Geek Rapping

I found This on the IET News What a load of fun tyhis guy sounds, if you like rapping? lol

listen up /
facilities man /
mutha earth is dying /
better change yo plan

pump up the server utilization /
cut the carbon of the nation /
gon’ get your i-o /
in the groove, yo

gon’ reduce the power /
hour by hour/
till we kill /
yo energy bill

Co Lo Bro: ‘Green Yo Ass’.

James Hayes
Editor, IT section

Controversial IT rapper Co Lo Bro has been in trouble again. Last week the 42-year-old former Java programmer organised an illegal live concert on the roof of one of the largest data centres in London’s Docklands. Performing to an estimated 2,000 fans, Co Lo Bro (supported by DJ Rakspayze) sang tracks from his new release ‘Green Yo Ass’, a concept album that urges data centre managers to ensure that their facilities are “environmentally fit”.

Co Lo Bro’s message extends equally to enterprise IT departments who, the artiste feels, can also make a “measurable contribution” to the greening of corporate computing. “This next song is dedicated to all da bros and sistas who are factoring thin client computing into their IT strategies going forward,” he told his audience. Unfortunately, at this point police – summoned by a group of ventilation service engineers trapped inside the data centre by surging crowds – ended the event, arresting Co Lo Bro and his cohorts.

The rapper’s sentiments may seem an unorthodox way of reaching IT professionals, but they are bang on the money. According to the lead feature ‘Thin clients’ fat challenge’ in the new edition of ‘Engineering & Technology’ magazine, sound though their value proposition is, thin clients may face some thin pickings over 2010, as many enterprises stall plans to upgrade ageing desktop clients to new slimline counterparts. And in the longer term, the thin client ethos faces the challenge of the mobile enterprise – for when significant numbers of the netbook-equipped workforce are not longer deskbound, the need for multiple permanent fixed computing terminals, fat or thin, starts to scale down drastically.

Also in the IT section of ‘E&T’ Issue 21, IDC Group analyst Carla Arend considers the changing shape of data storage, and we present the third installment of E&T’s ‘Buzzword Bingo’ guide, specially timed for readers who may be exposed to corporate claptrap over the festive period. Interminable terminology includes ‘Layer Eight’, ‘System DNA’, ‘Loose coupling’, and ‘disruptive technology’.

Cain & Abel v4.9.35 – Password Sniffer, Cracker and Brute-Forcing Tool

It’s been quite a while since we’ve written about Cain & Abel, one of the most powerful tools for the Windows platform.

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.

Cain & Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.

The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.

Most recently added is the support for Windows 2008 Terminal Server in APR-RDP sniffer filter.

You can download Cain & Abel v4.9.35 here:

ca_setup.exe

Or read more here, the online user manual is here.

Internet Security

You will be trading a bit of convenience for your increase in privacy. How many steps you take, and on which occasion you take them will depend on your degree of trust 🙂

1. cookies – by disabling persistent cookies, you can prevent a website (or network of websites) to track your browsing pattern across multiple sessions. Each time you close your browser, any cookies you have received will be deleted. The main drawback is that this will disable any website auto-logins or specific settings you may have enabled.

2. toolbars – assistants, helpers and other gimmicks that you might want to install as a browser toolbar will periodically phone home while you are surfing the web. Some of this may be legit, some of it may not.

3. websites that you register for – Social networking sites or webmail services may be interested in following your activities while you browse their site. Which topics interest you, what opinions did you express, did you make any purchases?
4. geolocation of your ip address – great for targeted advertising, or to display varied content (e.g. languages) depending on a user’s location. You could consider using a proxy that does not relay your original ip address.

5. data harvesting at the ISP level – search for Phorm, Nebuad, Carnivore 😉

The list could go on for a while, many others can comment on the other breeches of security like… Flash cookies, user agents, hopcounts, private browsing, browser anti-phishing features, omnibox, anonymizers, hosts file anyone?

Watch your password!

Microsoft confirmed yesterday evening that the popular web email service, Hotmail, had been targeted by malicious fraudsters in what is commonly referred to as a phishing scam, tricking users into revealing their credentials at fake websites.
Neowin can today reveal that more lists are circulating with genuine account information and that over 20,000 accounts have now been compromised. Non-Hotmail passport accounts have been affected too. A new list contains email accounts for Gmail, Yahoo, Comcast, Earthlink and other third party popular web mail services. It’s not clear if this is login information for the service itself or the Microsoft Passport passwords.
Microsoft confirmed Neowin’s exclusive report yesterday evening and issued a statement on a company blog:
“Over the weekend Microsoft learned that several thousand Windows Live Hotmail customer’s credentials were exposed on a third-party site due to a likely phishing scheme. Upon learning of the issue, we immediately requested that the credentials be removed and launched an investigation to determine the impact to customers. As part of that investigation, we determined that this was not a breach of internal Microsoft data and initiated our standard process of working to help customers regain control of their accounts.”
It’s clear the lists are the result of a phishing scam and some commenters at Neowin suggest it could be the result of unwitting users sending their credentials to sites that name who has blocked you on popular instant messaging software Windows Live Messenger.
Neowin has once again reported the new lists to Microsoft’s Security Response Center and can confirm that the lists originated from pastebin.com, a site commonly used by developers to share code snippets. Pastebin owner Paul Dixon confirmed that the site was down for maintenance due to “an unprecedented amount of traffic” after our initial reports. Dixon stated “Pastebin.com is just a fun side project for me, and today it’s not fun. It will remain offline all day while I make some further modifications.”
Update: The phishing attack has spread to Google Mail and Yahoo mail amongst others, we’re currently awaiting full confirmation on the number of accounts at each service. BBC News is reporting that Google have confirmed the phishing attack.

