Popular Posts

About Me

My photo
My blog is not for teaching hacking. I am an engineer by profession and trying to understand about these hidden criminals and their world. The honest intention behind ‘unite hackers’ is to prevent young computer techies from getting in to crime. This book has thrown light on various sensitive issues relating to hacking and hackers. There are so various aspects discussed in it on humanitarian ground.

Sunday, March 13, 2011

Gmail Enhances PC 2 Phone calling!


gmail logo 300X300 Gmail Enhances PC 2 Phone calling!While it was interesting to go through the Gmail Official blog update about a new feature introduced for PC-to-Phone calling in Gmail, trying it out myself in India resulted in a mere “nothing”.
This feature is presently available only to Gmailusers based in the USA however I have seen the feature a few times on my Gmail too. Mystery remains unrevealed!!



New Features

Coming to the point as the official blog said, there are 2 features added.
  • Users will no longer need to type a phone number if they have it in a conversation in their Inbox.
DW gmailcalling 2 Gmail Enhances PC 2 Phone calling!
Clicking the linked number in your conversation will open your dial-pad populated with that number.
DW gmailcalling 1 Gmail Enhances PC 2 Phone calling!
  • You will also see a little green colour phone icon next to phone numbers stored with your Contacts.
DW gmailcalling 3 Gmail Enhances PC 2 Phone calling!

My Experience

I know I live in India and still nothing as such will work for users in India, though I would still like to share my screen with you.
DW gmailcalling 4 thumb Gmail Enhances PC 2 Phone calling!
I have hidden parts of the address/phone number for privacy reasons
As you can all see, there was no link appearing on the phone number above. Though I strongly wish to see a link appearing soon, what you all have to say on that? Do share your thoughts with me! icon smile Gmail Enhances PC 2 Phone calling!

Tsunami hits in japan but peoples still walking near coastal area

japan coastal area crushed now...go to link for live view of a coastal area with control panel..



http://82.92.129.195/view/viewer_index.shtml?id=185875

Nine Notorious Hackers of Our Time (Best Hackers)

"You've been hacked" is a message none of us ever want to see. These people made a living out of sending out that message.

1. Kevin Mitnick (Several Convictions in the 1990's)

Image

For several years he made a career out of hacking into computers, stealing corporate secrets, scrambling phone networks, and breaking into the national defense warning system which caused millions of dollars in losses. He has spent almost six years in prison in solitary confinement for his notorious crimes.

It seems his hacking days are over, however. He is now a computer consultant, author, and public speaker. His story has inspired two Hollywood movies: Takedown and Freedom Downtime.


2. Adrian Lamo (Convicted in 2004)

Image

Adrian Lamo admitted to various computer crimes directed at companies like Yahoo!, Microsoft, Ameritech, Cingular, AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems, but he is best known his intrusion into "The New York Times" internal computer system. He repeatedly hacked into the system to add his name to confidential databases of expert sources. He also used the paper's LexisNexis account to conduct research on high-profile subjects.

In 2004, he surrendered to FBI and pleaded guilty to one count of computer crimes against Microsoft, Lexis-Nexis and "The New York Times". He was sentenced to six months' detention at his parents' home plus two years probation, and was ordered to pay roughly $65,000 in restitution.

Lamo is now an award winning journalist and public speaker. He has interviewed personalities like John Ashcroft and Oliver Stone.


3. Jonathan James (Convicted in 2000)

Image

Jonathan James was the first juvenile, at the age of 16, to be jailed for computer crimes in the United States. His crimes were directed toward NASA and the US Department of Defense.

NASA claimed he downloaded $1.7 million worth of proprietary software. He then admitted to installing a "sniffer" on the Department of Defense's computer system which allowed him to intercept over three thousand messages passing to and from employees, along with numerous usernames and passwords of other DoD employees. At least ten of the computers he hacked into were military computers

Although he could have served up to ten years in jail, the fact that he was a juvenile reduced his initial sentence to six months in jail and probation until he was 18 (he was also required to write apology letters to NASA and DoD). The judge then reduced the sentence to six months of house arrest and probation until the age of 21. After violating probation he was required to serve the full six months in a federal correctional facility.


4. Operation Web Snare (2004)

Image

As of 2004, operation Web Snare is the "largest and most successful" law enforcement operation related to online fraud. The operation included more than 150 investigations of Internet-related crimes, including denial-of-service attacks, computer hacking, selling counterfeit software, phishing, and identity theft. More than 870,000 victims lost more than $210 million dollars from such crimes.

