Learn How to Earn Online Money. Speak Asia Online Money Earning.

Receive Daily Updates

Enter your email address:

Showing newest 20 of 120 posts from 4/1/11 - 5/1/11. Show older posts
Showing newest 20 of 120 posts from 4/1/11 - 5/1/11. Show older posts

Saturday, April 30, 2011

Android Calendar Synchronization with Facebook Calendar on Google Calendar

Android Calendar Synchronization with Facebook Calendar on Google Calendar


One of the things that have been pesking me since the time I moved on to Android Cyanogenmod 7 was that I was not able to sync Facebook Calendar with Google Calendar or Outlook. Also since I was unable to sync Facebook Calender with Google Calendar hence the I was not able to sync Facebook birthdays on Android . That make me thinking and I got some nifty methods to do the same.


Method 1 (Sync Facebook Birthdays on Google)

Install Ebobirthday application on Android
Install Ebobirthday
Open it and click on
menu – > Import – > Facebook
menu ? > Import ? > Facebook
and let it connect to it.
let it connect to it.
Once connected enter your username and password, and allow it to access data. The it will start importing birthdays. Once done, click on
menu –> settings
 click on menu -> settings
and then choose calendar which you want to update.
choose calendar which you want to update.
choose calendar which you want to update.
then go to
menu –> export –> update calendar
menu ?> export ?> update calendar
and then it will connect and will update your google calendar :)
jp
Once done, sync your Android and Google. Alternatively you can sync outlook calendar with Google
 sync your Android and Google. Congrats..you have synced Facebook calendar with Google and Outlook !

Congrats..you have synced Facebook calendar with Google and Outlook !
I will discussing the method 2 on my next post :)
read more "Android Calendar Synchronization with Facebook Calendar on Google Calendar"

Microsoft Office 2010 Portable Free Download (Reupload 04-29-2011)


Microsoft Office 2010 Portable Free Download (Reupload 04-29-2011)

Microsoft Office 2010 gives you powerful new tools to express your ideas, solve problems, and connect with people. Office 2010 lets you work how, when, and where you want, letting you get things from a PC, the Web, and even a smartphone.

Use Office 2010 virtually anywhere: PC, phone, browser
With Microsoft Office 2010, you can review and do minor editing on Word, Excel, PowerPoint, and OneNote 2010 documents, virtually anywhere, by using Office Web Apps from more locations on more devices.

Keep your people productive on the go. Office 2010 lets you access and edit documents stored on a server while youre offline with SharePoint Workspace 2010, and then automatically syncs these changes when youre back online. So you stay productive while on the go.

Support your employees, regardless of location or device. Office 2010 saves you time and money by helping you deploy and manage Office on the PC, the smartphone, and the Web, all from within familiar Microsoft System Center tools.

Bring ideas to life
Create and deliver presentations that help you stand apart from the competition. Office 2010 puts you in the directors chair, enabling you to create dazzling digital content in PowerPoint 2010 without the need for expensive third-party tools. And you can broadcast your presentation to anyone with a browser, even if they dont have PowerPoint.

Stay organized and on top of your work. OneNote 2010 pulls together everything from daily sales figures to digital images, so all the information you need is easily accessible. You can also create side notes that stay on your screen as you move between different programs, so you can keep your thoughts organized as you multi-task. This helps you stay organized while saving you time.

Turn intuition into insights to make quicker and more informed business decisions. Excel 2010 provides tools for improved data visualization, which can give you key insights into business processes and tailor messaging and products to best meet customer needs. Whole trends can be conveyed in a single cell with Sparklines. And there are more options in styles and icons in conditional formatting, as well as the ability to highlight specific items like such as max/min in a single click.



read more "Microsoft Office 2010 Portable Free Download (Reupload 04-29-2011)"

Ethical Hacker Ankit Fadia Hacking Seminar Truth Reveled: Pure waste of Time

Ethical Hacker Ankit Fadia Hacking Seminar Truth Reveled: Pure waste of Time by RISHABH "XERO" DANGWAL

And there we go, I came to know about the renowned Ankit Fadia coming to my humble college & I was wondering if he will be different from those other security organizations who teach computer security & ethical hacking.

He was worse.
No offense to Mr Fadia, but actually I was quite saddened by some of the questions which he asked-
How many of you use Google as a search engine ?
(Almost all of hands raised)
He Proclaimed - STOP USING THEM !!

How many of you use email services like Gmail, yahoo?
(A lot of hands raised)
He Exclaimed - STOP USING THEM !!

How many of you use internet ?
(again..some of hands raised)
STOP USING THEM !!

And behind the above "Stop Using Them!!" there were some cheesy reasons of privacy invasion & record tacking. I wondered why he was not educating about how to use services like Scroogle/TOR/SOCKS for safe surfing (albeit nothing is safe, but still, they provide a greater degree of anonymity). Then..it all begin.

Part 1 - Screwing the Proxies

Then the hacking prodigy demonstrated his magical wits by recommending Russian proxy servers cuz "they were maintained by criminals" & "they kept no logs" .
F**INGBULLSHIT !!

Why the hell ! We can never trust a proxy if it keeps logs or not, that's why we always use SOCKS & proxy chaining to get the work done, even when I start something casual, i chain 10 proxies using a TOR network to get the work done, & that guy was recommending anonymizer.com & anonymizer.ru . And we shall trust Russian proxy cuz its maintained by criminals ? what an oxymoron ! His ace in hole in the proxy demo was the Princeton university proxy list where he claimed that to black all of the proxies it will need 413 individual tries ! A friend of mine asked -
"Well Mr Fadia, what if you block the Princeton university site ?"
pat came the nervous reply
" Appoint a junior of yours to go into local cybercafé to get the list, Xerox it and distribute in college"

Pure F**king Genius !
He went on to use SPYPIG to get IP of any person using an image. but he didn't get on the point that what if a person has disabled image viewing on email. Anyways..it all ended with a lot of questions which he dodged by saying that there will be a query session in the end. Ah well..

