Day: May 26, 2011

Exclusive Report : Is Department of Defense (DoD), Pentagon, NASA, NSA is Secure ?

Posted on Updated on


Over the past couple of weeks there has been a series of discussions around why the U.S defense and Intelligence agencies are moving so quickly to adopt cloud computing. Are there any Security Holes in their Security ? Or has someone already hacked them and their documents ?. In the last week we have noticed lots of hackers activity.

Below you are going to read about Security Holes in the U.S defense and Intelligence agencies! A Hacker named “sl1nk” claims that he has:

  1. SSH access to a Network of 140 machine’s layer 1 to 3 in the Pentagon
  2. Access to APACS (automated personel air clearance system) 
  3. Thousand’s of documents ranging from seizure of a vehicle up to private encryption key request forms.
  4. Database of all usernames/passwords of Webmail of Nasa.
  5. Access to ASSIST (Database for Military Specifications and Military Standards)
  6. Data Transformation Corporation’s FAA Sponsored DUAT Service
  7. Access to Government Gateway at http://www.gateway.gov.uk/
  8. Access to applicationmanager.gov
  9. Login access to HM Revenue & Customs (HMRC)
  10. Login to Central Data Exchange | US EPA


sl1nk” Claims That he have SSH access to these following IP address/Servers :
Area 54 : 207.60.16.0 – 207.60.16.255
Department of the Navy, Space and Naval Warfare System Command : 205.0.0.0 – 205.117.255.0
Pentagon, Nasa, Navy, NSA : IP=64.224.0.11 , IP=64.224.0.5, IP=64.70.0.2, IP=64.70.1.15, IP=64.70.2.23, IP=64.70.2.53, IP=64.70.2.95 , IP=131.182.3.72, IP=131.182.3.117, IP=153.31.1.195, IP=131.182.1.189, IP=64.70.2.16, IP=128.149.2.1, IP=64.224.0.9,  IP=130.167.1.62, IP=131.182.2.27, IP=130.167.1.137 ..Lots More
(Note : THN Team has verified his every claim and after getting all proofs of security holes, we are presenting this report exclusively to you !)

More over he claims to have all Military network IP’s , like 64.224.0.11, 64.224.0.5 etc..
Some Proofs Of Hack :
User: COM502571
Pass: C*************g@@
——————————————–
system access code: 0016***9
password: F*****1
——————————————–
Agent Name: Corie Lee
User ID: 1152****652
Pass: **************
——————————————–
Your User ID is: 437067167597
Password: cl**********3d
——————————————–
User: administratorbackup
Pass: fu********l@
——————————————–
User: JCrimson
Pass: M*********0n
——————————————–
User: Adminbackup
Pass: g*********7
More Sample Documents :
After reading all this I think everyone will be sure that, Nothing is Secure In this World ! We need more Secure Systems and Technology.

We can’t say how much more access (sl1nk) has but this raises the question on Cyber Security !!

Cloud computing is unique in its ability to address these critical defense and intelligence mission needs. That’s why cloud computing is critical to our national defense. As a bonus, cloud computing offers DoD and Intelligence Community agencies the ability to increase efficiencies and incur marked cost savings during their life-cycles to alleviate some of the pressure of budget reductions. Moving IT operations to the cloud also will assist in enhanced collaboration.

Violent Video Games Reduce Brain Response to Violence and Increase Aggressive Behavior, Study Suggests

Posted on


New research finds that the brains of violent video game players become less responsive to violence, and this diminished brain response predicts an increase in aggression. (Credit: © laurent hamels / 
Scientists have known for years that playing violent video games causes players to become more aggressive. The findings of a new University of Missouri (MU) study provide one explanation for why this occurs: the brains of violent video game players become less responsive to violence, and this diminished brain response predicts an increase in aggression.

“Many researchers have believed that becoming desensitized to violence leads to increased human aggression. Until our study, however, this causal association had never been demonstrated experimentally,” said Bruce Bartholow, associate professor of psychology in the MU College of Arts and Science.

