Thursday, December 06, 2012

10 Worst Cyberattacks in 2012


Bangalore: When the world was too busy to catch up their breath from new technological launches be it iPhone 5, Windows 8, Gmail’s 10 GB attachments or serious inroads into cloud connectivity which enabled working on the go, there were other elements of the tech-world snarling to pounce.


Cybercriminals too evolved to deal with new technology growth and designed clever ways to sneak away millions from unsuspecting consumers through malicious links, phishing scams and password hacks. The big company’s like Amazon, LinkedIn and others too put to embarrassment.   


Cybercrime prevention company ThreatMetrix has put together an infographic detailing the top 10 spookiest cyberattacks of the year so far. "With threats looming everywhere from banks and web browsers to online dating and social networking sites, this list is sure to leave you with goosebumps," the company says.


#10 Yahoo Voices


A hacker group called D33DS Company has dumped 453,492 usernames and passwords obtained in plaintext from a Yahoo! Voice service, formally known as Associated Content.


The usernames and passwords were posted online by the D33DS Company group. Apparently, hackers were able to get their hands on plaintext list of passwords and usernames using a MySQL injection attack.





#9 Android


The leading mobile platform in the world and its Google play sports about 700,000 apps. For hackers Android was too tempting an apple to resist, the result: currently about 198 million Android users’ memory cards are at the risk of wiping out clean with a malicious link or from a malicious app. Earlier this year the hackers developed a fake version of Instagram app which sent expensive text messages from the users’ phones.


#8 Wells Fargo


Wells Fargo & Company is an American multinational diversified financial services company with operations around the world. It is the fourth largest bank in the U.S. by assets and the largest bank by market capitalization. The bank’s website was recently hacked putting 70 million customers and 8.5 million active users’ data at risk.


Bank's Chief Financial Officer, Tim Sloan told Reuters that the cyber attacks were "pretty significant" but didn't cause customer losses or a major increase in expenses.


The group that calls itself the Cyber Fighters of Izz ad-din Al Qassam claimed credit for the attacks and said it to be a protest against the anti-Islam video posted on YouTube, reported Rueters.




#7 Amazon owned Zappos targeted


Zappos.com, the online shoe retailer owned by Amazon.com, got its internal network infiltrated by a cyber attacker.


More than 24 million customers personal information including: customers' names, e-mail addresses, billing and shipping addresses, phone numbers and the last four digits of customers’ credit card numbers were at hackers’ mercy.


However, database that stores customers' critical credit card and other payment data was not affected or accessed.


#6 Microsoft Internet Explorer


Internet Explorer got vulnerable to hackers when a security hole which was discovered in September. The hackers targeted some of the users by installing malicious software on Windows systems and had accessed personal.


The attacks prompted the German government and security experts to urge people to temporarily stop using the browser, reported IBN Live. 


However Microsoft acted fast and fixed a security bug in Internet Explorer.


#5 Global Data Inc (Visa and Master Card)


Hackers breached data card processing systems and were successful in getting 1.5 million card numbers. However names, addresses and other data which could have led to massive money drain out, was not stolen. It was a very narrow escape.




#4 LinkedIn And eHormany


The professionals’ social networking siteLinkedIn and online dating site eHarmony were been hacked, about 64 million LinkedIn passwords were put at risk and about 30,000 passwords were cracked. About 1.5 million eHORMONY passwords were stolen and posted on an online password cracking forum. These combined attacks put the personal information of the million at risk.    


#3 Go Daddy


Go Daddy, the domain registrar and Web hosting firm, with more than 53 million registered domain names had suffered major outages following a major cyber attack, which potentially would have taken millions of sites down with it. The activist group Anonymous later claimed the responsibility however Go Daddy denied it. But it did result in many firms going for Go Daddy for a domain registration though.


#2 U.S. Environmental Protection Agency


Thousands of employees of the U.S. Environmental Protection Agency had their Social Security numbers, bank-routing information and addresses exposed in a cyber breach of an internal computer database, reported Bloomberg. It compromised 8000 employees’ and others’ social security numbers and banking information.


#1 Gostshell


An Anonymous-related group, Ghostshell leaked 120,000 records from the top universities by injecting malware and vulnerable links.







Difference between 40 pin and 80 pin IDE/ATA data cables


1. 40 Pin IDE/ATA CABLE
· Each IDE/ATA channel uses one IDE/ATA cable. The cable that has been used for over a decade on this interface was once just called "an IDE cable", since there was only one kind (with the exception of special cable select cables.) Today, however, there is also the new 80-conductor Ultra DMA cable;
· A standard IDE cable is a rather simple affair: a flat ribbon cable, normally gray in color, with a (usually red) stripe running down the edge. The cable has 40 wire connectors in it, and usually has three identical female connectors: one is intended for the IDE controller (or motherboard header for PCs with built in PCI ATA controllers) and the other two are for the master and slave devices on the interface. The stripe is used to line up pin 1 on the controller (or motherboard) with pin 1 on the devices being connected, since the techniques used for keying the cables are not standardized.
clip_image002
A standard, 40-wire IDE/ATA cable. Note the presence of three black
connectors, and the 40 individual wires in the ribbon cable.
2. 80 PIN IDE/ATA CABLE
  • Requirement: The 80-conductor cable was first defined with the original Ultra DMA modes 0, 1 and 2, covering transfer speeds up to 33.3 MB/s
  • Cable Select Support and Drive Assignment: All 80-conductor cables that meet the ATA specifications support the cable select feature automatically.
  • Connector Assignments and Color Coding: For the first time, the 80-conductor cable defines specific roles for each of the connectors on the cable; the older cable did not. Color coding of the connectors is used to make it easier to determine which connector goes with each device:
    • Blue: The blue connector attaches to the host (motherboard or controller).
    • Gray: The gray connector is in the middle of the cable, and goes to any slave (device 1) drive if present on the channel.
    • Black: The black connector is at the opposite end from the host connector and goes to the master drive (device 0), or a single drive if only one is used.
clip_image004
A standard 80-conductor Ultra DMA IDE/ATA interface cable.
Note the blue, gray and black connectors, and the 80 thin wires.
The red marking on wire #1 is still present (but hard to see in this photo.)
3. Comparison between 40 pin and 80 pin IDE/ATA data cables
clip_image005
comparison of the wires used in 80-conductor and 40-conductor cables.
The 80-conductor cable is about the same width as the older style
because thinner gauge wires are used to make up the ribbon.




