welcome to TECHNO WORLD

Wednesday 31 July 2013

A small detailed and 14 Most Interesting Linux Facts




Linux is one of the world’s most powerful and popular operating system. Linux operating system was developed by Linus Benedict Torvalds at the age of 21. At present there are more than 300 flavors of Linux available and one can choose between any of them depending on the kind of applications they want.

Linux is a freeware and generally speaking its free from Virus and other malware infections. In this post I will share few Linux facts which may or may not be know for many of us.

14 Most Interesting Linux Facts


1.Only 2% of the current Linux kernel written by Linus Torvalds.
The Linux kernel version is written in the programming language C.

2.The first commercial distribution GNU / Linux was Yggdrasil was launched Lice-CD format in 1992. Red Hat was one of the first distributions to settle within companies and data centers in 1999.

3. A guy named William Della Croce Jr. registered the name Linux and demanded royalties for use of the mark. Later, he agreed to assign the trademark to the true owner, who is Torvalds.

4.Countries such as Russia, Brazil and Venezuela have put their focus on Linux as a basis for interoperable management , cost efficient and technologically independent.

5. U.S. Department of Defense, U.S. Navy Submarine Fleet, Federal Aviation Administration uses Linux in government offices. Indian state of Tamil Nadu uses Linux for education purpose.

6. 90% of the world’s most powerful supercomputers using an operating system GNU / Linux, in fact, the top ten of supercomputers use Linux. In fact, the penetration of Linux in data centers is very high, 33.8% of the world runs on Linux servers compared to 7.3% does so in a Microsoft operating system.

7.The name of the penguin, Tux , is not entirely clear. On the one hand, it is said that the origin of the name comes from the fact that penguins appear to be wearing a tuxedo, which in English is said max tuxedo tux and is abbreviated. In contrast, another source comes from the letters of the logo of Tux are Unix Torvalds.

8.Torvalds wanted to call the kernel Freax (a combination of “free”, “freak”, and the letter X to indicate that it is a Unix-like), but his friend Ari Lemmke, who administered the FTP server where the kernel was hosted for download, the download directory called kernel of Linux Torvalds.

9.Debian was one of the first GNU / Linux that was constituted and organized as a community of developers.

10.Linux is present in highly critical applications such as Japan’s bullet trains, traffic control, San Francisco, the New York Stock Exchange, CERN, many air traffic control systems or control of nuclear reactors of submarines and ships many nuclear war.

11.Linux programmers are often associated with living “isolated” in the world, however, over 75% of the code developed for the Linux kernel came from private sector developers. In fact, large technology companies like Intel, Google, IBM, AMD, Sun Microsystems, Dell, Asus, HP, Analog Devices, Oracle, Novell or Red Hat help developing applications, contributing to the core or pre-installing any GNU / Linux their machines. In fact, during the 2003 Super Bowl (which paralyzes the United States and remains glued to the TV for many Americans), IBM delivered a beautiful ad talking about Linux and open source options.

12.The GNU kernelhttp://technoworld007.blogspot.in/search?q=kernel in 1991, had no drivers and kernel, that’s what led to Linus Torvalds to address the Linux kernel development. If GNU had had, perhaps, Torvalds had not been put to work on that.

13.The Linux kernel is now the most widely ported operating system, running on a great variety of operating systems.

14.World known companies such as Google, Cisco, Facebook, Twitter, Linkedin etc use Linux as their main operating system.




Tutorial on Cracking Unix Password Hashes

Cracking Unix Password Hashes with John the Ripper
Few weeks ago we introduced all of you to John the Ripper...now I will show you some cracking Remember that everything is written here is only for educational purposes. Let's begin!


Introduction :»

This post will serve as an introduction to password cracking, and show how to use the popular tool John-the-Ripper to crack standard Unix password hashes.

The Scenario :»

My scenario is the following: We have just compromised and gained root access to a Unix machine on our target's network. Now, to better maintain access, and to facilitate further intrusion, we will attempt to extract and crack the password hashes on the host.

Where are Password Hashes Stored?

Before we can crack the password hashes, we first need to know where they are stored. Traditionally (according to Wikipedia, before 1988) password hashes for account were stored in the /etc/passwd file. However, this caused security issues since the file was readable by all users on the system. Now, instead of a password hash, this file contains an "x" to indicate that the password details are located in a different place: the /etc/shadow file. This file is only readable by the superuser (root), so there is far less of a security risk associated with this file.

