Posts

Showing posts from May, 2014

Is there is solution for Heratbleed

                Who is responsible for all of this ?   The Heartbleed Bug was discovered by security analysts from Google and Codenomicon and disclosed by the OpenSSL open-source group on April 7 as an OpenSSL Advisory and a fix prepared by OpenSSL open-source contributors Adam Langley and Bodo Miller. Across the world, companies and vendors have been scrambling to either patch their systems or assure users that their services weren't using OpenSSL. The Heartbleed bug (known as CVE-2014-0160) is a very serious bug in the openSSL library, which is the security library used to secure communications between computers for many different reasons – examples of openSSL usage include SSL certificates used one webservers (the padlock which indicates an encrypted connection), TLS communications between servers and email collected or sent over secured connections using ‘secure protocols’. Heartbleed is a flaw in OpenSSL, an open-source encryption technology that is used by an es

Web Browsing P2 |Rajat Poonia Rajasthan

Image
As email becomes essential part of internet world because millions of  email are send & receive everyday . Here are famous  services::: Fox mai l-          It is used for all type of  v-mails and exchange mails.User can see his attachment without downloading. But problem with Fox mail is that its default language is chainese . But we can change it into english lang. Features:        It supports mac's ratina display And it is easy to make schedule using meeting manager feature. Thunder Bird ::         It started in 2004.Thunderbird is mail client of mozilla .It is popular becoz it have lots of features.viz help to make better mail. Opera mai l::      This is gmail's opera mail.We can see gmail's chat in opera also.We can use multiple tabs to see more email at a time.which help in fast reply. Zimbra Mail ::          It provides a features by which we can excess all of our mail accounts in a single mail box.It is available for mac,windows & Linux. Net

Study Finds 97 Percent of Organizations Have Been Hacked |Rajat Poonia Rajasthan

Image
 A recent FireEye report based on data from more than 1,216 organizations in 63 countries states that 97 of those organizations had been breached, meaning at least one attacker had bypassed all layers of their defense-in-depth architecture.The report, entitled "Cybersecurity's Maginot Line: A Real-World Assessment of the Defense-in-Depth Model," also states that 27 percent of organizations experienced events known to be consistent with tools and tactics used by advanced persistent threat (APT) actors -- and three quarters of organizations had active command-and-control sessions taking place, meaning that they were actively being used by attackers for activities that could include theft of sensitive data. "The implication is clear: no corner of the world is remote enough to avoid falling into attackers' crosshairs, and current defenses are stopping virtually none of them. ... Despite the billions of dollars organizations pour into traditional security measu

what is going inside facebook, IS really good for a user ..? |Rajat Poonia Rajasthan

Image
what facebook   really want from their users ::                                                               Facebook has new plan for users.  Facebook's brilliant plan to Swine user's data viz seems a boring master plan.Personal data is the new currency . *As Facebook every Companies want to get information about people -- their location, age, relationships, interests, preferences and much more -- because when they have that information they can offer more powerful, more monetizable apps and services and can make money with high-priced personalized ads. But people want to prevent companies from getting their personal information for fear of being exploited, surveilled, abused and sold out. As technology and tech culture author Mike Elgan said ::  It's in the context of this tension that Facebook CEO Mark Zuckerberg recently announced a new offering called Anonymous Login . It's one of the most ingenious ideas Facebook has ever had. Facebook's 'A

microsoft XP had gone but leaves behind one last Bug |Rajat Poonia Rajasthan

Image
As microsoft had declared no-longer-support for xp further. Microsoft's decision to offer a Windows XP patch for a serious Internet Explorer flaw has drawn cheers, but those still using the no-longer-supported operating system shouldn't hold their breath waiting for the next one, the company has indicated. That isn't stopping security pros from lobbying for an extension of the support grace period, however. When Microsoft included Windows XP in the Internet Explorer zero-day browser vulnerability patch it issued this week, some industry observers were stunned. Had the company decided to backtrack on its assertion that it would no longer support XP? Had it knuckled under to user protests? *There have only been "a very small number of attacks" exploiting this flaw, according to Hall and other Microsoft executives.