During the study, 70 young adult participants were randomly assigned to play either a nonviolent or a violent video game for 25 minutes. Immediately afterwards, the researchers measured brain responses as participants viewed a series of neutral photos, such as a man on a bike, and violent photos, such as a man holding a gun in another man’s mouth. Finally, participants competed against an opponent in a task that allowed them to give their opponent a controllable blast of loud noise. The level of noise blast the participants set for their opponent was the measure of aggression.

The researchers found that participants who played one of several popular violent games, such as “Call of Duty,” “Hitman,” “Killzone” and “Grand Theft Auto,” set louder noise blasts for their opponents during the competitive task — that is, they were more aggressive — than participants who played a nonviolent game. In addition, for participants that had not played many violent video games before completing the study, playing a violent game in the lab caused a reduced brain response to the photos of violence — an indicator of desensitization. Moreover, this reduced brain response predicted participants’ aggression levels: the smaller the brain response to violent photos, the more aggressive participants were. Participants who had already spent a lot of time playing violent video games before the study showed small brain response to the violent photos, regardless of which type of game they played in the lab.

“The fact that video game exposure did not affect the brain activity of participants who already had been highly exposed to violent games is interesting and suggests a number of possibilities,” Bartholow said. “It could be that those individuals are already so desensitized to violence from habitually playing violent video games that an additional exposure in the lab has very little effect on their brain responses. There also could be an unmeasured factor that causes both a preference for violent video games and a smaller brain response to violence. In either case, there are additional measures to consider.”

Bartholow said that future research should focus on ways to moderate media violence effects, especially among individuals who are habitually exposed. He cites surveys that indicate that the average elementary school child spends more than 40 hours a week playing video games — more than any other activity besides sleeping. As young children spend more time with video games than any other forms of media, the researchers say children could become accustomed to violent behavior as their brains are forming.

“More than any other media, these video games encourage active participation in violence,” said Bartholow. “From a psychological perspective, video games are excellent teaching tools because they reward players for engaging in certain types of behavior. Unfortunately, in many popular video games, the behavior is violence.”

Other authors in the study include Christopher Engelhardt, graduate student in the MU Department of Psychological Sciences, and researchers from The Ohio State University and VU University of Amsterdam in the Netherlands. The journal article, “This Is Your Brain on Violent Video Games: Neural Desensitization to Violence Predicts Increased Aggression Following Violent Video Game Exposure,” will be published in a forthcoming edition of the Journal of Experimental Social Psychology

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Broadband Internet Speeds 2009-2010: The Top 10 Countries

Posted on


The results of the second annual global study on the quality of broadband connections done at end of 2009 reveal that 62 out of the 66 countries analyzed had improved the quality of consumer broadband services since last year. However, new data from the study highlights the extent of the digital quality divide between urban and rural areas and, for the first time, compares the quality of fixed and mobile broadband services.

The first groundbreaking Broadband Quality Studywas published in September 2008 to highlight each country’s ability to benefit from next-generation web applications and services. The research team found that broadband quality is linked to a nation’s advancement as a knowledge economy and countries with broadband on their national agenda had the highest broadband quality. This year’s report covers an additional 24 countries and includes new analysis on broadband quality in more than 240 cities.

Highlights / Key Facts:

  • Overall average broadband quality increased across the globe:
    • Global average download throughput increased by 49% to 4.75 Megabits per second (Mbps)
    • Global average upload throughput increased by 69% to 1.3 Mbps
    • Global average latency decreased by 21% to 170 milliseconds
  • South Korea tops the 2009 Broadband Leadership table.

