user, especially if Apple keeps the iPhone 4 as it did with the iPhone 3GS, which is more than likely to happen.

Then there's the fact that there aren't many features that can be altered without impacting on the user experience. Sure Apple can change the type of screen used, the screen size or resolution, the amount of memory and the number of cores on the next iPhone, but other than that it's quite hard to see how they would be able to differentiate between the Pro and the Standard iPhone 5.

Source

Hackers May Have Stolen Details Of 1.25m LastPass Accounts

LastPass, a company that allows its users to manage their passwords online, has revealed that it has detected anomalous traffic at its data center which might be due to hackers.

The company said on its website: "We know roughly the amount of data transferred and that it's big enough to have transferred people's email addresses, the server salt and their salted password hashes from the database."

The potential breach was discovered when the LastPass security team took a look at their logs and tried to explain every anomaly; unfortunately, they couldn't explain one that emanated from one of their non-critical machines and lasted for a few minutes.

Ironically, LastPass is supposed to help users manage their growing number of passwords and security logins, which is possibly why it could have been such an interesting target for hackers in the first place.

LastPass has urged its users to change their master passwords as soon as possible; access to that master password would have given any hacker the possibility to access scores of other passwords.

But, in stark contrast to what others have done in the past, LastPass apparently had a plan for such an eventuality and has forced all its customers to change their master passwords as a precautionary measure.

In addition, they're introducing a new feature called PBKDF2 or Password-Based Key Derivation Function which they hope will reduce the risk of hackers accessing customers information in the future even if they managed to breach LastPass's servers.

Source

Amazon iPad 2 Tablet Rival Is Real : Taiwan Sources

Amazon is indeed looking to build a credible iPad 2 competitor according to "upstream" sources based in Taiwan who normally receive orders well in advance for components.

Digitimes notes that Quanta computer, one of the biggest OEMs from the island, received orders from Amazon for the tablet which will use display components from E Ink Holdings.

The Taiwanese company is expecting to ship up to 800,000 units during the peak season towards the end of the year with initial shipping dates starting as early as July 2011.

Interestingly, the Quanta source said that the company expects the device to contribute as much as $3.5 billion to the company's annual revenue which, we suspect, is not totally correct given that Quanta will have to produce at least 10 million Amazon tablets in the six remaining months of 2011 to reach that number, something which is not likely to happen.

Quanta is looking to add Lenovo to its portfolio of tablet customers and wants to get them onboard to produce their next generation LePad (ed: we had a prior view of the Ideapad S1 which is set to come later this year).

Digitimes' report mentions that Amazon has been successful with the Kindle, its ebook reader, only in the US and Europe but hasn't been able to conquer a significant market share elsewhere.

One possible strategy Amazon may be looking into is to cut the price of the Kindle, flog it as a tablet lite, and then push a proper tablet device capable of rivalling the iPad 2.

Source

Sony Nearly Ready To Resume PlayStation Network Services

Sony will begin resuming some PlayStation Network services this week following a massive outage caused by an attack on the company’s servers.

According to a press release on the PlayStation blog, the company is gearing up to resume some of the features on the PlayStation network including gaming, music and video services.

The company was forced to shut down the entire PlayStation Network after hackers broke into their servers and stole valuable user information including user names, passwords and emails and presumably, credit card information. The outage affected more than 77 million PSN users worldwide.

Sony announced that it had done an audit of its entire network and had implemented measures to protect user information against future attacks.

The features that Sony will activate this week on the PlayStation Network include online gaming, access to music streaming services, access to account management and password reset, access to movie rentals, friend list and chat functionality.

“These illegal attacks obviously highlight the widespread problem with cyber-security. We take the security of our consumers’ information very seriously and are committed to helping our consumers protect their personal data,” said Kazuo Hirai, Executive Deputy President, Sony Corporation.

“In addition, the organization has worked around the clock to bring these services back online, and are doing so only after we had verified increased levels of security across our networks,” he added.

Source

BackTrack 5 Release

The BackTrack Dev team has worked furiously in the past months on BackTrack 5, code name “revolution”. Today, we are proud to release our work to the public, and then rest for a couple of weeks.

This new revision has been built from scratch, and boasts several major improvements over all our previous releases.










Based on Ubuntu Lucid LTS. Kernel 2.6.38, patched with all relevant wireless injection patches. Fully open source and GPL compliant. Head down to our downloads page to get your copy now!

