Friday, October 19, 2007

Adrian Lamo


Adrian Lamo is an infamous former grey hat hacker and journalist, principally known for breaking into a series of high-security computer networks, and his subsequent arrest. Best known among these were his intrusions into The New York Times and Microsoft. He is also known for attempting to identify security flaws in computer networks of Fortune 500 companies and then notifying them of any found; while still illegal in many places without permission, this can be seen as a form of unsolicited penetration testing. Dubbed the "homeless hacker" for his transient lifestyle, Lamo spent most of his travels couch-surfing, squatting in abandoned buildings and travelling to Internet cafes, libraries and universities to investigate networks, and sometimes exploit security holes. Despite performing authorized and unauthorized vulnerability assessment for several large, high-profile entities, Lamo refused to accept payment for his services. In the past, his lifestyle allowed him to travel up and down the coasts of the United States, often by coach, carrying all necessary possessions in a backpack.

Adrian Lamo is perhaps best known for breaking into The New York Times internal computer network in February 2002, adding his name to confidential databases of expert sources, and using the paper's LexisNexis account to conduct research on high-profile subjects, although his first published activities involved operating AOL watchdog site Inside-AOL.com.

in 2004, Lamo was sentenced to six months' detention at his parents' home plus two years probation, and was ordered to pay roughly $65,000 in restitution. He was convicted of compromising security at The New York Times and Microsoft, and is alleged to have admitted to exploiting security weaknesses at Excite@Home, Yahoo!, Microsoft, MCI WorldCom, Ameritech, Cingular and has allegedly violated network security at AOL Time Warner, Bank of America, Citigroup, McDonald's and Sun Microsystems. Companies sometimes use proxies to allow their employees access to the internet, without giving the internet access to their internal network. However, when these proxies are improperly configured, they can allow access to the company's internal network. Lamo often exploited this, sometimes using a tool called ProxyHunter.

Critics have repeatedly labelled Lamo as a publicity seeker or common criminal, claims that he has refused to publicly refute. When challenged for a response to allegations that he was glamorizing crime for the sake of publicity, his response was "Anything I could say about my person or my actions would only cheapen what they have to say for themselves." When approached for comment during his criminal case, Lamo would frequently frustrate reporters with non sequiturs such as "Faith manages" and "It was a beautiful day."


At his sentencing, Lamo expressed remorse for harm he had caused through his intrusions, with the court record quoting him as adding "I want to answer for what I have done and do better with my life."
As of January 16, 2007, Lamo's probation was terminated, ending a three-year period during which the U.S. District Court's ruling prevented him from exercising certain freedoms, including the ability to employ any privacy protection software, travel outside certain established boundaries, or socialize with security researchers.


Can You Hack It?, a documentary covering Lamo's life and times, is slated for release under the care of Trigger Street Productions. Directed by Sam Bozzo, it features Apple Computer co-founder Steve Wozniak, TechTV personality Leo Laporte, and narration by actor Kevin Spacey. The film explores the practical and ethical themes of modern computer hacking, intertwining Lamo's story with those of controversial figures throughout history.

Kevin Mitnick



Kevin Mitnick began social engineering at the age of 12. He realized he could bypass the punchcard system used for the Los Angeles bus system: by buying his own punch, he could get free bus rides anywhere in the greater LA area. Social engineering became his primary method of obtaining information, whether it be user names and passwords, modem phone numbers or any number of other pieces of data.
In high school, he was introduced to phone phreaking, the activity of manipulating telephones which was often used to evade long distance charges for his benefit. Mitnick broke into his first computer network in 1979, when a friend gave him the phone number for the Ark, the computer system at Digital Equipment Corporation (DEC) used for developing their RSTS/E operating system software. He broke into DEC's computer network and copied DEC's software, for which he was later convicted. Kevin Mitnick would change his identity by exploiting how the identification system worked in the United States. He would obtain the birth certificates of recently deceased newborns and very young children (around the ages of 1 to 3 years old), as the government had no distinct record of their death since they never worked nor were involved in society. Furthermore, the certificates would have to be from someone who was born and died in places far apart, as it was more difficult to trace back to the original source. He changed his identity about three or four times, any time he changed jobs. He claimed to have learned most of this information through a book titled Paper Trail. Mitnick was arrested after the FBI obtained a search warrant, searched his house, and found his wallet with numerous fake IDs. He was caught in an accident by having the fake identification still in his possession.


The case against Mitnick tested then-nascent laws that had been enacted for dealing with computer crime, and it raised public awareness of security issues involving networked computers. The controversy remains, however, as Mitnick is often used today as an example of the quintessential computer criminal although his exploits are less notable than his notoriety suggests.