Engineers Crowd 2 | Rajat Poonia Rajasthan

                                           WHAT IS THIS CROWD MEAN???? There are so many colleges of engineering in india and this no. increases day by day.It totally takes a shahape of bussiness which is really not good for students .Today everyone want to come to this field so in this manner number of private colleges enhanced  but these colleges not having such a qualified faculty that give them a path of innovation.slowly slowly the time is passed away  and they all remain as like crowd in techinical field. Secondly this croud consist of large number of those students who forget that for what purpose they join this field . there are many  circumstances due to which they are influanced, they may be as-wasting of golden time in fake relationships which has no future, waste of time in making of large friend circle,gangs and in drinking and all this. In this way a good and innovative boy\girl instead of increasing is thinking level & spreading his\her critaria of tech always bu

world of technology |Rajat Poonia Rajasthan

         "People are changing in mental sick" First user of Google glass gave a statement After having a demo of this device,"YOu will see the mentals walking on the road,driving a car, travelling in a bus with device". I support him with no doubt,because when i see someone talking with a earphone ,we go to take a view of him,may be he is calling us ,so example of earphone is old now, slowly- slowly the wearable device is coming into the world,People will break their connection with outer world and stuck with the device,Addition of social sites we see at present ,people do their work with one hand and other hand has their smartphone.The radition os wm waves also cause many desease but this is a different issue.Here we are talking about only the broken connection of world with technology user. Heat of electronics device, cause skin cancer but still people ignore that,Realtion of human with nature are slowly going to down even the 80% people of world do not ha

Engineers Crowd |Rajat Poonia Rajasthan

                                              -> ENGINEERS CROWD <-students                                             STRUGGLE   &    UNEMPLOYMENT As we all know 21st century or in other sence it is also known to be "era of technology".In this advanced technology the engineering colleges plays a major role in shaping the mind of students, this results in technical thinking. These above lines gives a good sense to viewers towards engineering but" IS THAT ALL TRUE?????  " BUT today in field of engineering garbage crowd is more then talent , due to which day by day it's reputation is fallen down . it is not only the cause of local or state level colleges but IIT's are also responsible for that because now aday their placement is 54% which fall down from 89% in2009.as if it is the condition of it's then what one can say about other colleges. BUT when we look for it's cause then only one point is BLAMED everywhere that is"RECESSI

Digital Tech Gives A Whole New World |Rajat Poonia Rajasthan

Image
Almost since the beginning of words, there have been dictionaries, but the digital age is prompting evolutionary changes in the form factor. Language is living, breathing and constantly changing, and dictionaries need to reflect that reality. They need to expand our understanding of a word's worth. They're not just about definitions anymore. Increasing in technology also increases ways to communicate between peoples.Ebooks readers are increasing day by day which shows tech effect. Lexicographer Erin McKean gave a TED talk in 2007 called "The Joy of Lexicography," in which she pointed out the limitations of print dictionaries. After that talk, she decided to make her vision of a new kind of dictionary a reality. Thus was born Wordnik.

Cybersquatters ready for Mischief |Rajat Poonia Rajasthan

Image
People are registering domains in typical cybersquatting fashion, and it could result in being quite dangerous for the average home user should they take a laptop or mobile device outside their network. When using a network outside the home, a laptop or mobile device could be deceived into connecting to a squatter's network. In the early days of the Internet, nimble squatters would register domain names of brands, then sell them back to the owners for tidy sums. Rules eventually were adopted to squash squatters, but with as many as 1,300 new top-level domains appearing on the Internet in the next three years, squatting may be in vogue once again. Squatting for cash, though, is only one way the new domains may be abused. One particular domain -- home.network -- can be exploited by the unscruplous to gain unauthorized access to a consumer's network, OpenDNS warned.

AOl users just superisedddd |Rajat Poonia Rajasthan

Image
AOL recently disclosed that a "significant number" of user accounts had been hacked, confirming rumors swirling around the issue for a week and denying its week-ago statement that users' email accounts were being spoofed. The hackers stole users' email and postal addresses, address book contacts, encrypted passwords and encrypted answers to security questions, and "certain employee information." It is possible that attackers gained access to systems containing subscribers' personal data but not financial data, [which] is generally kept on separate financial systems in large enterprises. However, the data encryption has not yet been broken, and there is no indication so far that users' financial information, which also is encrypted, has been disclosed, the company claimed. But it is shamefull for all user who use AOl.

