Tuesday 24 December 2013

Computer virus can be spread in the air to hack any computer!


Computer virus
Computer development is progressing at breakneck speed. Scientists have developed a prototype virus capable of transmitting data without requiring a network connection! This virus can in fact move in the air using inaudible sound frequencies. It is explained in detail.

As incredible as it may seem, scientists have invented a new concept of computer virus: A virus capable of traveling through the air. This invention is a team of German researchers based at the Institute for Communication work, information processing and Fraunhofer. The prototype requires only a microphone and integrated speakers to work.

Thus, they were able to travel information such as passwords or small amounts of data over distances of about 20 meters. Scientists explain in their paper and they described how the concept of air holes can be considered obsolete now that laptops quite common can communicate with each other through their speakers and internal microphone and can even form a kind of network noise ‘secret’. Hidden on this network, information can travel through multiple hops infected nodes, which means that they are interconnected so completely isolated networks and systems.

 " The sound frequency of which is very close to high frequencies and that of ultrasound is used borrowed from research to transmit data. all acoustic underwater! This allowed his team to transmit data between two laptops Lenovo T400 type simply using their integrated (micro and speakers) sound equipment. The data were thus transmitted at 20 bits per second, which is a fairly high speed to recover passwords, they explain.


“This small bandwidth may actually enable the transfer of critical information.” So far, the transmission of data from one computer to another required the presence of a network. Now, viruses and hackers can use this technique to transmit information while going completely unnoticed! It makes us shudder to realize that ... Would you ever imagine that could spread through the air and infect your computer virus?

How to stay safe in Public wifi connection



Public wifi
Everyone is happy to use internet from a public Wi-Fi hotspot, but many of us are unaware of the security risks beneath it. We all are willing to use open Wi-Fi, but none of us is willing to give away our sensitive information. Let me give you a clear idea about insecure popen Wi-Fi.

Does it easy to steal information in open wifi hotspot?

Yes, it is more easy to steal your information in public wifi hotspot. It is illegal to steal others information, but criminals never care about it. In fact, they won’t be caught since it’s not an easy one to prove as a crime.

Commonly accessed public wifi hotspots:

Open wifi hotspots are commonly provided by the following

(i) Airports
(ii) Libraries
(iii) Hotels
(iv) Hospitals
(v) Universities
(vi) Coffee shops
(vii) Restaurants and so on.

Problems in public wifi hotspot:

The most common problems occurred in open wifi hotspot are listed below

(i) Internet threats may occupy your system
(ii) Sensitive information may be theft
(iii) Computer can be hacked

Internet threats:

Internet threats include virus, malwares and spywares. They can easily entered into your system and spoil your security and privacy. These internet threats are the common issues that could reduce the performance of computer. They are more vulnerable in open wifi-hotspot.

Better keep your computer with an up-to-date anti-virus and anti-spywares. Microsoft provides better security from internet threats. If you are using Windows 8, then antivirus protection is turned on automatically.

If it’s not Windows 8 then download Microsoft Security Essential.

Security level:

Everyone of us like to have a more secured connection. Secured connection makes your computer to perform in a better way and gives virus free, spyware free and malware free computer. But most of the OS and software doesn’t provide a secure environment to access internet. The get hold on a maximum security level of your computer and stay away from risks, just maintain the following environment.

Better keep your firewall always on, never turn it off. In windows 7 and 8 we can configure our firewall to block all unwanted access to our computer.

Keep all software up-to-date. If not then never update any software in open wifi connection. It is an easy way to access and hack a computer.

Use a strong secured connection with more security. Better choose more secured connection even that you have to pay for it. Both windows 8 and 7 can reduce security risks.

Avoid information theft:

Most of the people are unaware of sensitive information theft. They may expose their personal informations that should be kept secured. Avoid typing such personal information in an open wifi connection. If you have any secured internet access, then better use it for sensitive information such as

(i) Online transactions and online payments
(ii) E-mail login
(iii) Social network login
(iv) Net banking and Mobile banking

Turn off sharing:

Avoid sharing personal informations in open wifi hotspot. Better turn off your wifi while you are not using it.
By following the above ways and keep those settings you can keep your computer safe and secured even in an open wifi hotspot connection.

Monday 23 December 2013

How to Send Self-Destructive Message along with Google Docs


Self-Destructive Message
Interest in sending mail, text, or even audio or video in an encrypted so that it self-destructs after a certain amount of time once the user has read and just vanishes. Facilities like this are provided by many apps, but now provided by Google Docs. Since this is going to be provided by Google your messages will be in a more secured way.

Google Docs

Want to try it with your friends, here send a tricky message to person who has a Gmail account. Make up with a self-destructing spread sheet to share with them whenever you needed. Now you may arise a query that how long this message will appear to the person who reads this. Professional explains this query just by a simple Google Apps Script, which will make clear that how much time you need them to appear.
If it is hard for you to create a spreadsheet with script already embedded, you visit some sites and make a download to it. Plans to do on your own, codes are available you can download in websites.

Web

If your recipient is not using Gmail don’t worry, some other option are available to perform this magic. Plenty of services are available on the web to perform self-destructive in private links. And this is not usually available to everyone at ease. Some of the sites that avails this is OneShar.es. At this site you can perform your take at ease. Just type the content you want to send and don’t forget to determine how long the message should prevail and clack on created link.

This will opt to encrypt your message and provide you a much secured link, through which you can share your recipient. He can view it only once. Analogous to this site that’s got additional point of password protection that is properly named as This Message Will Self Destruct (TMWSD). Here you can also make to have an avail a screen shot.

