Trend Watch

WidgetBucks - Trend Watch - WidgetBucks.com
   

Sunday, July 29, 2007

Hacking Quotes!

A computer makes as many mistakes in one second as three men working for thirty years straight.

A computer program does what you tell it to do, not what you want it to do.

A computer program will always do what you tell it to do, but rarely what you want to do.

A computer scientist is someone who fixes things that aren’t broken.

A fellow who is always declaring that he is no fool usually harbors suspicions to the contrary.

A friend in power is a friend lost.

A logician trying to explain logic to a programmer is like a cat trying to explain to a fish what it’s like to get wet.

A man will believe anything that does not cost him anything.

A misplaced decimal point will always end up where it will do the greatest damage.

A narrow mind has a broad tongue

Hacking Quotes!

Do you program in Assembly? she asked. NO, he said.

INSERT DISK THREE? But I can only get two in the drive!

Intel Inside is a Government Warning required by Law.

Intel Inside: The world’s most widely used warning label.

2 + 2 = 5, for extremely large values of 2.

2400 Baud makes you want to get out and push!

586: The average IQ needed to understand a PC.

A bus station is where a bus stops. A train station is where a train stops. On my desk I have a workstation…

A C program is like a fast dance on a newly waxed dance floor by people carrying razors.
A closed mouth says nothing wrong; a closed mind does nothing right.
A complex system that does not work is invariably found to have evolved from a simpler system that worked just fine.
A computer is like an Old Testament god, with a lot of rules and no mercy.

Technological Singularity

Imagine a society where one could upload, or download a personality from a supercomputer, or increase intelligence by artificial means. This illustrates a society that transcends to the metaphysical, making conventional human ability obsolete. Think this as a far-fetched idea? Think again. Trans-humanism: the philosophical movement that merges technology with humans, eventually leading to the next evolution in the human cycle. This evolution results in sophistically engineered posthumans. Once humans advance anatomically and neurologically beyond genotypical, and phenotypical patterns they can no longer be named as biological humans.

One area of the Trans-humanist progressive expansion lies in the field of Neurotechnology or Neurobionics. Neurotechnology: a set of instruments that analyze and influence the brain, and central nervous system in a desired effect. Neurochips, the silicon devices that are implanted inside neurons connected to the brain, allow brain manipulation. Transhumanist movements lead to neurological advancements in these neurochips. Despite its many possible advantages, disadvantages appear that could lead us into a negative technological singularity.

With progressive movements in Neurotechnology and Neurobioncs, many advantages for the neurologically impaired increase. New medical instruments are being created in areas of Nanotechnology, Biotechnology, and Neurotechnology to help those with neurological disorders in ways that were not previously open for patients before. Some of the possible advancements include nanomachines that interact with anatomical structures of the brain, which perform microsurgery inside the neural network system on cancerous cells, or damaged tissue.

Nanomachines, or nanites are submicroscopic robots that can perform medical functions within bloodstreams, or neurons of a living organism. This includes intracellular surgery on tumors, and the removal of clotted material in living cells. Nanites can store gigabytes of medical information on human anatomy to preform such task. ("Nanites"). Brain Interface Chips could be used as chips that link with the nanomachines using the Central Nervous System, and send messages and tasks to 'Task Forces' from the Command Chip which is linked directly to the Interface Chip. There will most likely be a neurochip that acts as a command and control chip which feeds information from the Central Nervous System to nanomachines, in the brain to carry out different task, such as destroying viruses, speeding up the healing process from different wombs and tissue in the brain; to detailed information from a database on human anatomy to perform microsurgery on areas such as the eyes, ears, and nerve repair.

"Aside from the more obvious tasks of destroying a virus, speeding the healing process from wounds, and taking out cancerous cells, the nanomachines would help in creating much healthier and fitter people for specific jobs such as astronauts, soldiers etc." It may even be possible to explore the brain and use the information to one day awakens the apparently dormant parts of the human mind. (Langley, Jason). If these nanomachines where to preform such complex task, they would have to have advance artifical intelligence; or intelligence that would require a task to be done by a human.

Different type of intelligence that would be incorporate into these machines would depend on the task it is carrying out. For example algorithms are certain rules to solve a problem, while heuristics are general steps that humans take in order to solve a problem without the knowledge of success; or trail and error type problem solving. One could assume that both of these methods would be incorporate into these nanomachines for advance problem solving abilities. (Levive, Talking Tech pg 49-50). Artificial intelligence in the neural network system allows for other technological advances such as nanobombs to blow up, and destroy tumors inside the nervous system on the submicroscopic level without human surgery. People with neurological diseases such as Cerebral Palsy can be treated with advance technological advances in neuroprothetics, with promising results from animal testing.("Neurobionics What The"). "Neurobionics has a future in neuroprothetics and robotics." ("Neurobionics What the"). Neurons are specialized cells that carry out messages through an electrochemical process throughout different regions of the brain. ("Types of Neurons"). Neurochips has a promising future for people with learning disabilities and neurological disorders. Neurochips can manipulate external mechanical devices such as a prosthetic arms, legs, and even paralyzed muscles. ("Foundation For People"). Neurochips stimulates single neurons, or group of neurons in the biological neural network system. Many great steps has been made in sensory substitution in recent years. Especially in areas in vision due to the increase knowledge of the visual system and eye implants. ("Brain Implant"). Sensory substitution is the principle that transform characteristic of one sensory modality into a stimuli of another sensory modality. ("Sensory Substitution"). Implantation of electrodes deep inside the brain can "recalibrate" areas of normal function by constant weak electrical simulation to certain areas for sensory modality. ("Trudeau, Michelle") This has important advantages for people with Alzheimer's disease, because silicon chips implanted inside the brain can mimic the hippocampus. The hippocampus is an area known in the brain for storing and creating memory. This chip could potentially aid people suffering from memory loss form new memories, and store old memories for longer periods of time. ("Sandhand, Lakshi"). Neurochips might also substantially increase the intelligence of mentally disabled people. The thought that people have would this new found freedom, could open up a virtual pandoras box of chaos which will be explained later. Other possibilities for paralyzed patients are neurosensors that would be connected by electrodes and fiber optics cable into the motor cortex which would allow that person to manipulate their electronic environment around them. Such as operating a computer by thought alone, turning on and off light switches in their house, to manipulating their oven's heat temperature. ("Brain Implants ..2").

