Men are more likely than women to be deceived and fell into schemes of data theft when using social networks like Facebook and Twitter, concludes a study on online safety carried out by BitDefender.
The reason is related to greater willingness on the part of males to take risks during the use of such platforms, explains the solution provider against computer threats.
"Men are more likely than women to accept friend requests from strangers, sharing your location, ignoring privacy settings, leave your accounts for all to see and avoid reading the privacy policies on social networks," revealed the analysis based on surveys of more than 1,500 people.
According to the study, while 64.2% of women always reject friend requests from strangers, only 55.4% of men do. About 24.5% of men allow their profiles on social networks to be accessed by anyone, when the same thing only was the rule among 16% of respondents were female.
Regarding the sharing of data on the geographical location of users, gender differences are less marked, with 25.6% of men admit to sharing this information and 21.8% of women do the same.
According to experts, the greatest lack of care recorded among men may increase the risk of users becoming victims of attacks from spammers, data theft and other fraud. It also grows the likelihood of being sent to sites infected with malicious software, they add. Still, all said they had an antivirus installed on your computer, notes the company.
The 1649 surveys conducted in the United States of America and the UK, also revealed that American men are more at risk than the English and that the general tendency is to become more cautious with age.
Men are more at risk than Women on Facebook
Top 10 Reasons To Root Your Android Phone
People say there are always two classes of technology users; those who take and use technology the way it is brought to them, no questions or complaints, while others who want to indulge deep into the very essence of what’s being offered, and want to empower themselves with everything to take the maximum out of that technology. This rule of thumb holds true for mobile phones as well. The power user crowd has always been different from the average.
If you want to skip the details and get straight to the rooting process, feel free to head over to our guide on how to root your Android phone or tablet device.
Back from the old Windows Mobile ROM cooking days, people have been questioning limitations of every device and finding workarounds. When iPhone was launched back in 2007, the power user (a.k.a hackers and geeks) side of the users quickly realized the true potential the device held, and the cruel software limitations that Apple had sealed it with. What became ‘Jailbreaking’ on iPhone was quickly translated to other platforms as well, and when the world saw the first Android back in 2008, the same concept got adapted there too.
Android, despite being open source, still did not give a user complete control over the device. This laid basis for many potential abilities remaining dormant, and subsequently Android devices began to get ‘rooted’. Now this begets the question, why root? With so many Android-based handsets out there now, this question has become even more important.
Rooting essentially means gaining root-level access to your device. Those who have used Linux OS will easily understand, but for users like me who have been loyal to Microsoft’s operating system all their lives, this means that by rooting your device you get complete control over what should remain in the device and what not. Rooting means you are the master and in control, not to mention the fun of it.
Hence, here’s a list of my top 10 reasons (in no particular order) that I consider worthy of rooting your device for.
Performance Update
There are just too many flavors of Android in the market, with every OEM or carrier adding their own personalization and customization to devices. While they may appeal to some, they do not let the device take full advantage of what the hardware is capable of. With root access, you can actually tweak the OS to behave entirely differently, and with infamous developers like Cyanogen working on custom ROMs and mods, people have actually reported performance boosts. Take the G1 for example. The device never got 2.1 officially, but thanks to Cyanogonmod G1 owners can not only the tastiness of Eclair but also report much better performance than the stock ROMs.
Hardware/Software Interaction
Most Android devices come with hardware that is fairly heavily capable, yet the OS limits them and becomes the bottleneck. By rooting, you actually remove the bottleneck and hence can take full advantage of your beloved Android. For example, overclocking a device’s CPU is fairly simple and rather safe thanks to many third-party apps, yet the OS does not allow it natively, and hence overclocking can only be done with a rooted phone. Or suppose you want to use your mobile’s LED as flashlight (HTC Desire, anyone?) but cannot because HTC won’t allow it? Rooting will allow you to bypass this limitation!
APPS2Sd
One of the most talked-about feature (or disadvantage) of any Android device is the limitation where you can install applications only in the phone’s internal memory and not the SD card. While Google may reason that SD cards are slower in general and cannot run apps as effectively as internal memory, fact of the matter is that most Android devices do not come with massive internal storage spaces, and hence greatly limit the number of applications that can be installed at a time. With rooted devices, you can use Apps2SD, which will copy ALL your applications to a ext2/3/4 formatted SD card an will also store future builds in card. Freedom to choose!
Unavailable Features
When Google brought forth the Nexus One, one of the aesthetically pleasing features was Live Wallpapers. Unfortunately, most of the Android phones vary so greatly, that despite the hardware being compatible with Live Wallpapers, the software won’t allow them to run. My Samsung Galaxy Spica is a perfect example. The handset’s hardware can easily handle Live Wallpapers, yet Samsung chose to exclude it. Thanks to rooting, you can have them on your device as long as hardware allows.
EXTRA APPLICATIONS
Folks at XDA-Developers have created a wonderful application, SetCPU, which allows easy overclocking of various Android CPUs. However, due to the permissions required for such level of operation, a superuser access is necessary, and that can come only from a root access. This is just one example. The internet is flooded with many such applications that remain useless unless you have rooted your phone.
Multitouch
If you have ever typed on an iPhone, you would always remember the smooth, fast typing action that you achieve on that amazing keyboard. Or if you can recall that pinch-zoom actions. These are the products of a multitouch screen.
While most Androids can deal with multitouch, various manufacturers have decided to omit it in their devices. This is not always because the hardware is incapable, but because the software does not let it happen. This becomes even more irritating when you see that HTC Hero had multitouch input support back from the Android 1.6 days, but more modern more powerful 2.1 devices never got it (again, my Spica).
Thanks to rooting, it has become possible to get multitouch input in various devices, most notably the G1.
WIFI AND Bluetooth Tethering
After having rooted your device, you can also use WiFi or Bluetooth tether to share your cellular data connection with your laptop or PC. The application works with ad hoc connections and will get you up and running online on your laptop in no time. Similarly, tethering can also be achieved over a Bluetooth connection. You may check out the app in question here, but remember, rooted-phones only!
Better Keyboard
I have expressed before and I will say again; I do not dislike the Android keyboard. However, it just isn’t enough. HTC, with their SenseUI, brought to their devices the revered HTC IME keyboard which had predictive text input, and made typing a breeze. Since it was an HTC only keyboard, people with phones from other manufacturers were left blindfolded. Again, the root-developer community ported the keyboard for all platforms, making possible for all rooted phones to take advantage of the better input method.
APPS From Other Builds
Almost every build of Android OS differs from others when it comes to default apps. G1 hasn’t got the same stuff as myTouch 3G; Nexus One differs from HTC Desire. What’s more, these applications from one build cannot be ported to another. Hence you are stuck in more than one ways. However, with custom ROMs, the developers usually gather the best of the lot in one complete package, that would leave a user satisfied, not craving. And to get these custom ROMs running on your phone, you need root.
Because You Can!
I am serious, I consider this a reason. You have a powerful, capable device that you have paid for. You should have the right to modify or change it in any way you like. The device is your property, and you would naturally want to see it working at its maximum potential. Hence the point of rooting.
With the latest Froyo announcement at Google’s 2010 I/O conference, most of these reasons may become useless. But Froyo will not be pushed for all devices, at least not immediately. While it will aim to reduce the fragmentation in Android division, until it happens, a rooted device is the only option you have.
Last, please do remember that rooting voids your warranty. Although you can always go back to a stock version of the OS, it is risky business, hence proceed with caution.
Start rooting
Now that you have learned all about what rooting is and why you should root your phone, head over to our guide on how to root your Android phone or tablet device and start rooting!
Android App Turns Smartphones Into Mobile Hacking Machines
Dangerous hacks come in small packages.
Or they will, perhaps, when an app called Anti, or Android Network Toolkit, hits the Android market next week. The program, which Israeli security firm Zimperium revealed at the Defcon hacker conference in Las Vegas Friday and plans to make available to Android users in coming days, is designed for penetration testing–in theory, searching out and demonstrating vulnerabilities in computer systems so that they can be patched. Anti aims to bring all the hacking tools available to penetration testers on PCs to smartphones, with an automated interface intended to make sniffing local networks and owning remote servers as simple as pushing a few buttons.