Part 2 - the infamous NETBUS DEMO

I patiently waited to ask him some questions regarding IP evasion & anonymity but he started to demo NETBUS Trojan, without any logic he went on to demonstrate how he can open his CD/DVD drive on his DELL Studio 14" (by installing a Trojan server on his own laptop & executing commands on local loopback & he didn't explained it, that's why its in f**king brackets !) . I asked him, on getting chance from my trusted roommates & event co-ordinators Sumit Dimri & Varun Kumar Singh & asked him 2 simple questions (Of course I already knew the answers) -
  • What happens if a person is behind a NATBOX/Router/Firewall, then there is no use of getting IP, it might not be forwarded at all. What then ?
  • Trojans are invalid against Linux. What can you do to break into Linux Security ?
He responded by dodging the first question & diverting it to a social awareness bullshit & some problem solving (which I cant seem to remember cuz it was irrelevant). The second question was answered by saying that Windows is insecure & I myself use Ubuntu linux at home.

Again..Pure F**king Genius !

From that point i got the point that he has no point :D
We moved on to the Steganography / Final session then.

Part 3 - the Steganography / Final session

The steganography session was started by exclaiming that he was contacted by FBI on 9/11 attacks (which i already knew as a matter of fact is fake courtesy of Attrition.Org & various LUG's out there) & they used images of sexy women to transmit data into them. He used a tool to hide text data into image & reverse it, nothing special, if you have been a reader of my blog I guess you probably know that Nettools allow you to do that. Then he demonstrated Bluetooth hacking by using bluesnarf (just a scan) & website hacking using SQL injection (again..nothing special) with no logical explanation of how the injection worked. The session ended by "Roadside Sign hacking" in which he displayed pics on projector of hacked road signs by hackers at USA, Australia & other countries.

He then begin to advertise Dell laptops & the highly prestigious (READ: BELOW AVERAGE) AFCEH course conducted at Reliance Webworld. Then he ran away cuz he was running short of time & no Query Session was conducted.

Aftermath : Pure F**king Genius !

I guess you realize what I felt for the whole seminar & the whole Ankit Fraudia oops.. Fadia hype..

My Feedback form read -
Name : Rishabh Dangwal
Qualification: Btech
Branch : CSE
Remarks : Ankit Fadia is Overrated..Overhyped & pure waste of time. If you are bored, do come to Fadia for a few laughs. Peace.
read more "Ethical Hacker Ankit Fadia Hacking Seminar Truth Reveled: Pure waste of Time"

Anonymous (Syrian youths) using twitter to spread false messages about Syria

Anonymous (Syrian youths) using twitter to spread false messages about Syria

Syrian youths are vigorously using the social networking site Twitter to spread news about protests.

Replicating other Arab uprisings, Syria’s civil unrest movement has been vigorously using the social networking site Twitter.

But in the clamor for users to tell their up-to-the-minute stories, the actions of some Twitter users have raised questions about developments in Syria, according to a report by Al Arabiya TV.

A clash between the government and the opposition has made Twitter users notice something out of the ordinary.

An anonymous group has been trying to distort the use of the recurrently used hash tag “Syria.” Twitter users have claimed the unidentified group has been posting a series of false or old news to mislead readers.

In the world of Twitter, the hash tag is an essential part of the tweeting process. It is what connects users, their tweets, and allows them to follow news attached to particular hash tags. More broadly, if news or an event is popular among social media communities, their hash tags on Twitter will also be popular.

The group’s tweets allegedly paint a rosy picture of Syria. Moreover, the group’s posting contain contradictory claims that the situation in Syria is fine and that the country does not have any problems.

The question remains, what do these groups want to achieve by cluttering Twitter with inconsistent news?

Posters were posting their tweets every two minutes but after a group of Twitter activists confronted the underhanded users, a precautionary measure to reduce their posts has restricted their activity to one-intervals.
read more "Anonymous (Syrian youths) using twitter to spread false messages about Syria"

The shutdown of the Coreflood botnet: Botnet Are They Really Dead or Will They Rise Again?


The shutdown of the Coreflood botnet: Botnet Are They Really Dead or Will They Rise Again?

There have been several victories against major botnets in the past few months, the most recent being the shutdown of the Coreflood botnet. Even though law enforcement officials have successfully collaborated with various industry experts—including Microsoft's Digital Crimes Unit and Symantec—to track down and seize command-and-control servers pumping instructions to infected machines, for the most part the operators remain at large.

While the Federal Bureau of Investigation has seized control the Coreflood botnet, it is now working with Microsoft to try to permanently remove malware from thousands of infected zombie machines to prevent Coreflood from springing back to life.

Now that the Federal Bureau of Investigation has successfully disarmed the Coreflood botnet temporarily, the next step is to get the malware off infected machines.

The number of “beacons,” or requests from Coreflood zombies to the C&C (command and control) servers have declined by over 90 percent in the week since the FBI raided and seized five C&C servers and 29 domains used to control the Coreflood botnet, according to court documents filed April 22. The requests have dropped from about 800,000 on April 13, two days before the raid, to less than 100,000 on April 22, according to court papers.

Many users were unaware their systems had been compromised in the first place and may still be infected even though the C&C servers are offline. With these dormant machines out there, it's possible that operators can resurrect the botnet at a later time and push out updated instructions to awaken its zombie army. "It stands to reason that when we stop seeing new exploits, that the entire botnet has to be on the decline," Patrick Cummins, a security malware researcher at Blue Coat Security, told eWEEK. The success and ultimate survival of the botnet depend on being able to continuously update its zombies. The U.S. Department of Justice employed a controversial technique to ensure Coreflood can't be revived by overwriting the malicious code on compromised systems with a new set of instructions.
read more "The shutdown of the Coreflood botnet: Botnet Are They Really Dead or Will They Rise Again?"

How to Hide Files on Hard Drives Without Encryption?

How to Hide Files on Hard Drives Without Encryption?

