<BODY><script type="text/javascript"> function setAttributeOnload(object, attribute, val) { if(window.addEventListener) { window.addEventListener('load', function(){ object[attribute] = val; }, false); } else { window.attachEvent('onload', function(){ object[attribute] = val; }); } } </script> <div id="navbar-iframe-container"></div> <script type="text/javascript" src="https://apis.google.com/js/platform.js"></script> <script type="text/javascript"> gapi.load("gapi.iframes:gapi.iframes.style.bubble", function() { if (gapi.iframes && gapi.iframes.getContext) { gapi.iframes.getContext().openChild({ url: 'https://www.blogger.com/navbar.g?targetBlogID\x3d18755935\x26blogName\x3dVINOD+MEDIA%E2%84%A2\x26publishMode\x3dPUBLISH_MODE_BLOGSPOT\x26navbarType\x3dBLUE\x26layoutType\x3dCLASSIC\x26searchRoot\x3dhttps://dmnvinod.blogspot.com/search\x26blogLocale\x3den_US\x26v\x3d2\x26homepageUrl\x3dhttp://dmnvinod.blogspot.com/\x26vt\x3d-1483311251890623224', where: document.getElementById("navbar-iframe-container"), id: "navbar-iframe" }); } }); </script>

Top 10 Animatated Music Video

Sunday, November 25, 2007
10. Fatboy Slim - Right Here, Right Now




9. Red Hot Chille Peppers - californication




8. The White Stripes - Fell In Love With A Girl



7. Pearl Jam - Evolution





6. Junior Senior - Move your Feet








5. Linkin Park - Breaking The Habbit









4. Rammstein - Links 2,3,4









3. We will rock u










2. Dire Straits - Money for nothing (1984)










1. Gorillaz - Clint Eastwood



Labels:

Cool Animation

Saturday, November 24, 2007
Happy


Kiwi



Animation vs Animator



This is Sparta




Gum Thief

Labels:

Cyber-terrorism (Target India)

Sunday, November 18, 2007
Cyber-terrorism is the leveraging of a target's computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption.

As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.

As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat.

India Website Defacement is on the high, here is a complete report. Website defacement is when a Defacer breaks into a web server and alters the hosted website or creates one of his own. A message is often left on the webpage stating his or her pseudonym and the output from "uname -a" and the "id" command along with "shout outs" to his or her friends. Sometimes the Defacer makes fun of the system administrator for failing to maintain server security. Most times the defacement is harmless, however, it can sometimes be used as a distraction to cover up more sinister actions such as uploading malware.

Most of the Exploit is due to Vulnerability in Cross site scripting, Windows Operating System, Linux, Apache, PHP.

Here are few statistics.








On-the-spot prevention

The attack should be identified at the service
request level, probably at the system call or API call invocation.
At this stage, the request hasn't executed yet. This is
the perfect time since changes to the page have not yet been
made. An effective technique is to use system call and API call
interception. The interception routine is transparently activated
prior to the execution of the request. It checks if the initiator
is allowed to perform the request and whether the
request is legitimate, i.e., not part of an attack. If the request
is found to be legitimate, execution resumes with no further
delay. If, however, the request is malicious, the call is failed
and the attack is thwarted.

Administrator (root) resistant

Most hackers first gain privileged
rights and then try to deface the site. Therefore, it's good practice
to restrict the privileges of the Administrator account on a
Web server machine. Instead of the 'Administrator' account,
only a specific predefined user (the Web master) should be
allowed to modify the Web site content and configuration. The
system should enforce this rule and fail malicious use of the
Administrator privileges.

Application access control

It makes no sense for an arbitrary application
such as a text editor to modify a Web page (even if the
user has the adequate privileges). A single predefined program
should be used to edit and/or create Web pages. An
effective solution should enforce this rule by making sure that
access to Web pages can be done only by using this predefined
program.

OS level protection

Many hackers exploit vulnerabilities in the
operating system in an attempt to break into the Web server
machine. The solution should be able to identify and prevent
such attempts. In particular, buffer overflow attacks, which
are very popular, should be prevented.
HTTP attack protection—There are many attacks that use the HTTP
protocol to break into Web servers and the OS. A protection
module, which scans incoming HTTP requests for malicious
requests should be used. The module should be effective also
when the communication is encrypted.