Sunday, December 02, 2012

Free Online Text To Speech Convertor



Making a good presentation mean adding every available feature in the file so that every person get your message clearly. Creating automated presentations are more commonnow a days but the softwares available to create this type of presentations are much more expensive. Few people can afford them but what if your Microsoft PowerPoint presentation become something like the above said. You can make a very good presentation with Microsoft PowerPoint and add voice in the background to read the text to make it more worthwhile for the viewers.
Online text to speech convertor are the most suitable and cheapest available options. You can change the voice (male/female), speed and many more features are available. there is a desktop version also available for this application and that is also free.
texttospeech

Check this great facility at under given URL for free:

How to Secure Files And Communications



People are working around to make their files and communications more and more safer than their other things by using passwords, long and complex passwords with special characters and many more techniques but the experts proved that this is not the only thing you should do to save your files and important data. Not so long ago, computer enthusiasts have proved to retrieve an eight letter password by use of a GPU in three days. Makes you wonder how safe your data is. In PixelCryptor you choose a picture and use it to combine your files into a package. The pixel data is used to encrypt your data. The combinations are endless and hard to break. Nowadays people have not one, but dozens of passwords. It can be hard to remember them, and you might lose precious data when you forget them. PixelCryptor offers a solution.
pxmain
Encryption has been used for as long as people have been talking and wishing to keep their communications secret. Examples range from trans- position Cyphers used by the Spartan military to more modern techniques like DES and AES.

pxencode2
A picture tells a thousand words, Complex encryption, yet user friendly
PixelCryptor offers an easy to use wizard to guide you  through the process of encryption and decryption. You are free to encrypt as many files you like. Be sure to save yourpicture, because just like passwords, when the key is gone the package is locked for good. No backdoor, workaround or crowbar will get you in.
Note: This software is free to use by the given terms of useLicense Agreement

KGB Archiver Download


KGB Archiver: Compress 1GB File to 10MB

KGB Archiver is free and open source software which compresses 1GB file to 10MB file. Data compression utility of this software is based on PAQ6 algorithm which has AES-256 powerful encryption. KGB archiver works on both Windows and Linux operating system. Compression ratio of this software is very high. Due to high compression levels, time to compress a file goes high as the size of the file increases and compression ratio may  vary depending on the format of the file.
When a file is compressed with KGB Archiver it saves it with own extension and at the time of decompression it automatically recognizes the file format. The only limitation of KGB archiver is, decompressed file cannot be open or extract with other compression softwares. You can also choose any compression level (high, maximum, normal, low, very weak) to compress a file but the compression time  will vary according to your selected compression level.
Note: If you are compressing any file with KGB archiver and sending the comprssed file to your friends then he must have KBG archiver installed on his computer to decompress the file.
System Requirements:
Due to high compression ratio of KGB archiver, you need to have a decent system hardware configuration
  • 256 MB RAM
  • 1.5 GHz Processor
Features of KGB Archiver

  • Supports native .kgb files and .zip files
  • AES-256 Encryption
  • Able to create self-extracting archives.
  • Multilanguage supports like Arabic, German, Greek, Japanese, Spanish many more.
  • Unicode is supported in both User Interface and File Systems.
  • An Explorer shell extension is available for the windows version.
  • Make Password protected compressed file.


Note: This KBG Archiver software cannot compress video format files.

Tally 7.2 Software with Key Full Version


Tally 7.2 Software With Key Full version




Mobile Security for Android


The "Download Now" link directs you to the product page in the online Android Market. The application can directly be downloaded and installed on the registered Android device from your PC, or you can download it from the Android Market on your Android device.

Oracle 10g Software Free Download



Oracle Database 10g Express Edition


Free to develop, deploy, and distribute


Oracle Database 10g Express Edition (Oracle Database XE) is an entry-level, small-footprint database based on the Oracle Database 10g Release 2 code base.  It's free to develop, deploy, and distribute; fast to download; and simple to administer.

Free Apache Tomcat Download



Apache Tomcat is an open source software implementation of the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed under the Java Community Process.
Apache Tomcat is developed in an open and participatory environment and released under the Apache License version 2. Apache Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. We invite you to participate in this open development project. To learn more about getting involved, click here.
Apache Tomcat powers numerous large-scale, mission-critical web applications across a diverse range of industries and organizations. Some of these users and their stories are listed on the PoweredBy wiki page.
Apache Tomcat, Tomcat, Apache, the Apache feather, and the Apache Tomcat project logo are trademarks of the Apache Software Foundation.

Download