Researchers Devise Way to Hide Files on Hard Drives Without Encryption

Academic researchers have devised a new method to hide data files on hard drives from a third party "in plain sight."

A new application can hide sensitive data on a hard drive without encrypting it or leaving any obvious signs that the data is present, according to the academic researchers who developed it. This kind of a technique would allow organizations to safely conceal private information from unauthorized users.

The new software uses “steganography,” or the process of hiding data in plain sight, according to researchers from the University of Southern California and the National University of Science and Technology in Pakistan. The technique exploits the way the operating system normally splits up file data in numerous small chunks, called clusters, and writes them wherever there is free space on the hard drive.

Hassan Khan, Mobin Javed, Syed Ali Khayam and Fauzan Mirza collaborated on the paper “Designing a Cluster-Based Covert Channel to Evade Disk Investigation and Forensics.” Khan and his colleagues claim the process hides data so effectively that it would be “unreasonably complex” for a third-party to detect it.

The method employs a “covert channel” to encode sensitive information. Instead of the operating system writing small pieces of the file in random areas on the hard drive, the software chooses the positions according to a secret code. The person who wants to access the file just needs to know the key to figure out where the fragments were written and reassemble the clusters accordingly.

“We present a new, plausible deniability approach to store sensitive information on a cluster-based filesystem,” the researchers wrote in the paper.

The process doesn’t leave behind any information about what it did, so anyone looking at the hard disk drive cannot see the hidden information or even be able to tell it exists, the researchers claimed. The hard drive would look like any other moderately fragmented drive.

Currently, users interested in protecting data generally wind up using encryption software. However, existing cryptographic methods generally leave behind some indicators that that the file has been encrypted. Attackers know there is something hidden and can try to use other methods to obtain the secret key to access the data.

Other existing methods involve adding pixels in digital images or changing the transmission timing of network packets. These are all well-known techniques and easily detected, the researchers said.

“An investigator without the key cannot prove the presence of hidden information,” the authors wrote.

The researchers tested the process on a FAT32 file system, which is accessible by the Windows operating system, Mac OS X and all major Linux distributions. The researchers envisioned using the software to write data onto a portable USB drive. The program won’t work to hide data on a Windows 7 laptop, for example, because the operating system can’t be installed on FAT32.

If the drive is defragmented, the “hidden” file will no longer be accessible.

The covert channel approach may cause a small performance degradation on the system, but the developers claimed it isn’t enough to be an issue. They estimated that it would be feasible to hide about 20MB of data on a typical 160GB hard disk drive.
read more "How to Hide Files on Hard Drives Without Encryption?"

German software company has threatened legal action against a security researcher

German software company has threatened legal action against a security researcher

A German software company has threatened legal action against a security researcher who privately reported a critical vulnerability in one of its programs, Dark Reading reports.

Legal goons from Magix AG sent a nasty gram to a researcher who goes by “Acidgen” after he reported the stack buffer overflow in the company's Music Maker 16. According to the report, Acidgen alerted Magix representatives to the bug in several emails that also included proof-of-concept code that forced the Windows calculator to open, indicating the flaw could be exploited to execute malicious code on a victim's computer.

Acidgen also provided suggestions for fixing the flaw, Dark Reading said. He also told the representatives he planned to disclose vulnerability details publicly once a patch was released.

That's when things got ugly.

“MAGIX does not appreciate that you are intending to publicly release the Exploit and to cause irreparable harm,” a company attorney wrote. “As you maybe [sic] aware it is illegal to release software which is intended to commit computer sabotage (e.g. Sec. 202C I No. 2 German Criminal Law). In addition this announcement together with your offering to have the vulnerability fixed by your company may be considered as an attempted extortion.”

The letter said Magix would “enter into all necessary and appropriate legal steps” and to “inform manufacturers of antivirus software that there might be a new virus based on your code.”

Germany enacted a draconian hacker law in 2007 that also criminalizes the creation or possession of dual-use security tools. ®
read more "German software company has threatened legal action against a security researcher"

Friday, April 29, 2011

Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India

Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India

SixthSense Technology : Interactions between the real world and the world of data

At TEDIndia, Pranav Mistry demos several tools that help the physical world interact with the world of data -- including a deep look at his SixthSense device and a new, paradigm-shifting paper "laptop." In an onstage Q&A, Mistry says he'll open-source the software behind SixthSense, to open its possibilities to all.

In my opinion, this person Pranav Mistry is a real Indian hacker, who is exploring the limits where any of our SO CALLED INDIAN hackers not even think. All such bogus so called black hat hackers still limited to outdated third class method very well known as website defacement. WAKE UP GUYS...I JUST GIVE A DAMN. I personally recommend to all my readers....rather then wasting your precious time on various time waste forums...have a look on such latest technology talks. It will really open your eyes and tell you the clear picture. Have a look and check your self exactly where you stands in front of this.

Just have a look on below demonstration video of SIXTHSENSE technology


Pranav Mistry: MIT grad student, is the inventor of SixthSense, a wearable device that enables new interactions between the real world and the world of data.

Before his studies at MIT, he worked with Microsoft as a UX researcher; he's a graduate of IIT. Mistry is passionate about integrating the digital informational experience with our real-world interactions.

Some previous projects from Mistry's work at MIT includes intelligent sticky notes, Quickies, that can be searched and can send reminders; a pen that draws in 3D; and TaPuMa, a tangible public map that can act as Google of physical world. His research interests also include Gestural and Tangible Interaction, Ubiquitous Computing, AI, Machine Vision, Collective Intelligence and Robotics.

Try innovate in your own boundaries bring productivity. Small Example given below. Might inspire all of us.

His official website is

read more "Pranav Mistry SixthSense Technology is thrilling potential: Real Hacker from India"

Lovely Professional University (LPU) MURDER Case: Mizoram Student Killed by group of Sudanese and a Tanzanian student

Lovely Professional University (LPU): Mizoram Student Killed by group of Sudanese and a Tanzanian student

Why I am publishing this news: Because I have done my B.Tech from Lovely Professional University (LPU). In my views, It's a MURDER case.