Broadband Penetration (% of households)

Broadband Quality Score 2009

Broadband Leadership 2009

1

South Korea

97%

66

139

2

Japan

64%

64

115

3

Hong Kong

99%

33

111

4

Sweden

69%

57

110

5

Switzerland

90%

40

108

6

Netherlands

83%

46

108

7

Singapore

96%

32

107

8

Luxembourg

99%

27

107

9

Denmark

82%

45

106

10

Norway

84%

38

102

  • South Korea rose just above last year’s broadband quality leader Japan with a 72% improvement in its Broadband Quality Score (BQS). This improvement has been driven by continuous efforts by the government to strengthen the country’s position as one of the world’s ICT leaders. Combined with higher broadband penetration, South Korea rises above Japan in the global Broadband Leadership rankings.
  • Japan stands out as having the cities with the highest BQS in the world, with Yokohama and Nagoya leading the BQS rankings and Sapporo not far behind.
  • Sweden has the highest quality broadband internet in Europe. It is rapidly catching up with Japan and South Korea as its BQS improves 38% from 2008. Sweden is the most successful country in closing the broadband quality gap with residents outside the most populated cities enjoying better quality than those in the cities.
  • Lithuania, Bulgaria and Latvia come just behind Sweden in quality boosted by recent city-based fibre rollouts and cable improvements but low broadband penetration means these countries have yet to break into the broadband leaders’ category.
  • 39 countries have a BQS above the threshold required to deliver a consistent quality of experience for the most common web applications today, such as social networking, streaming low-definition video, web communications and sharing small files such as photos and music.
  • Nine countries, South Korea, Japan, Sweden, Lithuania, Bulgaria, Latvia, The Netherlands, Denmark and Romania, were found to have the broadband quality required for future web applications, such as high definition Internet TV viewing and high-quality video communications (such as home telepresence) that will become mainstream in the next 3 to 5 years. In 2008, only Japan exceeded this threshold.
  • The research compares countries according to their stage of economic development :
    • Amongst the developed, innovation-driven economies, South Korea achieved the greatest improvement in broadband quality over the past year with a 73% increase in BQS. Sweden, the USA and the Czech Republic also saw significant above average improvements.
    • Amongst efficiency-driven economies, Bulgaria topped the most improved list with a 57% increase in BQS from 2009. Lithuania, Romania and Latvia also achieved above average improvements.
    • Amongst factor-driven economies, Kenya actually trebled its BQS but the overall score for Kenya remains well below the threshold required for today’s applications. Vietnam and Qatar followed Kenya as having made the most progress in broadband quality for countries in this stage of economic development.
  • The cities with the highest BQS of all the countries in the study were:
Top 10 Cities BQS Next 10 Cities BQS
Yokohama, Japan 85 Rotterdam, The Netherlands 55
Nagoya, Japan 82 Riga, Latvia 54
Kaunas, Lithuania 79 Copenhagen, Denmark 53
Sapporo, Japan 72 Bucharest, Romania 52
Seoul, South Korea 68 Stockholm, Sweden 51
Malmo, Sweden 67 Vilnius, Lithuania 50
Osaka, Japan 65 Zurich, Switzerland 49
Wuhan, China 60 Tokyo, Japan 49
Uppsala, Sweden 57 Goteborg, Sweden 49
Sofia, Bulgaria 56 Kosice, Slovakia 48
  • The research team compared the difference between the BQS in the most populated cities with the BQS in the rest of the country. Although a digital quality divide was found in the majority of countries, 13 countries showed significant differences in BQS between its major cities and the rest of the country. Lithuania, Russia and Latvia had the biggest digital quality divide, while rural residents in Sweden, United Arab Emirates and Iceland enjoyed similar, if not slightly higher quality broadband services than their city counterparts.
  • The country with the highest broadband quality outside of its major cities was Japan, followed by Korea and Sweden.
  • The study also included data on the quality of mobile broadband services for the first time. On average, mobile devices connecting to WiFi services meet the broadband quality threshold required for today’s mobile Internet applications. The average BQS of 3G and 3G+ technologies do not currently meet the threshold due to low upload throughput.

TechPark-A Neurochip That Can Communicate With Brain

Posted on


The University of Calgary, Faculty of Medicine scientists who proved it is possible to cultivate a network of brain cells that reconnect on a silicon chip—or the brain on a microchip—have developed new technology that monitors brain cell activity at a resolution never achieved before.

