Wednesday, February 10, 2010

CYBER-TERRORISM AND INDIA


We are aware about "traditional" terrorism. When we talk about terrorism we imagine a masked man with AK-47. Cyber-terrorism is different than this. It is terrorism in cyberspace. Cyber-terrorism is new trend of terrorism of 21st century. This terrorist has only one powerful weapon “Computer”. We are familiar with the term “hacking”. The term cyber-terrorism is becoming increasingly common in the popular culture, yet a solid definition of the word seems hard to come by. Cyber-terrorism is an extension of terrorism and hacking. A terrorism by other means and it takes advantage of the fact that our society is increasingly becoming dependent on computer networks and, particularly, dependent on the Internet. It is new concept of terrorism. Cyber-terrorism has done in cyberspace which is carefully planned violence where a small amount of effort, usually hard to identify or catch. It is applied to interfere with the functioning of civil society.

There are some that say cyber-terrorism does not exist and is really a matter of hacking or information warfare. They disagree with labeling it terrorism because of the specific image of terrorism like of the creation of fear, significant physical harm, or death in a population using electronic means. Cyber-terrorist is invisible and hard to locate. He can easily spread terrorism from anywhere in the world. Experts already said that World War III would be in cyberspace.

Security professionals have expressed their increasing concern over not only the increase in frequency of attacks against the Internet, but also the increase in the level of sophistication of these attacks. While the complexity of the attacks is increasing, the skill level of the intruder that launched the attack is decreasing. This is a very troubling trend. As the terrorists learn from every attack what works and what doesn't, where the vulnerabilities are, how we respond, and the methods we use to detect these attacks. They gain the knowledge that will increase their chance for success.

TARGET-

The intention of a cyber terrorism attack could range from economic disruption through the interruption of financial networks and systems. It may be used in support of a physical attack to cause further confusion and possible delays in proper response. Although cyber attacks have caused billions of dollars in damage and affected the lives of millions. New terrorist organizations are highly funded, technologically strong groups capable of inflicting devastating damage to a wide range of targets.

There's many ways of judging the severity of such threats but the primary target for cyber-terrorism is the Internet. Its most attractive objective is to bring the Internet down, since increasingly, all commerce depends on Internet-based transactions. We call it e-commerce. In India e-commerce is growing rapidly. The cyber-terrorism threat is real because we have already experienced experimental acts of cyber-terrorism when a large number of Internet-connected computers have ceased to function. We have recent example at 7th June 2008 ten government sites of India got defaced.  Nearly 7,000 websites are hacked every year in India which means that on an average 19 sites are hacked a day. (CERT Official). And this number is increasing with every new day.

Cyber-terrorist exploits weaknesses. They take advantage of the fact that our software systems and our operating systems are woefully inadequate and are responsible for the intrinsic vulnerabilities that can be exploited. Cyber-terrorists live off the weaknesses of the defenders. In the cyber-terrorist's case it's the extremely low cost and low risk exploitation of the weaknesses of the victims where the cyber-terrorists have the advantage. From recent years India is on the target of Pakistani, Chinese and Bangladeshi hackers. They also enjoy the support of others. Every night there are thousands of conversations taking place in discussing the weaknesses of existing organizations in managing their computers. Every unsecured computer or network can be used for hacking, cyber-crime and cyber-terrorism. It means every unsecured computer is threat for someone.  So indirectly we are at the middle of war. No matter who loose and who wins, we are definitely going to loose.

Yet we have no idea how this threat is growing and becoming powerful day by day. Underdeveloped country like India has more danger than other European countries because of less expenditure on security. (check out my previous article) A weak cyber security policy in India is also resulting in increased cyber terrorism activities in India. The position is even worst when it comes to wireless security in India. Wireless security has become a headache due to its misuse by terrorists in India. Unfortunately, cyber security in India is an ignored world. In India there is large number of computer illiteracy. Million of computers of Asia especially India, Pakistan and China are infected by various viruses (threatfire.com). Viruses act as backdoors or tools for cyber-terrorists. They use Viruses, Trojans, Worms, Backdoors, Hoxes for controlling networks and servers. Very few people know about cyber security measures. As concern about India we’ve many enemies who want to bring down our economy. When India-Pak war has started, we’ve experienced many cyber attacks from Pakistani hackers called “Indian Mujahideens”.  We have a very weak cyber law, negligible cyber security and cyber forensics and almost missing legal enablement of ICT (Information and Communication Technology ) systems. The only solution is the quick deployment of a Counter-Cyber-Terrorist - someone who knows what you are up against today, someone who lives in the world of the people who are, and will be, attacking - someone who can train the people who must fight the battles.