UPDATE on 27th April 11:30 PM: Teaching will remain suspended in the lovely professional university from 28th April to 30th April..

UPDATE on 28th April 12:15 AM: One more student who was a friend of Johny had died and there is one more who is critical.. all over the campus is the condition of lathi charge.

Shame on LPU Management.. hope it recovers soon or otherwise it is going to result in a huge.

UPDATE on 28th April 12:30 AM: LPU is on fire now. Police and students are fighting with each other. Law , 6th , 6a , 3 , 5 Blocks Many Kiosks bashed ! Cc audi badly bashed ! Fire at BH 3 BH 2 Totally bashed No Currently there ! G.T Road Jammed , Buses In Pieces , Stones On Punjab Police , No Fire Brigade Yet Near BH 3 , Tear Gases all around , Air Firing at BH 2 , Lathi Charge Still , Itz A Battle Field , More Than Half Of the University is Damaged By The Students.

UPDATE on 28th April 12:50 AM: Update by Aman Shah: Those bloody bastard africans are still moving freely...just because of the support of our great lpu management...They are just trying to close this chapter without justice, just to get more admission & to get more money....The idiot dean of lpu MS.Rashmi mittal is responsible for all this. kehte hain na apno ko lage toh dard ka pta chalta hai.. dusron ko kuch ho toh dard ka ehsaas nhi hota.. same is the case here. the innocent johny is not the family member of that stupd dean.. so wo dean kya jaanegi uski life ki value??? unn parents ko pucho ki unhone kya khoya? incase agr johny ki jagah dean ka apna beta hota toh bhi wo aise act krti kya?? tab bhi clg ki reputation ko dekhti... nhi wo justice ke liye fight krti, i m damn sure..toh johnny ke case mein kyn kuch nhi kar rahi.. \.. & at last i just want to say MS. MITTAL that don't act like a politician, be a woman & give a justice to johnny & his family.. MAY JOHNY REST IN PEACE!!!!!!!

UPDATE on 28th April 01:10 AM: Every thing normal now & under control. A case under section 302 and 34 IPC was registered against Hashim Idrish, Ahmed Althani, both belonging to the Republic of Sudan(a country of North Eastern Africa) and Syed Faizal of United Republic of Tanzania (a country in East Africa). After the incident students of the college took to the street and protested the death. Meanwhile, heavy deployment of police was made in the University.and the students, especially those from African counties, were sent outside the university campus to avoid any backlash attack on them.

UPDATE on 28th April 01:15 AM: Finally the FIR has been logged & NON BAILABLE FIR WARRANT HAS BEEEN MADE.......against the three guilty, 2 Sudanese & 1 Tanzanian but still it is not clear that what LPU management has logged in the complaint.

ACCIDENT OR MURDER ??

UPDATE on 28th April 01:30 AM: All the 3 Culprits not yet arrested & they flew away from Punjab

We regret the sad and untimely demise of our young student Johny F Lalhmangaihzuala. We standby the bereaved family at this unfortunate time. We pray to the almighty for the peace of the departed soul and granting strength to family and friends to bear this irreparable loss.

R.i.P bro....

------------



Johnny Jwala from Mizoram

PHAGWARA: A Mizoram student was killed by a group of Sudanese and a Tanzanian student in Lovely Professional University. Sudan, is a country in northeastern Africa & Tanzania is a country in East Africa

The unofficial match was in between teams named Mizoram and Sudan. Johnny, a B.Tech student, scored a goal for the former. This infuriated the rival team members, who indulged in rough play. They kicked Johny in the stomach, chest and below the belt and they even hit him in his eye with a iron rod. Johnny fainted and fell on the ground. He was rushed to a local private hospital, where he was declared dead.

Two Sudanese students and one Tanzanian have been named in the FIR registered on the statement of university official and they have been arrested by the police.

Deceased Johny F Lalhmangaih Zuala (22) student of B Tech (Civil) Second year, was badly thrashed and he succumbed to his internal injuries in a hospital around midnight following which Indian students went on a ransacking spree inside the University and police had to be called. It is learnt that the ransacking took place around the hostel where Mizo students were staying as the latter vent out their ire after death of their friend.

According to an eyewitness, who was part of the Mizo team during a semifinal football match between the Mizo team and Sudan Eagle Team, in the late evening on Tuesday, Johny had scored a goal and their team was ahead of Sudan with one goal. "We wanted to replace a team mate while a free kick was given to the Sudanese team and suddenly a few infuriated members of the Sudanese team pounced upon Johny. Even before we could rush to save him they had already rained blows and kicks on him and Johny fell unconscious," the Mizo player, who did not want to be identified told TOI. "We did try to save him and finally, with the help of university officials who were present there, managed to separate them but the damage had already been done in 2-3 minutes as apart from the Sudanese team some of their supporters had also surrounded the victim," he said.

The victim was then rushed to Gandhi Hospital Phagwara where he died around midnight. As the news of his death spread angry Mizo and other Indian students went on a ransacking spree. Apart from damaging some kiosks they also targeted some vehicles belonging to the University. The university authorities then called police on whom also stones were pelted by the angry students and an ASI Ramandeep Singh sustained injuries while a couple of other got gashes. While sources revealed that police also fired in the air to control the mob on rampage but SHO Sadar Phagwara Ravinder Singh denied it.

Case against two Sudanese students Hashim Idriss, Ahmad Aigaly and one Tanzanian student Saeed Fesial has been registered under sections 302 and 34 of IPC on the basis of the statement of LPU Security Officer Surinder Khurana.

Meanwhile, heavy deployment of police was made in the University. Sources said that international students, especially those from African counties, were sent outside the university campus to avoid any backlash attack on them.

A leader of Jalandhar Mizo Students Union told that Johny's father was working as SDO in Mizoram PWD and was posted in a remote area and could not be informed about the death of his son till noon.