Developed with the National Research Council Canada (NRC), the new silicon chips are also simpler to use, which will help future understanding of how brain cells work under normal conditions and permit drug discoveries for a variety of neurodegenerative diseases, such as Alzheimer’s and Parkinson’s.

Naweed Syed's lab cultivated brain cells on a microchip.Naweed Syed’s lab cultivated brain cells on a microchip.

The new technology from the lab of Naweed Syed, in collaboration with the NRC, is published online this month in the journal, Biomedical Devices.

“This technical breakthrough means we can track subtle changes in brain activity at the level of ion channels and synaptic potentials, which are also the most suitable target sites for drug development in neurodegenerative diseases and neuropsychological disorders,” says Syed, professor and head of the Department of Cell Biology and Anatomy, member of the Hotchkiss Brain Institute and advisor to the Vice President Research on Biomedical Engineering Initiative of the U of C.

The new neurochips are also automated, meaning that anyone can learn to place individual brain cells on them. Previously it took years of training to learn how to record ion channel activity from brain cells, and it was only possible to monitor one or two cells simultaneously. Now, larger networks of cells can be placed on a chip and observed in minute detail, allowing the analysis of several brain cells networking and performing automatic, large-scale drug screening for various brain dysfunctions.

This new technology has the potential to help scientists in a variety of fields and on a variety of research projects. Gerald Zamponi, professor and head of the Department of Physiology and Pharmacology, and member of the Hotchkiss Brain Institute, says, “This technology can likely be scaled up such that it will become a novel tool for medium throughput drug screening, in addition to its usefulness for basic biomedical research”.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Security researcher finds ‘cookiejacking’ risk in IE

Posted on


A security researcher in Italy has discovered a flaw in Internet Explorer that he says could enable hackers to steal cookies from a PC and then log onto password-protected Web sites.

Referring to the exploit as “cookiejacking,” Rosario Valotta claims that a zero-day vulnerability found in every version of Microsoft’s IE under any version of Windows allows an attacker to hijack any cookie for any Web site.

Demonstrating his findings at security conferences this month in Switzerland and Amsterdam, Valotta acknowledges that to exploit the hole, the hacker must employ a bit of social engineering because the victim must drag and drop an object across the PC for the cookie to be stolen.

But Valotta said he was able to devise the right type of challenge on a Facebook page that required people to drag and drop an object by undressing an onscreen photo of a woman, noted Reuters, thus allowing him to capture their Facebook credentials via a cookie.

“I published this game online on Facebook and in less than three days, more than 80 cookies were sent to my server,” he said, according to Reuters. “And I’ve only got 150 friends.”

From its point of view, Microsoft doesn’t see much real-world risk to cookiejacking.

“Given the level of required user interaction, this issue is not one we consider high risk in the way a remote code execution would possibly be to users,” Microsoft spokesman Jerry Bryant said in a statement sent to CNET.

“In order to possibly be impacted a user must visit a malicious Web site, be convinced to click and drag items around the page and the attacker would need to target a cookie from the Web site that the user was already logged into,” added Microsoft. “We encourage all customers to protect themselves against potential issues by avoiding clicking on suspicious links and e-mails, as well as adjusting Internet settings to higher security levels.”

Read more: http://news.cnet.com/8301-1009_3-20066419-83.html#ixzz1NTeflcai

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

[Revised post] Computer Addicted [Bijay_deadbj] Nepal Born Boy

Posted on


“Cigar is my fren, and Internet is my Girl Fren”_bijay_deadbj

I am Mentally Ill and that is why I am creative. “Creative people, like those with psychotic illnesses, tend to see the world differently to most. It’s like looking at a shattered mirror. They see the world in a fractured way” My thought processes are like a shattered mirror. Fragments and shards everywhere! My mind moves so quickly that I couldn’t keep up with my own thoughts. I still find comfort when I’m producing something artistic and my strengths as an individual have always been in the arts i.e.(Designing Pics,Designing Blogs and Imagination.) Mathematics I have always looked upon with horror! My mind simply cannot compute a logic behind it. Once again, I cannot live inside the normal box. I am different from my Family, frens, and this world. So I got the name Psycho.[bijay_deadbj]

“My 1st and 2nd story are Aggressive and Shocking, now 3rd story will be worst and superhit of all”_deadbj

THE LOST RACE . . .
‘I woke up one day and I
realized that the race that
I’d been running has already
finished and I’ve been left
far behind. Now, I have a
long way to go. I ran but
the path blurs and the poor
world spins madly.