*Information Sources*
-Cyber Terrorism In The Context Of Globalization By Rohos Nagpal
-CCRC (COMPUTER CRIME RESEARCH CENTRE)
-WIKIPEDIA (Encyclopedia)
-An Interview on Cyberterrorism with Paul Strassmann
-Thaindian News(Cyber Security In India: Another Wake Up Call)

Note- All rights of this article is reserved by owner. If you have any problem please contact at kulkarni.gargeya@gmail.com

Sunday, January 24, 2010

Feeling stuck with ANTIVIRUS??...Updated (2-Feb)



             Yes. I know. This is problem of every 2nd Indian… Most of the people (including my friends) think that they know everything about antivirus and if they’ve registered (WTF??) antivirus then their computer will not be infected. First of all I want to tell you guys… Your pc can be infected anytime. No antivirus product can give you 100% security. There are always some loops holes in engine. Yes. We can minimize risk by taking few steps.
            Ok. Lets move on to the popular and tricky question. Which antivirus is best?? I am gonna discuss a little on this topic. So first of all you have to tell me about your requirement. Because all antivirus softwares has some “distinct” feature. The basic security level is not problem. It is always mentioned by all (almost) multinational security software companies. Second thing the word “antivirus” means security suite in this article. Security suite is a bundle of all security software…like antivirus, antispam, firewall, web protection etc. I’ve compared best three antivirus products here. This comparison is based on my individual experience with some world class articles on security suits and also on some test results which have taken by “Test Systems”, “Malware City”, “AV Comparatives” and “Cascadia Labs”.

  1. Kaspersky Internet Security 2010- Kaspersky Labs has distinguish reputation for security software. Kaspersky 2010 provides excellent security. And its firewall is best of the best in world. I think it is BEST AV software ever. Real time protection of Kaspersky is just awesome. Often Kaspersky is FIRST to identify and eliminate new (unknown) threats because of its huge security network. Still it has some problems like false detections and huge prompts. Also it is best at virus detection but little lazy at warms. But still I recommend you to use Kaspersky if you know about your system and you have 1GB+ RAM. If your pc has some confidential or sensitive data and you don’t want to compromise at security then Kaspersky is the only one. I recommend this software for colleges and offices where environment is hostile. It’s really best AV available in India costing you around 600-700rs I think…


  1. Norton Internet Security 2010- I know we have very negative impression about Norton products. But I want to tell you guys that NEW Norton 2010 is one of the fastest antivirus in world. It is shocking but true. If you want faster pc with good security then go for Norton. Recommended RAM can be 512 or 1 GB. But it has some problem with its real-time protection. But if you want speed then I think you can compromise with Norton. So you can get good security and good speed both. It costs little more than Kaspersky. It costs nearly 1200-1500rs. It is huge amount for me for 1 year. It is good for any type of environment.


  1. Eset Smart Security 4- Ok. This means SPEED and only SPEED. If your most priority is your computer speed then go for ESET. If only you have no any sensitive data on your pc. You will forget that you having any antivirus product. It takes lesser memory so it needs only 256RAM. It is lightest antivirus I’ve found on internet. It costs 1000-1100rs. But I recommend this software for only home use. Because you cannot take a risk of security at work place.

             I often use ESET and Norton because I am always ready to format my pc if anything happens wrong. And I like fast pc. Still I want to tell you that I’ve never found any single virus on my pc while I am using anyone of these three antivirus products. Only thing is you have to update software at lease once in week.

MOST IMPORTANT- I’ve personally tested other products like (legend) Quick Heal, Avast, AVG with its latest versions and latest updates. And I must say that they are little kids in terms of security and speed. You cannot even compare these products with best AV's like Kaspersky or Norton. Quick heal, Panda, F-secure and AVG takes HUGE memory (so they are in my shit-list). I will prefer viruses than installing these products. Also above 3 best AV products are its best when you install it at formatted (clean) pc. (Use pc tweak software like Advanced System Care)

       Also if you dont have the key of above products and want to use free AV then i will say Avira Antivir or Avast is best choice. They give you best protection (real time). You won't get firewall protection in free version but still its fine. Today (2 Feb) i've tested Avast IS v5 (the newest) and i think its fine. It takes (4000k+23000k+18000k) memory which comparatively low. Also it has detected all 38 viruses (including my personal trojan).