Password Cracking Process : »

An important thing to note is that these two files have some overlapping content. John the Ripper's tool suite provides a nifty tool to merge these two files into one called "unshadow". To use it, we simply need to specify the passwd file, and the shadow file. For the sake of this post, we will use the /etc/passwd and /etc/shadow files on my local Backtrack VM. However, in the case of our scenario above we will have copied these files from our compromised machine to our Backtrack machine, and then specify the location of these files to unshadow. Then, we send the output to a new file of our choice. This looks like the following:
[code]
root@bt:~# cd /pentest/passwords/john
root@bt:/pentest/passwords/john# ./unshadow /etc/passwd /etc/shadow > ~/passwords.txt
root@bt:/pentest/passwords/john# cat ~/passwords.txt
root:$6$jcs.3tzd$aIZHimcDCgr6rhXaaHKYtogVYgrTak8I/EwpUSKrf8cbSczJ3E7TBqqPJN2Xb.8UgKbKyuaqb78bJ8lTWVEP7/:0:0:root:/root:/bin/bash
daemon:x:1:1:daemon:/usr/sbin:/bin/sh
bin:x:2:2:bin:/bin:/bin/sh
sys:x:3:3:sys:/dev:/bin/sh
sync:x:4:65534:sync:/bin:/bin/sync
games:x:5:60:games:/usr/games:/bin/sh
man:x:6:12:man:/var/cache/man:/bin/sh
lp:x:7:7:lp:/var/spool/lpd:/bin/sh
mail:x:8:8:mail:/var/mail:/bin/sh
news:x:9:9:news:/var/spool/news:/bin/sh
uucp:x:10:10:uucp:/var/spool/uucp:/bin/sh
proxy:x:13:13:proxy:/bin:/bin/sh
www-data:x:33:33:www-data:/var/www:/bin/sh
backup:x:34:34:backup:/var/backups:/bin/sh
list:x:38:38:Mailing List Manager:/var/list:/bin/sh
irc:x:39:39:ircd:/var/run/ircd:/bin/sh
gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/bin/sh
libuuid:x:100:101::/var/lib/libuuid:/bin/sh
syslog:x:101:103::/home/syslog:/bin/false
sshd:x:102:65534::/var/run/sshd:/usr/sbin/nologin
landscape:x:103:108::/var/lib/landscape:/bin/false
messagebus:x:104:112::/var/run/dbus:/bin/false
nobody:x:65534:65534:nobody:/nonexistent:/bin/sh
mysql:!:105:113::/var/lib/mysql:/bin/false
avahi:*:106:114::/var/run/avahi-daemon:/bin/false
snort:*:107:115:Snort IDS:/var/log/snort:/bin/false
statd:*:108:65534::/var/lib/nfs:/bin/false
usbmux:*:109:46::/home/usbmux:/bin/false
pulse:*:110:116::/var/run/pulse:/bin/false
rtkit:*:111:117::/proc:/bin/false
festival:*:112:29::/home/festival:/bin/false
postgres:!:1000:1000::/home/postgres:/bin/sh

We can immediately notice the password hash for the user root. Let's fire up JTR, and point it to this passwords.txt file. To perform the cracking, we will use the --single option. From the documentation:

"This is the mode you should start cracking with. It will use the login names, "GECOS" / "Full Name" fields, and users' home directory names as candidate passwords, also with a large set of mangling rules applied. Since the information is only used against passwords for the accounts it was taken from (and against password hashes which happened to be assigned the same salt), "single crack" mode is much faster than wordlist mode. This permits for the use of a much larger set of word mangling rules with "single crack", and their use is always enabled with this mode. Successfully guessed passwords are also tried against all loaded password hashes just in case more users have the same password."
- John the Ripper Documentation

Let's see this in action and attempt to crack the password hash for the root user:

root@bt:/pentest/passwords/john# john --single ~/passwords.txt
Warning: detected hash type "sha512crypt", but the string is also recognized as "crypt"
Use the "--format=crypt" option to force loading these as that type instead
Loaded 1 password hash (sha512crypt [32/32])
toor (root)
guesses: 1 time: 0:00:00:00 DONE (Fri Jan 4 10:12:42 2013) c/s: 35.00 trying: toor
Use the "--show" option to display all of the cracked passwords reliably
root@bt:/pentest/passwords/john# john --show ~/passwords.txt
root:toor:0:0:root:/root:/bin/bash

1 password hash cracked, 0 left

Success! After we finished cracking the password hashes found in the passwords.txt file, we can use the command john --show [file] to display the found account details. These details are displayed in the same format as the password file, with the only exception being that the password hash is now replaced by the password 'toor' (the default password for the root user on Backtrack).