I am now defeated, I am now
lost somwhere in hell. Now,
I AM A SHADOW MAN.

My aim is too big and that
my arms are too short to
grab it’
DEADBJ_BIJAY


Hi, my name is Bijay_deadbj. I am software engineering student. And I work as a blogger nxt to my study. I am working on these blogs, totally all creations by me. HOPE YOU LIKED IT TOO.

http://shenanigans-nepal.blogspot.com/

http://stopcivilwar.blogspot.com/

http://codingcourse-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

http://nomusicnolife100.blogspot.com/

http://dangcity.blogspot.com/

http://deadbj.wordpress.com/

http://ayogorkhali.blogspot.com/

Zuckerberg and Schmidt warn on over-regulation of web.

Posted on


Zuckerberg and Schmidt warn on over-regulation of web

Mark ZuckerbergMark Zuckerberg stressed the internet couldn’t be split into parts
Facebook founder Mark Zuckerberg and Google boss Eric Schmidt have warned governments worldwide not to over-regulate the internet.

Mr Zuckerberg said governments cannot cherry pick which aspects of the web to control and which not to.

The two are leading a group of internet pioneers to the G8 summit in France.

The delegation will deliver recommendations thrashed out at the first e-G8 gathering in Paris this week.

Although e-G8 had the blessing of President Sarkozy, world leaders are under no obligation to listen to its findings.

The comments by Mr Zuckerberg and Mr Schmidt reflect growing concerns in the industry about government censorship.

“People tell me on the one hand ‘It’s great you played such a big role in the Arab spring [uprisings], but it’s also kind of scary because you enable all this sharing and collect information on people’,” said Facebook’s founder.

“But it’s hard to have one without the other. You can’t isolate some things you like about the internet and control other things that you don’t.”

Mr Schmidt echoed his sentiments: “Technology will move faster than governments, so don’t legislate before you understand the consequences”.

‘Public good’One of the most hotly-debated subjects at the e-G8 was protection of intellectual property on the internet.

In sometimes heated discussions, senior figures from the music, TV and film industries faced criticism from proponents of internet freedom.

Critics claimed that the event was designed to promote the views of rights holders, seeking to lobby governments for tougher copyright laws.

Professor Lawrence Lessig of Harvard Law School warned delegates: “We should say to modern democratic governments, you need to be aware of incumbents bearing policy fix-its.

“Their job is profit for them. Your job is the public good.”

Echoing the views of many participants, Professor Lessig suggested that governments should exercise light touch regulation or risk damaging the still-young internet.

Others made the case that if politicians remained hands-off in the belief that it would help innovation, then existing industries such as music and film would suffer.

James Gianopulos of Fox Filmed Entertainment said governments needed latitude to legislate, as in the case of the French three-strikes law designed to target illegal file sharing.

“The political process is imperfect,” Mr Gianopulos told the BBC.

“Private entities, individuals and industries are more likely to come to an agreement if they know that the next step is the litigation or legislation process.”

Sony Music Japan hacked through SQL injection flaw

Posted on


Another day, another attack on Sony. I reported yesterday on the SQL injection attack exposing user information on SonyMusic.gr and today attackers have found flaws in SonyMusic.co.jp.

The Hacker News sent us a tip this eveningdocumenting a couple of vulnerable web pages on SonyMusic.co.jp that allowed hackeSony Music Japan logors to access their contents through SQL injection.

Screenshot of Sony Japan hack from Pastebin.com

The good news? The database information that was published does not contain names, passwords or other personally identifiable information. The attackers noted that there are two other databases on the site that are vulnerable and it remains unclear whether they contain sensitive information.