We would like to take this opportunity to thank several key individuals who have helped make this release possible:

- Ofensive-Security who have played a major role in deveopment and funding of our project.
- Devon Kearns – A new member in our BackTrack team who single handedly covered more packages that the whole team put together. At some stage we considered renaming the release to “dookie-track”.
- Shadz – Master of the dragon and creator of the promo movie. Check him out at www.zusedesign.com
- Digip – Master of our website and dang good artist – ticktockcomputers.com
- Elwood – For getting an awesome forensics environment up. Thanks!
- Mister_X – For going through our wireless setup and making sure everything was sparkling.
- Bolexxx – our torrent and download master. Your download is due to him.

I would also like to personally thank each member of the BackTrack Dev team for putting the effort required to make this great release. Stay tuned to our Forums and Wiki for upadtes, howtos and bug fixes for BackTrack 5. These resources will grow significantly in the next couple of weeks.

Head down to the downloads page and get your copy of BackTrack 5!

Source

How to Remove Google Redirect Virus 2010-2011?

Google redirect virus is one of the mechanical disorders created in the computers, laptops which directly attack the users Google search main page, leaving the user to redirect and get into wrong malicious programs.

This annoying virus is specially promoted through Trojans like Msqpdxserv.sys; the virus is connected with online scam and websites which distribute other malware resulting in completely damaging your computer. It is very important to remove Google redirect virus from your computer as soon as it is detected. This virus has become very common in 2010-2011. It is very difficult to completely get rid of this virus from your computer.

Google redirect virus 2010-2011 is also known as browser hijacker. It completely removes the original main page of the web browser and does not allow the user to work on it. This in result redirects the user to move the web browser in the websites which are not required at all. This virus does not allow the user to use certain security tools and websites. A computer which is infected with annoying virus may display the advertisements which are not required by the user. This virus is capable of changing the HOSTS file.

Following steps needs to be followed in case you wish to remove Google redirect virus 2010-2011 from your PC. Manual removal of Google redirect virus consumes lot of time and one should possess a proper knowledge of the computer to perform the action properly.

• Go to start and select run. Then type regedit in the space and click ok.

• Delete all the required registry files.

• Now delete the DLL files. Go to start and select run. Then type cmd in the space and click ok.

• Then unregister all the DLL files which are not required. Finally delete them.

• You can also remove the Google redirect virus with the help of browser helper object.

• Follow the above mentioned step by step so that you can work on each of them thoroughly.

• After the computer is over with the performance of the removal procedure, clear your web browser main page and restart the computer.

• After reinstalling the computer now look for the results.

It is always advised to remove the Google redirect virus automatically because manual removal is very risky and may not remove the infection permanently. It is best to invest and get install a good spyware software or to run an anti-virus program in your computer.

Russian pres fumes at mystery DDoS hack

Russian president Dmitry Medvedev has denounced online vandals who launched an attack against the site that hosts his blog.

The denial of service assault on the LiveJournal site on Wednesday was both “outrageous and illegal” the Russian politician fumed after the assault, the BBC reports. “What has occurred should be examined by LiveJournal’s administration and law enforcement agencies,” he wrote.*

Novaya Gazeta, a newspaper critical of official government policies, was also hit a day later, on Thursday, as part of a wave of website-jamming attacks directed around the Russian interwebs this week. The paper is running a project to create an “online parliament” in order to create a venue where issues ignored by vested government or corporate interests can be debated and discussed. Novaya Gazeta reckons that this effort to create a forum of free speech is behind the attacks.

Whether the two attacks are linked remains unclear.

LiveJournal addresses associated with a popular anti-corruption blogger, Alexey Navalny, were reportedly the first to be targeted by denial of service attacks that first began on 24 March, according to a post on Kaspersky Lab’s SecureList blog. It reports the attacks are using the Optima/Darkness DDoS bot, currently all the rage on Russian language cybercrime forums. Who is being targeted – mostly political bloggers, although one furniture firm is on the list – is clear enough, as is how the attack took place. But why the attacks have been mounted, much less who exactly is behind them, remains unclear.

The other attacks might have been launched in order to draw attention away from the assault on the furniture firm, as Kaspersky analyst Maria Garnaeva notes. Alternatively, the attacks may have originated with anti-opposition cyber-militia, who then mistakenly attacked Medvedev’s blog.