I hope this short introduction to password cracking helps you. Keep an eye out for a more comprehensive post covering more JTR cracking techniques, as well as other password cracking tools and methods.


source by thecyberelite.blogspot.com
I am not responsible for any consequences , you dig your own grave of you own risk guys :P



what is IP Address and how can i hack remote computer using IP address




Firstly I Will Tell You What Is Internet Protocol (IP) ??

The Internet Protocol is the principal communications protocol used for relaying datagram (packets) across an
internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.


IP is the primary protocol in the Internet layer of the Internet Protocol Suite and has the task of delivering
datagrams from the source host to the destination host solely based on their addresses. For this Purpose, IP defines addressing methods and structures for datagram encapsulation

Literally, hacking is accessing something or somebody in internet without their permission or interest. While, speaking in summary, hacking is very easy job, it is like instead of using front door, finding the hidden door of a house and hijacking the precious things. Among all the hacking, hacking via IP address is one of the most common yet powerful beginning.


You may want to hack the website and put your advertisement there or grab some database information In this type of hacking, you are playing with the web server’s computer instead of the administrator’s computer. Because, www.website.com is hosted in separate web server rather than personal computer.
Another can be accessing your friend’s computer from your home. Again this is IP based and this is possible only when your friend’s computer is online. If it is off or not connected to internet then remote IP hacking is totally impossible.
Well, both of the hacking has the same process. Let’s summarize what we must do.
  • Confirm the website or a computer you want to hack.
  • Find or trace their IP address.
  • Make sure that IP address is online
  • Scan for open ports
  • Check for venerable ports
  • access through the port
  • Brute-force username and password 


Now let me describe in brief in merely basic steps that a child can understand it.
First, getting the IP address of victim.
To get the IP address of the victim website, ping for it in command prompt.
For example,
ping www.google.com
will fetch the IP address of Google.com

This is how we can get the IP address of the victims website.
How about your friend’s PC? You can’t do www.yourfirend’sname.com, can you? Finding your friend’s IP address is little tough job, and tougher it is if he has dynamic IP address that keeps changing.
One of the widely used method to detect IP address of your friend is by chatting with him.


If u know the ip address? Is it online? To know the online status just ping the IP address, if it is online it will reply.
If the IP address is online, scan for the open ports. Open ports are like closed door without locks, you can go inside and outside easily.
Use Advanced Port Scanner (password Is www.cyberelite.in)to scan all open and venerable ports.

Now you’ve IP address and open port address of the victim, you can now use telnet to try to access them. Make sure that you’ve telnet enabled in your computer or install it from Control panel > Add remove programs > add windows components.
Now open command prompt and use telnet command to access to the IP address. Use following syntax for connection.
telnet [IP address] [Port]


You’ll be asked to input login information.


If you can guess the informations easily then it’s OK. Or you can use some brute-forcing tools like this one.
In this way you’ll able to hack remove computer using only IP address

this post is for only Educational purpose , not for any consequences bare your own risk 



Battlefield 2 mod Project Reality gets v1.0 release date and its trailer . amazing gift for gammers


In the eight years it has taken Battlefield 2 mod Project Reality to hit its 1.0 milestone, DICE have released seven additional Battlefield games. Then again, they’ve got more money, people, and one of those games was Battlefield Play4Free, so there’s probably something to be said for taking your time to nurse something towards completion. Project Reality will finally hit that mark this Friday, August 2nd, and its creators have released a trailer to round up its now complete feature list.

If the mod’s big features are the two new factions, additional maps and new game modes, it’s the thousands of smaller tweaks that ultimately have a more dramatic effect. Project Reality – as the name might suggest – aims to create a more realistic Battlefield 2 experience, not only by rebalancing guns and equipment, but by upgrading and even removing parts of the base game. You can get an overview of what the mod offers from the latest change log.
The 1.0 release is currently available for pre-loading, which will allow you to download the mod files, ready for when the team release the installer password at launch. To download the mod, head to the Project Reality 1.0 announcement page.




ASUS RAIDR Express, ideal PCIe SSD for hardcore gamers and enthusiasts













ASUS has announced release of the solid state drive in format PCI-Express RAIDR Express, a model of high capacity and performance, support for older BIOS and UEFI new, and a starting price in the environments of the 400 dollars.