If history shares any economic relationships with the past one may argue that those who foresee these changes and can ride the technological wave may have much to invest in. Biologist have came a long way achieving great success in the Human Genome Project, which has sped up sequencing of DNA by many magnitudes .According to Kurzweil an analysis of the history of technological evolution is exponential contrary to intuitive linear view. “So we won’t experience 100 years of progress in the 21st century– it will be more like 20,000 years of progression.” (“Kurzweil”). The “returns” which involves microchip speed and cost-effectiveness also obeys this law, The Law of Accelerating Returns. Mathematically there should even be an exponential growth within the rate of exponential growth. Futurist predict that within a few decades machine intelligence or artificial intelligence will transcend human intelligence. Technological change would be so rapid, and significantly profound that it would forever change the fabric of human history. As discussed previously these changes include merges with biological and non-biological technology, and possibly ultra-intelligent software, and intelligence.

Mathematically exponential trends in the past were so flat that there appeared to be no trend. Lack of technological expectations have been fulfilled. Most long term forecast of technological feasibility in the future is underestimated in the power of evolutions. This is the paradigm based on intuitive linear view of technological progression rather than exponential historical view of technological progression. Kurzweil mathematically predicts that we will see 100 years worth of technological progression in 25 years. Rapidly accelerated technological progression and societal change due to the event of superhuman intelligence would change society in one night, more than society has changed in 1,000 years. This fast pace movement would be so advance, that whatever we predict to happen now in the pre-singularity age, will probably be surpassed in the post Singularity age due to smarter than human intelligence. The uncertainty in the direction of this technological progression is called Singularity.

"Within thirty years, we will have the technological means to create superhuman intelligence. Shortly after, the human era will end." ("Vinge, Vernor"). "The theory of transformation states that humans will incorporate AI into their own biology."("Artificial Intelligence Theory"). Neurochips implanted into the human mind, can increase intelligence far surpass any human on earth. With this intelligence, humans can create smarter than human intelligent supercomputers, and robots. In return these supercomputers, and robots can create smarter supercomputers and robots, and so on, and so forth, until humans become totally obsolete. This would steepen the have from the have nots. The upper class elite could increase their intelligence, and life years by artificial means, while the lower and middle class go without, which means they would become obsolete themselves causing societal problems. Genetically engineered posthumans or greater than humans would outclass, out smart, and out preform "normal" human intellect, and human ability. Another possibility in this singularity future is mind downloading, and uploading onto a supercomputer. Basically this allows a user to download their mind, and reconstruct it down to the single neuron onto an artificial hardware for a cloned brained of that user. Essentially creating many conscious minds, and possibly souls of the person.("Bostrom, Nick"). Doing so creates many bioethical, and societal problems. For example, Ray in the year 2055 downloads his mind onto a supercomputer creating an exact copy of his mind. Doing so creates two of the same Rays, both of them swearing they are the original Ray. Who would be the real Ray? What ethical laws does this create? Does this make the second Ray a real person, and a law abiding person, or entity? Should the second Ray [downloaded version] be treated the same as a human, is this Ray human? How will this effect the original Ray? Does the second Ray have a soul? What happens if someone else uploads this Ray into their body? Do they become the same Ray? Do they think the same way? Do they now have the same souls? ("Kadmon, Adam"). The questions that are brought up with Neurochips are its insidious usages. If a person with Alzheimer's disease is implanted with a chip that mimics the hippocampus then how will that person know that the memory they have is of their own? With the implanted Neurochip, could come implantation of false memories. Memories the person never had. This could be used for massive brain washing, political propaganda, assassinations, and cover ups. The person with this implanted chip, may not even own their own mind. These chips can alter emotions, and actions of the user against their own will for desired effects of an euphoric feeling. In a future scenario an unknown homeless person could be beaten up, have his memory erased, implanted with a neurochip, having fond memories of a family he never had. While in reality this person assassinated a prominent political leader with skill and knowledge that allowed him to do so inserted into his neurons; doing so he thought he was in a skiing trip in CO. with his unknown family, swearing he killed no one [a possibility].

Another possibility is that humans can be implanted with chips that has the internet, making our brains online. Allowing us to surf the web mentally, and commutate with other uses telepathically. Dangers of this would include the question would we even own our own brain at this time? Would we have to pay for our minds? What if our minds get a virus? Could someone hack into our brain, and steal our memories, knowledge, experience and IQ? What security measures would we have to pay the Federal Government to have firewalls, and anti-virus programs installed into our minds [technology joke]? If one chooses not to have this technological progression incorporated into their body would they be left behind? What kind of world would it be like if humans were genetically engineered into the very best posthumans society could produce? It would leave everyone else without these golden genetics behind. Foreign and domestic governments could use this technology to create a dystopian government system [humans are destructive remember]? A world government system that has eliminated war, crime, poverty, and depression by creating a homogenous high-tech society across the entire world and social system , based on the principles of a technological utopia that creates a society free of care.