Meanwhile, LPU authorities have made arrangements to transport his body to Mizoram. Mizo students converged at Civil Hospital Phagwara where postmortem was conducted.

According to comments received

Duhawma Pachuau (Lunglei, Mizoram)
RIP Johny. A va han runthlak em. It happens only in India, shame@blame goes to LPU Authorities as well as to our very busy politicised Government. Very well done LPU Gold diggers. Thumps down.
Mathantea Pa (Aizawl)
Outrageous!! Middle East ppl esp. rich oil merchants kids come to India, spend their money on our women, despise our men. Loathe us and yet wants to stay in India. Its our country, Its our land, we don't want them doing any more trouble to our esteemed Motherland. We as Indians should stand united and prevent such things from happening in the future.

A student (LPU)
This is a very unfortunate accident.. A wrong of one person must not be blamed on whole community. On the other hand, the LPU Administration is very good at playing politics and acting. They don't let the news come out.. it's a shame that i am paying to such an institution which is the biggest mimicry act in itself- They say something else, do something else and the result is something else. There were around 80 people (or more) watching the match (It was an OFFICIAL EVENT in university- Football matches) when the brawl began (because one of the team couldn't digest the fact that they were loosing).. no one intervened, probably scared of there lives... if someone had mustered courage, a life would have been saved... Not those 10, all those who were watching are also convicts.. If You cannot stop a wrong, You are part of the wrong.. This is high time LPU Administration should channelize there efforts in actually enforcing than pretending to be some super-advanced university in advertisements and banners... SHAME on us!
khushi (lpu)
it's a shame for us tht foreigners kicked us in India too,,,n wht if we would hav been in their states they would hav taken the revenge by the time indians are watching...they got to pay for wht they did... juzz go away frm our country else we can also do the way others deal wid indians for committing a crime in other states...mango nation (Moscow) replies to khushi (lpu)what else will cowards do, they will sit and watch only
tamanna (lpu)
well very rightly said yogesh, lpu talks about its discipline and security and how a bunch of foreigners are ruining it. these africans have already created mess many times before if lpu had taken strict action rather then ignoring to maintain its reputation we wudnt had to see this day. may johny RIP

seema (LPU )
i really regret wat ever happened yesterday evening wid "JOHNY"....mistakes r not only of Sudanese but also of LPU security...while the match was going on...there must be security present there as LPU have lot of security guards...securities are here only for catching lovers without any reason and nothing else these securities are here for :( strict action must be taken against Sudanese students:( Atlast i pray for peace of your soul dear "JOHNY" WE WILL BE MISSING YOU A LOT :(

Rpk Rex (Jalandhar, India)
Just feeling shame on myself to be part of the university. This is such a big issue yet no action has been taken nor anything has been clarified. Even we are not allowed to do silent protest. And police is charging lathi on taking no action with violence. We are following the slogan of "Athithi devo bhavo" but when guest is doing such a criminal offence then why not we. Our only question is "What is done for the student died and what is done for the security of students studying here?

Mizohican (Mumbai)
What I don't understand is, how can a bunch of foreign students, who are "guests" of this country, have the audacity and guts to thrash someone to death right in front of everybody? If you and I were studying at a foreign country, would we even disrespect the locals over there? This just shows how little they think of us and that they know nothing will happen to them because they are "foreigners" and many of them have their daddy's oil rich bank account to bail them out anywhere. They know they can get away even with murder. Its high time our Govt makes an example of such people, giving those who are responsible the harshest punishment possible, even if they are foreigners. Indian students abroad are beaten up by the locals over there. Does this mean that even here in India, Indian students are not safe from the fiery wrath of foreigners? Rest In Peace, dear Johny, and my utmost condolences to your grieving family back in Mizoram. Going through your facebook wall brings tears to our eyes, intensifying our rage rather than dousing it. Your death will never be forgotten.

Himanshu Choudhary (JALANDHAR,PUNJAB)
now the worst part of the story has arised..... lpu management is now trying to disclose dis matter so that their should be no negative affect on their foriegn admissions... they r trying 2 make it a case of accident.... wat a shame...

ram din thara (solomon islands)
Very unfortunate! Foreign students killed an Indian student in India! The guilty party should face the full force of the law. RIP, Johny.

PC.lalnghinglova (PC-a) (Rajasthan)
Indian studens have beeb killed in Australia and in many more foreign soils and, indians are hapless there.Now, native student is brutally butcherred to death by merciless foreigner in our door step.Befitting action must be taken.May God dwell with the family of Jonny and may his soul rest in peace.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on [email protected]
read more "Lovely Professional University (LPU) MURDER Case: Mizoram Student Killed by group of Sudanese and a Tanzanian student"

Is Online Privacy Really Possible? A BIG QUESTION After Recent Sony Playstation Network Hacking

Is Online Privacy Really Possible? A BIG QUESTION After Recent Sony Playstation Network Hacking

A recent Sony Playstation network outage is the result of a hacker and a compromise of users personal data, possibly including credit card information, plus email addresses.

From Sony to Apple, major tech companies have been in the bulls eye recently for privacy concerns.

The question is, can tech lovers completely protect themselves online and through their mobile devices, or should we all just get used to the occasional data breach?

Sony's not the only tech giant in the bullseye of privacy experts recently.

A report alleged Apple tracked the location of iPhone, iPad, and iPod touch users and stored that data.

The company responded by saying the Intent wasn't to log where users go, and the issues would be corrected.

While some users were alarmed experts say others have just gotten used to it accepting it as a tradeoff for the sites and mobile devices we've integrated into our lives.

Social media expert Deanna Zandt says, "It's almost becoming a normalized activity for us to be risking our privacy and security for entertainment and services."

When it comes to protecting personal data, like it or not, it's largely up to you.