Kevin Mitnick now runs Mitnick Security Consulting, a computer security consultancy

Dennis M. Moran(aka Coolio)

is an American hacker who was accused in February 2000 of a series of Denial-of-service attacks that shut down some of the most popular websites on the Internet. He was later arrested and pled guilty to defacing the websites of DARE and RSA Security, as well as unauthorized access of US Army and Air Force computer systems at four military bases.
He was also accuased of hacking:
-Yahoo.com
-eBay
-Amazon.com
-E*TRADE
-Buy.com

He was sentenced to 12 months in jail with 3 months suspended as well as ordered to pay $15,000 USD in restitution.

Adam Botbyl

Adam Botbyl is an American computer hacker. He and Brian Salcedo and Paul Timmins, gained unauthorized access to the United States nationwide computer system used by the Lowe's.

Timmins and Botbyl initially discovered an open wireless LAN access point at the Lowe's store in Southfield, Michigan. Months later, Botbyl and Salcedo returned to explore and exploit the network. They then attempted to install a program could allowed them to capture the credit card information of customers conducting transactions through the Southfield store. TheUS government claimed that the crime could have caused more than $2.5 million in damages. The three men were initially charged with 16 counts of wire fraud and unauthorized intrusion. Botbyl was sentenced to 26 months imprisonment, followed by 2 years of supervised release.
Computer criminals :

Adam Botbyl
Dennis Moran
Nahshon Even-Chaim
Jonathan James
Richard Jones
Kevin Mitnick
Mark Abene
Robert Tappan Morris
Jeffrey Lee Parson
Kevin Poulsen
Brian Salcedo
Simon Vallor


I'll be posting a detailed description series about every person on the above list.