The irony of this is, in order to achieve this utopia, many things will possibly be eliminated including "family, cultural diversity, art, literature, religion and philosophy." ("Brave New World"). This singularity and dystopian future could also put the inferior and elite in different caste systems. Creating inequality in our society, but achieving certain societal "goals". ("Brave New World"). The monster we create could be the monster that destroys us. "Humans are constrained to only a few types of change acceptable, although the rational parts of our mind often remind us that change can be good." ("Kadmon, Adam"). Even though this technology is a double edge sword, we have the choice to choose where it will lead our society, we can bring our society into singularity break down, or singularity posterity. The choice is ours.

"Ex machina Libertas" means technology will set you free. This means that rationally applied technology will improve human conditions. ("Slogans"). But on the other hand "Eritis sicut dii", means that you shall be as gods. Which is similar to Genesis 3:5 comparing the relationship between the snake, and Eve, with technology representing the neo-fruit of knowledge opening our eyes to both good and evil knowledge.("Slogans ..2"). Which makes it up to humans to decide if Transhumanist movements in Neurotechnology , and technology will lead our society into a horrific melt-down into a singularity.

Who are we? What do we want? What defines us? What is it that defines you? Besides the biological aspect, that makes us humans? Why is our species so special? What makes us special? Why do humans want to recreate themselves? What is so special about our culture, social aspect, and lives? Why do we want to create something better than ourselves? Why do we want to create something that would make our lives so easy that we would no longer have to do manual labor, and make all human ability obsolete? One must ask themselves would they like to live in a world that would be ruled by machines, and technology? If we are lucky nature will forgive us, and our higher species will put us into cages, and make us do tricks for treats.

Quantum Computing Gets Boost From 'Entanglement' Of Atom Pairs

Physicists at the Commerce Department's National Institute of Standards and Technology (NIST) have taken a significant step toward transforming entanglement--an atomic-scale phenomenon described by Albert Einstein as "spooky action at a distance"--into a practical tool. They demonstrated a method for refining entangled atom pairs (a process called purification) so they can be more useful in quantum computers and communications systems, emerging technologies that exploit the unusual rules of quantum physics for pioneering applications such as "unbreakable" data encryption.


The NIST work, reported in the Oct. 19, 2006, issue of Nature,* marks the first time atoms have been both entangled and subsequently purified; previously, this process had been carried out only with entangled photons (particles of light). The NIST demonstration also is the first time that scientists have been able to purify particles nondestructively. Direct measurement would destroy the delicate entangled state of atom pairs; the new experiment gets around this problem by entangling two pairs of atoms and measuring only one pair.

Entanglement is a curious property of quantum physics that links the condition and behavior of two or more particles, such as atoms or photons. Entanglement can occur spontaneously when two atoms interact. For the initial interaction, the atoms have to be in close proximity, but the entanglement may persist even if they are physically moved apart. The quality of the entanglement can be degraded by many environmental factors, such as fluctuating magnetic fields, so the process and the transport of entangled particles need to be tightly controlled in technological applications. The purification process implemented at NIST can clean up or remove any distortions or "noise" regardless of the source by processing two or more noisy entangled pairs to obtain one entangled pair of higher purity.

"We demonstrated entanglement purification with relatively high success rates in an ion trap system that could be scaled up to build quantum computers of a practical size," says Dietrich Leibfried, an author of the paper and designer of the experiment. "It's a more complicated procedure than anything we've demonstrated before, and it will be useful in many contexts once we improve our purification procedures."

The NIST team used ultraviolet lasers to entangle two pairs of beryllium ions (electrically charged atoms) in an electromagnetic trap. A similar process was used to cross-entangle the entangled pairs--that is, to entangle each member of the first pair with its counterpart in the second pair. Then the first pair of ions was measured, and the results were used as an indication of whether the second pair (unmeasured, and thus with its quantum state intact) was entangled with higher purity. Additional tests were performed to verify that the quality of the entanglement had indeed improved.

The reported purification rate is a record (although the entangled state is not yet pure enough for use in a working computer or other device) with more than one success for every three attempts, compared to one in a million in the photon experiments. Theoretically, the NIST process could be enhanced and then repeated as many times as necessary to create a stream of near-perfectly entangled pairs in a computer or network. The NIST team's continuing research aims to substantially improve the purification operations through, for example, improved control of magnetic fields and laser intensity.

The same NIST group previously has demonstrated at a rudimentary level all the basic building blocks for a quantum computer, including key processes such as error correction and, most recently, a mass-producible ion trap. Ions are among the most promising of a dozen or so candidates for quantum bits (qubits) to store, manipulate, and transport quantum information.

Quantum computers, if they can be built, could break today's best public-key encryption systems, used to protect commercial communications. Quantum communications systems, if well designed, provide a new approach to "unbreakable" encryption to keep messages secret. Quantum computers also potentially could be used to optimize complex systems such as airline schedules, accelerate database searching, and develop novel products such as fraud-proof digital signatures.

Entanglement could have many uses in large quantum computers and networks. For example, it is required for "teleportation" of information (http://www.nist.gov/public_affairs/releases/teleportation.htm), a process that could be used to rapidly transfer data between separate locations in quantum computer, or to detect and correct minor operational errors (http://www.nist.gov/public_affairs/releases/quantum_computers.htm). Entangled photons are used in various forms of quantum cryptography, and are the clear choice for long-distance communication.

Purification is crucial because particles can be entangled initially only when they are close together, and the link degrades as the particles are moved apart. The NIST process could be used, for example, to purify entangled ions before transfer of information to photons in large networks. Most long-distance quantum communication schemes require data transfer from storage qubits to transport qubits. "If someone comes up with an interface for efficiently transferring information from ions to photons, then ions could be used for purification and photons for transport," Leibfried says.

Funding for the research was provided in part by the Disruptive Technology Office, an agency of the U.S. intelligence community that funds unclassified research on information systems.

More information about NIST research on quantum computers and communications is available at http://www.nist.gov/public_affairs/quantum/quantum_info_index.html.