Purported EC18T

Hey, what’s this attractive looking dude? Well, from the looks of it, it’s Gateway’s not-yet-announced or previously spied tablet PC. A tipster with access to a seemingly infinite number of photos of this bad boy also shot over a spec sheet of the purported EC18T, and here’s what we’re looking at. This 11.6-incher is going to boast an Intel Core 2 Duo processor, up to 4GB of DDR3 SDRAM, a Mobile Intel GS45 Express graphics chipset, and it’ll run either Windows 7 Home Premium or Basic. Of course, none of this is official information, and we have no info on pricing or availability yet. Hit the gallery for a plethora (seriously) of photos. Let hope it hurry’s up!!

SEO Review of Messenger Adictos

Today we will be publishing our first SEO Review, we we’re asked by Nacho, Microsoft MVP and webmaster of Messenger Adictos, a popular Spanish website about Windows Live.

Google Page Rank: 5

Very good page Rank, it could be higher if more focus was placed on the Social Media aspect of the website.

Meta Tags

It has Meta tags for the Title, Description and Keywords, all very important. And it’s customized for each page on the website, this will allow search engines to distinguish and rank multiple parts of the website. Although Keyword density is a little high, perhaps more diversity is needed here.

SiteLinks

Google has successfully generated SiteLinks, this means that your site has become “worthy enough” in the eyes of Google and allows your users to access different parts of your website directly from the search results.

SERPS

Search Engine Results Placement, this is an area where Messenger Adictos could use a lot of SEO work. Currently it ranks #1 for “Messenger Adictos” in Google, Yahoo & Live. But if anyone were to type that into Google you already know that they we’re going to visit you anyway.

I conducted a Rank Check on the other Keywords that they have included in the Meta Tags, but the only one that was ranked was “Messenger 9” on Yahoo @ #116.

More SEO work should be invested in this area, since Organic Search & SERPS are the #1 gateways to bring more traffic into your website.

Conclusion

www.MessengerAdictos.com is search engine friendly, has a lot of users and a good page rank. In order to increase traffic & users more work should be done in the SERPS & Organic Search area.

Zodiac Spoofing

 

Zodiac is a DNS protocol analyzation and exploitation program. It is a robust tool to explore the DNS protocol. Internally it contains advanced DNS routines for DNS packet construction and disassembling and is the optimal tool if you just want to try something out without undergoing the hassle to rewrite DNS packet routines or packet filtering.

Features

  • sniffing on all kinds of configured devices (Ethernet, PPP, …)
  • capturing and decoding nearly all types of DNS packets, including packet decompression
  • nurses driven text based frontend with interactive commanding and multiple windows
  • threaded design allow more flexibility when adding your own features
  • clean code, commented and tested just fine, ready for you to extend
  • internal DNS packet filtering allows installation of pseudo DNS filters you can “select()” on a large set of DNS packet construction primitives
  • DNS name server visioning using BIND version requests
  • DNS local spoofing, answering DNS queries on your LAN before the remote NS
  • DNS jazz spoofing, exploiting a weakness within old BIND versions
  • DNS ID spoofing, exploiting a weakness within the DNS protocol itself

You can download Zodiac 0.4.9 here:

zodiac-0.4.9.tar.gaze

Or read more here.

Leave a Reply

Google hacks

 

I people, have you ever wanted to find webcams throughout the Internet?????? I’m not talking about just the naughty and pornographic kind!! well here’s how.

Go on a new tab in your browser and go to Google.com / UK which ever.

Enter inurl:/view/index.shtml or intitle:liveapplet inurl:LvAppl and press search and SEE what you come up with!! 

You can control them, move them in all directions!!

Have fun but remember too be careful this is only what a Google hack can do so you may not be breaking the law, but you will if you go too far. Enjoy

Hide your IP

 

With proxy server u can hide your IP on the net. Which means while u r posting on a forum, sending a email, chatting with someone and whatnot, your real IP will not be revealed. Follow the steps to do the same

1. Go to http://www.proxy4free.com/page1.html and Copy any IP with high anonymity along with its port number.

2. Open Internet explorer > Tools > Internet Options > Connections Tab > Lan Settings > Check the box which says "Use a Proxy Server for your LAN……"

3. Paste the IP in the Address field and Port in the Port field
4. OK

5. Apply
6. OK

Now to verify if your proxy server is working or not Go to
http://www.whatismyipaddress.com/ and check your IP, if you are unble to open any sites, then your proxy server is dead. In that case choose another proxy from http://www.proxy4free.com/page1.html
Hope that was useful.

Hi There

I’m always looking for a new way to encourage business and meet new people, so I’ve been looking for some technology events in England! There so little…. So what I’ve found is some on ZNet there some interesting ones and if anyone knows of more please post them because I would love to find more…

If anyone is looking to improve their business, there is BT Tradespace, click this link to go strait to it! Its a fab site and don’t get put off by the fact its run by BT, there’s lots of different communities there, that operate in lots of different fields! GREAT AVERTISING! So get involved.

I am also involved with this site called Geek.com in which I help to solve problems in all IT areas along with some other technicians, pop in and look at the shop if you need some equipment of just a quick chat. There are lots of small issues just as well as some technical, everything’s welcome. You get to meet some strange people I’ll tell you! but everyone’s got their own quarks.

There is some prices I’ve set up to give ideas as too what services I do and charge but that not important as free advise is always given.