Friday, 11 November 2011

Top Ten Hackers of the Web World....AMAZIN BRAINS !!

Be it for fun, personal benefit or simply curiosity, the sharp brains, publicly known as : "crackers", "hackers"  or "black hats" work to exploit computer system and none of us, intelligent minds can easily track or trace what they have building up within themselves !! On the other hand, stand the proud "white hats", who use their brains and skills for good, are termed as "Ethical Hackers" and are hired by companies to keep themselves yet safer !! So, here are the 10 most famous hackers of the Web World -

Black Hats


             Jonathan James  - He was the first juvenile, 16 yrs old,  to be sent to prison for hacking. His interest was in high-profile organizations, which began just for fun…a challenge to see what he could pull out. He installed a backdoor into a Defense Threat Reduction Agency server. The DTRA is an agency of the Department of Defense charged with reducing the threat to the U.S. and its allies from nuclear, biological, chemical, conventional and special weapons. The backdoor he created enabled him to view sensitive emails and capture employee usernames and passwords. Nonetheless, the smart guy also cracked into NASA computers, stealing software worth approximately $1.7 million.
             Adrian Lamo – As said in a profile article, “He hacks by day, Squats by night”. This famous "homeless hacker," used Internet connections at Kinko's, coffee shops and libraries to do his hackings. He entered The New York Times' intranet and added himself to a list of experts and viewed personal information on contributors, including Social Security numbers and much much more and a series of such episodes was followed by imprisonment and heavy fines.
             Kevin Mitnick - Mitnick was convicted for breaking into the Digital Equipment Corporation's computer network and stealing software, but he leisurely began with exploiting the Los Angeles bus punch card system to get free rides. The CNN article says, "Legendary computer hacker released from prison," explains that "he hacked into computers, stole corporate secrets, scrambled phone networks and broke into the national defense warning system."  But good gracious,  He served five years, about 8 months of it in solitary confinement, and is now a computer security consultant, author and speaker.
             Kevin Poulsen -  Also known as Dark Dante, held expertise in telephone lines hacking which earned him a Porsche!! Poulsen's most famous hack, KIIS-FM, was accomplished by taking over all of the station's phone lines. Ultimately, Poulsen was captured in a supermarket and served a sentence of five years.
             Robert Tappan Morris - Morris Worm, the first computer worm to be unleashed on the Internet was created by him, son of former National Security Agency scientist. He says he just wanted to use it to see how vast the internet was but it replicated itself excessively, slowing down computers to such an extent that they were no longer usable. He was sentenced to three years' probation, 400 hours of community service and a fined $10,500.

White Hats


             Stephen Wozniak -  His start in hacking was with making blue boxes, devices that bypass telephone-switching mechanisms to make free long-distance calls. Stephen was the one who c0founded the Apple computers and fully assembled PC concept.
             Tim Berners-Lee - Berners-Lee is famed as the inventor of the World Wide Web, the system that we use to access sites, documents and files on the Internet. Initially, he created a hypertext prototype system that helped researchers share and update information easily. He later realized that hypertext could be joined with the Internet. Eay to remember, he is the founder of W3C !!
             Linus Torvalds - Torvalds hacks included "an assembler and a text editor…as well as a few games." And in due course of time, he was well known as father of the Linux, the very popular Unix-based operating system. He has had an asteroid named after him and received honorary doctorates .
             Richard Stallman - Stallman's crusade for free software started with a printer. At the MIT lab, he and other hackers were allowed to modify code on printers so that they sent convenient alert messages. However, a new printer came along – one that they were not allowed to modify. It was located away from the lab and the absence of the alerts presented an inconvenience. It was at this point that he was "convinced…of the ethical need to require free software." And he became ‘ Father of Free Software”.
             Tsutomu Shimomura -  he was hacked by Kevin Mitnick, the blach hat. Shimomura out-hacked Mitnick to bring him down. Shortly after finding out about the intrusion, he rallied a team and got to work finding Mitnick. Shimomura, later,  wrote a book about the incident with journalist John Markoff, which was later turned into a movie.