As a non-regulatory agency of the Commerce Department's Technology Administration, NIST promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards and technology in ways that enhance economic security and improve our quality of life.

New Computer Program Prevents Crashes And Hacker Attacks

Today's computers have more than 2,000 times as much memory as the machines of yesteryear, yet programmers are still writing code as if memory is in short supply. Not only does this make programs crash annoyingly, but it also can make users vulnerable to hacker attacks, says computer scientist Emery Berger from the University of Massachusetts Amherst.

With such problems in mind, Berger created a new program that prevents crashing and makes users safer, he says. Dubbed DieHard, there are versions for programs that run in Windows or Linux. DieHard is available free for non-commercial users at www.diehard-software.org.

Berger developed DieHard together with Microsoft researcher Ben Zorn. Berger has received a $30,000 grant from Microsoft, a $30,000 grant from Intel, and a $300,000 grant from the National Science Foundation for his work on DieHard.

Almost everything done on a computer uses some amount of memory--each graphic on an open Web page, for example--and when a program is running, it is constantly requesting small or medium chunks of memory space to hold each item, explains Berger. He likens the memory landscape to a row of houses, each with only enough square footage for a certain number of bytes. The problem, says Berger, is that sometimes when memory real estate is requested, programs can unwittingly rent out houses that are already occupied. They also might request a certain amount of square footage when they actually need more, so an item can spill over into another "house." These mistakes can make programs suddenly crash, or worse.

"Ironically, crashing is the best thing that can happen," says Berger. "An overflow also can make your computer exploitable by hackers."

One way that the computer becomes more vulnerable results from the fact that "addresses" that are designated for a password, for example, will be on the same lot on the same street in every version of the program. So if a hacker overwrites a password, he or she can easily locate the password address on any of the umpteen versions of the program that are out there.

DieHard presents several remedies to such problems. First, it takes a compact row of memory buildings and spreads them around in the landscape. It also randomly assigns addresses--a password that has a downtown address in one session may be in the suburbs next time around. And in some versions of the program, DieHard will secretly launch two additional versions of the program the user is running--if a program starts to crash, that buggy version gets shut down and one of the other two is selected to remain open. DieHard can also tell a user the likelihood that they'll have been affected by a particular bug.

These problems wouldn't arise if programmers were a little less focused on speed and efficiency, which is rarely a problem these days, and more attentive to security issues, says Berger.

"Today we have way more memory and more computer power than we need," he says. "We want to use that to make systems more reliable and safer, without compromising speed."

The First Molecular Keypad Lock

How can defense or intelligence agencies safeguard the security of top-secret data protected by a computation device the size of a single molecule?

With cryptography approaching that sobering new era, scientists in Israel are reporting development of what they term the first molecular system capable of processing password entries. Abraham Shanzer and colleagues describe their "molecular keypad lock" in the Jan. 17 issue of the weekly Journal of the American Chemical Society.

Electronic keypad locks long have been fixtures on home security systems and other devices that require a password. The new study, however, describes a keypad lock based on molecules that fluoresce only in response to the correct sequences of three input signals.

"By harnessing the principles of molecular Boolean logic, we have designed a molecular device that mimics the operation of an electronic keypad, a common security circuit used for numerous applications in which access to an object or data is to be restricted to a limited number of persons," the researchers state. "The development of a molecular-scale keypad lock is a particularly attractive goal as it represents a new approach to protecting information at the molecular scale."

The researchers cite DNA-microdot encryption as a complementary approach, which in combination with their molecular lock might provide an unbreakable protection against forgery.

The First Molecular Keypad Lock

How can defense or intelligence agencies safeguard the security of top-secret data protected by a computation device the size of a single molecule?

With cryptography approaching that sobering new era, scientists in Israel are reporting development of what they term the first molecular system capable of processing password entries. Abraham Shanzer and colleagues describe their "molecular keypad lock" in the Jan. 17 issue of the weekly Journal of the American Chemical Society.

Electronic keypad locks long have been fixtures on home security systems and other devices that require a password. The new study, however, describes a keypad lock based on molecules that fluoresce only in response to the correct sequences of three input signals.

"By harnessing the principles of molecular Boolean logic, we have designed a molecular device that mimics the operation of an electronic keypad, a common security circuit used for numerous applications in which access to an object or data is to be restricted to a limited number of persons," the researchers state. "The development of a molecular-scale keypad lock is a particularly attractive goal as it represents a new approach to protecting information at the molecular scale."

The researchers cite DNA-microdot encryption as a complementary approach, which in combination with their molecular lock might provide an unbreakable protection against forgery.

Security That Nets Malicious Web Sites

Have you ever wondered how fraudulent or malicious websites can rank highly on search engines like Google or Yahoo?


Queensland University of Technology IT researcher Professor Audun Josang said a website's ranking was determined by the number of people who visited the site - the more hits the higher the ranking.

But this system is fraught with danger and can be easily manipulated directing people to unreliable, low quality and fraudulent sites, according to Professor Josang.

"Just because a website ranks highly on a search engine doesn't mean it's a good website, in fact highly ranked websites can be malicious websites," he said.

To safeguard against this type of threat, Professor Josang believes the answer is to develop a new type of internet security system based on "reputation" where a community of users can rank the quality of a website.

He said this could then be used to warn others from visiting that site.

"For example most people are able to recognise a website that tries to trick them into giving confidential information (a phishing attack) when they see it," he said.

"With this system, aware users can rate such websites as malicious and as a result a phishing site will be quickly and universally recognised as dangerous, warning unsuspecting users against visiting that site."

Professor Josang said using this "social control" approach could provide protection against this type of online threat, by preventing attacks before they occurred.

"Social control methods, also known as soft security, adhere to common ethical norms by parties in a community.