Web server resources protection

Hackers typically need access to
Web server resources for them to succeed in their attempts.
They may want to kill the Web server process, modify configuration
settings, and manipulate the Web server user properties
(see the Sechole case). The resources that must be
protected include:
• Executables
• Configuration files (including the Registry in NT)
• Data files
• Web server process
The access to these resources should be restricted to a predefined set
of users and to a predefined set of applications.
Other Internet server attack protection—Internet servers such as
Bind (a DNS server), Sendmail (an SMTP server), and others
are known to have many vulnerabilities that let a hacker gain
administrative privileges. The solution should be able to preprevent
such attacks by parsing the incoming communication
stream and identifying malicious requests.


Let`s Hope the numbers come down in 2008 !

Regards,
VINOD M

Labels: , , ,

Wardriving a Hobby

Friday, November 16, 2007
Wardriving / Wireless Hijacking

Wardriving
Wireless Highjacking
Wi-Fi piggybacking
Warbiking
Warwalking
Warchalking

Whatever !!!







Following to My Previous post on Wardriving, Wardriving has continued to be a hobby rather than a crime.

WiFi Highjacking has continued to be a top hobby for most Casual hackers, an online survey shows over 50% of people use someone else's Wi-Fi connection without their permission. Sophos Servey on Wi-Fi piggybacking.

Here is another cool video of a Wifi Highjacked Victim



Happy WiFi hijacking.

Labels: , , , , ,

ATM Frauds

ATM Frauds

Cash machine crime was the fastest growing form of card fraud in the past year.
Fraudsters target cash machines using skimming devices, which copy card details, and miniature camera devices, which record cardholders' PINs.



Chip and pin cards aim to cut fraud by including a smart chip, which can store more information than the usual magnetic strips, and also by having users verify transactions by keying in a pin number rather than signing a receipt.
France pioneered the technology more than 10 years ago - reportedly cutting fraud by almost 80% as a result.




● Be aware of others around you. If someone is behaving suspiciously or makes you feel uncomfortable choose a different machine.
● If you spot anything unusual about the cash machine, or there are signs of tampering, do not use the machine and report it to the bank immediately.
● Be alert. If someone is crowding or watching you, cancel the transaction and go to another machine.
● Stand close to the cash machine. Always shield the keypad with your spare hand and your body to avoid anyone seeing you enter your PIN.

Labels: , ,

Credit Card Clone

Credit card fraud is a huge problem and it's getting worse.
But it's not card theft that poses the greatest problem - it's card cloning.
Cloning a credit card takes seconds. Whilst a card is being swiped for payment - dishonest staff can swipe the card details which are downloaded on computer.

Watch this video to see how Credit cards are cloned in no time.



TOP TIPS TO AVOID CREDIT CARD FRAUD

Theft of the card:
It's physically stolen from your bag or wallet, or home, and an impostor pretends to be you to obtain goods or services.

Cloning (also called 'skimming'):
An employee of a shop, petrol station, or restaurant puts your card into an electronic reading device and steals your card details.

Card-not-present fraud:
Details may be obtained from card theft, skimming or going through someone's receipts, or copying down details during a transaction.
Goods or services are fraudulently obtained by buying over the phone, internet, from mail order or fax.

To prevent card fraud:
Keep your cards and cheque books safe, and do not let anyone know your PIN numbers even if they say they're from the police or the credit card company.

When paying by card, don't let it out of your sight.
Only use secure, well-known internet sites when shopping online.
Always check bank and credit card statements carefully, and query anything you don't recognise immediately.
Be careful when disposing of bank statements and credit card receipts. Criminals search dustbins for these.

If you think your card is stolen or copied:
Call your card issuer immediately.
Your card will be cancelled by the issuer. If you still have it in your possession, remember not to use it again. Check with a credit reference agency such as Experian or Equifax to make sure no fraudulent applications for credit have been made in your name.

Labels: , ,

HAPPY DIWALI

Saturday, November 10, 2007


Wish you a very happy and prosperous diwali.

Best Regards,
VINOD M

Labels: