Webstats4U - Free web site statistics Personal homepage website counter
Free counter News You Can Use From Technology World

Saturday, July 21, 2007

Top 10 Photo Enhancement Tools

Here are some tools,which will help you to get the desired result
from your clicked photographs and apply various effects to them :
1.IrfanView - Free
2.Corel Paint Shop Pro XI - $ 89.99
3.Ulead PhotoImpact - $89.99
4.Adobe Photoshop CS 3 - $ 649
5.Lview Pro - $39.95
6.PhotoLine32 - $78
7.ACDSee Photo Editor - $49.99
8.Magic Photo editor - $29.95
9.snaglt 8.2 - $ 39.95
10.FaceonBody - $24.95

Top 10 PSP titles worth your money

Top 10 PSP titles worth your money
The PSP gets a bad rap for various reasons.It's more expensivethan the moderately priced DS,so it can hardly be considered impulsebuy.But more importantly the early-on trend was to either simply createor port console-like experiences on the portable,which has led to littleoriginality and lacklustre sales.
But now developers are beginning to break that trend,creating experiencesthat are actually suited for handheld gaming.
Here is our list of the 10 best PSP titles that you must have if you own the sleek looking handheld.Here is the list :
Developers - Ready at Dawn
Genre - Action Platformer
2.Syphon Filter : Dark Mirror
Developers - Sony
Genre - Stealth based Action
3.Burnout Legends
Developers - Criterion
Genre - Driving
4.Ratchet and Clank :Size Matters
Developers - High Impact Games
Genre - Action Platformer
5.Tekken Dark Resurrection
Developers - Namco
Genre - Fighting
6.Metal Gear Solid : Portable Ops
Developers - Kojima Productions
Genre - Stealth Based Action
7.Wipeout Pure
Developers - Sony
Genre - Sports
8.GTA White City Stories
Developers - Rock Star Leeds
Genre - Action
Developers - SCEJ
Genre - Action Platformer
Developers - Bandai
Genre - Action Puzzler

Sunday, January 14, 2007

Scam Email Blackmails With Death Threat

SophosLabs, Sophos's global network of virus, spyware and spam analysis centers, have warned of a spammed-out email that pretends to come from a professional hitman, hired to kill the recipient, but are really interested in stealing money.
The emails claim that the recipient has been stalked by a hired assassin for 10 days, but that the hitman is prepared to drop the contract if he is paid a total of $80,000. Upon receiving an initial advance payment of $20,000 the hitman claims that he will produce taped evidence of the contract to kill the reader of the email.

Part of the email, which start with a cheery greeting of "Good day" and can have a subject line of "Read this to be safe and a new life in this new year", reads:

"This is surely one of the sickest phishes yet seen — the intention of this email is quite clearly to frighten the recipient into coughing up a substantial amount of money or, at the very least, their bank account details," said Graham Cluley, senior technology consultant for Sophos. "Innocent, vulnerable people could be scared into believing that the contents of the email are truthful, while the not-so-innocent are arguably even more likely to be hoodwinked. It may be hugely unnerving to receive such threats, but the only way to stop the distribution of these messages is for users to stop responding."