"They make it possible to identify and sanction those participants who breach the norms and to recognise and reward members who adhere to them."

Professor Josang said in today's technologically advanced world of business, high ranking of a company's web page was a crucial factor for its success.

"This is why the control of search engines is so important and why it can be financially worthwhile for businesses to manipulate the system."

The central idea of Professor Josang's research is to take search engines one step further and by using them to make the internet a safe place to interact and transact.

"This project is about a new type of internet security that can be supported by search engines. There is a deception waiting for you around every corner on the internet and the technology we develop will protect people from that.

"I think in the future reputation systems, integrated into search engines, can be used to weed out such websites by giving them a low ranking and thereby making them invisible to unsuspecting users."

Saturday, July 7, 2007

XP Hack: Hacking Precautions

Although all of the hacks and tips mentioned here have been tested, if a step is accidentally
missed or a typo made, your computer could experience severe problems.To make sure
that your computer is protected, I highly recommend that you use the Windows XP system
restore feature.

SYSTEM RESTORE
Windows XP system restore is a great program that monitors all of the changes to your
computer. If you make a change to the system registry as one of the hacks in this book
requires you to do, you can always undo the change by reverting to an earlier system
restore point.

By default,Windows XP creates a restore point once per day. But if you are
making a lot of changes to your computer, it is a good idea to create a restore point before
every computer modification. The following two sections will show you how to use system
restore to create a restore point, and how to restore your computer to an earlier
checkpoint.

CREATING A SYSTEM RESTORE POINT

1. Click the Start button, expand All Programs, Accessories, and System Tools, and select
System Restore.
2. When System Restore loads, select Create a Restore Point and click Next.
3. Type in a short description for the checkpoint in the box and click Create.
4. Once the restore point is created, just hit Close.

RESTORING YOUR COMPUTER TO AN EARLIER RESTORE POINT

1. Click the Start button, expand All Programs, Accessories, and System Tools, and select
System Restore.
2. When System Restore loads, select Restore My Computer To An Earlier Time and click
Next.
3. Browse through the calendar and select the restore point that you want your computer to
revert to and click Next.
4. The Confirm Restore Point Selection screen will be displayed. Click Next to proceed.


Keep in mind that you may lose any files that were created when you revert to an earlier
restore point. Make backup copies of important documents and files on a floppy or network
drive of important documents just in case.
Once you click Next, your computer will reboot and revert to the earlier restore point.

Hacking XP- A Vivid Collection of About 200 Hacks

EVER THOUGHT THAT YOU COULD HACK YOUR OWN SYSTEM

No! Then your journey starts here...
This section will contain all the hacks for XP, so keep checking!


See Yaa
Amateur Hackers


*Perform all the hacks at your own risk.

Create Computer Games - Get Started on Creating Your Own Virtual Worlds

This summary is not available. Please click here to view the post.

How To Be A Success At Whatever You Do In Life - An Absolute Must Know For You!

Have you ever seen people who never fail? Yes all of us do fail at some parts of our life but I am referring to people who are almost masters at everything in life. Whatever they do they always succeed.

May it be in any field or stream they always manage to rise to the top. What is it that some people keep trying without any results and the other manage to get whatever they want with ease? Now what do you think do those successful people know what you do not?

There's a great secret which can give you almost anything and everything. It's an absolute must know you. Read on to find out what the great secret of the successful people is and how you can make it work for you.

Time and time again we have seen some of the most influential and powerful people on this planet. They all have one thing is common. They all know the secret. Think of it this way why is it that only 1% of the total population is earning 99% of the total money that is being earned
around the world?

You think it's just there luck? Well let me tell you something luck does not exist it's just a word of excuse for those who do not have any control over their life. This secret is so powerful that once you know it you can flip the world upside down.

Now it's time to reveal the greatest secret. This is the grand daddy of all. This is what has been hidden from mankind since ages. This secret would give you almost anything and everything you've ever desired. This has been used by some of the greatest thinkers and achievers since
ages. These secrets are so powerful that they can get you almost anything you desire, wherever you desire, whenever you desire them.

Think of it this way it's like your own personal grand genie but this time you do not have 3 but unlimited number of wishes. It can change your life overnight and after you discover this it will be an absolute life transforming event.

Wednesday, June 13, 2007

Wireless Access Point 20 Second Hack

Placement of your wireless access points is the first layer of security for your wireless network. If your wireless access points can be physically touched by a passerby you have major problems.


The easiest way to hack a wireless access point is walk up to it and press the reset button. This will make it default back to an open network and poof you have keys to the kingdom


When placing your wireless access point the only thing you should be able to see is maybe the antenna. You can purchase access point antennas that look like ceiling panels or fire alarms.


If a hacker is in your building probing your wireless network he is going to look for access points. If he can determine the make and model of your access point he can search the Internet for default passwords and vulnerabilities for that access point.


Finally when placing your wireless antennas outdoors try and make them blend into the building as much as possible. You should use a wireless directional antenna that is flat against a wall rather than a Yagi antenna which screams look at me.


Wireless access points can be hacked in 20 seconds or less if they are mounted in the wrong place. The most secure wireless network is the one nobody knows about.



RESOURCES


http://www.wirelessninja.com is the only website on the internet dedicated to simple and secure wireless networking. Learn the real secrets to securing your wireless network. http://www.wirelessninja.com has wirleess security tips that you won't find in any book or class. Is your wireless network simple and secure?


Playing Fun Games Online

If you are looking for an alternative to the classic games, the online games that you can find today everywhere on the Internet might be just what you are looking for. You can search the worldwide Internet for games of all sorts and find out exactly what games are more popular with players today.


You will find that the offer games is very diverse: there are car games, racing games, action games, strategy games, games that feature popular cartoon characters, Lord of the Ring games, Star War Games, mystery games, paintball games and the list could go on endlessly.


