Tuesday 4 August 2015

PORN BANNED IN INDIA

India Blocks 857 Pornography Websites, Defying Supreme Court Decision

 
 
NEW DELHI — Without warning or explanation, the Indian government this weekend ordered Internet service providers to block access to 857 pornography websites that had been singled out by an anti-pornography activist.
Within hours, social media platforms in India lit up with complaints from people trying to visit pornography sites only to find either a blank screen or a cryptic message saying the site had been blocked “per instructions” from India’s Department of Telecommunications.
Because the government made no official announcement about why it was censoring so many websites, much remained unclear on Monday about its intentions, including how it chose which sites to block. According to Internet service providers in India, thousands of other pornography websites were unaffected by the order.
Adding to the confusion, the government acted just weeks after India’s Supreme Court declined a request to block access to online pornography. In rejecting the request, India’s chief justice, H.L. Dattu, said adults had a fundamental right to watch pornography within the privacy of their own homes.
The activist, Kamlesh Vaswani, a lawyer who failed to persuade the Supreme Court to block online pornography, gave thanks on Monday to Prime Minister Narendra Modi for taking a step that the Supreme Court would not. “Under Prime Minister Modi’s good governance and the good faith with which this government has been working,” Mr. Vaswani said in an interview, “they have been instrumental in blocking the 857 websites that I have been looking to get blocked.”
Mr. Vaswani, 43, a private lawyer from the central Indian state of Madhya Pradesh, said he decided to begin a legal crusade against online pornography in response to the brutal gang rape of a 23-year-old woman on a New Delhi bus in 2012. With help from a college engineering professor, Mr. Vaswani analyzed traffic data for pornography websites and came up with a list of the most popular sites. This list of 857 websites, he said, is what he asked the Supreme Court to block.
“Nothing can more efficiently destroy a person, fizzle their mind, evaporate their future, eliminate their potential or destroy society like pornography,” Mr. Vaswani wrote in his petition to the Supreme Court. “It is worse than Hitler, worse than AIDS, cancer or any other epidemic,” he added. “It is more catastrophic than nuclear holocaust, and it must be stopped.”
After the Supreme Court rejected his petition, Mr. Vaswani gave his list of 857 websites to Pinky Anand, once a top lawyer for Mr. Modi’s Bharatiya Janata Party and now a top lawyer for Mr. Modi’s government. It was Ms. Anand, he said, who delivered his list to the Department of Telecommunications.
“Yes, Mr. Vaswani gave me that list of porn websites,” Ms. Anand said in an interview. “I did not instruct the ministry to block, but more specifically, take appropriate action.”
Internet providers typically receive a list of a handful of websites the Department of Telecommunications wants blocked. The order the department sent on Friday was no different, except this time the list was far longer and it included many of the most popular pornography sites in the world.

“It is a simple letter with instructions to block the aforesaid websites,” Dinesh Chandran, an executive with Asianet Satellite Communication Ltd., said in an interview. The government gives no explanation for why it wants a website blocked, he said, and Internet service providers have little choice but to comply. “For us, the Department of Telecommunications is the government.”
Speaking anonymously, government officials gave different justifications for blocking the websites. An official told The Hindustan Times that the affected sites were “found to be spreading antisocial activities as hyperlinks.” The official did not specify which activities were deemed antisocial. But in The Times of India, an official said the ban was temporary, in place only until the government adopted new regulations to block child pornography.
Either way, the government’s action set off a furious debate. Some, arguing that the government has no business dictating what Indians watch online, accused the conservative Hindus who dominate India’s current government of imposing their morals on an entire nation. Others argued that the ubiquity of online pornography feeds an atmosphere of sexual permissiveness in ways that contribute to India’s epidemic of sex crimes against women.
Some experts on India’s regulation of the Internet said this appeared to be the largest number of websites the government had ever tried to block at one time. Nikhil Pahwa, editor and publisher of MediaNama, which monitors digital policy in India, said he feared that the Modi government was using pornography as “a ruse” to create a government-controlled web filter for India. “This one is a clear attempt by this government to control the Internet in India,” he said in an interview.
“It’s not just one incident. There are numerous battles, all linked to one another, for free speech and Internet freedom that are being fought in the country right now.”

Wednesday 29 July 2015

Google Hacked

Google Pitcairn Island Hacked by underground hackers group by Session Hijacking Attack




Tuesday 7 April 2015

Intel Compute Stick, world's smallest PC, will cost $150 with Windows, $110 with Linux

 

 


It look a little longer than expected, but Intel’s Compute Stick PC is up for pre-order through some online stores.