Presented at CES, ASUS RAIDR Express is a Taiwan firm innovative storage device: a PCIe 2.0 card x 2 SSD storage with capacity of 240 Gbytes.

A responsibility of the elite division of ASUS ROG device ((Republic of Gamers), and linking in an elegant set two solid state drives in RAID 0 for maximum performance, set to a speed of transfer of data from 830/810 Mbytes per second modes 100,000 4 K random write IOPS and read/write.)

The ASUS RAIDR Express uses one of the memories most advanced industry: NAND flash Toshiba manufactured in 19 nanometers and smaller and high density of industry. Your controller in this case double, is the well-known LSI SandForce SF-2281 used by 9
percent of the manufacturers. It supports TRIM, SMART, and NQC commands.

According to advertise the firm, the ASUS RAIDR Express would be the first PCI-e SSD compatible with old BIOS and UEFI new industry, that you will know by the greater security provided by secure startup and also problems to install another system that is not Windows 8 such as Linux.

ASUS resolves the issue offering a switch that you can see in the image above for both modes, supporting BIOS legacy and new UEFI input/output interfaces.

As for the price, it is on sale in Japan since the previous weekend by 37.800 yen. To change, some 400 dollars that would be converted into 400 euros even though we will have to wait for the official price in Europe and America.

No, it is not cheap, since a dual SSD 2.5 mm can be mounted on RAID with the same capacity, lowering the price enough. That Yes, will not achieve the performance of these PCIe, dedicated enthusiastic teams and teams of high level for PC games.




 ASUS ROG today announced RAIDR Express, the first PCI Express-based SSD in the world with a DuoMode feature that allows it to work with either legacy (traditional) or modern UEFI BIOS. Aimed at hardcore gamers and PC enthusiasts demanding a faster and more reliable computer experience, RAIDR Express combines the best compatibility and great performance with incredible durability.

With 240GB capacity, sequential 830MB/s read and 810MB/s write speeds, and bundled with tons of features that maintain the high-speed performance and extend the lifespan, RAIDR Express is made for real speed-demons. Boasting the gorgeous ROG red and black design with double-sided metal shielding and an incredible 620,000 hours mean time between failure (MTBF) to ensure quality, RAIDR Express is built to last.

Exclusive design, exclusive flexibility
RAIDR Express isn’t like other SSDs. It’s the world’s first and only PCIe-based SSD with DuoMode BIOS support. With two BIOS chips onboard, RAIDR Express includes a hardware switch that lets users easily alternate between legacy and UEFI modes, ensuring the best compatibility with PCs old and new.

In legacy mode, the RAIDR Express can be used on older motherboards — those with a traditional (non-UEFI) BIOS. By switching to UEFI mode, users can significantly boost PC startup times. With the flexibility of choosing which mode is best, users can enjoy the benefits of both.

Made for real speed demons
With the latest generation dual LSI® SandForce controller, Toshiba-made 19nm 16K-page size multi-level cell (MLC) sync-NAND flash, 100,000 4K read/write input/output operations per second (IOPS) and 830/ 810MB/s sequential read/write speeds, RAIDR Express doesn’t keep users waiting.

As well, RAIDR Express has several other speed-boosting tricks up its sleeve. The bundled RAMDisk utility that allows users to dedicate up to 80% of a computer’s available RAM for use as a high-speed virtual drive that accelerates the loading of favorite applications and games. In ASUS tests, read speeds of over 12,000MB/s were reached.

Better still, RAMDisk extends the life of RAIDR Express by reducing unnecessary write operations. RAMDisk even backs itself up to the main system drive when the PC is shut down and restores itself automatically at power-up, for maximum speed and minimum hassle. The ROG SSD TweakIt tool ups the speed stakes still further by relocating repetitive write activities to the RAMDisk for even faster operation, while keeping RAIDR Express at peak performance for much longer. SSD TweakIt can also be used to apply a preset profile that refines processor settings automatically to achieve additional speed boosts of up to 5%.

RAIDR Express also includes ROG HybriDisk technology super-charges hard disk drive storage. HybriDisk allows RAIDR Express to act as a solid-state cache for high-capacity hard drives up to 4TB, but its PCIe architecture means data transfers smash the 600MB/s SATA limit for traditional PC storage. The included ROG CrystalDiskMark benchmark tool allows users to see for themselves just how fast RAIDR Express can go — and keep on going.