So, wasn’t that amazing !!!

Thursday, 10 November 2011


“What do you need to start a business? Three simple things: know your product better than anyone. Know your customer, and have a burning desire to succeed.” – Dave Thomas

And who is Dave Thomas?? He was an American fast-food entrepreneur and philanthropist. Thomas was the founder and chief executive officer of Wendy's, a fast-food restaurant chain specializing in hamburgers. A living legacy. Now, why does this blog of mine talk of Wendys and hamburgers….mmm…. With some mouth watering ones on my mind, I was just hunting for some stuff for one of my client’s sites, one of the tough ones to convince you know !! And , this is always the right time when I need to go for inspirational BUSINESS quotes.hahaha SO, yummy inspirational quotes solves 2 purposes in one.

How rightly, the wise man said what one needs to start his business – know your product better than anyone…this isn’t to be able to befool your users and just convince them to pay to you…you are not making but losing business instead, a business relationship. Business is much about references, which comes from satisfaction and trust. Knowing your product best helps you provide best of information to convince as well as best of after-sales support or services for satisfaction.

Know your customer – Myself, being into a service industry,dealing with different customers each day, I understand how hard it is to convince and satisfy in a service industry..you do not have a visible PHYSICAL product and choices of the same customer may vary from day to day and milestone to milestone…then comes the need to STAY CALM….and remind yourself as if you were helping your student solve a problem and alongwith clearing his doubts poured upon you in form of questions J HE is paying and has the right to ask butt…I really hope customers too understand that its BAD to take advantage of our considerations…lol.
Have a burning desire to succeed – this reminds me of another quote I would like to share with you guys -  

 Nobody talks of entrepreneurship as survival, but that's exactly what it is and what nurtures creative thinking.” – Anita Roddick

So, keeping my spirits high, I take up work for survival…provide my best in terms of communication and services and look forward to nurturing creative thinking.

Coming to the end, I am just sharing the best news sites on the web…now that my blog talks about web world updation ;-)
·         CNN.com
·         CBS News
·         ABC News
·         Google News
·         Reuters
·         Yahoo News
·         BBC News Online
·         World News
·         MSNBC
·         FOX news
 
So, lets have a nice time updating ourselves while someone says –“One overriding challenge of the Internet economy is keeping up with the Net itself. You can't claim to be well informed about business unless you're well informed about the Web, which virtually changes by the nanosecond. 

Tuesday, 8 November 2011

For those who glance my blog ..... Be careful with ATM's.

The new scene of crime is "ATM-Skimmers". I think many might know about this , but still i insist upon this for those who are not aware of it, as for all of us Money matters a lot.

OPERATION:
These devices just goes over the card reader of an normal ATM machine. They read the card's magnetic stripe and store the informations for later use. This device is usually inserted in conjunction with miniature camera(insigignificantly attached with ATM) to read the user's PIN. Another method is using the same device is keypad overlay which matches up with the buttons of the legitimate keypad below it and presses it when ever it gets operaed , the keylog of the PIN is recorded or transmitted in wireless mean.

How to identify it?
These devices are usually not mounted by screws (as ATM would notice that) but by tape. So if we apply some force the device would come off . In case of the keyboard below it, can also be tried to dismount. If you have noticed the original outline of an normal ATM this can be identified easily. 

AVOIDANCE:
To avoid any haseless things, follow these tricks to avoid getting caught in skimming scam.

1) Use Secure ATM machines: under video surveillance or inside a bank lobby as they are less likely to be tampered with.
2) Cover the ATM keypad: Cover it when you are about to enter the Pin number as ther may be any hidden camera around.
3) Skimming devices will stick out a few inches from ATM. If something looks suspicious find another ATM. Don't fall for a poor fitting device(or a sticker or sign that say "Swipe here first" or "Use this machine only".
4) If the card in held in the machine , call the bank immidiately.
5) Dont accept any help from the people roaming out of ATM , they may say that they too had same trouble and instruct us to enter the number again.
6) Keep changing your PIN number( remember it too!!) thought NET banking or Phone banking.