Labels: , ,

Friday, December 29, 2006

Hackers break into online broker accounts in USA

High-tech crooks using spyware are costing U.S. discount brokerages millions of dollars to repay clients who have been victimized by fraud
The U.S. Securities and Exchange Commission warned earlier this month that scammers were hijacking online brokerage accounts using spyware and operating from remote locations.
TD Ameritrade Holding Corp. on Tuesday became the latest brokerage to confirm the problem. It said it cost $4 million in the third quarter to make whole customers whose accounts had been hacked.
Harder hit was rival E*Trade Financial Corp., which said its fraud losses ballooned by $18 million in the third quarter from swindlers who stole clients' identities and manipulated their accounts.
Both brokerages guarantee to repay clients who lose money through such frauds. A spokesman for a third discount brokerage, Charles Schwab Corp., said the company hasn't seen "anything unusual enough to merit a disclosure."
"During the quarter E*Trade, like a number of our competitors, experienced a significant increase in losses resulting from fraud relating to identity theft," said Jarrett Lilien, president and chief operating officer, on last week's conference call.
TD Ameritrade Chief Executive Joseph Moglia told Reuters that all those who stole clients' identities did so by using public computers rather than hacking into the Omaha, Nebraska-based company's internal systems.
He called the $4 million hit "not material at all." "This gets a lot of attention but it's not affecting the share price," he said.
TD Ameritrade shares fell 79 cents, or 4.8 percent, to close at $15.84, making them the top decliner on the Amex Securities Broker Dealer index. Moglia blamed the share price fall on a cut on its projections for 2007 earnings. Both firms said they were strengthening their defenses.
"We've seen that level of fraud in the last three weeks or so reduced to almost zero as a result of the changes we're making," E*Trade CEO Mitchell Caplan said in last week's conference call.
But Gwenn Bezard, an analyst with Boston-based consultant Aite Group, said E*Trade had previously made big efforts to bolster security and the $18 million increase was a sign of hackers' resiliency in flouting fraud prevention efforts.
"It's a reminder that though you may have stronger authentication it may not protect you from other types of scams," he said.
Both E*Trade and TD Ameritrade said they are working with investigators at the SEC, U.S. Federal Bureau of Investigation and other agencies to crack down on the scammers.
About 25 percent of U.S. retail stock trades are made by online investors through roughly 10 million online accounts, according to brokerages regulator NASD.
In many of the schemes outlined recently by SEC officials, crooks will load a victim's computer or a public PC with a spy program to monitor a user's activities and capture vital information, such as account numbers and passwords. The program then e-mails the stolen information back to the thief, who can use it to open victim accounts.
Once inside, the thief may sell off an account's portfolio and take the proceeds. Or electronically hijacked accounts may be used for "pump-and-dump" schemes to manipulate stock prices for profit, SEC officials have said.

By- Jonathan Keehner and Kevin Drawbaugh (Reuters)

Sunday, December 3, 2006

Collaborate for Security

Closely working with Telecom Service Providers will help security agencies contain terrorists misuse of networks.

As responsible citizens of the world, we are all equal stakeholders in the society. It is our duty, therefore, to do our bit towards building a healthier and fearless society.
Terrorism and organized crime are the nemesis of today’s world. Terrorists exchange information to organize, plan, coordinate and execute their activities. Security agencies need to tap this information to take pre-emptive action and prevent terrorists from causing damage and loss to property and lives of the innocent people.
Lawful interception plays a crucial role in helping law enforcement agencies to combat against criminal activity by monitoring and intercepting communication between terrorist groups. While this has become a top priority globally after the incident of September 11, certain countries like Israel, India, and the US, that are prime targets of the militants, need to take more steps and be even more alert.
Although there are different standards for lawful interception, like CALEA (in the US) and ETSI (in Europe), security agencies in every country have different expectations and telecommunication service providers in each country have to build systems to meet the country’s legislations. However, there are certain genuine issues that service providers face while helping the security agencies in their mission to track terrorist activities.
A lot of information exchange happens through e-mails, Net telephony and VoIP over dedicated leased lines that bypass PSTN switches
The first and foremost issue is of lack of clarity in the exact requirements of lawful interception. This, coupled with unavailability of right solutions, has already delayed service rollouts of several NLD/ILD service providers. Unless and until the requirements are frozen, the right solution cannot even be thought of, let alone being developed.
The whole thing was much simpler earlier before Internet became prevalent, when only voice calls were intercepted. This process was as follows:
Security agencies provided the telecom service provider details of the phone number or group of numbers that had to be intercepted
The service provider programmed the switch to monitor those number(s)
Whenever a call was made from or to that number, the service provider would connect to the security agencies who could hear it live or/and record it as well
In the modern Internet world, this becomes very complex, where lot of information exchange happens through e-mails , Internet telephony and VoIP over dedicated leased lines that directly connect to the Internet cloud, bypassing the PSTN switches.
In India, the current scenario of lawful interception is quite fluid due to the following reasons:
Security requirements and solutions for TDM voice services are reasonably in place. However, for newer services like VoIP over IPLCs, there are no standard specifications defined for lawful interception
Liberation of telecom market in India is seeing large number of new private SPs entering the scenario. Security agencies that earlier dealt with only BSNL/VSNL are now trying to play it safe and make the security specifications as exhaustive as possible
Security agencies are still finalizing their expectations from SPs
In developed countries, where similar solutions have been deployed, usually the onus is on the security agencies to define the specifications and requirements for lawful interception. In fact, there the security agencies are the owners of the required monitoring systems and equipment and the respective governments provide subsidies for this project, as it is a matter of the nation’s security. The service provider is responsible only for providing access to the network traffic by tapping information at the entry/exit point of the network. This approach is followed in other countries based on two perspectives.