“We wanted to create a penetration testing tool for the masses, says Itzhak “Zuk” Avraham, founder of Tel-Aviv-based Zimperium. “It’s about being able to do what advanced hackers do with a really good implementation. In your pocket.”
Anti, a free app with a $10 corporate upgrade, will offer a wi-fi-scanning tool for finding open networks and showing all potential target devices on those networks, as well as traceroute software that can reveal the IP addresses of faraway servers. When a target is identified, the app offers up a simple menu with commands like “Man-In-The-Middle” to eavesdrop on local devices, or even “Attack”; The app is designed to run exploits collected in platforms like Metasploit or ExploitDB, using vulnerabilities in out-of-date software to compromise targets.
For now, the demonstration app Avraham showed me was equipped with only a few exploits: One aimed at a bug in Windows–the same flaw exploited by the Conficker worm in 2009–another targeting default SSH passwords in jailbroken iPhones, and a third exploiting a vulnerable, older version of Android. Zimperium has also built a Windows trojan that allows Anti to perform automated commands on hijacked machines like taking a screenshot, ejecting a CD, or opening the calculator, a common penetration-testing demonstration.
Even in its current form, the app raises the possibility of dangerous, stealthy attacks. A hacker could, for instance, walk into a coffee shop or a corporate office with his phone and start sussing out machines for data theft or malware infection. But Avraham says Zimperium will ask users in its terms of service to limit their hacking to “white hat” penetration testing.
“Hacking is not for the chosen few,” reads one description in the app’s documentation, formatted in Star Wars-style scrolling text. “Anti is your perfect mobile companion, doing it all for you. Please remember, with great power comes great responsibility. Use it wisely.”
Penetration testers who saw the app at Defcon were impressed. “It’s just sick,” says Don Bailey, a researcher with security firm iSec Partners. “The way it populates the screen with vulnerable targets…it’s really elegant.”
Another professional penetration tester for a defense contractor firm who asked that his name not be used called the app a “quick and dirty Swiss army knife for mobile pen testing.” “It’s so polished it’s almost like playing a video game,” he says, comparing it to penetration testing suites that cost thousands of dollars.
With its sheer simplicity, Anti’s impact could be comparable to that of Firesheep, a proof-of-concept tool released in October of last year that allowed anyone to easily snoop on devices on unsecured wi-fi networks that connected to unencrypted web pages. That tool was downloaded more than 1.7 million times, and no doubt used in some instances to spy on web users unawares. But it also helped inspire both Twitter and Facebook to encrypt traffic to their site and prevent such eavesdropping.
“People might use it in dangerous ways,” Avraham says with a shrug. “I really hope not. But I know this might be the risk to help people increase their security, and that’s our goal.”
Website : http://www.zimperium.com/Android_Network_Toolkit.html#anti-apk
Download : http://box2me.dyndns.org/Android/Applications/Anti1.0.apk
Download to mobile :
Startup Windows 8 in 8 seconds
Microsoft recently published as a blog dedicated to the development of Windows 8, a new video to show the startup speed of it.
Since the power button is pressed, the system boots up in just 8 seconds. In fact, most of the time is consumed during the start of the BIOS, the system is being born in just under 5 seconds
Microsoft intends to use, this new version, several techniques which use, in its full potential, the multiple cores of the CPU's current techniques and hibernate the system.
The company also notes that these improvements will be felt by both users with conventional hard drives, as the users of SSD.
You can view the video released by the company below:
Crackers – Wikipedia
Crackers software : Term used to designate programmers and decoders that make reverse engineering of a particular program, or alter the contents of a particular program to run correctly, many hackers alter the expiry dates of a particular program to make it work more than 30 days, or modify the trial mode to use as if it were a legitimate copy, or make an inner shift in the registration routine of the program so that it passes to accept any devices, such sofwares changed are known aswarez .
- Developers viruses , worms , trojans and other malware : software developers that create small to cause damage to the user.