Here i've listed Antivirus Products as per their performance (good to bad)
1. Kaspersky IS 2010
2. Norton IS 2010
3. ESET Smart Security v4
4. Bit Defender 2010 (it is also good defiantly recommended)
5. Avira Premium 2010 (good)
6. Avast IS 5 (good)
7. A- Squared Anti Malware v4.5 (detection rate is quite good but takes more memory)
8. AVG IS v9 (more memory)

Above all article is based on my personal opinion and some tests and articles. If you have any problem or query then mail me at war379k@gmail.com

Thursday, November 5, 2009

WINDOWS SERVICES FOR DISABLE

Windows services are very crucial in os. By disabling extra services you will reduce windows weight(in other way) by 30-50%. In standard xp, 20-25 services are running unnecessarily.

ROOT>>>> control panel > Administrative Tools > Services
(note.. right click on service and go to "properties" for changing start-up type, status..etc)

OS platform-- Windows XP

Alerter.........................................Disabled

Application Layer Gateway Service...............Manual

Application Management..........................Manual

Automatic Updates...............................Disabled

Background Intelligent Transfer Service ........Disabled

ClipBook........................................Manual

COM+ Event System...............................Disabled

COM+ System Application.........................Disabled

Computer Browser................................Manual

Cryptographic Services..........................Manual

DHCP Client.....................................Automatic

Distributed Link Tracking Client................Disabled

Distributed Transaction Coordinator.............Disabled

DNS Client......................................Automatic

Error Reporting Service.........................Disabled

Event Log.......................................Automatic

Fast User Switching Compatibility...............Disabled

Help and Support................................Disabled

Human Interface Device Access...................AUTOMATIC
IMAPI CD-Burning COM Service....................Disabled

Indexing Service................................Disabled

InteractiveLogon................................Disabled

Internet Connection Firewall (ICF)/
Internet Connection Sharing (ICS)...............Disabled

IPSEC Services..................................Disabled

Logical Disk Manager............................Disabled

Logical Disk Manager Administrative Service.....Disabled

Machine Debug Manager...........................Manual

Messenger.......................................Disabled

MS Software Shadow Copy Provider................Disabled

Net Logon.......................................Manual

NetMeeting Remote Desktop Sharing...............Disabled

Network Connections.............................Manual

Network DDE.....................................Disabled

Network Location Awareness (NLA)................Manual

NT LM Security Support Provider.................Disabled

Performance Logs and Alerts.....................Disabled

Plug and Play...................................Automatic

Portable Media Serial Number....................Disabled

Print Spooler...................................Automatic

Protected Storage...............................Automatic

QoS RSVP........................................Disabled

Remote Access Auto Connection Manager...........Manual

Remote Access Connection Manager................Manual

Remote Desktop Help Session Manager.............Disabled

Remote Procedure Call (RPC).....................Automatic

Remote Procedure Call (RPC) Locator.............Manual

Remote Registry.................................Disabled

Removable Storage...............................Disabled

Routing and Remote Access.......................Disabled

Secondary Logon.................................Disabled

Security Accounts Manager.......................Disabled

Smart Card......................................Disabled

Smart Card Helper...............................Disabled

SSDP Discovery Service..........................Disabled

System Event Notification.......................Disabled

System Restore Service..........................Disabled

Task Scheduler..................................Automatic

TCP/IP NetBIOS Helper...........................Disabled

Telephony.......................................Manual

Telnet..........................................Disabled

Terminal Services...............................Disabled

Themes..........................................Automatic

Uninterpretable Power Supply....................Disabled

Universal Plug and Play Device Host.............Disabled

Upload Manager..................................Disabled

Voulume Shadow Copy.............................Disabled

WebClient.......................................Disabled

Windows Audio...................................Automatic

Windows Image Acquisition (WIA).................Automatic

Windows Installer...............................Manual

Windows Management Instrumentation..............Automatic

Windows Management Instrumentation
Driver Extensions...............................Manual