Among those convicted were Utah resident Mark Pentrack who offered car parts, aircraft parts, and other items for sale over the Internet, but did not own those items. More than ten people sent Pentrack more than $200,000 for such items. He hired secretaries in five states outside Utah to receive payments from the consumers, used an Australia based e-mail service, and used an "anonymizing" program when conducting online activities. He was sentenced to more than 11 years in prison after he pleaded guilty to mail fraud, misuse of a Social Security number, attempted destruction of evidence, and making a false statement in connection with an Internet fraud scheme.


5. Max Ray Butler (Convicted in 2001)

Image

Also known as Max Vision, Max Ray Butler was a talented computer specialist who ran a computer security company in Silicon Valley. He was also a highly-skilled hacker who went to prison for creating an Internet worm that hacked into systems at McChord Air Force Base, NASA's Marshall Space Flight Center, the Argonne and Brookhaven National Labs, IDSoftware, and an unspecified Defense Department system.

Interestingly, Max was an FBI informant for five years. He supplied to the FBI information about several major cracks and helped track down other computer hackers.

Police arrested Max in March 2000 after he refused to wear a wiretap to a meeting with a friend who was being suspected of cyber-crimes. He was later charged with 15 counts of hacking-related crimes including computer intrusion, possession of stolen passwords and interception of communications. He was sentenced to 18 months in prison.

His hacking career didn't end with his prison sentence, though. Recently he was in court facing with charges of wire fraud and identity theft. He faces a possible sentence of 40 years in prison and a $1.5 million fine if convicted.


6. Nahshon Even-Chaim (Convicted in 1993)

Nahshon Even-Chaim , aka Phoenix, belonged to an elite computer hacking group known as The Realm. He was the first major computer hacker to be convicted in Australia. His targets centered on defense and nuclear weapons research networks. He was so skilled that many of his victims weren't aware they were victimized until the evidence was presented after the arrests.

Some of his crimes include stealing a password cracking program from NASA, gaining unauthorized access to universities involved in nuclear energy research, tampering with files and crashing the system at the Lawrence Livermore National Laboratory which controlled the world's most powerful laser, and many more.

Wire and data taps gave police all the evidence they needed to charge Even-Chaim with 48 offenses, most of which carried a maximum ten year sentence. After negotiations, however, his sentence was reduced to 500 hours of community service and a 12 month suspended jail term.


7. Vasiliy Gorshikov and Alexey Ivanov (Convicted in 2001)

Image

After a very complex undercover FBI operations, Vasiliy Gorshikov and Alexey Ivanov of Chelyabinsk, Russia were arrested for 20 counts of computer crimes, fraud and conspiracy. They were convicted for stealing approximately 50,000 credit card numbers from U.S. online banks, e-commerce companies and Internet service providers.

Gorshikov was sentenced to three years in prison and ordered to pay $690,000 in restitution charges, while Ivanov received a 3 years and 8 month sentence and restitution charges of $800,000.


8. Jeanson James Ancheta (Convicted in 2006)

Image

Jeanson James Ancheta of California was charged with 17 counts of conspiracy, fraud and other crimes connected to a 14-month hacking spree that started in June 2004. He pleaded guilty to seizing control of hundreds of thousands of computers and renting the zombie network to people who used it to send out spam. He silently downloaded Spy ware/Ad ware to more than 400,000 infected computers that he controlled. He admitted to gaining for himself and a co-conspirator more than $100,000 in advertising affiliate proceeds.

Among the computers he attacked were some at the Weapons Division of the U.S. Naval Air Warfare Center in China Lake, California, and at the U.S. Department of Defense.

Ancheta was sentenced to almost five years in federal prison and ordered to pay approximately $15,000 to the United States federal government for inflicting damage on military computers. He was also forced to return to the government more than $60,000 in cash, a BMW automobile and computer equipment.


9. Markus Hess (convicted in 1990)

After being recruited by the KGB as an international spy to secure U.S. military information for the Soviets, Markus Hess, a German citizen, was able to attack 400 U.S. military computers.

Hess was sentenced to one to three years in prison after being found guilty of espionage he was released on probation before the end of his sentence. He now writes networking software for a computer company in Germany.