Again Cyberthreat defeat security pros struggle |Rajat Poonia Rajasthan

Image
As the volume and sophistication of cyber attacks increase, system defenders in the trenches are losing confidence in their ability to protect their organizations' information assets. Security pros are worried that cyber threats are falling through the cracks in their enterprise security systems, a recent survey suggests. The survey of almost 5,000 global IT security pros found that more than half of them (57 percent) felt their organizations were unprotected from sophisticated cyber attacks and nearly two-thirds of them (63 percent) doubted they could stop the exfiltration of confidential information from their systems. However, the C-level execs in their companies don't seem to share their concerns. Seventy-five percent of the survey respondents said their companies' leaders didn't equate the loss of confidential data with a potential loss of revenue. More than three-quarters of the respondents (75 percent) said their companies' leaders didn't equat

Google Maps | Rajat Poonia Rajasthan

Image
Google always play role to improve life for make it easier to live.Google maps are always a way to go anywhere in  the world . Google has launched a new feature on Street View that enables users to browse through images dating back as far as 2007, as well as images from different seasons and at night. Google denotes the ability to tinker with time with a small hourglass in the upper left-hand corner of a Street View panorama. Clicking the hourglass brings up a thumbnail of past images; a timeline allows users to move through time. Street View users have long pined for the ability to look at shots from the past, according to Google Maps Street View Director of Engineering Luc. Vincent. How neighborhoods used to look. How natural disasters affected scenes on the ground. That sort of thing. Google Street View now has time-traveling function; schoolchildren are smuggling iGoodies from Hong Kong to China; Apple's Asia numbers drive huge quarterly revenue; and Megaupload tries

ios bypass |Rajat Poonia Rajasthan

iOS Lock Screen Can Be Bypassed to Access Contacts using Siri 'Hack':: Apple's iPhone 5s came with the much-vaunted Touch ID fingerprint sensor for biometric authentication, however, soon after its release it was supposedly 'hacked' by a security research group. A new video has sprung up on YouTube that shows how someone can bypass an iPhone 5s' security lock without the need to swipe the Touch ID sensor or input the 4-digit passcode locking the device. The video shows a user accessing the contacts saved inside the iPhone 5s (Review | Pictures), using voice-commands via Siri. he video by Sherif Hashim at first shows Siri rightfully asking for passcode when asked for 'Contacts' on a locked iPhone 5s. However, when given the voice-command 'Call', Siri straight away asks the user whom to call, giving access to on-screen keyboard via which one can search contacts and get access to the full phonebook list by tapping on 'Others' option.

Private Browsing |Rajat Poonia Rajasthan

privacy is essential part of life.But on the internet onone is private.But somehow a certain amount of privacy can be acehive by making some affort with different technique & ideas. Starting from browser private browsing- Each browser has a private browsing window.like in google chorme window for private browsing is 'new incognito window' or directly it appear by pressing shhift+ctrl+n .It doesn't store history. IN firefox it seems as 'new private window' or by pressing shift+ctrl+p this all above is client side processing. For privacy on internet we can use proxy websites.

web Browsing P1 |Rajat Poonia Rajasthan

Image
Web Browsing essentiality give the idea of browsers. Most used web browser in todays world is google chorme. Chorme become best due to his security and features & some magical extensions which enhance user experience during browsing. Features & Extension provide by Chorme :: *MXHERO TOOLBOX *IMAGUS *TOOMANYTABS *SHIELD *ANY.DO *STREAMUS *HOLA UNBLOCKER *SUSPENDER *ADBLOCK PLUS *READABILITY *DIIGO *BUFFER *VIBE *LASTPASS *LAZARUS:FORM RECOVERY

web browsing |Rajat Poonia Rajasthan

Image
Web Browsing is a main part of internet or say it is part of todays life which may be using mobile internet or computer world or ipad.There are many browsers but mostly used browsers are firefox,safari,chorme,internet explorer,dolphin,opera,ucbrowser,iron browser etc. As web browsing is essential in same way security is double essential.Many certification clearify  security issuses.Taking security issues in consideration anyone want to use most safe browser for web browsing with good features. *Security and Features can not acquire simultaneously. Keeping security in mind chrome and safari got good rank than mozilla firefox . Every browser has its own benifit like mozilla firefox is best for hacking whereas google chrome is best as a normal user prospective.Each browser become best due to its own extensions Or say features. In today's world private browsing is necessary so each browser have this facility for privacy.