Crackers are not considered people as distributors of warez and crackz , webmasters who provide on its pages, software without authorization from copyright owners or people who copy software pirates. The cracabiker is essentially a qualified professional in reengineering or reverse engineering of software or hardware. A hacker takes advantage of caractísticas systems in order to modify them. The hackers are self-taught (and hackers) and without any knowledge of the system revert hacks necessary to understand the systems back and forth a few times. Your changes are also made because they are hacks upon hacks in general.
Crackers are confused with:
Digital graffiti: they act primarily for the purpose of being recognized. Want to become famous in the universe for both cyberpunk and alter web pages, a behavior very similar to the graffiti wall, leaving always signed his pseudonyms. Some leave messages of political content which should not be confused with cyber-terrorism.
Revanchist: employee or former employee of a company that for whatever reason decides to sabotage it clear goal of revenge. Usually worked in the computer industry company which greatly facilitates their work since they are well informed of system vulnerabilities.
Vandals: they act for the sake of causing harm to the victim. This damage may consist of simple server crash (leaving the machine briefly disconnected from the Internet) or even the total destruction of stored data.
Spies: they act to acquire sensitive information stored on the victim's computer. The data may have commercial content (a chemical formula a) or political (e-mails between consulates) or military (military programs).
Cyber-terrorists: terrorists are digital. Their motivations are often policies and their weapons are many, from the theft of confidential information to the local phone system crash or other actions of its kind.
Thieves: they have clear financial goals and usually attack banks in order to divert money to their accounts.
Robbers, also with financial goals, in general, seek to acquire credit card numbers stored in large commercial sites. Generally use a technique called "Phishing Scam", by sending an e-mail program that is run by a user, having access to your information.
Cracking
The act of breaking the security of a system often requires brilliance and ability to perform to explore ( exploiter ) known vulnerabilities of the target system with creativity.However some, 'mistakenly' defined as crackers, make use of known solutions to recurring problems in vulnerable systems, thereby copying or exploiting flaws discovered by others without any effort.
Apple hires creator Jailbreakme.com
It is very normal for companies to hire information technology communities who can break the barriers of safety of their products. Apple is no exception andjust do it by hiring Nicholas Allegra, also known as @ comex, one of the most active members in the community who is responsible for breaking down barriers and allow iOS Jailbreak to use the equipment.
Nicholas Allegra is one of the most active and known to a large communitydedicated to circumvent the security mechanisms of the IOS. It was he who created the site known Jailbreakme.com, which allows to exploit a flaw in iOSand thus unlock the equipment they use it.
This site is by far the easiest way to make a jailbreak, simply enter youraddress and follow the instructions.
This hiring was announced by Nicholas Allegra, a tweet to your account.
So, the week after next I will be starting an internship with Apple.
This type of contract is not new to Apple, who at the beginning of the summerhad joined his team as a programmer developing applications available onCIDIA, and that created a created a reporting system very similar to what Apple is going to present iOS5 .
The community that comes to break the barriers imposed by Apple iOS and is dedicated to finding points of failure is a little poorer. It is a big step for Nicholas Allegra, who hopes his work will be continued and developed by the team that helped create the Jailbreakme.com.
For Apple is hiring a weight and Allegra will surely work now to meet and solveall the problems that for years went to explore.
New 802.22 Wi-Fi standard has a range of 62 miles
Tired of your Wi-Fi cutting out every time you take your laptop into the bathroom with you? IEEE (also known as the Institute of electronics geeks) has just released a new, official standard for 802.22 Wi-Fi, and this bad boy can cover 12,000 square miles with just one single base station.
You should already be familiar with 802.11 a/b/g/n, which is likely the wireless standard that you currently use to connect to the Internet. 802.11 is doing perfectly fine, and there's no need to worry that this new standard is going to immediately render your router useless. 802.22, besides being a solid 0.11 more awesome (for whatever that's worth) is designed to take advantage of all that new broadcast spectrum that opened up when we put the smackdown on analog TVs a couple years ago.