Fast, compatible and built to last
RAIDR Express is fast and offers the widest system compatibility, but it’s also built to last. RAIDR Express is rated at an amazing 620,000 hours’ mean time between failure (MTBF), so users are assured year after year of trouble-free use and strict testing ensures wide system compatibility.

RAIDR Express also has a highly durable design packed with unique ROG innovations designed to extend its lifespan. Tough, double-sided metal shielding provides great heat dissipation and reduces electromagnetic interference (EMI), improving cooling and overall stability.



How to install Flash Player on Android complete detailed view


How to install Flash Player on Android

Some time that Adobe announced that Flash Player would be available for Android. You can discuss about the successful or not of the decision, but there is no doubt that users who want to view websites with flash content will have problems. In this article, you have the best way to install Flash Player on your Android device.

Adobe Flash is no longer available on Google Play, the official repository of apps for Android, so it is necessary to download it from this section of the Adobe website. As you will see are collected all the available versions of Flash Player, next to the link for direct download and technical documentation for developers. Users with devices that cannot be updated can be found on this page the latest compatible version.

► » http://helpx.adobe.com/flash-player/kb/archived-flash-player-versions.html « ◄



The first step is to download the latest version available (do not do case to notice that only supports Android 4.0, works perfectly in subsequent developments). Remember that it is necessary to install applications not signed in Android, enable the option in settings, security, unknown sources (possible that names will change slightly depending on your version of the operating system).

After this change, go to the downloads folder and click on the file to automatically install Flash Player. To navigate we recommend that you install Mozilla Firefox for Android, a plugin-capable browser and which will allow you to view almost any flash content. You can download it free on Google Play.

When you open any site with flash content in Firefox you should see no problems. To optimize performance and avoid potential compatibility problems, we recommend that you set your browser to activate playback flash only when you click on the elements. You only have to press menu, go to settings and access the settings of the plugin.

Alternatively, you can download any browser already integrated support for Adobe Flash series. An interesting option that we have tested is Puffin Web Browser, available for more than two euros in Google Play. Finally, you can consult this article where we explained how to do something similar with Dolphin Browser.



DWR-921, d-Link router with 4G connectivity as 4th Generation Technology




DWR-921, d-Link router with 4G connectivity


4G technology is just taking its first steps, but are have had that chance to try it few doubts about the revolution might be. With up to 10 times higher than 3G speed, we have a serious alternative to traditional ADSL in terms of performance, we can also use anywhere.

In this sense, the new D-Link DWR-921 is emerging as one of the first alternatives to share our connection 4G at home or in the Office of an easy, efficient and safe. Equipped with four Ethernet LAN ports and connectivity WiFi 802.11 n, this neutral router works by dual-band and incorporates technological arsenal that characterizes to the high end of the company.

Thanks to a slot for SIM card 3 G / 4 G, it can be used with a mobile data service. In addition, includes failover function, a system that automatically activates the connection to mobile networks when there are problems with ADSL, something very interesting for companies and professionals who need to be always connected.

With regard to security, in addition to the advantages inherent to manage our connection with a router to use, technologies are like a double firewall or encryption for WiFi networks, which prevent the possibility of intrusion and ensure total privacy in our communications between devices.

The new D-Link DWR-921 4G is now available at all authorized distributors for a preferred price of 239 euros. We hope that the operators decide to expand the download limit and improve the quality of coverage in the coming months to help final takeoff of the 4 G as an alternative. 



Tuesday 30 July 2013

New Samsung tablet of 10 and 12 inch of a rumor



The technology rumor mill again the development of new Samsung tablet of 10 and 12 inch Panel under IGZO technology from Sharp that would provide a native resolution of 2560 x 1600 pixels.

The rumor comes from @evleaks although it is not new and ensures the development of new tablets with high resolution and 10 and 12.2-inch diagonals.

The first would be the P600 and would use the 800 Qualcomm Snapdragon SoC, while the second would be the SM-P900 and would use the new eight-core Exynos 5420 SoC of Samsung. 

While Samsung triumphs completely in smartphones we cannot say the same in tablets but with these new models of large-scale spectacular forecasts would have to sell up to 12 million quarterly units.

If this is true, each time is made more news the rumor of the abandonment of Samsung's market on the desktop, confirming the current revolution in which the computer industry is immersed.

Although Samsung has never had great presence in the PC desktop in Europe or the United States market, it sells units by number in the Asian region and has been of the few that have been spared the burning of the decline of the sector.

However, the intention would be to focus on tablets, AIO all in one portable, while continuing to dominate the Smartphone market.