Consumer Watchdog Targets Google In "Don't Track Me" Campaign


The Washington, DC organization Consumer Watchdog is making a big publicity push for its "Do not track me" campaign, which asks Congress to create a list for people that don't want to be monitored on the Internet.
If the campaign succeeds it will be a massive blow to Internet advertising and e-commerce companies because they will lose the ability to tailor targeted commercial messages and discovering user behaviors across a range of web destinations.
Consumer Watchdog has purchased a 540 sq. Ft. Jumbotron digital billboard on Times Square and is showing a video showing an animation of Eric Schmidt, Google's CEO, driving an ice cream truck so that he can spy on kids.
Consumer Watchdog said:
Google has collected massive amounts of personal data from Wi-Fi networks through its Street View cars, made private Gmail contacts publicly available on Buzz, and done a complete about-face on net neutrality, joining with Verizon in calling for toll lanes on the Internet.
Schmidt has appeared clueless regarding privacy himself, Consumer Watchdog said. When questioned about privacy, he has said, “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” Recently, he suggested children could change their names when they got older if they wanted to escape what was embarrassing and public in their online lives.
- About 80% of Americans support a national "Do not track me" list according to a poll by Grove Insight.
- 90% said that it is important to “have more laws that protect privacy of your personal information” online.
The poll indicated strong support for:

- Require the creation of an “anonymous button” that allows individuals to stop anyone from tracking their online searches or purchases: 86% favor; 9% oppose.

- Ban the collection of any personal data on children under the age of 18: 84% favor; 10% oppose.

- Prevent online companies from tracking personal information or web searches without your explicit, written approval: 84% favor; 11% oppose.

-- Ban online companies from tracking and storing information related to children’s online behavior so they can target them with advertising: 83% favor; 12% oppose.

- Require the creation of a “do not track me” list for online companies that would be administered by the Federal Trade Commission: 80% favor; 12% oppose.

Saturday, March 12, 2011

Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie


Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie


Hackers to Become Real Heroes: Cyber Terror Book to be Adapted into Movie

With the growing popularity of the initiative taken by the Newsmakers Broadcasting & Communication Pvt. Ltd. to unite the hackers and bestow a positive light in the world of hacking, people from all over the world have started recognizing the significance. A Jewish Director named Timmi Aboodi, 25, has shown immense pleasure in converting the book ‘Cyber Terrors’ written by Vaidehi into a full-fledged movie Titled ‘Hackers - the Modern Day’s Robinhood’. Timmi Aboodi a documentary maker making his first directorial debut with this film. The author already has given Timmi the rights to go ahead with his directorial venture. The movie will have many of real hackers acting for reel screen. Besides this, several youths aged18 to 22 belonging to the theater background will be playing the supporting roles.

The highlight of the movie is that both the director and the actors will be making their debut with this venture. The movie will be commercial venture same on the likes of mainstream Indian cinema. Even though Timmi has only made art films till date, he will now fulfill his directorial dreams by making fiction movie. Greek musician Sanoria will be composing the music for this film. The film will be produced under the banner of Veronica motion pictures and NBC pvt lts.

When AV spoke to Timmi about his directorial debut, he sounded very optimistic about the movie and said “It’s too early to say anything about this project. I am sure that youths will like this film.” By edn of this month we may physically enter into the venture.”

The movie will be a first of its kind which is all about unexplored subject ‘Hacking’. Indian audience is unaware about Hacking and hence this movie will introduce them about Hackers and their world. However, youths will enjoy this film as some of them are already techno savvy. Hacking may be considered as a cyber crime but if used effectively can solve many problems like securing one’s important information on the cyberspace, safeguarding it. Hackers possess exceptional brains and can also safeguard important websites of a country from potential cyber terror attack. Few years back hacking was considered as a cheap crime committed by techno savvy youths who indulged in such activities to become popular in the cyber space. Not anymore, the term hacking has undergone a metamorphosis and nowadays even top-notch software companies are hiring hackers to keep an eye on their competitors. Some of them even also extract vital information about the rival companies.
Newsmakers will launch a book named Cyber Terrors on 30th October at Police Gymkhana, Marine Lines, Mumbai. The book is written by Vaidehi Sachin, Editor-in-Chief of Newsmakers Publications and co-researched by Amarjit Singh and speaks about hacker culture.

