Jump to content

CyberAbc

Retired Staff
  • Content Count

    519
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    18

Everything posted by CyberAbc

  1. CyberAbc

    Hi guys

    welcome to our family. Njoy
  2. CyberAbc

    hi

    We r fine bro Welcome bro
  3. CyberAbc

    Old Newbie :)

    welcome bro
  4. CyberAbc

    Better late than never

    welcome to our family
  5. CyberAbc

    Hey ALL

    welcome bro and njoy
  6. CyberAbc

    new here

    welcome to our family
  7. CyberAbc

    Hi gang

    welcome to our family
  8. CyberAbc

    hi

    welcme to our family bro. Njoy!
  9. When Apple released iOS 7 to the world at 1pm ET on Sept. 18, legions of iPhone and iPad owners immediately downloaded the new operating system. That's no surprise, but statistics released today illustrate just how much of an impact the mobile OS had on Internet traffic. At one unnamed North American fixed Internet provider, "Apple Updates immediately became almost 20 percent of total network traffic and continued to stay above 15 percent of total traffic into the evening peak hours," according to Sandvine's Global Internet Phenomena Report for the second half of 2013. Sandvine makes equipment that helps consumer broadband providers manage network congestion. Over-the-air update sizes were 760MB for the iPhone 5, 900MB for the iPad 2, and 729MB for the Apple TV, the report says. Updates downloaded on desktops through iTunes were 1.2GB for the iPhone and 1.4GB for the iPad. "Most interesting is the fact that the launch noticeably increased the total volume of traffic during peak hours. This presents a unique challenge for operators, since they must engineer their networks for peak demand, and Apple product launches and software updates are infrequent in nature," Sandvine wrote. "Several of Sandvine’s customers were closely monitoring the traffic demand the launch would cause, and based on the results we observed, we expect they will have a plan in place to manage the load when iOS 8 launches next year." OS X Mavericks also placed a heavier-than-usual load on networks because this year's new version of the Mac operating system was free and a little bigger than the previous year's. Why YouTube buffers: The secret deals that make—and break—online video? When ISPs and video providers fight over money, Internet users suffer. Overall, streaming video is still dominating Internet traffic. We noted a few months ago that "Netflix and YouTube alone account for nearly half of all Internet traffic to homes in North America during peak hours." Unsurprisingly, that is now more than half: "YouTube continues to see growth in its share, now accounting for 18.7 percent of peak downstream traffic, up 9 percent from our 1H 2013 study," Sandvine wrote. "This growth is likely not caused by the adoption of paid channels, but instead by continued growth of smartphone and tablet use within the home (i.e., 'Home Roaming'). While changes in share have been relatively minor, most interesting is the fact that Netflix and YouTube now combine to account for over 50 percent of downstream traffic." BitTorrent is no longer the beast it once was in terms of overall traffic share. "As observed in previous reports, BitTorrent continues to lose share and now accounts for just 7.4 percent of traffic during peak period, and file sharing as a whole now accounts for less than 10 percent of total daily traffic," Sandvine wrote. "This demonstrates a sharp decline in share. Long are the days when file sharing accounted for over 31 percent total daily traffic, as we had revealed in our 2008 report." YouTube and Facebook are dominating cellular network traffic: This next chart shows that if you're looking to watch YouTube when quality is best, you should avoid the lunchtime and evening hours: Actual throughput (80th percentile) achieved by YouTube from a number of US Internet service providers (both cable and DSL) for one week (all days overlaid) as collected in September 2013. Sandvine "What is instantly noticeable in the chart is the fact that YouTube has two pronounced dips," Sandvine wrote. "The first may not surprise some as it occurs during the evening peak period when networks are most congested. The second dip, however, is far more interesting as it occurs over the lunch hour." While we've previously pinned the blame for poor YouTube quality on the business decisions of ISPs, Sandvine said Google deserves blame, too. Hulu (albeit with a lighter traffic load) doesn't suffer the same lunchtime and evening quality degradation, and the YouTube problems were consistent across ISPs. "[W]e can conclude that the quality degradation is likely occurring because of an oversubscription in the Google server farm (where YouTube is hosted), which makes YouTube unable to meet high video demand during lunch time and European evening," Sandvine wrote. "This oversubscription would result from a commercial decision by YouTube regarding how much capital they wanted to invest in server capacity to maintain quality." Sandvine also provided some data relevant to the debate over data caps or "usage-based billing," which charge consumers extra when they go over the data limit prescribed by their Internet service provider. "In North America, the top 1 percent of subscribers who make the heaviest use of the network’s upstream resources account for 39.8 percent of total upstream traffic," Sandvine wrote. "The comparable downstream users account for 10.1 percent of downstream bytes. At the opposite end of the usage spectrum, the network’s lightest 50 percent of users account for only 6.8 percent of total monthly traffic."
  10. CyberAbc

