Thursday, October 30, 2008

വിന്ഡോസ് 7

Just a few days into the official announcement of Windows 7Steve Ballmer has now officially announced that Windows ൭ is using the code base of Windows Vista and that the next version is actually “Vista, a lot better saga”.

It is clear that Microsoft is not happy with the install base of Windows Vista, now reported at 180 million licenses, especially when XP is running on 800 million computers. Their new marketing campaign may not be enough to change the perception of Windows Vista and as such; releasing a major (called by Microsoft) Windows while using the Vista code base is the next logical step.

With this strategy, I think enterprises who have not yet moved into Vista may finally decide to wait for Windows 7 unless Microsoft offer some incentives on pricing upgrades from Vista to 7

Thursday, October 16, 2008

Types of Ethical Hacks

Ethical hackers can use many different methods to breach an organization’s security during asimulated attack or penetration test. The most common methods follow:
  1. റിമോട്ട് നെറ്റ്‌വര്‍ക്ക് :- A remote network hack attempts to simulate an intruder launching anattack over the Internet. The ethical hacker tries to break or find a vulnerability in the outsidedefenses of the network, such as firewall, proxy, or router vulnerabilities.Remote
  2. ഡയല്‍ -അപ് നെറ്റ്‌വര്‍ക്ക് A remote dial-up network hack tries to simulate an intruderlaunching an attack against the client’s modem pools. War dialing is the process of repetitivedialing to find an open system and is an example of such an attack.
  3. ലോക്കല്‍ നെറ്റ്‌വര്‍ക്ക് A local network hack simulates someone with physical access gainingadditional unauthorized access using the local network. The ethical hacker must gaindirect access to the local network in order to launch this type of attack.
  4. സ്റൊലെന്‍ എകുഇപ്മെന്ട് A stolen-equipment hack simulates theft of a critical information resourcesuch as a laptop owned by an employee. Information such as usernames, passwords, securitysettings, and encryption types can be gained by stealing a laptop.
  5. സോഷ്യല്‍ എഞ്ചിനീയറിംഗ് A social-engineering attack checks the integrity of the organization’semployees by using the telephone or face-to-face communication to gather information for usein an attack. Social engineering attacks can be used to acquire usernames, passwords, or otherorganizational security measures.
  6. ഫിസിക്കല്‍ എന്‍ട്രി A physical-entry attack attempts to compromise the organization’s physicalpremises. An ethical hacker who gains physical access can plant viruses, Trojans, rootkits,or hardware key loggers (physical device used to record keystrokes) directly on systems in thetarget network.

What Is Hacktivism?

Hacktivismrefers to hacking for a cause. These hackers usually have a social or politicalagenda. Their intent is to send a message through their hacking activity while gaining visibilityfor their cause and themselves.Many of these hackers participate in activities such as defacing websites, creating viruses,DoS, or other disruptive attacks to gain notoriety for their cause. Hacktivism commonly targetsgovernment agencies, political groups, and any other entities these groups or individualsperceive as “bad” or “wrong.”

Thursday, October 2, 2008

Change to Green Tea

- Green tea contains high levels of antioxidants. Antioxidants are particles that remove the charge from the free radicals moving around the body. Over time, free radicals damage the body. Free radicals are said to cause cancer, heart disease, aging, and many other problems.

- Green tea helps boost the immune system. The immune system is the body’s own natural defence system against viruses and bacteria. If we didn’t have an immune system, we would die from a common cold. A healthy immune system helps us to get sick less often.

- Green tea helps to suppress appetite. This indirectly helps people to maintain a healthy weight.

- Green tea helps to stabilize blood sugar levels. Maintaining stable blood sugar levels reduces the risk of aquiring type 2 diabetes.