The spectrum that 802.22 will operate in ranges from 54MHz to 698MHz, and the reason that TVs were already in that niche was because these frequencies are great for long distance transmissions. This means that the new Wi-Fi standard will be able to broacast data at up to 22 Mbps out to a whopping 62 miles from just one single base station, making it easy to provide rural broadband or to blanket cities with municipal Wi-Fi.
Now that the official standard has been approved, companies can go start building things that incorporate 802.22 technology, so it's really just a matter of time before none of us are without Wi-Fi access ever again. Phew.
Technological failure can be used to open prison doors
A U.S. researcher has just draw attention to the failures of the electronic system which manages the ports of high security prisons in the U.S.. The vulnerabilities could be used to open the doors to inmates.
The discovery by John Strauchs promises to become one of the main sights of the DefCon conference, to be held next week in Las Vegas.
The origin of the vulnerabilities is the use of industrial logic controllers (PLC), which may be the target of attacks by cybercriminals.
In a statement reproduced by Wired, John Strauchs admits that the authorities will have to protect themselves if they want to avoid greater evils: "Most people do not know how a prison is drawn, and that's why no one ever paid attention to this ".
Strauchs, who has worked with electronic systems of more than 100 U.S. prisons, ensures that two models of logic controllers from Siemens are vulnerable to malicious code created with the aim of causing the malfunction of various electronic devices that operate in a particular room.
Most major U.S. prisons are already using logic controllers for opening and closing doors or manage other electronic devices (air conditioners, sensors, lighting). Except that only a portion of these drivers have been supplied by Siemens. This did not prevent Strauchs to develop, together with a colleague who preferred to remain anonymous, an experimental prototype that allows to exploit the vulnerabilities of the Siemens PLC.
According to researchers in 2500 were enough euros to buy and develop the necessary tools, in just three hours, the program that lets you take advantage of security holes of the PLC.
To confirm this theory, a part of U.S. prisons will be vulnerable to malicious code Stuxnet that in 2010, has been used to sabotage Iran's nuclear industry
Hackers can attack car locking systems
Systems that allow the blocking of vehicles through text messages sent from a mobile phone can be a target for hackers
According to two researchers from ISEC, Don Bailey and Matthew Solnik, these systems have different vulnerabilities to be exploited by hackers can remotely take control of these vehicles, which calls into question the safety of both of them as of its users.
Another of the experts' concerns relates to the fact that this type of technology is also used for remote control of other systems, many related high tech industries, which when accessed by someone malicious could put into question the very safety of a country.
According to The Register investigators will present the results of their work in the security conference Black Hat, scheduled for next week in Las Vegas
Google: "A million PCs" steal infected link
A Google engineer has found clues that show that about one million computers with Windows operating system have been infected with malware that redirects the Internet users' browsing through intermediate servers (proxy).
Damian Mensch of Google, was conducting routine maintenance when he noticed an unusual traffic still being sent from strange links to the servers. Enlisted the help of experts in cybersecurity and found that these requests came from a group large group of PCs infected with malware proxy redirection.
The type of attack is not new, but the proportions it has taken this case in the same family of malware, it is "unusual," according to IDGNow.
The media giant has added a layer to detect and locate this redirects the attack, through which Internet users read on their screens "seems to have been infected."
"We hope to inform users about the redirection of traffic, we can help you update your antivirus and remove infections," noted Google in his blog.
Hackers say they have violated Apple security
The group announced yesterday AnonymousIRC have managed to violate the security of Apple and to prove it published online 26 user names and passwords obtained in this alleged attack. The information was disclosed to the Twitter account from the group which claims to unite and LulzSec Anonymous.
This seems to be the latest target of the Anti-Sec campaign, launched by the new group, but in short Twitter message through which publishes the addresses AnonymousIRC also seems to show that now is putting his "commitment" elsewhere, and that there is interest in continuing to attack Apple.
After the attacks LulzSec deos have checked the computer security agenda in recent weeks, seeking a series of private and public entities, the group keeps hackers AnonymousIRC the campaign you want to keep the operation Anti-Security and defend the manifesto promoted by LulzSec, that however "closed" activity.