Windows Time....................................Disabled

Wireless Zero Configuration.....................Disabled

WMI Performance Adapter.........................Disabled

Workstation.....................................Disabled

--------------------------------------------------------------------------------

***MY TESTED SERVICES***

background intelligent transfer
com+ system application
logical disk manager admin service
logical disk manager
com+ event system
fast user swithching compability
help & support
windows cardspace
imapi cd burning com service
tcp-ip netbios helper
distributed transaction coordinator
removable storage
remote desktop session manager
qos RSVP
Security accounts manager
smart card
secondary logon
system event notification
windows firewall/ internet connection
system restore service
SSDP discovery storage
stardwind AE service
terminal services
distributed link tracking client
uninterruptible power supply
webclient
security center
automatic updates

if you have any problem plz contact me at kulkarni.gargeya@gmail.com

PROXY SITS (tested by me)

the proxy sites are not always good. They can store your information like username and pass and can manipulate ur account.... so u should not give such info under such sites. Here is some sites which are completely secured. This sites might not be banned in your college or school because it is most anonymous proxies over internet!!!!

  • http://kproxy.com (Best For Orkut !)


  • http://backfox.com


  • http://atunnel.com


  • http://calculatepie.com


  • http://www.stupidcensorship.com


  • http://www.vmathpie.com


  • http://www.xroxee.com


  • http://mathtunnel.com


  • http://www.pagemod.com (Contributed by : Anonymous


  • http://www.anonymizer.ru (this is russian site...bt dnt worry just give website add in 1st textbox... simple!!)

    BLOCK AND UNBLOCK SITE IN COLLEGE

    Many times in schools, colleges & offices surfing some sites like orkut,etc are banned !
    To overcome this you can unblock these or block some other websites and play pranks !

    Do The Following :
    For eg you want to block www.xyz.com !

    * Open the folder C:\WINDOWS\system32\drivers\etc
    * There you will find a file named HOSTS
    * Click on the file and press SHIFT and now right click on it .
    * From the right click menu select Open with .
    * Now, select Notepad to open the file from the list !
    * Now, in the file under the line 127.0.0.1 localhost add another line as 127.0.0.2 www.xyz.com.
    * Now, File>>Save !

    Now, open your web browser and try openning www.xyz.com , it will not load !

    To unblock sites just do the opposite !
    HAVE FUN....

    Sunday, March 22, 2009

    Internet Explorer 8.00.6001.18702 - Final

    Internet Explorer 8.00.6001.18702 - Final

    Internet Explorer 8 takes the Web experience beyond the page and introduces a new way to seamlessly experience the power of the Web whether you are a Web developer writing to standards, or an end user discovering a new online service. This beta release is available to everyone, but is primarily for Web developers and designers to test the new tools, layout engine, and programming enhancements.

    Internet Explorer 8 (IE8) has been designed to make everyday tasks easier, provide dynamic security protection and improve the development platform and manageability. End user improvements include a streamlined interface, tabbed browsing, printing advances, improved search functionality, instant feeds (RSS), dynamic security protection, and more.

    -------------------------------------------XP---------------------------------------------------
    Download Internet Explorer 8 for Windows XP/2003 x32: 16.1 MB


    http://download.microsoft.com/download/C/C/0/CC0BD555-33DD-411E-936B-73AC6F95AE11/IE8-WindowsXP-x86-ENU.exe


    Download Internet Explorer 8 for Windows XP/2003 x64: 32.4 MB


    http://download.microsoft.com/download/7/5/4/754D6601-662D-4E39-9788-6F90D8E5C097/IE8-WindowsServer2003-x64-ENU.exe

    --------------------------------------------VISTA--------------------------------------------
    Download Internet Explorer 8 for Windows Vista/2008 x32: 13.2 MB

    http://download.microsoft.com/download/F/8/8/F88F09A2-A315-44C0-848E-48476A9E1577/IE8-WindowsVista-x86-ENU.exe

    Download Internet Explorer 8 for Windows Vista/2008 x64: 24.1 MB

    http://download.microsoft.com/download/D/C/F/DCF5DACB-313F-40C6-889C-AD1F8546099D/IE8-WindowsVista-x64-ENU.exe



    Note That All above Links are DIRECT microsoft Server Links..... Plz Download It as per your Operation System.....