"The onus is on us as the consumers to protect ourselves versus the companies that we pay and we have service agreements with to protect our data for us and that's going to be a huge issue going forward," Zandt says.
read more "Is Online Privacy Really Possible? A BIG QUESTION After Recent Sony Playstation Network Hacking"

Hacker Jeff Moss aka Dark Tangent hired by ICANN as Security Chief


Hacker Jeff Moss aka Dark Tangent hired by ICANN as Security Chief

Boston: A hacker who goes by the name Dark Tangent was hired to oversee security for the nonprofit group that manages all Internet addresses to make sure each one is unique.

The Internet Corporation for Assigned Names and Numbers, or ICANN, said on Thursday that it has hired hacker Jeff Moss as its chief security officer.

Moss is founder of Def Con, the world's largest conference for hackers, which meets in Las Vegas each summer. He also founded Black Hat, a smaller hacking conference that targets businesses.

Moss, a hacker who uses his skills to fight Internet crime, also serves as a member of the Obama Administration's Homeland Security Advisory Council.

"He has the in-depth insider's knowledge that can only come from fighting in the trenches of the ongoing war against cyber threats," ICANN Chief Executive Rod Beckstrom said in a statement.
read more "Hacker Jeff Moss aka Dark Tangent hired by ICANN as Security Chief"

National News Agency (LETA) Website Hacked by Latvian Hacker

National News Agency (LETA) Website Hacked by Latvian Hacker

RIGA - A hacker in Latvia has broken into the national news agency website.

The hacker, whose attack on the LETA website has been described as "very professional", posted a message criticizing one of the news agency's stories in which security experts were quoted as saying that small firms are more susceptible to security breaches.

The message admonished the website, accusing it of publishing "defamatory news", "offensive advertorials", and telling LETA not to "try to leap higher than your own ass".
read more "National News Agency (LETA) Website Hacked by Latvian Hacker"

Internet activist group Anonymous threaten Parliament's website http://www.parliament.nz/en-NZ

Internet activist group Anonymous threaten Parliament's website http://www.parliament.nz/en-NZ

Internet activist group Anonymous is threatening to block access to Parliament's website from this afternoon to protest against a law change that will make it easier for film and music companies to track and fine internet users who pirate copyrighted material.

Parliamentary Service general manager Geoff Thorn said it was taking the threat of a "denial-of-service" seriously and was taking undisclosed measures to try to pre-empt it.

The threat came as polling firm Horizon Research issued a survey that found mixed views on the law change, which will establish a "three strikes" regime for illegal file-sharing, under which people could be issued with infringement notices and then fined up to $15,000.

It found 37.1 per cent of its 1922 panelists supported last month's law change and 38.3 per cent were opposed.

Anonymous said the Copyright Amendment Bill presumed people were guilty of piracy unless proved innocent and breached "internet freedom".

Activists claiming to represent Anonymous also threatened to take down Internal Affairs' website last month, but there is no evidence an attack eventuated.
read more "Internet activist group Anonymous threaten Parliament's website http://www.parliament.nz/en-NZ"

Oracle Remote Password Disclosure Exploit: JD Edwards JDENET SawKernel

Oracle Remote Password Disclosure Exploit: JD Edwards JDENET SawKernel

Onapsis Security Advisory 2011-009: Oracle JD Edwards JDENET SawKernel Remote Password Disclosure

This advisory can be downloaded in PDF format from http://www.onapsis.com/.

By downloading this advisory from the Onapsis Resource Center, you will gain access to beforehand information on upcoming advisories, presentations and new research projects from the Onapsis Research Labs, as well as exclusive access to special promotions for upcoming trainings and conferences.

1. Impact on Business
=====================

By exploiting this vulnerability, a remote unauthenticated attacker might be able to obtain valid access credentials and access or modify all the
business information processed by the ERP system.
This would result in the total compromise of the ERP infrastructure.

- -- Risk Level: High


2. Advisory Information
=======================

- -- Release Date: 2011-04-27

- -- Last Revised: 2011-04-27

- -- Security Advisory ID: ONAPSIS-2011-09

- -- Onapsis SVS ID: ONAPSIS-00031

- -- Researcher: Juan Pablo Perez Etchegoyen


3. Vulnerability Information
============================

- -- Vendor: ORACLE

- -- Affected Components:

* JD Edwards 9.0 EnterpriseOne Server + EnterpriseOne Tools 8.98
( older versions might be also affected)

- -- Vulnerability Class: Information Disclosure

- -- Remotely Exploitable: Yes

- -- Locally Exploitable: No

- -- Authentication Required: No

- -- Original Advisory: http://www.onapsis.com/resources/get.php?resid=adv_onapsis-2011-09


4. Affected Components Description
==================================

JDENet is a network communication middleware that performs network communications workstation-to-server and server-to-server. It is used to call
remote functions, to authenticate users and transmit information between hosts in a JD Edwards environment.


5. Vulnerability Details
========================

It is possible for a remote and unauthenticated attacker to retrieve passwords of users that are allowed to login to the SAW Kernel (System
Administration Workbench Kernel) in default installations of JD Edwards EnterpriseOne servers.

As SAW users are allowed to, among other things, remotely execute commands on the server, the exploitation of this vulnerability leads to a full
compromise of the server.

Further technical details about this issue are not disclosed at this moment with the purpose of providing enough time to affected customers to patch
their systems and protect against the exploitation of the
described vulnerability.


6. Solution
===========

Apply Oracle Critical Patch update April ? 2010. More information available on http://www.oracle.com/technetwork/topics/security/cpuapr2011-301950.html
Onapsis strongly recommends Oracle customers to download the related security fixes and apply them to the affected components in order to reduce
business risks.


7. Report Timeline
==================

* 2010-09-20: Onapsis provides vulnerability information to Oracle.
* 2010-09-21: Oracle confirms reception of vulnerability submission.
* 2010-09-24: Oracle states vulnerability is under investigation.
* 2010-10-07: Oracle confirms vulnerability.
* 2011-04-19: Oracle releases fixes in CPU.
* 2011-04-27: Onapsis releases security advisory.


About Onapsis Research Labs
===========================

Onapsis is continuously investing resources in the research of the security of business critical systems and applications.