The attack was first reported by The Hacker News but various media Americans reported the news yesterday, including The New York Times. Apple does not comment on security breach that may affect your image, especially at a time when the company prepares to expand its cloud computing services with iCloud.
Sapo a5 – Briefly Here
Tricks / ROM / Firmware / Unlock / App / Games
Briefly Here
IMF ( FMI ) was the target of hacking
The International Monetary Fund (IMF), which holds sensitive information about the vast financial situation of many countries, was the target of a "complex" computer attack recently, reports the New York Times today.
The report said the hacking was revealed in the IMF's internal information circulated on Wednesday and was considered "complex" and its dimensions are still unknown.
"This is a failure (security) is too large," said the New York Times an IMF staff, who said that the attack occurred over the past few months.
David Hawley, a spokeswoman for the IMF, said the incident is being investigated but that the international institution "operates in full."
The IMF coordinates the rescue programs in Portugal, Greece and Ireland, also in possession of sensitive information about other countries as well as other data that may affect the markets.
With AFP
What if you could choose the operating system from your phone?
The Fujitsu is launching a mobile phone with dual boot that allows a choice between two Symbian, Nokia, and Windows 7, Microsoft. Not only is the novelty of the possible options, I would add that the Windows version is not applied to commonly used in mobile phones, but Windows Home Premium (32-bit).
Information on the LOOX F-07C (Model name) is advanced by Engadget , citing preliminary specifications sheet of Japan's NTT DoCoMo operator who, it indicates theblog, is preparing to market the phone in June or July others, by the modest sum of 70,000 yen (about 600 euros).
Note that the F-07C LOOX will bring the full version of Office, with a license for two years.
Among other arguments - some of them visible in pictures taken by Japanese publication 's ASCII - Fujitsu presents the model of a sliding QWERTY keyboard, LCD screen, four inches (1.024x600) and Intel Atom (1.2 GHz).
It also has a 5.1 megapixel camera with face detection in the back, along with a VGA camera installed in front and multiple connectivity options.
The memory is 1 GB and disk storage capacity is 32 GB, expandable via microSDHC.
In the important requirement of autonomy, know that the battery life is significantly reduced when using Windows. The phone promises 600 hours standby and 370 minutes of talk time on mobile phone mode, and only two hours if you want the terminal works with the Microsoft operating system.
Raspberry Pi – What is this ?
The Raspberry Pi Foundation is a UK registered charity (Registration Number 1129409) which exists to promote the study of computer science and related topics, especially at school level, and to put the fun back into learning computing.
We plan to develop, manufacture and distribute an ultra-low-cost computer, for use in teaching computer programming to children. We expect this computer to have many other applications both in the developed and the developing world.
Our first product is about the size of a USB key, and is designed to plug into a TV or be combined with a touch screen for a low cost tablet. The expected price is $25 for a fully-configured system.
How would you use an ultra-low-cost computer? Do you have open-source educational software we can use? Contact us at info@raspberrypi.org.
Provisional specification:
- 700MHz ARM11
- 128MB of SDRAM
- OpenGL ES 2.0
- 1080p30 H.264 high-profile decode
- Composite and HDMI video output
- USB 2.0
- SD/MMC/SDIO memory card slot
- General-purpose I/O
- Open software (Ubuntu, Iceweasel, KOffice, Python)
Raspberry Pi device running Ubuntu 9.04
Raspberry Pi device with attached 12MPixel camera module
eeePC 1001PX - Hack
When Buy :
Memory : 1 GB DDR2
Hard Disk : 160 GB
S.O : Windows XP
Now :
Memory : 2 GB DDR2
Hard Disk : 500 GB
S.O : Linux Fedora 14
Why Instaled Linux ?
Because its very fast, and its good for test network,
Can play 720p videos
Micro does’t work
My Kanguru Internet doesn’t ( yet )
Batery only up to 3h
Avast License Code
1º Download here Avast Antivirus Free Edition
2º Just copy and paste this serial. License to 2038
C00822631R9983B1147-4UH6FKSS