The stick-sized computer is available from Newegg with Windows 8.1 on board. If you’re the type that always spells “Microsoft” with a dollar sign, Newegg is also selling the Linux version for $110. Liliputing reports that it comes with Ubuntu 14.04. The price for the Linux Compute Stick was supposed to be $89, but we’ve yet to see it anywhere for that cheap.

Regardless of operating system, the Compute Stick comes with an Intel Atom quad-core processor, 2GB of RAM, 32GB of storage and 802.11b/g/n Wi-Fi. It plugs directly into a monitor or TV via HDMI, and is powered through a Micro USB jack on the side of the stick. There’s also a full-sized USB port, and Bluetooth 4.0 for connecting a mouse and keyboard.

Intel originally planned to ship the Compute Stick in March, but Newegg is listing a release date of April 24 for both models. A similar dongle with BeeLink branding is already available, but from more obscure retailers.

Why this matters: We’ve seen an explosion of miniature computers lately—including a new Raspberry Pi with promised Windows 10 support—but the Compute Stick promises to be the smallest of the bunch. Still, Intel has been talking about this thing since last November, so you’d be forgiven for writing it off as vaporware by now. While the Compute Stick hasn’t quite crossed over to “actual product” territory just yet, it sounds like we’ll be able to put it through its paces soon.

Friday 3 April 2015

                        FREE METRO RECHARGE





If you travel by Metro in Delhi, this news may help you save some money on your Metro travel.  The Delhi Metro Rail Corporation has forged a partnership with “Offer World” to launch an app that will reward the users if they download apps that are listed within their app.

Every time the user downloads an app listed in the Offer World App, they will be offered set amount of recharge on their Metro smart card, which can then be used to buy tickets on Delhi Metro. The users will first need to register with the Offer World app to avail the benefits.

The Offer World app is currently available only to Android users, and you can download the app from here.








Each app you download you can get recharge ranging from Rs. 5 to Rs. 15. For example, if you download popular News app, NewsHunt, you will be offer Rs. 15 recharge, similarly, Paytm app gives you Rs. 15, FoodPanda will give you Rs. 15, Quikr offers Rs. 12, whereas Cleartrip offers Rs. 10. Currently there are less than 10 apps available to download, however, once can hope that this pool will increase over a period of time.

Offer World offers

Once you have downloaded the apps, you will be credited with said amount, which can then by accumulated in your Metro smart card by entering the smart card number that is printed on the back of every card. This is available inside the app itself.

The smart card will be recharged within 48 hours of entering the details, and users will be able to check the available balance and credits from the home option in “Offer World” app.

DMRC Chief Spokesman Anuj Dayal said, “the move is aimed at optimizing and encouraging use of smart cards by tapping the ever-growing community of Android smartphone users. 70% of Metro commuters use smart cards at present.”

This is a good move by DMRC to popularize Smart cards, and lot of users will not mind using it because it is quite easy. From user’s perspective, it is just matter of installing all the apps to get free credits. If at all they do not want the apps, they can obviously uninstall the apps from their phones later.

The only word of caution – Please check the app ratings before you download any apps, because given the nature of apps, some of them might pose some risks.

Wednesday 1 April 2015

NSA Got Hacked By Its Very Own Vulnerability

 You need one hundred and four dollars, more or less, eight hours and Amazon’s cloud computing to hack the National Security Agency’s website. Oh, and you need to make use of the NSA’s very own FREAK vulnerability to hack them in their own game.

A group of researchers did just that, using a few tools to implement man-in-the-middle-attacks. This is an ability that swiftly creates an outcome of 512 bit RSA (RSA is one of the first practicable public key crypto systems and is widely used for secure data transmission) keys.

The bug was reported on Monday. It allows the attacker to take control of secure connections between people using iOS devices or Android devices. This gives hackers a chance to mimic the target and steal private information like login details and passwords.

To factor the 512 bit export keys, the project enlisted the help of Nadia Heninger at University of Pennsylvania, who has been working on “Factoring as a Service” for exactly this purpose. Her platform uses CADO NFS on a cluster of EC2 virtual servers, and (with Nadia doing quite a bit of handholding to deal with crashes) was able to factor a bunch of 512 bit keys; each in about 7.5 hours, for $104 in EC2 time according to Vice.