There are also games that you can download and play on your personal computer, games that you can play online against other players and even games where you can apply certain strategies, build an empire, a castle, buy credits online and so on. There are a few advantages of playing games online are that you can play them at any time of the day or night because the game never stops.


You will also be able to create a new world and have lots of fun. Some of these games that you find online are even for free, or they offer you a free trial, and if you like the game, you can purchase it, download it, and play it anytime. The online games are played by hundreds of people at a time, so you can face some virtual players while engaging in different tasks.


These online games are also accessible for everyone. The rules are thoroughly explained, so that anyone can try the game. There is even a demo of the game where one can figure out some tricks that may come in handy during the game.


And remember, if you want to become good at a game and go to the nest level, you have to train and play a lot. As a rule, these online games are designed in different levels, and the aim of the game is to get to the highest level possible.


In case you have never played an online game before give it a try! It’s sure to end up on your list of favorite things to do. You can find a complete list of fun games on the Internet if you search for games com. Be prepared to have lots of fun and develop new playing skills in a virtual new world.

How To Be A Success At Whatever You Do In Life !

Have you ever seen people who never fail? Yes all of us do fail at some parts of our life but I am referring to people who are almost masters at everything in life. Whatever they do they always succeed.


May it be in any field or stream they always manage to rise to the top. What is it that some people keep trying without any results and the other manage to get whatever they want with ease? Now what do you think do those successful people know what you do not?


There's a great secret which can give you almost anything and everything. It's an absolute must know you. Read on to find out what the great secret of the successful people is and how you can make it work for you.


Time and time again we have seen some of the most influential and powerful people on this planet. They all have one thing is common. They all know the secret. Think of it this way why is it that only 1% of the total population is earning 99% of the total money that is being earned

around the world?


You think it's just there luck? Well let me tell you something luck does not exist it's just a word of excuse for those who do not have any control over their life. This secret is so powerful that once you know it you can flip the world upside down.


Now it's time to reveal the greatest secret. This is the grand daddy of all. This is what has been hidden from mankind since ages. This secret would give you almost anything and everything you've ever desired. This has been used by some of the greatest thinkers and achievers since

ages. These secrets are so powerful that they can get you almost anything you desire, wherever you desire, whenever you desire them.


Think of it this way it's like your own personal grand genie but this time you do not have 3 but unlimited number of wishes. It can change your life overnight and after you discover this it will be an absolute life transforming event.

Develop Computer Games - Create Your Own Virtual Worlds

This summary is not available. Please click here to view the post.

Closing Open Holes

With the spread of Hackers and Hacking incidents, the time has come, when not only system administrators of servers of big companies, but also people who connect to the Internet by dialing up into their ISP, have to worry about securing their system. It really does not make much difference whether you have a static IP or a dynamic one, if your system is connected to the Internet, then there is every chance of it being attacked.


This manual is aimed at discussing methods of system security analysis and will shed light on as to how to secure your standalone (also a system connected to a LAN) system.


Open Ports: A Threat to Security?


In the Netstat Tutorial we had discussed how the netstat -a command showed the list of open ports on your system. Well, anyhow, before I move on, I would like to quickly recap the important part. So here goes, straight from the netstat tutorial:


Now, the ??a? option is used to display all open connections on the local machine. It also returns the remote system to which we are connected to, the port numbers of the remote system we are connected to (and the local machine) and also the type and state of connection we have with the remote system.


For Example,


C:\windows>netstat -a


Active Connections


Proto Local Address Foreign Address State

TCP aditya:1031 dwarf.box.sk:ftp ESTABLISHED

TCP aditya:1036 dwarf.box.sk:ftp-data TIME_WAIT

TCP aditya:1043 banners.egroups.com:80 FIN_WAIT_2

TCP aditya:1045 mail2.mtnl.net.in:pop3 TIME_WAIT

TCP aditya:1052 zztop.boxnetwork.net:80 ESTABLISHED

TCP aditya:1053 mail2.mtnl.net.in:pop3 TIME_WAIT

UDP aditya:1025 *:*

UDP aditya:nbdatagram *:*



Now, let us take a single line from the above output and see what it stands for:


Proto Local Address Foreign Address State

TCP aditya:1031 dwarf.box.sk:ftp ESTABLISHED


Now, the above can be arranged as below:


Protocol: TCP (This can be Transmission Control Protocol or TCP, User Datagram Protocol or UDP or sometimes even, IP or Internet Protocol.)


Local System Name: aditya (This is the name of the local system that you set during the Windows setup.)


Local Port opened and being used by this connection: 1031


Remote System: dwarf.box.sk (This is the non-numerical form of the system to which we are connected.)


Remote Port: ftp (This is the port number of the remote system dwarf.box.sk to which we are connected.)


State of Connection: ESTABLISHED



?Netstat? with the ??a? argument is normally used, to get a list of open ports on your own system i.e. on the local system. This can be particularly useful to check and see whether your system has a Trojan installed or not. Yes, most good Antiviral software are able to detect the presence of Trojans, but, we are hackers, and need to software to tell us, whether we are infected or not. Besides, it is more fun to do something manually than to simply click on the ?Scan? button and let some software do it.


The following is a list of Trojans and the port numbers which they use, if you Netstat yourself and find any of the following open, then you can be pretty sure, that you are infected.



Port 12345(TCP) Netbus

Port 31337(UDP) Back Orifice


For complete list, refer to the Tutorial on Trojans at: hackingtruths.box.sk/trojans.txt



AND WHAT?