    Nice greetings from Germany

    welcome to our family bro. enjoy!
  11. Thanks to NSA, German e-mail providers see flood of new customers The revelations about the National Security Agency's surveillance programs may have hurt US cloud providers' business, but they've created a boom in German e-mail hosting. According to a new report by Der Spiegel, Germany's major Internet service providers have seen a surge of new users in the wake of Edward Snowden's revelations about US Internet monitoring. In particular, the German ISP Freenet has seen an 80 percent growth in new customers over the past three weeks. Deutsche Telekom has used concerns over US surveillance as part of its marketing campaign. This month, the company (along with two other firms, GMX and Web.de—the three collectively serve two-thirds of German e-mail users) launched a new campaign called "E-mail Made in Germany," designed to ensure that customers' domestic e-mail never leaves servers within Germany. E-mail messages within the service are encrypted, and users are warned when a message is being sent outside the safety of the trusted network. However, as Ars has reported previously, German security experts have scoffed at this marketing ploy. Further, using German e-mail services is no guarantee that someone won't go rifling through your messages. While Germany certainly has strong data protection and privacy laws, using a German e-mail provider does not necessarily provide users more protection. In fact, it might offer less protection, especially to US-based users, since their message traffic would likely pass through exchanges monitored by the NSA's XKeyscore system.
  12. CyberAbc

    Happy Halloween to the CP Family

    happy halloween
  13. Avast! New hacks could steer ships into pirates’ grasp Researchers presenting at the Hack in the Box conference in Kuala Lumpur have presented more ways in which a standard ship communication system can be used for ill—potentially forcing vessels to divert from their course and steer into danger. The findings have been presented to the International Telecommunications Union in an attempt to press for fixes. The Automated Identification System (AIS), an international system for broadcasting ship location information and signals regarding navigation, safety, and weather, has already been cited by previous researchers because attackers can spoof messages into the system or jam its Internet-based backbone with DoS attacks. But Trend Micro's Dr. Marco Balduzzi and Kyle Wilhoit, along with independent security researcher Alessandro Pasta, demonstrated a number of new attacks on AIS using low-cost hardware. These hacks of AIS could be used by pirates or others who want to disrupt shipping to misdirect ship's crews or make ships drop off the AIS system altogether. One attack uses the "man-in-the-water" alert sent by an emergency transmitter as a lure to pull ships off course. The researchers demonstrated a Python script that can spoof the data from an AIS transmitter and send it to ships, potentially luring would-be rescuers to a location. Other AIS spoofs could trigger ship's collision alert systems, send fake weather alert data to ships, or even command a ship's AIS system to switch to an unmonitored frequency—making it "disappear" from the network. The hardware used to demonstrate these attacks was a €500 ($674) software-defined radio, but Balduzzi said that "it's possible to do it by using a VHF radio that costs around €100 ($134)—a price that makes the technology accessible to almost anyone (including pirates)."
  14. CyberAbc

    Zalutations and glad to be back!

    welcome again old friend
  15. CyberAbc

    Howdy Cyber People!