Monday 29 July 2013

Panda Cloud Antivirus, a great alternative to protect your PC from recent Technologys of build up with Cloud computing process

 Antivirus. For a long time, in the computer world, that Word has meant Windows. Now things are different. However, antivirus and Windows continues to be an irresistible combination, and is the operating system of Microsoft, despite having improved a lot on security, still needs this kind of protections.

Thus, one of the tasks of any Windows user is the choose a solution among the many available antivirus. At this point, the fear for someone like me, who had been many years without using Windows directly, was the memory of what were the antivirus on the half of the last decade: neighborhood thugs. I.e. these mafias that extort businessmen in Exchange for protection.

Then, as now, have an antivirus installed on your computer was a basic requirement to be "sure"; antivirus were then, like vampires, who sucked the resources your team until exhausted. Norton, Panda, Kaspersky, McAfee... No matter the name, all were vital and insufferable session mates.

Fortunately things have changed a lot, the manufacturers have realized that a good protection need not be obstacle for optimal performance of the machine and use Windows today is much more 'breathable' than before. So, what antivirus choose?

The truth is, even having changed things, if you want to save resources without dispense with the best protection, there is still room for choice. The first option would be the 'default', Microsoft Security Essentials, Microsoft Windows Defender in Windows 8: free, perfectly integrated into the system and lighter will not find anything. But at the level of protection and features, it remains unable to compete in the major league. In fact - and only talking about Microsoft Windows Defender - recently that, finally, managed to pass the certification of the independent company AV-Test.

From here the offer is wide, both paid and free solutions. Of all, I I have opted for giving him the opportunity to an old vampire turned into an angel: Panda Cloud Antivirus. It is not an exaggerated comparison if you don't get the context: Panda Cloud Antivirus is, after the development of Microsoft, the lighter option of few I have tested among others, even during analysis, it is darn easy to use and do not need to update definitions every few minutes. These and other features are what make Panda Cloud antivirus an alternative to keep in mind.

Panda Cloud antivirus cloud                

As does Panda Cloud? Why don't need updates? These are two of the most interesting questions to discover. Broadly speaking, Panda Cloud is a dependent of Internet antivirus and whenever analysis is conducted, is connected to the collective cloud of Panda Security to "contrast" data (protects against malware of all kinds, even exploits). The advantage is the Save pending updates, the negligible impact on performance and a powerful and very updated detection; the handicap, that the effectiveness of the application decreases significantly (although the anti-virus maintains a cache) without an Internet connection. Personally, I remember the last time that I was offline, or for few minutes was not. Also, without the Internet the risk of infection disappears or boils down to the end, so that the handicap is not much (always depending on circumstances).

                                       

The more important question here is, how efficient is the system of Panda Cloud? The best thing in these cases--not to say the only thing that can be done - usually legit independent experts and prestigious Virus Bulletin or the aforementioned AV-Test:

Panda Cloud Antivirus, certified by ICSA Labs
Panda Cloud Antivirus is the best free antivirus according to AV-Test
Panda Cloud Antivirus obtains the seal Advanced Plus from AV-Comparatives
Panda Cloud, only free antivirus in obtaining Advanced + in disinfection of malware
Panda Cloud Antivirus Pro get Virus Bulletin VB100 certification
Panda Cloud Antivirus Free get the VB100 certification from Virus Bulletin on Windows 8

The test, of course, passes with note. Panda Cloud stands out for its efficiency by detecting and disinfecting malware, something that also makes quickly, without disrupting the user experience on the machine that is running. The latter only feels - or feel, better said - using the application, I'm still working normally, with several heavy applications open, and the impact on the performance of the computer is undetectable. Not the case with other antivirus, the truth. As I have said, after Microsoft Security Essentials, there is nothing lighter than Panda Cloud Antivirus.

After overcoming with note two factors key - detection / disinfection and performance - when considering to Panda Cloud Antivirus as the ideal candidate - or one of them - to protect your PC, is time management and options of the application itself. And we must again refer to Microsoft Security Essentials / Microsoft Windows Defender, is after this simplest thing between the antivirus on first line. At least at first glance.

Between the free version, Panda Cloud Antivirus Free, and payment, Panda Cloud Antivirus Pro, obviously, there are differences. As differences there are in the needs and tastes of users: some prefer thousand features and options to set up other simplicity and conciseness.