Now, the above tutorial resulted in a number of people raising questions like: If the 'netstat -a' command shows open ports on my system, does this mean that anyone can connect to them? Or, How can I close these open ports? How do I know if an open port is a threat to my system's security of not? Well, the answer to all these question would be clear, once you read the below paragraph:


Now, the thing to understand here is that, Port numbers are divided into three ranges:


The Well Known Ports are those from 0 through 1023. This range or ports is bound to the services running on them. By this what I mean is that each port usually has a specific service running on it. You see there is an internationally accepted Port Numbers to Services rule, (refer RFC 1700 Here) which specifies as to on what port number a particular service runs.


For Example,

By Default or normally FTP runs on Port 21. So if you find that Port 21 is open on a particular system, then it usually means that that particular system uses the FTP Protocol to transfer files. However, please note that some smart system administrators delibrately i.e. to fool lamers run fake services on popular ports. For Example, a system might be running a fake FTP daemon on Port 21. Although you get the same interface like the FTP daemon banner, response numbers etc, however, it actually might be a software logging your prescence and sometimes even tracing you!!!


The Registered Ports are those from 1024 through 49151. This range of port numbers is not bound to any specific service. Actually, Networking utlites like your Browser, Email Client, FTP software opens a random port within this range and starts a communication with the remote server. A port number within this range is the reason why you are able to surf the net or check your email etc.


If you find that when you give the netstat -a command, then a number of ports within this range are open, then you should probably not worry. These ports are simply opened so that you can get your software applications to do what you want them to do.


These ports are opened temporarily by various applications to perform tasks. They act as a buffer transfering packets (data) received to the application and vis-a-versa. Once you close the application, then you find that these ports are closed automatically.


For Example,

when you type www.hotmail.com in your browser, then your browser randomly chooses a Registered Port and uses it as a buffer to communicate with the various remote servers involved.


The Dynamic and/or Private Ports are those from 49152 through 65535. This range is rarely used, and is mostly used by trojans, however some application do tend to use such high range port numbers. For Example,Sun starts their RPC ports at 32768.


So this basically brings us to what to do if you find that Netstat gives you a couple of open ports on your system:


1. Check the Trojan Port List and check if the open port matches with any of the popular ones. If it does then get a trojan Removal and remove the trojan.


2. If it doesn't or if the Trojan Remover says: No trojan found, then see if the open port lies in the registered Ports range. If yes, then you have nothing to worry, so forget about it.



HACKING TRUTH:


A common technique employed by a number of system administrators, is remapping ports. For example, normally the default port for HTTP is 80. However, the system administrator could also remap it to Port 8080. Now, if that is the case, then the homepage hosted at that server would be at:


http://domain.com:8080 instead of

http://domain.com:80


The idea behind Port Remapping is that instead of running a service on a well known port, where it can easily be exploited, it would be better to run it on a not so well known port, as the hacker, would find it more difficult to find that service. He would have to port scan high range of numbers to discover port remapping.


The ports used for remapping are usually pretty easy to remember. They are choosen keeping in mind the default port number at which the service being remapped should be running. For Example, POP by default runs on Port 110. However, if you were to remap it, you would choose any of the following: 1010, 11000, 1111 etc etc


Some sysadmins also like to choose Port numbers in the following manner: 1234,2345,3456,4567 and so on... Yet another reason as to why Port Remapping is done, is that on a Unix System to be able to listen to a port under 1024, you must have root previledges.



Firewalls


Use of Firewalls is no longer confined to servers or websites or commerical companies. Even if you simply dial up into your ISP or use PPP (Point to Point Protocol) to surf the net, you simply cannot do without a firewall. So what exactly is a firewall?


Well, in non-geek language, a firewall is basically a shield which protects your system from the untrusted non-reliable systems connected to the Internet. It is a software which listens to all ports on your system for any attempts to open a connection and when it detects such an attempt, then it reacts according to the predefined set of rules.


So basically, a firewall is something that protects the network(or systen) from the Internet. It is derived from the concept of firewalls used in vehicles which is a barrier made of fire resistant material protecting the vehicle in case of fire.


Now, for a better 'according to the bible' defination of a firewall: A firewall is best described as a software or hardware or both Hardware and Software packet filter that allows only selected packets to pass through from the Internet to your private internal network. A firewall is a system or a group of systems which guard a trusted network( The Internal Private Network from the untrusted network (The Internet.)


NOTE: This was a very brief desciption of what a firewall is, I would not be going into the details of their working in this manual.


Anyway,the term 'Firewalls', (which were generally used by companies for commerical purposes) has evolved into a new term called 'Personal Firewalls'. Now this term is basically used to refer to firewalls installed on a standalone system which may or may not be networked i.e. It usually connects to an ISP. Or in other words a personal firewall is a firewall used for personal use.


Now that you have a basic desciption as to what a firewall is, let us move on to why exactly you need to install a Firewall? Or, how can not installing a firewall pose a threat to the security of your system?


You see, when you are connected to the Internet, then you have millions of other untrusted systems connected to it as well. If somehow someone found out your IP address, then they could do probably anything to your system. They could exploit any vulnerability existing in your system, damage your data, and even use your system to hack into other computers.


Finding out someone'e IP Address is not very difficult. Anybody can find out your IP, through various Chat Services, Instant Messengers (ICQ, MSN, AOL etc), through a common ISP and numerous other ways. Infact finding out the IP Address of a specific person is not always the priority of some hackers.


What I mean to say by that is that there are a number of Scripts and utilities available which scan all IP addresses between a certain range for predefined common vulnerabilities. For Example, Systems with File Sharing Enabled or a system running an OS which is vulnerable to the Ping of Death attack etc etc As soon as a vulnerable system is found, then they use the IP to carry out the attacks.


The most common scanners look for systems with RAT's or Remote Administration Tools installed. They send a packet to common Trojan ports and display whether the victim's system has that Trojan installed or not. The 'Scan Range of IP Addresses' that these programs accept are quite wide and one can easily find a vulnerable system in the matter of minutes or even seconds.