    welcome to our family and enjoy
  16. CyberAbc

    Hi

    welcome bro to our family and enjoy
  17. Since Windows Vista, the upper-tier editions of Windows have supported local disk encryption via a feature called BitLocker Drive Encryption. Like the FileVault feature in newer versions of OS X or the “encrypt device” feature on many Android phones and tablets, you usually need to enable BitLocker manually to take advantage of it. Once enabled, it protects the data on your device from being accessed by someone who walks away with it. However, some mobile devices—including those running iOS, Windows Phone 8, and Windows RT—don’t require users to take device encryption into their own hands. These operating systems can all assume that the underlying hardware supports encryption, so they enable it by default in a way that’s entirely seamless and invisible to you as you use your phone or tablet day to day. Windows 8.1 finally brings this to x86 tablets and Ultrabooks in a feature Microsoft calls “device encryption.” While it has very specific hardware requirements, the feature is designed to improve local security for Windows users without them ever needing to know about it. What it doesWindows 8.1’s new device encryption treats your x86-based Windows tablet or laptop more like an ARM-based tablet or smartphone. Rather than requiring a user or system administrator to enable it, your device’s boot partition comes encrypted out of the box. This encryption is essentially invisible during normal use—you pick up the tablet, log in, and use it just as you would an unencrypted PC. If someone were to steal the device from you, though, they wouldn’t be able to get at any of your information without your account password or your encryption key, which in this case is protected by your account password. You’ll need to log in to a Microsoft account or join a domain with the appropriate Group Policy settings to finish protecting your system. Andrew Cunningham When you first fire up Windows 8.1 on a PC that supports the feature, head to the “PC Info” section in the device settings screen to check your encryption status. Computers with the necessary hardware features begin encrypting the drive immediately, but the master key needed to decrypt the drive isn’t protected. A user with administrator access will have to log in with a Microsoft account, at which point the device will generate a recovery key and upload it to Microsoft’s servers. This recovery key can then be accessed from another computer with your Microsoft account if you’re ever locked out of your system. Active Directory user accounts can also be used to store the key, provided your domain administrator has enabled the proper Group Policy settings. This is a far cry from the standard BitLocker encryption process, which requires individuals to back up and store their own key manually and must be enabled by users themselves. However, with the exception of the part where your key is uploaded to Microsoft’s servers, the underlying technology is exactly the same as it is in BitLocker. Open up the Disk Management console and your system partition will be marked as “BitLocker Encrypted,” just as if you’d gone through the steps to enable the feature manually. Upon closer inspection, the "device encryption" feature is just an extension of BitLocker. It just happens automatically and is supported by all Windows SKUs, not just the Pro and Enterprise tiers. Andrew Cunningham The nice thing about the automated device encryption (beyond the “automated” part) is that it extends to every edition of Windows 8.1, where BitLocker is a Pro- or Enterprise-tier feature in Windows 8 and an Ultimate- and Enterprise-tier feature in Windows 7 or Vista. OS X (to pick a prominent example) offers built-in disk encryption to all Macs via FileVault, and we’re glad to see the feature slowly trickling down to the consumer-oriented Windows editions. What you need (or, your hardware probably doesn’t support this)A year or two from now, this invisible-to-the-user, always-available encryption option will probably be on most new Windows laptops and tablets. For Windows 8 systems that are being sold right this very minute (and for Windows 8.1-compatible systems that have been sold for the last several years), stringent hardware and firmware requirements will usually prevent them from supporting it. Here are the hardware features the passive device encryption feature needs to work: Support for the Secure Boot feature, which implies both UEFI support and 64-bit Windows. A Trusted Platform Module (TPM). The feature requires TPM 2.0, and most current devices use TPM 1.2. Hardware and firmware support for Windows’ Connected Standby feature. Connected Standby allows a sleeping system to wake up periodically and refresh certain data, like e-mail messages or calendar events. Your smartphone already does the same sort of thing. Note that Connected Standby is similar in concept to Intel’s Smart Connect Technology, but Smart Connect support does not imply Connected Standby support. Connected Standby comes with its own set of hardware requirements, including a solid-state boot volume, NDIS 6.30 support for all network interfaces, and memory soldered to the motherboard. The system must also rely on passive cooling when in Connected Standby mode, even if it normally uses a fan. As of this writing, there are very, very few systems out there that can tick all of these boxes. The Connected Standby feature is probably the most restrictive, since it requires support in the CPU silicon itself. Intel’s latest Haswell chips and its Clover Trail and Bay Trail Atom chips support Connected Standby (AMD chips with support are supposedly due in 2014), but older chips do not. Even the Haswell Ultrabooks we’ve installed Windows 8.1 on so far have lacked Connected Standby support, so even if you have a shiny new Haswell laptop, you may be waiting on your OEM to issue a firmware update before you can use the feature. Connected Standby’s own set of hardware requirements also means that certain types of systems—any larger laptops or desktops with removable RAM, for example—are automatically disqualified. While we’d love to see the hardware requirements loosened to include all modern PCs, as of Windows 8.1 only the newest and most integrated of PCs are eligible to use it at all. BitLocker soldiers onFor the many systems that can’t support the new device encryption features, Windows 8.1 Pro and Enterprise still include the more traditional BitLocker drive encryption feature that has been a part of Windows since Vista. Its hardware requirements are much less onerous—it’s easiest to use if you have a TPM 1.2 module installed, but you can choose to use a USB key or a pre-boot passphrase to boot the system in PCs without TPMs. We’d only recommend the latter for tech-savvy users who value security more than convenience, but it’s still good to have the option in a pinch. BitLocker remains an important option if you don’t want to deal with other strings attached to the new encryption features—if you’re not comfortable storing your encryption key on Microsoft’s servers via your Microsoft account, for example. BitLocker doesn’t dictate where or how you store your encryption key, making it a better choice for those who want full control over their system’s protection. If your system supports the feature and you’d like to opt out in favor of something you control, you can turn it off in the PC Info section in Windows 8.1’s settings. The automatic encryption is also opt-in if you upgrade to Windows 8.1 on a Windows 8 system that supports the feature. You can opt out manually if you want to manage your own device encryption. Andrew Cunningham Like many of the other changes in Windows 8.1, the new device encryption feature allows Windows tablets (specifically, x86 Windows tablets, in the wake of Windows RT’s disappearance from the OEMs’ lineups) to do things that other ARM tablets can already do. Tablets and Ultrabooks are easier to walk off with than larger equipment, so making automatic encryption available for those devices is only sensible.
  18. CyberAbc