Not satisfied with secured measures available? Then it is better to move on with Burn Note. Burn Note not only offers a self-destructive message but images are tend to broke up while taken a screen shot. Spyglass display featured in Burn Note so once you move your cursor to that only shows the content. Once the message are burned means that message is deleted from Burn Note server, then it’s liked to be never existed.

Mobile Phone 

Email may be little tedious process to make up with. You can also make through a message. Usually these are not an option to perform it before, but upcoming upgraded mobile offers you these kinds of messages through some Apps. One among several App is Wickr, available only for iPhone. Wickr in iPhone uses a military-grade encryption that gets rid of time stamp, location and even device type. This term may on whole described as Metadata message.

Haven’t yet installed Wickr yet? Go to iTunes App Store there you will find and upon installing you can play with. Unfortunately Android version has not yet been released. Hope releases soon and all Smartphone lovers can make use of it once available in Android Market.

Benefits of Hard Drive Encryption

Hard drive encryption is a process that renders the contents of your hard disk virtually unreadable to anyone who does not hold the so-called key to unlock it. No, there's not actually a lock and key. Rather, data protection software is used to encrypt and de-crypt the data. Once encrypted, your data will look like meaningless gibberish to unauthorized users such as thieves and hackers.
Why use data protection software to encrypt your hard disk? Hard drive encryption can deliver numerous benefits. Below are just a few:
  • Peace of mind - Knowing that a thief can steal your laptop but can't touch your data can bring you peace of mind should your computer become lost or stolen.
  • Regulatory compliance - Depending on your business, hard drive encryption may help you to comply with various security and privacy regulations.
  • Corporate data protection - What types of corporate secrets do your computers store? From trade secrets and client lists to confidential financial information, your company's computers hold a wealth of information that should be protected from thieves and casual users alike. Hard drive encryption can ensure that your company's most confidential data remains private.
  • Accidental data disclosure - Have you ever dropped off an old laptop at the local e-recycling facility? If so, did you destroy the hard disk by wiping it clean with data protection software and then physically smashing it with a sledge hammer? Unfortunately, recycled hard disks can make their way into the hands of unsuspecting consumers (or data thieves). You can avoid potential problems with hard drive encryption.
  • Reputation management - You've likely heard horror stories of stolen company laptops containing sensitive customer information such as credit cards or passwords. Not only can hard drive encryption protect customer information, it can protect your company from embarrassment and bad publicity. If your company is subject to regulatory compliance, hard drive encryption may protect you from liability and penalties as well.
Protect your data with data protection software that encrypts the contents of your hard disk and enjoy the benefits.

Daniel's a Network Administrator at Intel, and enjoys sharing his passion of network security products from WinMagic with his readers. For more updates follow him on Google+.

How to write a Twitter Bot


Twitter Bot
Professional who to use twitter would have come across this term Twitter Bot. To common folks whodidn’t know anything about this, can learn what Twitter Bot while reading this further is.

Writing a Twitter Bot isn’t that tough, you can make it up in 5 minutes. A little bit of JavaScript may let you to know about Twitter Bot, but that is not certainly going to be a requirement just to make a basic Twitter Bot.
Bot is usually termed as an essential program that is always running at background. While running so whenever a command given to them especially tweets, it tends to process them number of tweet and provide a reply to the tweeter usually not in the same but a different tweet.

At earlier stages of development you would surely need a web server to run the Bot, while Bot is written using languages like PHP, Perl or phython. These language’s are not know by everyone so let’s make it simple. So let’s try out in Google Drive.

Step’s to write Twitter Bot

• To perform this Bot the first and foremost step is to create a Twitter account, that’s tends to be the Bot at later on stages. Have you ever come across dev.twitter.com, go to that sign-up with Twitter account and create Twitter app. Provide app name, description, website URL and how to get back named callback URL. Finally on processing everything at last Agree terms and conditions, fill the CAPTCHA and submit the form. Now you can create Twitter Application.

• Now Twitter app will be created and clack on settings tab and click on Read and Write under the Application Type. This will help since we want to read tweet and also to re-tweet or post tweet. After completing these steps click on update button to save your change.

• OAuth tool tab is an option available in Application and try to switch over. Then make a note of the customer Key and consumer Secret, because these things will be later on needed in Google Apps Script.

Proceed to Step B: Create a WolFarm Alpha App

• Twitter App will monitor the tweets and have a respond to tweet, while Wolfarm App used to find out answer that user tends to post to your Twitter bot.

• To work out with Wolfarm you have to create an account. For this procedure visit developer.wolfarm.com. Generate an account and then choose Get an App ID to generate new app.

• Nothing proceed now will go in vein. Creating new account in Wolfarm will help later on in Google script. You can purchase a full or free version, on free version it works only a non-commercial purpose, so you have to make a note of this.

Guidelines for creating Twitter Bot with abcd is that 

• You have a send a mail to businessdevelopment@abcd.com to deal up regarding license. Queries can be made to @DearAssistant at the rate of 2,000 per month.

Proceed to Last Step: 

• Clear to have a copy of Twitter Bot in your device. And re-enter the values of Twitter Consume key with Twitter Consumer Secret and also the Twitter Handle.

• Initialize the Twitter Bot through Run. On Authorization access to Google Script Service provide yes.

• At last Go to Run and upon authorization it will lead you to the Script access to Twitter account.