Tuesday, 30 October 2012

A SHORT STORY...

LIFE IS AN ECHO..

A little boy got angry with his mother and shouted at her,"I hate you, I hate you". Because of fear of reprimand, he ran out of the house. he went up to a valley and shouted,"I hate you, I hate you", and the echo returned "I hate you, I hate you". having never heard an echo before, he was scared, and ran to his mother for protection. he said there was a bad boy in the valley who shouted "I hate you, I hate you". the mother understood and asked the son to go back and shout, "I love you, I love you". the little boy went and shouted "I love you, I love you", and back came the echo. that taught the little boy a lesson : Our life is like an echo. we get back what we give.
life is a boomerang. Benjamin Franklin said "When you are good to others, you are best to yourself."

source : You can Win by Shiv Khera (Edition 2011) 
Chapter 7 ; pg no. 167

Friday, 12 October 2012

Future cyber attacks could rival 9-11, cripple US, warns Panetta..


The Secretary of Defense laid out why the military should be involved in defending critical infrastructure
 The U.S. is facing a dramatically increasing threat from cyber attacks and a future attack on the country's critical infrastructure could have an effect similar to the Sept. 11 terrorist attacks of 2001, the U.S. Secretary of Defense said Thursday evening.
Speaking at a meeting of the Business Executives for National Security (BENS) in New York, Leon Panetta called the Internet "the battlefield of the future" and spelled out what he believes the Department of Defense's role should be in cyberspace.
The military's role in securing the domestic Internet and working against attacks on commercial institutions has been controversial, although Panetta sought to get the assembled business leaders on his side by warning them of the danger a large-scale attack could have on their companies.
"A cyber attack perpetrated by nation states or violent extremist groups could be as destructive as the terrorist attack on 9/11," he said in the televised speech. "Such a destructive cyber terrorist attack could virtually paralyze the nation."

http://www.computerworld.com/s/article/9232317/Future_cyber_attacks_could_rival_9_11_cripple_US_warns_Panetta

Sunday, 7 October 2012

Cyber criminals plot massive banking Trojan attack..


Computerworld - An international gang of cyber crooks is plotting a major campaign to steal money from the online accounts of thousands of consumers at 30 or more major U.S. banks, security firm RSA warned.
In an advisory Thursday, RSA said it has information suggesting the gang plans to unleash a little-known Trojan program to infiltrate computers belonging to U.S. banking customers and to use the hijacked machines to initiate fraudulent wire transfers from their accounts.
If successful, the effort could turn out to be one of the largest organized banking-Trojan operations to date, Mor Ahuvia, cybercrime communications specialist with RSA's FraudAction team, said today. The gang is now recruiting about 100 botmasters, each of whom would be responsible for carrying out Trojan attacks against U.S. banking customers in return for a share of the loot, she said.
Each botmaster will be backed by an "investor" who will provide money to buy the hardware and software needed for the attacks, Ahuvia said.
"This is the first time we are seeing a financially motivated cyber crime operation being orchestrated at this scale," Ahivia said. "We have seen DDoS attacks and hacking before. But we have never seen it being organized at this scale."
RSA's warning comes at a time when U.S. banks are already on high alert. Over the past two weeks, the online operations of several major banks, including JP Morgan Chase, Bank of America, Citigroup and Wells Fargo were disrupted by what appeared to be coordinated denial-of-service attacks.
A little-known group called "Cyber fighters of Izz ad-din Al qassam" claimed credit for the attacks, but some security experts think a nation may have been behind the campaign because of the scale and organized nature of the attacks.
In mid-September, the Financial Services Information Sharing and Analysis Center (FS-ISAC) warned banks to be on guard against cyberattackers seeking to steal employee network login credentials to conduct extensive wire transfer fraud. Specifically, the alert warned banks to watch out for hackers using spam, phishing emails, Remote Access Trojans and keystroke loggers to try and pry loose bank employee usernames and passwords.

http://www.computerworld.com/s/article/9232117/Cybercriminals_plot_massive_banking_Trojan_attack

Wednesday, 3 October 2012

TORRENT FILE..



A torrent file stores metadata used for BitTorrent. It is defined in the BitTorrent specification. Simply, a torrent is data about a target file, though it contains no information about the content of the file. The only data that the torrent holds is information about the location of different pieces of the target file. Torrents work by dividing the target file into small information chunks, found on an unlimited number of different hosts. Through this method, torrents are able to download large files quickly. When a client (the recipient of a target file) has initiated a torrent download, the chunks of target file that are needed can be found easily, based on the data from the torrent itself. Once all the chunks are downloaded the client can assemble them into a usable form.
A torrent file contains the URLs of many trackers and integrity metadata about all the pieces. It can also contain additional metadata defined in extensions to the BitTorrent specification. These are known as "BitTorrent Enhancement Proposals". 

source :  http://en.wikipedia.org/wiki/Torrent_file

Monday, 1 October 2012

Oracle girds MySQL for heavier Web usage..

Oracle has issued a release candidate of the upcoming MySQL 5.6
(By Joab Jackson
October 1, 2012 03:21 AM ET)

IDG News Service - Oracle is updating its widely used open source MySQL database, and a range of associated products, in order to meet the increasing demands of Web users.

In the past decade, "The Web has transitioned from just serving Web pages to actually providing critical services," said Tomas Ulin, Oracle vice president of MySQL engineering. "You expect your e-mail to always be available, for your Facebook account to always be available. Ten years ago, it was acceptable to hit reload on your browser. Now you expect your page to come up immediately."

For its first MySQL Connect conference, held over the weekend in San Francisco, Oracle has released a number of updates to its line of MySQL technologies. It has posted a release candidate (RC) for the next version of the database, MySQL 5.6, as well as a developer milestone of the next version of MySQL that runs across multiple servers, MySQL Cluster 7.3. It has also updated its MySQL Enterprise package for commercial clients. All these updates feature new technologies designed to boost database readiness.

The MySQL 5.6 RC offers a nearly complete version of MySQL 5.6, which will probably be released in its final state within the next few months. This version comes with a number of significant features. Through the use of the Memcached API (application programming interface), MySQL can now offer a speedy way to store and retrieve database entries, one that should rival the performance of NoSQL databases.Another new feature that should please heavy users of MySQL is the new ability to execute DDL (Data Definition Language) operations without taking offline the database tables being changed. 

http://www.computerworld.com/s/article/9231882/Oracle_girds_MySQL_for_heavier_Web_usage