In possibly related news, surfers attempting to reach the website of Russian football club Zenit St Petersburg were redirected to a site hosting complaints against local politicians instead earlier this week. We suspect CSKA Moscow fans for this assault, blamed by the club on a DNS records hack. But that’s just us.

Feds defend Twitter dragnet on WikiLeaks

Federal prosecutors on Friday defended their attempts to access the Twitter records of three WikiLeaks supporters, arguing their claims that the dragnet violates their constitutional rights should be rejected.

In a 19-page filing in federal court, prosecutors said a ruling issued last month should be upheld despite the claims by WikiLeaks supporters Jacob Appelbaum, Birgitta Jónsdóttir, and Rop Gonggrijp that it violates their right to free speech. The filing came in an ongoing criminal investigation into Julian Assange founder of the whistle-blower website.

The March 11 order approved the government’s request for IP addresses the supporters used to access Twitter between November 2009 and last December and the email addresses they gave when registering with the micro-blogging website. US Magistrate Judge Theresa Buchanan said there were no constitutional violations because the information sought didn’t involve the content of any of the Twitter subscribers’ communications. Federal prosecutors agreed.

“The subscribers’ claim that Twitter’s non-content records are subject to heightened protections under the First Amendment is baseless,” they wrote.

The information demand was made in a confidential filing in December under the US Stored Communications Act. The Twitter users also argued that the secrecy of the motion violated their Fourth Amendment right protecting them from unreasonable searches and seizures. The government later agreed to make public most of the court documents filed in their demand, but withheld revealing one document that Buchanan said would reveal “sensitive nonpublic facts, including the identity of targets and witnesses.”

Snortalog Snort Log Summarizer 2.4.3

Snortalog is a powerful Perl script that summarizes Snort logs, making it easy to view any network attacks detected by Snort. It can generate charts in HTML, PDF, and text output. It works with all versions of Snort, and can analyze logs in three formats: syslog, fast, and full snort alerts. Moreover, it is able to summarize other logs like Fw-1 (NG and 4.1), Netfilter, and IPFilter in a similar way.

Changes : This release brings new features like TippingPoint, Netscreen, and CheckPoint R70 & R71 logs detection. The GUI works with the latest GD libraries to improve Windows compatibility.

MD5 | 83b07c1f0ae06f81d04a862704cf83a4

Download

PHP DoS/DDoS (Denial Of Service) Script
















This script enables you to launch a DoS attack from your server (using that nice high bandwidth connection provided by your hosting provider) to bring your victims server/PC to its knees.
This script should be used responsibly, I did not create it, im merely distributing it for “educational” purposes.

Download PHP DoS script

Search Terms :
ddos script
php dos
php ddos script
php dos script
ddos php script
ddos script php
phpDos
ddos scripts
script DDOS
php ddos
ddos php
denial of service script
dos php
ddos attack script
php ddoser
script php ddos
dos php script
php script ddos
ddos script download
php DDos attack script
script ddos php
PHP DoS Script by Exe
ddos
php dos by exe
ddos skript
mysql ddos
DENIAL OF SERVICE php script
php ddos attack
php ddos download
download script ddos
ddos online
denial of service scripts
PHP DoS/DDoS (Denial Of Service) Script
ddos php tool
php curl ddos
ddos php scripts
script ddos attack
dos script denial
php Dos scripts
php denial of service

Havij v1.14 Advanced SQL Injection

Havij is an automated SQL Injection tool that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page. It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and password hashes, dump tables and columns, fetching data from the database, running SQL statements and even accessing the underlying file system and executing commands on the operating system.

The power of Havij that makes it different from similar tools is its injection methods. The success rate is more than 95% at injectiong vulnerable targets using Havij.

The user friendly GUI (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.

Download Havij v1.14

DVWA Web Hacking

Damn Vulnerable Web Application (DVWA) is a collection of web hacking tool based on PHP / mySQL. DVWA may be an option for beginners to learn web hacking web hacking techniques from scratch. Various techniques web hacking attacks can be obtained from this tool. Besides easy to use, lightweight and complete, DVWA run through a local server (localhost) using WAMP / XAMP / LAMP and others.

DVWA include some web hacking tools such as :
- SQL Injection
- XSS (Cross Site Scripting)
- LFI (Local File Inclusion)
- RFI (Remote File Inclusion)
- Command Execution
- Upload Script
- Login Brute Force

Download here

Armitage

Armitage is a graphical cyber attack management tool for Metasploit that visualizes your targets, recommends exploits, and exposes the advanced capabilities of the framework. Armitage aims to make Metasploit usable for security practitioners who understand hacking but don’t use Metasploit every day. If you want to learn Metasploit and grow into the advanced features, Armitage can help you.