Bill Gates letter: The Age of Software-Powered Communications

If you've been in the work force for 20 years or more, you can remember a time when the pace of business-and life in general-was quite a bit slower than it is today. Back then we read newspapers and magazines and watched the network news to stay informed. Faxes were just becoming a common way to share written business information. A phone call might elicit a busy signal or no one would answer at all. In those days, no one expected to send documents to coworkers on the other side of the globe instantly, collaborate in real-time with colleagues in distant cities, or share photographs the very day they were taken.
These and similar advances have delivered remarkable results. The ability to access and share information instantly and communicate in ways that transcend the boundaries of time and distance has given rise to an era of unprecedented productivity and innovation that has created new economic opportunities for hundreds of millions of people around the world and paved the way for global economic growth that is unparalleled in human history.
But few people would argue that there is no room for improvement. Although we have once-unimaginable access to people and information, we struggle today to keep track of emails and phone calls across multiple inboxes, devices, and phone numbers; to remember a growing number of passwords; and to synchronize contacts, appointments, and data between desktop PCs and mobile devices. The fact is that the proliferation of communications options has become a burden that often makes it more difficult to reach people than it used to be, rather than easier.
In 2006, I wrote about how unified communications innovations were already beginning to transform the way we communicate at work. Because you are a subscriber to executive emails from Microsoft, I want to provide you with an update on the progress we're making toward achieving our vision for unified communications. I also want to share my thoughts on how rapid advances in hardware, networks, and the software that powers them are laying the foundation for groundbreaking innovations in communications technology. These innovations will revolutionize the way we share information and experiences with the people who are important to us at work and at home, and help make it possible to put the power of digital technology in the hands of billions of people around the globe who have yet to reap the benefits of the knowledge economy.
Moving Beyond Disconnected Communications
A fundamental reason that communicating is still so complex is the fact that the way we communicate is still bound by devices. In the office, we use a work phone with one number. Then we ask people to call us back on a mobile device using another number when we are on the go, or reach us on our home phone with yet another number. And we have different identities and passwords for our work and home email accounts, and for instant messaging.
This will change in the very near future. As more and more of our communications and entertainment is transmitted over the Internet thanks to email, instant messaging, video conferencing, and the emergence of Voice over Internet Protocol (VoIP), Internet Protocol Television (IPTV), and other protocols, a new wave of software-driven innovations will eliminate the boundaries between the various modes of communications we use throughout the day. Soon, you'll have a single identity that spans all of the ways people can reach you, and you'll be able to move a conversation seamlessly between voice, text, and video and from one device to another as your location and information sharing needs change. You'll also have more control over how you can be reached and by whom: when you are busy, the software on the device at hand will know whether you can be interrupted, based on what you are doing and who is trying to reach you.
One of the best examples of how communication is changing-and how technology is integrating the way people share experiences across devices-starts in the world of video games. With Xbox Live, the online gaming and entertainment network for Xbox 360, people can play games with friends who are in distant locations. Xbox Live also provides a comprehensive range of communications options including video chat and instant messaging, as well as text, voice, and picture messaging, all seamlessly integrated into the video game experience. With more than 7 million subscribers, Xbox Live is quickly redefining the way people access entertainment of all kinds. And it is enabling them to share experiences with each other in real time without being constrained by the limits of location.
But that's just the start. We recently launched Games for Windows - Live, which links Xbox 360 gamers with the millions of people who play games on their PCs. Now, Windows and Xbox 360 video game players can compete and communicate with each other without being constrained by the limits of devices.
The communications expectations that young people-and anybody else who has adopted the latest digital communications tools-bring to the workplace are already changing how we do business. To them, the desk phone is an anachronism that lacks the flexibility and range of capabilities that their mobile device can provide. A generation that grew up on text messaging is driving the rapid adoption of instant messaging as a standard business communications tool. Accustomed to forming ad hoc virtual communities, they want tools that facilitate the creation of virtual workgroups. Used to collecting and storing information online, they look for team Web sites, Wikis, and other digital ways to create and share information.
All of these expectations are prompting companies to adapt by implementing new communications strategies and technologies. Those that do are already seeing a wide range of benefits including significant cost savings and important productivity gains. At Microsoft, for example, we replaced our old voice mail system with Exchange Server 2007 unified messaging, a move that is saving the company $5 million annually by lowering hardware and maintenance costs. More importantly, Exchange Server 2007 provides a software solution that enables integration of traditional telephone infrastructure and VoIP with corporate messaging, calendaring, and directories. This convergence of telephony and messaging increases employee productivity and decreases the administrative workload for IT professionals.
The Next Wave of Communications Technologies
Today in San Francisco, Microsoft is launching the next wave of enterprise VoIP and unified communications products for business. Among the products we'll launch are Microsoft Office Communications Server 2007 and Microsoft Office Communicator 2007, which bring together a broad range of communications options including voice, instant messaging, and video into a single, consistent experience. Office Communications Server 2007 and Office Communicator make it easier for employees to communicate and collaborate with each other in real-time by letting them see at a glance if the people they want to contact are available. They will also be able to initiate a conversation by email, voice, video, or instant messaging from within Microsoft Office system applications, making communication and collaboration an integral part of day-to-day work processes, rather than an interruption. In addition, when they use the new version of Office Communicator Mobile that is launching today, they will be able to stay connected using Windows Mobile-powered devices.
We're also announcing the availability of Microsoft RoundTable, an advanced video and VoIP conferencing device that provides a 360-degree view of a meeting room, along with wideband audio and video that tracks the flow of conversation between multiple speakers. With RoundTable and Office Live Meeting or Office Communications Server, meeting participants in different locations will be able to converse and share information as if they were in the same room. RoundTable also enables companies to record meetings for later use.
All of these products are important steps toward achieving our long-term vision for streamlined, integrated communications that will enable people to be more productive, more creative, and to stay in touch more easily without being limited by the device they have at hand or the network they are connected to.
A Foundation for Future Innovation
It would be hard to overstate the magnitude of the changes that are coming. Standardized, software-powered communications technologies will be the catalyst for the convergence of voice, video, text, applications, information, and transactions, making it possible to create a seamless communications continuum that extends across people's work and home lives. This will provide the foundation for new products, services, and capabilities that will change the world in profound and often unexpected ways.
This will happen not only in developed countries where access to digital technology is the norm, but also in emerging economies around the world. Currently, about 1 billion of us have a PC, just a fraction of the world's 6 billion people. As we make technology more accessible and simpler to use-often in the form of affordable mobile devices-we can extend new social and economic opportunities to hundreds of millions of people who have never been able to participate in the global knowledge economy. And as more and more of the world's people are empowered to use their ideas, talents, and hard work to the fullest, the results will be new innovations that make everyone's lives richer, more productive, and more fulfilling.

Bill Gates

Tuesday, July 17, 2007

Computer geeks..!!

OK! All you geeks out there, do you have a room like those, anyway take a look..




















Genetics !!

This is not some kind of music visualizers or somthing, this is called 'computer genetics'


Spying Bugs..

Ok, this is true, not kinda science fiction (anymore). This is the proof, those are functioning spying bugs and flies, and who knows what else is being used...




































Monday, November 13, 2006

Radial engine, interesting huh !!!



The radial engine is a configuration of the internal combustion engine, in which the cylinders are arranged pointing out from a central crankshaft like the spokes on a wheel. This configuration was formerly very commonly used in aircraft engines before being superseded by turboshaft and turbojet engines. The Radial Engine is a type of reciprocating engine.

The cylinders are connected to the crankshaft with a master-and-articulating-rod assembly. One cylinder has a master rod with a direct attachment to the crankshaft. The remaining cylinders' connecting rods have pinned attachments to rings around the edge of the master rod (see animation). Four-stroke radials almost always have an odd number of cylinders, so that a consistent every-other-piston firing order can be maintained, providing smooth running.

I encourage everyone who's interested in this topic to read more about it here.