CIA



Let us explain the FREAK vulnerability to you in a more detailed manner:

Earlier this year, many cyber security companies revealed information about a vulnerability in OpenSSL. OpenSSL started accepting temporary RSA keys when using non-export cipher suites. A malicious server could make a TLS/SSL client using OpenSSL, using a weaker key exchange method.

As stated earlier, OpenSSL clients accepted EXPORT-grade insecure keys even when the client had not initially asked for them. This could be exploited using a man-in-the-middle attack, which would intercept the client’s initial request for a standard key and ask the server for an EXPORT-grade key. The client would then accept the weak key, allowing the attacker to factor it and decrypt communication between the client and the server.

The vulnerability affects all Linux systems too, including the Server, Workstation, Desktop, and HPC Node variants that have not installed the fixed version of OpenSSL packages.

While the use of EXPORT-grade ciphers is disabled by default in OpenSSL), it can be enabled by applications that utilize the OpenSSL library. For this reason, the vulnerability is able to affect all Linux 6 and 7 systems, including the Server, Workstation, Desktop, and HPC Node variants, which have not installed the fixed version of OpenSSL packages.

However, using Internet-wide scanning, we can perform daily tests of all HTTPS servers at public IP addresses to determine whether they allow this weakened encryption. More than a third of all servers with browser-trusted certificates are at risk. i.e all the HTTPS servers at Alexa’s top 1 million domain names have their current vulnerability levels at 8.5 percent. HTTPS servers with browser trusted certificates are at 6.8 percent vulnerability, and the rest of the HTTPS servers are at 11.8 percent.

Browsers are vulnerable to the FREAK attack because of bugs that allow an attacker to force them to use weak, export-grade encryption. One example is the OpenSSL bug described in CVE-2015-0204, but some other TLS libraries have similar problems. Far more browsers are vulnerable to the FREAK attack than was initially thought when the attack was announced, including:


Sunday 1 March 2015

New research specially for the guys who are in long distance relationship. Enjoy......  |  Rohit Kaswan


Guys now you are able to Video chat with the help of Mozilla Firefox without having any application or software in your device. There you don't have any need to create any account and no need to pay it's completely free

Requirement

You should have a Mozilla Firefox in your device
Complete Tutorial about how to do that i will show you in following pictures




https://hello.firefox.com/H2bAuDRvLTE



It's Simple no need to install anything




Saturday 7 February 2015

 


New security vulnerability programs kicking off

In 2014, Google spent more than $1.5 / €1.326 million through its Security Reward Programs on security researchers reporting different bugs in software developed by the company.
The money was split between 200 different researchers who revealed over 500 security flaws in Google products.
George Hotz gets top dollar: $150,000 for breaking Chrome OS
One expert, 25-year-old George Hotz (GeoHot), however, managed to attract most attention as he received the biggest reward in 2014, $150,000 / €132,500 for an exploit that took advantage of four vulnerabilities in Chrome OS, leading to the execution of a persistent program on the system during the Google-sponsored Pwnium hacking competition.

The glitches he exploited were a memory corruption in Google Chrome's JavaScript engine, V8, a command injection in Crosh (shell in Chrome OS), one path traversal flaw in CrosDisks (responsible for mounting and un mounting file systems in Chrome OS), and a problem touching on file persistence at boot time.

As a result of the hack, Hotz was also offered an internship on Google’s Project Zero, a team of elite hackers bent on discovering zero-day vulnerabilities in software products from different vendors.
Research grants and mobile apps security rewards announced
Google security engineer Eduardo Vela Nava says in a blog post that, in the case of Chrome, most of the flaws never made it to the stable release of the browser and were eliminated in the developer and beta versions.

Along with the vulnerability expenses announcement, Nava also informs that two new security projects are kicked off. One is a research grant offered for investigating bugs and products assigned by Google, and the other is the inclusion of mobile apps officially developed by Google for Android and i OS in the Vulnerability Reward Program.

The research grants are experimental at the moment and they come with no strings attached and do not require disclosing any bug in order to receive the money (the maximum tier is $3,133.70 / €2,770). “These are up-front awards that we will provide to researchers before they ever submit a bug,” Nava says.

“We'll publish different types of vulnerabilities, products and services for which we want to support research beyond our normal vulnerability rewards,” he adds. Then, the researchers carry out their investigation as usual.

Since the inception of the Security Vulnerability Program back in 2010, the search giant paid more than $4 / €3.526 million, which may be nickels and dimes for the company but it is a hefty investment in the security of its products that is not easy to match. Apart from this, Google also offers rewards outside this project.