Click below for Download





Saturday 27 July 2013

Narendra Modi fans launch Namo as Next-generation Android Mobile Odyssey



A group, claiming to be "independent body of fans of Shri Narendra Modi", has launched the Namo Android smartphone that will be available 'soon'.
Namo, is short of course for Narendra Modi, the Chief Minister of Gujarat, and Chairman of Central Election Campaign Committee of Bharatiya Janata Party (BJP), one of India's leading political parties. Namo is also, the group shares, short for, Next-generation Android Mobile Odyssey, as the Namo phone is based on Android.
Explaining the motivation in releasing the phone, the group says on its website, "We are fans of Shri, Narendra Modi, our forthcoming future leader of our great nation India, we are manufacturing latest Android handset dedicated to the IRONMAN of modern India."
The website is scant on details about Namo, the smartphone, though it does mention some of the specifications. Namo will sport a 5-inch Corning Glass 2 display and be powered by a 1.5GHz quad-core Mediatek MT6589 chipset. It will have a 13-megapixel camera. The phone will supposedly come in 4 variants, with the amount of RAM and internal storage varying between 1-2GB and 16-64GB respectively. There's no word yet on the price or availability of Namo smartphone.
To be clear, it seems what the group plans to do is import off-the-shelf smartphones from China to rebrand and market them, similar to what many other Indian smartphone brands are already doing. Will the group be around to service the Namo smartphone if and when it runs into issues is anyone's guess.
"We are from land of Gujarat & in electronic smartphone business in China," the group says. "Our product is our way of dedication & respect to our great nation leader. We will be launching NAMO Android handset with Shri Narendra Modi "signature edition", for which process in under way! We will launch our handset very soon... for updates please see our FB page."



Friday 26 July 2013

Android 4.3 rolling out to Google's Nexus devices: How to get Android 4.3 to my Google's Nexus device :)



Google unveiled the second generation Nexus 7 tablet with Android 4.3 Jelly Bean at an event in San Francisco on Wednesday. The update is an incremental one when it comes to user facing changes, but brings a number of new features under the hood.

While the updated OS will ship with the new Nexus 7 tablet, Google has announced that it has started rolling out the Android 4.3 update to Nexus devices including the original Nexus 7 tablet, the Nexus 10 tablet, and Nexus 4 and Galaxy Nexus smartphones. 

The update will be available over the air through the Settings menu on the devices. It will roll out gradually and it could take weeks before it reaches all devices. Our Galaxy Nexus smartphone has not received the update, at the time of writing this post.

You can also force your device to check for updates by going to the Apps menu from the Settings, and finding the Google Services Framework app. You can then tap on 'Clear data' and 'Force stop' options and check for the update again from the About settings menu. This doesn't harm your device in any way and is a completely safe option. However, it's not guaranteed that you'll get the update after performing these steps.

For the more adventurous, the full factory images of Android 4.3 are also available through the Android Open Source Project online, on the Google Developers website. However, you'll need to flash these images manually using special tools and unless you're pretty sure of what you're doing, we'd recommend waiting for the official update to hit your device.

Hugo Barra, Vice President of Android product management at Google also announced that the stock Android Google editions of the Samsung Galaxy S4 and the HTC One would receive the update as well, though he did not specify a timeline.



Thursday 25 July 2013

How to choose a SIEM solution: An overview



IT organizations, faced with an increasing volume of logs from multiple sources are turning to Security Information and Event Management (SIEM) solutions to help manage the flood of information and at the same time, analyze it in order to find evidence of security incidents. Implementing a successful SIEM solution, however, is not an easy project. Here we will examine what to look for in a SIEM product and provide some guidance for a successful implementation.

What is SIEM?

SIEM is the combination of two different types of products, SIM (Security Information Management) that gathers and creates reports from security logs and SEM (Security Event Manager) that uses event correlation and alerting to help with the analysis of security events. On the other hand, traditional log management tools only collect and report on the captured log data.
In order to benefit from the features of a SIEM solution, an organization has to be able to monitor and respond to the events discovered in the security logs. As a minimum, a log review process (like the one described here) should already be in place to ensure that the appropriate resources are committed to a regular review of the security logs and that investigations of anomalous events can be carried out in a timely manner. Ideally, an incident response process should also be in place, with corresponding policies and resources to respond to security incidents.
Another important consideration is that the organization must be willing to commit resources to the maintenance, adjusting and evolution of the tool. Event correlation, one of the defining characteristics of a SIEM product, will not turn raw log data into actionable information by itself. Most tools provide a generic set of default correlation rules, conditions or dashboards that in most cases are not the perfect fit for your organization. Your organization's analysts must customize and continually improve the rules, reports and dashboards and adapt them to the organization's needs. If the resources for the regular "maintenance" tasks of the tool are not available, the value the SIEM tool might bring will be easily lost.

