Skip to main content

Posts

Showing posts from July, 2009

Strong passwords: How to create and use them (2)

Password strategies to avoid Some common methods used to create passwords are easy to guess by criminals. To avoid weak, easy-to-guess passwords: • Avoid sequences or repeated characters. "12345678," "222222," "abcdefg," or adjacent letters on your keyboard do not help make secure passwords. • Avoid using only look-alike substitutions of numbers or symbols. Criminals and other malicious users who know enough to try and crack your password will not be fooled by common look-alike replacements, such as to replace an 'i' with a '1' or an 'a' with '@' as in "M1cr0$0ft" or "P@ssw0rd". But these substitutions can be effective when combined with other measures, such as length, misspellings, or variations in case, to improve the strength of your password. • Avoid your login name. Any part of your name, birthday, social security number, or similar information for your loved ones constitutes a bad password choice. T

Strong passwords: How to create and use them

Your passwords are the keys you use to access personal information that you've stored on your computer and in your online accounts. If criminals or other malicious users steal this information, they can use your name to open new credit card accounts, apply for a mortgage, or pose as you in online transactions. In many cases you would not notice these attacks until it was too late. Fortunately, it is not hard to create strong passwords and keep them well protected. What makes a strong password To an attacker, a strong password should appear to be a random string of characters. The following criteria can help your passwords do so: Make it lengthy. Each character that you add to your password increases the protection that it provides many times over. Your passwords should be 8 or more characters in length; 14 characters or longer is ideal. Many systems also support use of the space bar in passwords, so you can create a phrase made of many words (a "pass phras

Cyber attacks came from Britain: Vietnamese research

Cyber attacks last week that crippled major US and South Korean websites originated from a master server in Britain, a major Vietnamese computer security centre said on Wednesday. South Korean and US government and private websites were last week hit by waves of “distributed denial of service” (DDos) attacks designed to swamp selected sites with traffic. Officials in Seoul said the attacks may have originated in North Korea and that 166,000 “zombie” computers in 74 countries were involved. And the Bach Khoa Internetwork Security (Bkis) in Vietnam said the master computer was in Britain. “Most important of all, we could locate the master server that controls all the hacking, located in the UK,” said Nguyen Minh Duc, senior security researcher for “Ours is the first report on the location of the master server.”The Bkis centre is part of is part of the Hanoi University of Technology and of a regional internet security group, the Asia-Pacific Computer Emergency Response Team. Duc told AFP

100 million dollars worth of stock from Facebook

A Russian Internet company is offering to buy 100 million dollars worth of stock from Facebook employees in a deal which values the fast-growing social network at 6.5 billion dollars. The Russian company, Digital Sky Technologies (DST), which invested 200 million dollars in Facebook in May, is offering 14.77 dollars per share of Facebook common stock. The tender offer will close “some time in August,” said Jennifer Gill, a DST spokeswoman. Facebook chief executive Mark Zuckerberg confirmed the DST offer. “While individuals must make their own decisions about participating in this program, I'm pleased that the price DST is offering is much greater than the price originally considered last fall,” Zuckerberg said in a statement. “This is recognition of Facebook's growth and progress towards making the world more open and connected,” he said. At the time it purchased a nearly two percent equity stake in Facebook, DST said it would be purchasing at least 100 million dollars of comm

Facebook claims 250 million users

Facebook founder Mark Zuckerberg on Wednesday said the number of people using the online social networking service had climbed to 250 million. “The rapid pace of our growth is humbling and exciting for us,” Zuckerberg said in a message posted at Facebook's official blog. “For us, growing to 250 million users isn't just an impressive number; it is a mark of how many personal connections all of you have made. ”Palo Alto, California-based Facebook was founded in 2004 and has become the most popular online social networking service, eclipsing News Corporation-owned MySpace. On Monday, it was revealed that a Russian Internet company is offering to buy 100 million dollars worth of stock from Facebook employees in a deal that would value the fast-growing social network at 6.5 billion dollars. The Russian company, Digital Sky Technologies (DST), which invested 200 million dollars in Facebook in May, is offering 14.77 dollars per share of Facebook common stock. The tender offer will cl

Computer crime specialist welcomes internet controls

The Guelph Police officer whose job it is to track down criminals on the internet welcomes the call for increased police powers.Det. Const. Bruce Hunter of the Guelph Police technological crimes section said anything that helps in the fight against internet crime, and in particular child pornography, is a plus.His comments came the day after the Conservative government introduced two bills aimed at giving police increased access to private internet communications. "It's been a long time coming. There's been discussion in the past on amending these laws," Hunter said yesterday."It's been on the horizon for awhile."He said it's important for the laws to keep up with the technology that criminals are using on the internet."As technology marches on, it's becoming more and more advanced. The ability to hide in cyberspace or on your own computers is out there," Hunter said. "It's becoming increasingly difficult for us to conduct thor

Brief Notes On Michael Jackson

The Bio History of Michael Joseph Jackson began when he was born on the 29th of August 1958 in Gary, Indiana. He was the 7th of nine children. (brothers: Sigmund "Jackie", Toriano "Tito", Jermaine, Marlon, Steven "Randy", and sisters Rebbie, Janet and La-Toya JacksonMichael began his musical career at the age of 5 as the lead singer of the Jackson 5 who formed in 1964. In these early years the Jackson 5, Jackie, Jermaine,Tito,Marlon and lead singer Michael played local clubs and bars in Gary Indiana and moving further afield as there talents grew and they could compete in bigger competitions. From these early days Michael would be at the same clubs as big talented stars of there days, such as Jackie Wilson and would be learning from them even back then. In 1968 the Bobby Taylor and The Vancouvers discovered the Jackson five and from there they got an audition for Berry Gordy of Motown Records. The Jackson 5 signed for Motown and moved to Ca

How to hack a gmail account?

At Defcon, hackers demonstrated a tool to hack into GMail accounts by using snooping unencrypted data (man-in-the-middle attack) with cookies which GMail uses for everything other than login by default. Now Google has introduced the ability to optionally encrypt any transmission to / from GMail and not just the login sequence. Previously login sequence was encrypted only. All other data was transmitted unencrypted making it vulnerable to hackers. That means every email, every article that you are reading on your GMail account is transmitted unencrypted over the web. This makes it possible for an attacker sniffing traffic on the network to insert an image served from http://mail.google.com and force your browser to send the cookie file, thus getting your session ID. Once the hackers gets the session ID, hacker can log in to the account without the need of a password. People checking their e-mail from public wireless hotspots are more vunerable than the ones using secure wired networks