    EXCLUSIVELY By WAR PRAYER

    Sunday, March 1, 2009

    HIDE FOLDERS V1.6 FREE


    HIDE FOLDERS V1.6 FREE

    Hide Folders is free software for Windows operating system. It allows you to securely hide folders with your private and sensitive data. Hidden folders can not be viewed or opened in Windows, they are invisible and inaccessible to other users and applications
    Hide Folders is free for personal and commercial use. Hide Folders is clean software, it does not contain adware or spyware.


    Hide Folders Features
    * Securely hide folders with your confidential data
    * Works on Windows XP and Windows Vista, supports NTFS, FAT32 and FAT file system.
    * Password protection - folders can be unhid only after entering a password within the program.
    * Hidden folders can not be uncovered by deinstalling the program.
    * Unlimited number of folders can be hidden.
    * Folders are hidden even in Windows safe mode.
    * Fast and user-friendly skinned user interface.
    * Intuitive for usage, no learning curve.

    Download Hide Folders
    Version 1.6
    Filesize 1.2mb
    Click Here to download

    Homepage:= http://www.hidefolders.org/

    AN INSTECH GROUP PRODUCTION

    Saturday, February 28, 2009

    SOLID PROTECTION FOR PEN DRIVES OR ANY REMOVABLE MEDIA

    I carry my USB flash drive that contains a lot of portable tools with me all the time but I am afraid of one thing, which is a computer virus such as JambanMu or MaxTrox that is able to infect USB flash drives and bind itself to the executable files in there. So far there are only ways to disable writing to USB flash drive on your computer by editing the registry but if you plug it into a public computer which has virus, your USB flash drive will be writable and can be infected by virus. So is having a pendrive with a built-in write protect switch the only way to prevent the drive from virus infection?

    SOLUTION IS---- to create DUMMY file in pen drive of exactly free space.

    First, you have to know how much free space is left on the USB drive. Plug in the drive, go to My Computer, right click on the drive letter and select Properties. Take note of the “Free space” that is in bytes. My USB drive has 1,300,594,688 free space, so I will need to create a dummy file that has the exact file size.
    Removable Drive Free Space

    Second, go to command prompt (in accessories) and type the following command

    fsutil file createnew F:\IamDummy 1300594688


    fsutil file createnew

    HERE
    fsutil file createnew IS COMMAND (MUST BE STATIC)
    F:\ IS MY PEN DRIVE
    IamDummy IS MY DUMMY FILE NAME
    1300594688 IS MY EXACT FREE SPACE LEFT ON PEN DRIVE

    There are many softwares in market who can protect Pen Drive. But this is inbuilt tool in windows which will give you 100% assurance about your Pen Drive's Security.

    <<<<<<<BY WAR PRAYER>>>>>>>>

    IP HIDER 4.0 (LATEST)

    IP Hider 4 serial license


    IP Hider v4.0 Key Features:

  • You can easily hide or change your IP address with a click of a button.
  • Un-ban yourself from forums, MySpace, YouTube, Facebook and any other websites.
  • Prevent your real IP address from being shown in E-mail headers on any Webmail E-mail service such as Yahoo, Hotmail and etc.

  • Premium proxy list includes proxy servers exclusively dedicated to IP Hider users providing constant browsing speed / quality.
  • Online privacy protection by cleaning all online traces such as Internet History, cookies and etc that may harm or use inadvertently information on your computer
  • Protects your computer from the action of invasive codes by blocking Javascript and ActiveX.
  • LINK:=Download IP Hider v4.0 ]


    BY WAR379K (THE WAR PRAYER)

    PC Tools AntiVirus Free Edition 6.0




    PC Tools AntiVirus 6 for Windows

    Designed for Windows® Vista™ 32-bit, XP and 2000

    PC Tools AntiVirus Free Edition will thoroughly scan and protect your PC from virus attacks.
    With PC Tools AntiVirus


    PC Tools AntiVirus Free Edition feature highlights

    • Protects your PC as you are working, surfing and playing
    • Detects, quarantines, disinfects and destroys Viruses, Trojans and Worms
    • IntelliGuard™ protects your computer against threats in real-time
    • Automatically checks for frequent updates against the latest threats
    • Best of all it's FREE. No catches, limitations or time-limits.

    For world-leading spyware protection we recommend you download Spyware Doctor. Spyware Doctor is also available in as a free Spyware Doctor Starter Edition

    link:= instechgrouphttp://www.pctools.com/free-antivirus/

    REMOVE instechgroup from link

    BY WAR379K