With that objective in mind, a special unit ? the Onapsis Research Labs ? has been developed since the creation of the company. The experts involved
in this special team lead the public research trends in this matter, having discovered and published many of the public security vulnerabilities in
these platforms.

The outcome of this advanced and cutting-edge research is continuously provided to the Onapsis Consulting and Development teams, improving the quality
of our solutions and enabling our customers to be protected from the latest risks to their critical business information.

Furthermore, the results of this research projects are usually shared with the general security and professional community, encouraging the sharing of
information and increasing the common knowledge in this field.


About Onapsis
=============

Onapsis is the leading provider of solutions for the security of ERP and business-critical systems and applications. Through different innovative
products and services, Onapsis helps its global customers to effectively increase the security level of their core business platforms, protecting
their information and decreasing financial fraud risks.

Onapsis is built upon a team of world-renowned experts in the ERP security field, with several years of experience in the assessment and protection of
critical platforms in world-wide customers, such as
Fortune-500 companies and governmental entities.

Our star product, Onapsis X1, enables our customers to perform automated Security & Compliance Audits, Vulnerability Assessments and Penetration Tests
over their SAP platform, helping them enforce compliance requirements, decrease financial fraud risks an reduce audit costs drastically.

Some of our featured services include SAP Penetration Testing, SAP Gateway & RFC security, SAP Enterprise Portal security assessment, Security Support
for SAP Implementations and Upgrades, SAP System Hardening and SAP Technical Security Audits.

---Do you want to share you views?? Just leave a comment here. you can also drop an email on [email protected]
read more "Oracle Remote Password Disclosure Exploit: JD Edwards JDENET SawKernel"

Unrevoked 3.33 may launch soon: Exploits Android 2.3.3 GingerBreak Released

Unrevoked 3.33 may launch soon: Exploits Android 2.3.3 GingerBreak Released

Source: http://www.theprohack.com/

Sebastian Krahmer the famed “rage against the cage” exploit dev has released the latest version of exploit that exploits Android 2.3.3 Gingerbread and may also exploit Android 3.0 Honeycomb and may also exploit Android 2.2 Froyo. As the official post claims -

Free your phone, once again. Successfully tested on Gingerbread (2.3.3) but might also run on Froyo and Honeycomb. If it fails there, some offsets and indexes need to be adjusted which is left to the reader.

NOTE: You use it at your own risk! I am not responsible for any failure or damage. Make sure to read the README file carefully! Download it here. If you successfully run it anywhere, please make a comment with exact device model/firmware running.
[Update] I replaced the tarball with a new version to fixsome glitches while parsing vold.fstab. Should now also work on the GalaxyS. Thx to Chainfire.

You can download the exploit here .Or you can visit the blog here

The best part ? Since the exploit is released, we can expect Unrevoked team to release Unrevoked 3.33 soon :)

In the mean time, you can read how to root HTC Wildfire 2.2.1

ALSO READ Android Calendar Synchronization with Facebook Calendar on Google Calendar

read more "Unrevoked 3.33 may launch soon: Exploits Android 2.3.3 GingerBreak Released"

Android powered smartphones recognize people's faces

Android powered smartphones recognize people's faces

Android smartphones may soon recognise your friends

Northern California startup Viewdle released software that lets Android-powered smartphones recognize people's faces.

The free SocialCamera application available at the Android Market or online at viewdle.com/products/mobile was billed as the first of its kind for US smartphone users.

"Viewdle SocialCamera is the first mobile camera app to encourage socializing and communication," said Viewdle co-founder and chief executive Laurent Gil.

"Consumers can now instantly share their photos based on who appears in them," he continued.

SocialCamera uses computer algorithms to create "faceprints" that people can tag with names and store in smartphones. The software then matches faceprints to subjects in subsequent photos.

Android smartphones can instantly connect names to those in photos and share the images with those involved using social networking service Facebook; photo-sharing website Flickr, or by email or instant messages.

SocialCamera was billed as the first in a line of facial-recognition software applications aimed at the consumer market.

High-powered players in September pumped $10 million into the Palo Alto, California startup devoted to crafting ways to let smartphones "see" things the same way people do and identify faces.

The influx of cash came from Qualcomm, BlackBerry Partners Fund, US electronics retail chain Best Buy, and Anthem Venture Partners, an investment firm that has backed Viewdle from the outset.

"We are giving smartphones human eyes," Gil told AFP in an interview when the funding was announced.

"Letting them see the world the way people do... it is artificial intelligence," he said. "It is happening."

Viewdle bills itself as the leading independent facial recognition company for consumer gadgets. Its technology is developed by the company's research team in the Ukraine.

Viewdle is the result of 15 years of research, rooted in work done at The Cybernetics Institute in Kiev, and got its first infusion of investor money -- 2.5 million dollars -- in June 2008.

SOURCE: TOI

read more "Android powered smartphones recognize people's faces"

Thursday, April 28, 2011

Download Book PDF Code in the Cloud Programming Google AppsEngine


Download Book PDF Code in the Cloud Programming Google AppsEngine

Publisher: Pra gmatic Book shelf | 2011 | 320 Pages | ISBN: 1934356638 | EPUB + PDF | 7.8 Mb

One of the most exciting recent changes in the computing world is cloud computing. Cloud computing is a dramatic shift in how applications are developed and used-and even in what applications are. With cloud computing, developers are no longer building applications that run on a user's desktop computer. Instead, they're building services on the network that can be used by thousands of users at the same time.

Cloud services are an exciting opportunity for developers: the cloud is a platform for creating services, a new kind of application that can reach more users, and provide those users with more capabilities than a desktop application ever could. Building applications as cloud services also makes them scalable: cloud applications can easily and smoothly adapt from running on a single computer for a single user to running on thousands of computers for millions of users.

Code in the Cloud will teach you what a cloud service is, and how it differs from traditional applications. It will show you how to build a cloud service, taking advantage of the services that AppEngine makes available to you, using iterative development of a simple application to guide you through the different aspects of AppEngine development, using either Python or Java.