In the book, Vaidehi describes about the people, the machines, and the events that defined the Hacker Culture and the Hacker Ethic, from the early mainframe hackers at MIT, to the self-made hardware hackers and game hackers. Immediately following is a brief overview of the issues and ideas that are brought forward by her book, as well as a more detailed interpretation of each chapter of the book, mentioning some of the principal characters and events. The hacker ethic deals with the idea that individuals are performing a duty for the common good, an analogy to a modern day 'Robin Hood'.

The hacker communities as a result are prided on the fact that they are the rebellion against authority figures that restrict this level of computer freedom. Hackers are only judged by their ability as opposed to the various systems in place that currently dictate authority, such as schools and universities. Mostly the hacker ethic idealizes the notion of hacking being an art-form, something revered as opposed to disputed and frowned upon. Popularized by 'phreakers' in the 1970s and 80s, this is something that is not only evident, but also widespread among the growing community.

In the field of computing, it is something that reflects not only on this community, but also about the wider social, political and financial world. In a sense, hacking is something that should affect everyone, but it is whether or not the interpretation that is given to hackers by Vaidehi compared with negative stereotypes of the media that dictate this perception. This book also expresses her pain and trauma handling hackers at all level. The book is evident script on Good Bad and Ugly hacker’s behavioural disorders. This book is combination of fictions and practical life style of hackers.

Hacker Groups


There have been many hacker groups in India since 2k. Some are noted for their notorious behavior.

1. Indian Snakes. Indian snakes was a closed underground community of hackers who were on the top of the scene in the early 2000s. They are also noted for the YAHA worm that they had written.
2. hacking-truths.net (2005-2008) stopped because of personal problems. Restarted in 2010. Activities malware dev/hacking.
3. h4cky0u. It started around 2003 Website: h4cky0u.org. The activities included defacing, exploit dev, botnets etc. It died in 2006 due to some personal differences between the staff. It was reopened as h4ck-y0u, sadly h4ck-y0u also stopped after one year of its existence due to cyber crime activities, financial issues. H4cky0u was started again by an American who went by the handle "Big Boss" and we haven't heard much about it after that.
4. n|u (null security community). It started in 2008 and has spread to 6 cities in India namely Bangalore, Pune, Delhi, Mumbai, Hyderabad and Bhopal. Their activities include vulnerability research, exploit dev, projects, disclosures, nullcon hacker conference. It is more of an OWASP style community sans the limitation of only web app security research. It is also registered with the Govt. Of India as a non-profit organization.

5. Andhra hackers. Started in late 2000s. It is a forum like portal. Activities include sharing security information.

6. ICW (Indian Cyber warriors) is an off-shoot of Andhrahackers and started around 2008. This is a hactivist group with activities including defacing Pakistani websites.
7. Securitytube.net. It is not a group per se. It is a portal that has lots of security videos, question/answer section much like stackoverflow. It was started somewhere around 2008 or 2009.

8. Indishell. It started in 2009. The main guys behind indishell are Lucky, mr. 52, jackh4xor, silentp0sion. It is again a hacktivist group and majorly into defacing pakistani websites. It was recently stopped due to some unknown issues and has re-emerged at the time of writing this article. Activities include defacing websites.

9. ICA (Indian Cyber army) is an off-shoot of Indishell with mostly the same staff as Indishell. It is also a defacer group. Noted for defacing sites including Pakistani ISP national telecommunication corporation pakistan

Let's Build a Responsible Cyber Society.Terrorism is a curse for the society that we live in.the cyber world has its own concerns on “Cyber Terrorism”. This issue tries to explore the legal aspects of this clause particularly how it may impact a corporate entity


Hacktivism Vs Terrorism

Hacktivism is the act of hacking, or breaking into a computer system, for a politically, socially or motivated by a criminal purpose. The intentions behind hacking are nothing but to harm and damage. The individual who performs an act of hacktivism is said to be a hacktivist. There are many such scavengers are around who never forget to boast their skills of hactivism. Globally there are 4,00000 community of black hat hackers, out of which 70 percent are students and between the age group of 20 to 25, 18 percent are between the age group of 15 to 20, 2percent are above the age of 30, 10 percent are grey hat hackers. And this population is of hactivists. (Read this beautiful research report in Cyber Terror) from this population 22% are only Indians,10 % from Pakistan ( details of these hactivists with pictures, code name, their addresses, and much more read in Cyber Terror)