It isn’t clear whether the hackers are able to inject data into the database, or simply access the tables and records it contains. If they are able to alter the records, this could be used to insert malicious code that could be used to compromise people browsing the site.

The attackers appear to be the same crew who targeted Fox.com earlier this month. Known as Lulz Security, the group appears to attack sites primarily for fun and political reasons, not to steal credit cards and commit other types of fraud.

This doesn’t change the criminality of their behavior. Accessing systems without authorization is still a crime in most countries.

Will Sony stop the bleeding? The attackers stated in their message “This isn’t a 1337 h4x0r, we just want to embarrass Sony some more.”

While there is an enormous target on Sony’s back as a result of these very public attacks it is unclear why this is happening. Is Sony taking security seriously or are there simply so many flaws from the past that exist in their public facing sites that it will take them a long time to patch them all?

I hope this is the last time I have to report on a flaw at Sony. Sony has announced they are working with several professional organizations to get their security house in order and for their sake I hope this happens sooner rather than later.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Computer use ‘damages children’s reading skills’

Posted on


Reading ability in the US has fallen sharply in the last decade as computer use has increased.

Scientists at Sweden’s University of Gothenburg analysed the differences in reading achievement from nine to ten-year-olds over time in Hungary, Italy, the US and Sweden, looking at how reading skills have changed since the 1970s.

They found that reading ability has improved steadily in Italy and Hungary – but has fallen rapidly since 1991 in both the US and Sweden.

And while the Swedish and American pupils described a large increase in the use of computers in their free time during this period, there was no similar increase in Hungary or Italy.

“Our study shows that the entry of computers into the home has contributed to changing children’s habits in such a manner that their reading does not develop to the same extent as previously,” says Professor Monica Rosén.

“By comparing countries over time we can see a negative correlation between change in reading achievement and change in spare time computer habits which indicates that reading ability falls as leisure use of computers increases.”

She says it’s not the computers themselves, or even the activities they’re used for, that impair reading skills. Rather, she says, it’s the way in which they have stolen time from leisure reading.

And it’s the higher-ability children who seem to be affected.

“We have shown that the poorer results are principally caused by a fall in the skills of those from the centre of the ability range and upwards,” says Rosén.

“It is not that case that there are more less-gifted readers or that the skills of these readers have become poorer. What has happened is that there are fewer high-performing children.”

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/

Sony admits no system is secure-Bad World too

Posted on


Sony is now acknowledging what every hacker has known for decades: absolutely no system is truly secure.

Indeed, Sony CEO Howard Stringer says he can’t guarantee the security of the company’s videogame network or any other Web system in the “bad new world” of cyber crime.

Sony admits no system is secure“[Maintaining security] is a never-ending process. [I don't know if anyone] is 100% secure,” Stringer told the Wall Street Journal.

“It’s the beginning, unfortunately, or the shape of things to come. It’s not a brave new world; it’s a bad new world.”

However, Stringer emphasized that Sony’s online security wasn’t lax, even though unknown digital infiltrators recently managed to compromise the personal info of millions and down the PlayStation Network for weeks.

“We had no reason to believe that our security was not good and still no reason to believe it because we have plenty of people looking at it. We’ve learned that we just have to keep improving our security. We [also] have to earn back the trust and loyalty we may have lost in this circumstance. That’s our goal and that’s one we have to reach.

“[In addition], we have to have better tools to watch out for those who want to steal our data. After all, we ran the PlayStation Network which gave away free games. It’s not an obvious target for enmity or aggression. I’m very upset at what they did to our customers who want to enjoy our network. There’s a lot to be learned from this experience.”

Meanwhile, Kazuo Hirai, the head of Sony’s videogame and consumer electronics units, confirmed the Japanese-based corporation had installed a number of new safeguards to prevent hack and extract operations.

“We have done everything possible and reasonable to make sure that a system is secure from attack,” Hirai added.

Contact me at : contactme.bijay@gmail.com

http://computeraddicted.wordpress.com

http://shenanigans-nepal.blogspot.com/

http://losthacker-deadbj.blogspot.com/