Confidentiality: Process and capability of monitoring remains fully confidential with security agencies.

Customized Solutions: The monitoring equipment are not available off the shelf. They are highly customized solutions, which require extra development efforts to meet the requirements and hence are very expensive.
Additional costs prevent SPs from lowering the tariffs and pass on the cost benefit to end consumers. Perhaps a phase-wise approach can give service providers sufficient time for implementation. But the key to successful implementation lies in a collective approach—involving service providers and security agencies.
By - Jagbir Singh


Thursday, November 23, 2006

How to secure your network

Check this article to know how a network analyzer continuously monitors traffic on network and provides detailed information about critical problems, virus attacks and even generates traffic to stress test your network.

Observer is a 64-bit application that can run on wired as well as wireless networks. However, it can be used on 32-bit machines also. It can analyze, monitor and troubleshoot your network on the fly. It provides an instant view of captured packets and can also present them in a readable format. The software can provide information about things like bandwidth utilization, load on your wireless access points and VLANs, analysis of Internet traffic, routers, etc, all in real time. It has some very effective filters for specific packet types that can help you analyze specific problems on your network quickly and easily. It can also send off e-mails and pagers to the network administrator when it finds any anomalies or attacks on your network.

It has a neat feature called Traffic Generation, which can generate heavy traffic on your network and help you stress test it. This feature is useful if you're planning to deploy a new application, and would like to know how much juice your network can really take. It provides network trending and detailed reporting to help you keep an eye on overall health of your network. When run for the first time, Observer asks you to choose the network interfaces on which you want to use with it.

Step 1:
Create filtersTo create a filter for capturing packets, click on Actions on the Menu Bar and choose 'Filter Setup for Selected Probe.' A window will pop-up where you will see various groups like Hack Filters, Virus Filters, Wireless Filters, etc. There will also be some pre-defined filters under each category. You can use any of these filters as is or customize them.

You can also create a new filter. For this, click on New Filter button, provide a name for the new filter and click on OK. A new window will open, where you can create your own filters based on addresses, ports, protocols, errors etc. Once the filter has been created you can start capturing packets. Click on the Capture button on the Menu bar and then on Packet Capture. Now the Packet Capture window will appear on your screen. Here click on Start. Once it has started capturing packets, you can see details about them in real time.

Step 2:
Analyze VLANs on your networkTo see VLAN statistics, click on Statistics tab in the Menu bar and choose VLAN Statistics. A new window will pop-up. Here click on Start and it will start showing you the number of VLANs you have and their statistics.

In case you don't have any VLANs created on your network, the window will display 'No VLAN' under the VLAN column but will still continue to provide statistics on your network. The VLAN Statistics window will show you details about broadcasts, multicasts, packets in the network and network utilization (in percentage).

Step 3:
Expert analysisNow let's see how you can analyze data using Observer. From the Packet Capture window, select the View icon and then click on Expert Analysis tab at the bottom of the Decode display. Here the window will show you the network utilization graph and just below it, the Network Condition summary, which shows you the problems detected on the network and their count. Similarly, you can see Protocols, Top Talkers, Application Analysis, etc by selecting them from the bottom window.

To see the Network Trends from the Menu bar click on Trending/Analysis and then on the Start Network Trending Viewer. In Viewer window click on the date whose network trends you want to see. You can view trends in three ways: Internet Patrol, IP to IP Pairs Matrix and TCP/UDPApplication Tree.

Step 4:
View network traffic reportsObserver lets you create and view reports about activities on your network on a Web browser. For analyzing the different activities, select Trending/Analysis tab from the Menu bar and click on Start Web Browser Report. An Explorer window will open with the Trending Report Library. Here you'll find detailed reports pertaining to different tasks such as the network summary, Internet usage, Application Analysis, VLAN, etc. These provide a good insight of the state of your network.

source- pcquest

Labels: , ,

Free Search Engine Submission
Free Search Engine Submission
Blog Listings SkinStore Special Offers