Trojan Horses like Back Orifice provide remote access to your system and can set up a password sniffer. The combination of a back door and a sniffer is a dangerous one: The back door provides future remote access, while the sniffer may reveal important information about you like your other Passwords, Bank Details, Credit Card Numbers, Social Security Number etc.


If your home system is connected to a local LAN and the attacker manages to install a backdoor on it, then you probably have given the attacker the same access level to your internal network, as you have. This wouls also mean that you will have created a back door into your network that bypasses any firewall that may be guarding the front door.


You may argue with me that as you are using a dial up link to your ISP via PPP, the attacker would be able to access your machine only when you are online. Well, yes that is true, however, not completely true. Yes, it does make access to your system when you reconnect, difficult, as you have a dynamic Internet Protocol Address. But, although this provides a faint hope of protection, routine scanning of the range of IP's in which your IP lies, will more often than not reveal your current Dynamic IP and the back door will provide access to your system.



HACKING TRUTH:


Microsoft Says: War Dialer programs automatically scan for modems by trying every phone number within an exchange. If the modem can only be used for dial-out connections, a War Dialer won't discover it. However, PPP changes the equation, as it provides bidirectional transportmaking any connected system visible to scanners?and attackers.



PROTECTING YOURSELF


So how do I protect myself from such Scans and unsolicitated attacks? Well, this is where Personal Firewalls come in. They just like their name suggests, protect you from unsolicitated connection probes, scans, attacks.


They listen to all ports for any connection requests received (from both legitimate and fake hosts) and sent (by applications like Browser, Email Client etc.) As soon as such an instance is recorded, it pops up a warning asking you what to do or whether to allow the connection to initiate or not. This warning message also contains the IP which is trying to initiate the connection and also the Port Number to which it is trying to connect i.e. the Port to which the packet was sent. It also protects your system from Port Scans, DOS Attacks, Vulnerability attacks etc. So basically it acts as a shield or a buffer which does not allow your system to communicate with the untrusted systems directly.


Most Personal Firewalls have extensive logging facilities which allows you to track down the attackers. Some popular firewalls are:


  1. BlackICE Defender : An IDS for PC's. It's available at http://www.networkice.com.

  2. ZoneAlarm: The easiest to setup and manage firewall. Get it for free at: www.zonelabs.com


Once you have installed a firewall on your system, you will often get a number of Warnings which might seem to be as if someone is trying to break into your system, however, they are actually bogus messages, which are caused by either your OS itself or due to the process called Allocation of Dynamic IP's. For a details description of these two, read on.



Many people complain that as soon as they dial into their ISP, their firewall says that such and such IP is probing Port X. What causes them?


Well, this is quite common. The cause is that somebody hung up just before you dialed in and your ISP assigned you the same IP address. You are now seeing the remains of communication with the previous person. This is most common when the person to which the IP was assigned earlier was using ICQ or chat programs, was connected to a Game Server or simply turned off his modem before his communication with remote servers was complete.


You might even get a message like:

Such and Such IP is trying to initaite a Netbios Session on Port X. This again is extrememly common. The following is an explanation as to why it happens, which I picked up a couple of days ago: NetBIOS requests to UDP port 137 are the most common item you will see in your firewall reject logs.


This comes about from a feature in Microsoft's Windows: when a program resolves an IP address into a name, it may send a NetBIOS query to IP address. This is part of the background radiation of the Internet, and is nothing to be concerned about.


What Causes them?


On virtually all systems (UNIX, Macintosh, Windows), programs call the function 'gethostbyaddr()' with the desired address. This function will then do the appropriate lookup, and return the name.


This function is part of the sockets API. The key thing to remember about gethostbyaddr() is that it is virtual. It doesn't specify how it resolves an address into a name. In practice, it will use all available mechanisms. If we look at UNIX, Windows, and Macintosh systems, we see the following techniques:


DNS in-addr.arpa PTR queries sent to the DNS server

NetBIOS NodeStatus queries sent to the IP address lookups in the /etc/hosts file

AppleTalk over IP name query sent to the IP address

RPC query sent to the UNIX NIS server

NetBIOS lookup sent to the WINS server


Windows systems do the /etc/hosts, DNS, WINS, and NodeStatus techniques. In more excruciating detail, Microsoft has a generic system component called a naming service.


All the protocol stacks in the system (NetBIOS, TCP/IP, Novel IPX, AppleTalk, Banyan, etc.) register the kinds of name resolutions they can perform. Some RPC products will likewise register an NIS naming service. When a program requests to resolve an address, this address gets passed onto the generic naming service. Windows will try each registered name resolution subsystem sequentially until it gets an answer.


(Side note: User's sometimes complained that accessing Windows servers is slow. This is caused by installing unneeded protocol stacks that must timeout first before the real protocol stack is queried for the server name.).


The order in which it performs these resolution steps for IP addresses can be configured under the Windows registry key


HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\ServiceProvider.



Breaking Through Firewalls


Although Firewalls are meant to provide your complete protection from Port Scan probes etc there are several holes existing in popular firewalls, waiting to be exploited. In this issue, I will discuss a hole in ZoneAlarm Version 2.1.10 to 2.0.26, which allows the attacker to port scan the target system (Although normally it should stop such scans.)


If one uses port 67 as the source port of a TCP or UDP scan, ZoneAlarm will let the packet through and will not notify the user. This means, that one can TCP or UDP port scan a ZoneAlarm protected computer as if there were no firewall there IF one uses port 67 as the source port on the packets.


Exploit:

UDP Scan:

You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sU 192.168.128.88

(Notice the -g67 which specifies source port).


TCP Scan:

You can use NMap to port scan the host with the following command line:

nmap -g67 -P0 -p130-140 -sS 192.168.128.88

(Notice the -g67 which specifies source port).



FeedBack