What to look for in a SIEM solution?

Now that we know what a SIEM is and the resource commitments it requires, we can take a look at various features and characteristics that you should pay attention to when choosing a product:
Licensing and scalability: Different SIEM vendors license their products differently. Some of the most common licensing modes are:
  • Number of monitored computers/devices
  • Number of events per day/hour/minute and log volume size (in MB). If you have a baseline of the logs you wish to monitor, you should already know most (if not all) of this information beforehand.
Be aware that some products may limit functionality (or worse - like stopping event logging) if you exceed your license, particularly those whose license is based on a given number of events or volume.
Make sure you verify that your selected product is able to accommodate future growth, especially in the storage department. You must be able to expand the storage available for both the parsed (or normalized) events as well as the raw logs.
Log compatibility: Since there is no single accepted log standard, not all SIEM products are able to capture events from every log source conceivable. You must ensure that the product is compatible with all of your required logging needs and that they can be parsed and normalized. Since you may need to add logs in the future from new unknown sources, the product must provide you a way to integrate these new logs or you should ask if the vendor can do it for you upon request. The correlation engine: The correlation engine depends mainly on rules the product can use. The ease of their creation for those rules is critical. The search function available for events is also very important, as you will need the ability to search across multiple devices, logs and timeframes. Ideally, the search results will allow some manner of drilldown all the way to the raw log data. Dashboards, reporting and general user interface: The tool must provide the ability to create your own dashboards and reports. Ideally, the dashboards should operate in real-time and provide drilldown capabilities. The ease to create custom reports is also important, as well as their timely performance. Since the SIEM product will be one of the main tools used during the investigation or analysis of any security incidents, its performance and general UI design should be intuitive enough so as to not slow down the operator.

Do you need a SIEM solution?

As described here, a SIEM solution requires resources that not all organizations may be ready to commit. You can always evaluate tools that can perform log management and offer the compliance level you require, but allow you to grow into a full SIEM installation later on.
SIEM is not a silver bullet that will on its own solve all your security issues, but when properly staffed and supported, it can provide an excellent way to quickly identify and act on security threats.



Google unveils $35 Chromecast that lets you stream Internet content to TV


Google Inc. has unveiled a gadget that will lean on its widely used Chrome Web browser and take aim at Apple in the living room.
The new device, called Chromecast, is part of the company's attempt to make it easier for people to access Internet content on their TVs. Chromecast is a small stick roughly the same size as a thumb drive that can be plugged into an HDMI port on flat-panel TVs. It brings Netflix, Google's YouTube site and other Internet content to what is usually the biggest screen in households.
Forrester Research analyst Sarah Rotman Epps said Chromecast could undermine Apple in the still-nascent market to plug streaming devices into TVs, just as the Nexus tablets have siphoned some sales away from Apple's iPad.
Google's previous products designed to connect TV sets to the Internet haven't worked out well. The company initially tried to embed an operating system called Google TV into sets made by TV manufacturers, but that flopped. Last year, Google introduced an orb-like device called the Nexus Q in hopes of delivering more Internet video to flat-panel TVs, only to quickly pull the product from the market.
"Chromecast looks like a smart and disruptive device," Rotman Epps said. "Maybe it took the other failures for Google to get it right."
Google wants to have a presence on TVs because it could open up a lucrative new channel for it to sell more ads, which bring in most of its revenue.
In a show of its determination to make inroads on TVs, Google started selling Chromecast for just $35 on Wednesday. That price undercuts the most popular Internet-streaming devices made by Apple and Roku. An Apple TV box sells for $99, while the least expensive Roku box capable of showing high-definition video goes for $80. Roku, a company that formed within Internet video subscription service Netflix Inc., also sells an Internet streaming stick similar to Chromecast for $100.
Earlier this year, Apple revealed that it has sold more than 13 million of its streaming boxes. Roku said its sales of streaming boxes surpassed 5 million units this year.
The Chromecast device connects with smartphones, tablets and personal computers to beam Internet connect to TVs. The Apple and Roku streaming boxes rely on a standard remote control to select Internet content.
As an enticement to get people to try Chromecast, Google is offering three months of free Netflix service with a purchase of the Internet-streaming stick. That translates to a $24 value, leaving the cost of the device at $11 for those who would have gotten Netflix anyway.