Through the process of working on a simple application, you'll learn about how to build an application as a service; how to manage persistent data using AppEngine; how to build dynamic, interactive user interfaces that run in a user's web-browser; how to manage security in a web application; and how to interact with other services running in the AppEngine cloud.

DOWNLOAD

read more "Download Book PDF Code in the Cloud Programming Google AppsEngine"

Download The Complete Idiot's Guide to WordPress

The Complete Idiot's Guide to WordPress
Alp.ha | 2011 | ISBN: 161564072X | 464 pages | PDF | 20 Mb

Take advantage of the #1 blog publishing application.

With more than 22 million users worldwide, WordPress is the #1 blog WordPress publishing application in the world. This guide provides users of both its hosted blogging service (WorldPress.com) and its self-hosted application (WordPress.org) with everything they need to know to create, customize, manage, and share their WordPress blogs with the world.


read more "Download The Complete Idiot's Guide to WordPress"

New Zealand Parliament Website Down: Anonymous Suspected of Taking Down Kiwi Gov Website

New Zealand Parliament Website Down: Anonymous Suspected of Taking Down Kiwi Gov Website

The parliament website experienced intermittent outages today, in the wake of a threatened attack by hacker collective Anonymous.

Anonymous said New Zealand had "crossed the line" when it passed the Copyright (Infringing File Sharing) Amendment Bill and that a quick example would be made of the government, in a press release on their website recently. A user in the Operation Black Out IRC (chat channel) said over Easter that while there were no solid plans as of then, the government servers were "extremely weak" and could be taken down by a person in "two minutes. The government might like to work on that,"


The same user claimed to have hacked a minister's website and sent a message to all the MPs who voted for the bill, expressing contrition for voting for the bill, and outlining its failures, although this has as yet not been confirmed.

And today an email was sent at 9am by parliamentary service general manager Geoff Thorn to MPs that said the parliamentary website was experiencing intermittent outages due to excessive load, a problem often caused by distributed denial of service (DDoS) attacks favoured by Anonymous.

"It is possible that this traffic is related to a public threat to bring down the Parliamentary website," Mr Thorn said in the email.

Green MP Gareth Hughes, who has been lauded on the internet for opposing the bill, said today that while he supported non-violent direct action, attacking the parliamentary website was not the way for anyone to go.

"I think the parliamentary website is part of the democratic process of New Zealand, it's essential that people get access to it."

Mr Hughes said while the group was rightly concerned about the bill, the appropriate ways to protest were to join the campaign of blacking out avatars on social media sites, joining the protests organised in May and getting in touch with the government.

He said the bill had been improved from Labour's first draft, but that there were still issues, such as "grave concerns" about the presumption of guilt and the internet account suspension penalty.

"It's disproportionate, it doesn't work and I believe accessing the internet is a modern human right."

Mr Hughes said the government needed to clearly state how they would interpret the fines schedule, and when and how they would decide to bring in the account suspension.

Reports on various sites, including the Facebook page for the Black Out (Opposing the bill) campaign, are confused - a counter has been linked stating it has been over a day (NY time) since Anonymous was due to attack New Zealand while other posts state that attacks were planned for today at 3pm.

And on Wednesday, the Twitter user YourAnonNews announced that Anonymous itself was under attack at its anonops.net site. A post on the Anonymous facebook page stated the group's anonops.tk website was undergoing maintenance.

Anonymous was accused of the hack which stole millions of users' personal information from the Sony PlaystationNetwork but the group has denied responsibility.


---Do you want to share you views?? Just leave a comment here. you can also drop an email on [email protected]
read more "New Zealand Parliament Website Down: Anonymous Suspected of Taking Down Kiwi Gov Website"

Is Speak Asia Online Scam (Fraud) Company for Investment? Ask Mr.Navi 9464256908 the real truth

Is Speak Asia Online Scam (Fraud) Company for Investment? Ask Mr.Navi 9464256908 the real truth


Do you want to join us? We will add you in our power leg.
Contact us: [email protected]
Mobile no: Mr.Navi 09464256908

Is Speak Asia Online Scam (Fraud) Company for Investment? Many people want to know that the Speak Asia Online company is scam or legitimate (real). Some of them say it is a very genuine Company from Singapore and some say that they are paying now, but don’t know when they will withdraw the business.

Speak Asia Online is 6 years old in survey services and started its services in India in Feb, 2010. They say you can earn 4000/- to 40,000 per month by giving simple online survey answers just siting at your home office etc. And of course this is MLM business and we have already saw many MLM business which are closed after their pockets have filled. First you should register by paying $200 as registration fee and in return you get $40 per month for the next 12 months and there is referral (MLM) program also.

Till date no reports has been received from any of the member & company also cleared all the paychecks with in 2 days. Many guys also earning in lakhs. For any MLM business, the key point is to join it as soon as possible and earn as much as you can. More you think, the more time you will waste & more risk you will take. ITS VERY SIMPLE. I highly recommend Speak Asia to all of you guys. Now just stop thinking and join before you all friends join it. Make profit and enjoy the money.

Amit agarwal of labnol.org says -

Speak Asia Online has been around in India for about an year now and it looks like the company has been regularly paying members the promised commissions and thus more people are getting lured into the system. Some existing members are even re-investing their own profits back into the system to increase the size of their paycheck. Remember the rice and chessboard story? Speak Asia Online is working on adding new users at a similar rate – one new member will invite two more who in turn will bring another four new members to the system and thus the subscriber base will grow as quickly as the number of rice grains on that chess board. Once enough people join their unsustainable and unbelievable business, the company will simply vanish into thin air. There’s no ‘easy money’ on the Internet and the ease and scale at which this company is operating in India has simply baffled me. Please stay clear!
read more "Is Speak Asia Online Scam (Fraud) Company for Investment? Ask Mr.Navi 9464256908 the real truth"