Armitage organizes Metasploit’s capabilities around the hacking process. There are features for discovery, access, post-exploitation, and maneuver.

For discovery, Armitage exposes several of Metasploit’s host management features. You can import hosts and launch scans to populate a database of targets. Armitage also visualizes the database of targets–you’ll always know which hosts you’re working with and where you have sessions.

Armitage assists with remote exploitation–providing features to automatically recommend exploits and even run active checks so you know which exploits will work. If these options fail, you can use the Hail Mary approach and unleash db_autopwn against your target database.

Requirements
To use Armitage, you need the following:
Linux or Windows
Java 1.6+
Metasploit Framework 3.5+
A configured database. Make sure you know the username, password, and host.

Download :
Windows
Linux

Hexjector

Hexjector is an Opensource,Cross Platform PHP script to automate Site Pentest for SQL Injection Vulnerabilties.

Features :
1.Check for SQL Injection Vulnerablities.
2.Pentest SQL Injection Vulnerablities.
3.Web Application Firewall Detector.
4.Scan For Admin Page
5.Manual Dump Function
6.Browser
7.SQL Injection Type Detection
8.Search For Vulnerable Sites by using Google Dork
9.MD5 Cracker

Download here

Wireless Hacking Tools 2011

Wireless Hacking Tools 2011 | 156.63 MB

WiPhire is a Bash script aimed at making the Wireless Hacking process a lot easier. This script was written on Backtrack 4 and designed to be used with Backtrack 4. This script was also designed to be used with the Alfa AWUS036H Wireless adapter with the RTL8187 chipset. If you do not have this chipset but another adapter that is compatible with the aircrack-ng suite you will need to put it into monitor mode prior to running the script if you wish to use an option that needs monitor mode enabled. This script needs to be ran as root.

1. Wireless hacking tool AIO 2009 edition with a few tweaks by tweaker so updated to 2011
2. Airodump and Airongcrack etc. to get WEP and WPA password
3. WiPhire
airodump is an 802.11 packet capture program that is designed to "capture as much encrypted traffic as possible...each WEP data packet has an associated 3-byte Initialization Vector (IV): after a sufficient number of data packets have been collected, run aircrack on the resulting capture file. aircrack will then perform a set of statistical attacks developed by a talented hacker named KoreK."

These are the functions of the script :
autoMACtic MAC spoofer
Ability to crack WEP networks
Ability to crack WPA networks
Perform simple MITM attacks
DNSspoof a network
Use airdrop-ng to create a jammer
Programs that WiPhire Uses:

airmon-ng
airodump-ng
aireplay-ng
aircrack-ng
airdrop-ng
xterm
crunch
pyrit
sslstrip
arpspoof
macchanger
kate
apache2
ettercap
Firefox

If a virus alert occurs disregard that as for these are hacking tools and they will be flagged as virus's no matter what.

Download:
http://hotfile.com/dl/95289912/805d3d5/WHT2OII.rar.html
Mirror 1:
http://www.fileserve.com/file/mCesPNH/WHT2OII.rar
Mirror 2:
http://www.filesonic.com/file/54270824/WHT2OII.rar

Remote Administrator with ProRat

Prorat is one of RAT (Remote Administration Tools) are widely used to take over the computer system. Tool made by PRO Group, a group of Turkish hackers community, can be used as a tool Hacking computers in a network. Use of Prorat quite simple, you simply enter the IP (Internet Protocol) is the target computer and then go through one open port. The hardest part is finding where an open port. But you can use a variety of network analysis tools such as nmap, Ethercap, LookHost, etc.

Here are the features provided by PRORAT:
- Remote Control
- Viewing System Info, application running and the Task Manager
- Add process, file, or download files
- Admin FTP
- Format the HDD (hard disk damage)
- Remotely download
- Running MS-DOS, Batch Script, VBScript
- Adding a Registry Entry
- Keylogger: Password Recording
- Make Screnshoot, see your Windows desktop instantly
- Send messages and chat
- Shutdown, Restart, Control Panel, IExplorer, Registry, Printer and Online Controls

Download here


 

Copyleft © 2011