    hi m8

    welcome to our family Follow the rules Njoy!
  19. CyberAbc

    Hi

    welcome to our family Follow the rules Njoy!
  20. CyberAbc

    Hi

    welcome back bro njoy
  21. CyberAbc

    Hello

    welcome to our family. Follow the rules and enjoy
  22. CyberAbc

    oops.

    welcome to our family Njoy
  23. CyberAbc

    Good to be back!

    welcome back bro Hope u will get the same milieu as earlier
  24. More than two years after unknown hackers gained unfettered access over multiple computers used to maintain and distribute the Linux operating system, officials still haven't released a promised autopsy about what happened. The compromise, which began no later than August 12, 2011, wasn't detected for at least 16 days, a public e-mail and interviews immediately following the intrusion revealed. During that time, attackers were able to monitor the activities of anyone using the kernel.org servers known as Hera and Odin1, as well as personal computers belonging to senior Linux developer H. Peter Anvin. The self-injecting rootkit known as Phalanx had access to a wealth of sensitive data, possibly including private keys used to sign and decrypt e-mails and remotely log in to servers. A follow-up advisory a few weeks later opened the possibility that still other developers may have fallen prey to the attackers. For three weeks in September and early October, officials kept kernel.org closed so the servers that run it could be rebuilt. When the site reopened on October 4, a message on the front page prominently warned of the breach and noted the steps taken to rebuild the site. "Thanks to all for your patience and understanding during our outage and please bear with us as we bring up the different kernel.org systems over the next few weeks," the message concluded. "We will be writing up a report on the incident in the future." Almost two years later, the report has yet to be delivered. The promise to deliver an incident report remained on kernel.org as recently as March 1 of this year, before being quietly pulled the following day. To this day, officials have yet to provide key details, including exactly how many machines were compromised, how the attackers were able to gain root access to them, and what they did once they seized control. The delay contrasts sharply with autopsies that were delivered promptly following two similar compromises of Apache.org, the official distributor of the open-source Apache Web server. "As a user, I think everyone should be a little bit disappointed they didn't execute that transparency in a follow-up," Dan Rosenberg, a senior security researcher at Azimuth Security, told Ars. Without a thorough autopsy, "it's hard to really know what level of negligence was involved in the compromise." Linux developer and maintainer Greg Kroah-Hartman told Ars that the investigation has yet to be completed and gave no timetable for when a report might be released. He said officials remain confident of preliminary findings that the attackers were not able to tamper with the source code that millions of organizations use to compile their Linux systems. "We went through many rounds of validation of the kernel releases on the site, regenerating them from the Git tree and old backups," he wrote in an e-mail. "All of them were fine, nothing was found to be tampered with or touched at all." Git is the name of the system that tracks changes made to the source code for the Linux kernel. It uses a series of 160-bit cryptographic hashes to account for the revisions. Copies of the repository and all changes are then cached in thousands of locations around the world. A mismatched hash in one or more location would quickly indicate unofficial changes. Kroah-Hartman also told Ars kernel.org systems were rebuilt from scratch following the attack. Officials have developed new tools and procedures since then, but he declined to say what they are. "There will be a report later this year about site [sic] has been engineered, but don't quote me on when it will be released as I am not responsible for it," he wrote.
×