Archive for the ‘social networking’ Category


1. Secure your WIFI connection

secure your digital life from hackersHome users are particularly prone to leaving their routers open without passwords, in order to make sure that you’re protected check your router settings to verify whether encryption is turned on or not. leaving access unencrypted can be just a minor issue of bandwidth being stolen by unauthorized users freeloading off your connection to more serious cybercrimes like credit card fraud or hacking taking place using your internet connection, which may be traced back to you.

The majority of routers support encrypted connections, support either WEP or WPA/WPA2, always opt for WPA/WPA2 as it’s far more secure. If you have the option hide SSID broadcast, turn that on as well, it basically allows you to make your wireless router invisible to outsiders and they need to know your SSID to access the network.

2. Encrypt your hard drive

secure your digital life from hackersIt’s important to keep your data secure in case of loss of hardware or even theft. An encrypted hard drive basically prevents its contents from being access without the password. It is obviously more important to encrypt thumb drives and laptop drives. Windows 7 Ultimate and Business editions come with a built in hard drive functionality using a software called BitLocker which will encrypt your entire hard drive, but users with Home Premium or Basic users shouldn’t feel left out as there is a free way to encrypt your hard drive using trucrypt.

Mac users can use FileVault to encrypt their folders, and OSX Lion will allow you to encrypt your entire hard drive as well.You can also get hardware encryption which will use fingerprint recognition to unlock data inside the drive like the Lacie Rugged Safe.

3. Keep your software updated

secure your digital life from hackersIt’s a given that you need to keep your operating system, antivirus and web browser up to date in order to protect yourself from exploits, and if you haven’t got automatic update turned on for them, you should do it now.

However a lot of users often overlook other software such as Acrobat Reader, Flash, Java and iTunes when it comes to keeping software updated. It’s important to realize that many of these applications have direct access to the operating system, and an exploit in these applications can be used as a gateway into your system files. Flash and Acrobat are used heavily with web browsers which is the number one source of malware infections.

4. Upgrade your antivirus suite.

secure your digital life from hackersIt’s as important to keep your virus suite updated as much as it is to keep your virus definitions updated. The reason for this is because antivirus software evolve in the way they deal with malware, such as introducing heuristic technologies which identify common traits of viruses, the way they interact with the system and actively block these scripts. This is why having an outdated antivirus software, despite updated virus definitions may not provide the best possible protection. If you’re using an older version of antivirus software you may entitled to discounted upgrades to newer versions.

5. Secure your smartphones

secure your digital life from hackersMany people completely overlook this fact, but smartphones are essentially mini computers which hold swathes of personal information about you. They often hold logins to your facebook/twitter accounts which are set on auto login, online banking and other financial information as well as access to email. If someone gets hold of all these details it can cause a lot of stress and havoc to your life.

It’s vital to keep your devices with password lock activated, additionally you should take some precautionary measures in case you lose your device.

Apple has a very cool security software called Find my iPhone which is a free app by Apple, which lets you track your phone by GPS, lock and remotely delete data from it. You can even use it just to locate your iPhone if you misplace it, causing it to sound an alarm.

For Android users it’s important to stay protected, smartphones are just as vulnerable to viruses as a PC, although the android platform is more prone to them than apple due to the open platform nature of the former. Android phones require antivirus protection, all the popular desktop antivirus brands offer android support as well.

The app store is less prone to malware due to the fact that all apps are vetted by Apple before publishing, although if you’ve jail broken your iPhone, antivirus protection may be something you need to look at.

6. Vet web page links using a link checker

Cyber criminals are using sophisticated strategies to drive users onto their web pages, increasingly innocent websites are being targeted using exploits to find security holes to hack and implant code on them which can launch JavaScript applications and infect computers when users visit the infected site. Link checkers scan links on your search results and optionally other websites and indicate whether links are safe, websites are scanned by their own servers so it does not impair your computer performance. Link checkers are available with most anti malware security suites such as with AVG, McAfee and Symantec.

7. Laptop Security for mobile workers

secure your digital life from hackersLaptops thefts are common, and are easy targets due to their transportable nature. If you work away from your office it’s important to invest in a Kensington Lock. While a lock won’t prevent trained thieves armed with cable cutters, it will prevent opportunistic thieves which is the overwhelming majority of laptop thefts.

It’s also important to keep prying eyes away from your data, always password protect your login, and when leaving your laptop unattended, using the screen lock feature in Windows to prevent unauthorized users from looking at or accessing your information.

If you work with particularly sensitive data a privacy screen may provide an added level of protection, the screen is only viewable to the person sitting directly in front, so people sitting around you cannot look at your screen. Targus and 3M are well known for producing privacy screens for all manner of monitor sizes.

8. HTTPS encryption for websites

secure your digital life from hackersMost people are well informed with the necessity of using https secure connections with online shopping when entering sensitive personal information. However, it can be argued that websites like facebook, twitter, gmail and others hold equally sensitive information about you.

Did you know you can elect to use https secure connections on these websites? For case by case uses, you can insert a ‘s’ after the http on the web address, if there isn’t one already to access the site securely. However if you want to access the sites securely every time you visit, you can login select the option to always use https in the profile settings.

9. Use online backup to keep an offsite storage of your files.

secure your digital life from hackersA great way for mobile workers to keep data kept safe and secure while on the move is to use online backup, this provides great peace of mind if your computer gets lost, as it allows you to recover your files from the cloud. Online backup services like Sugar Sync also provide users with high level synchronization features which can be used as a great time management tool as well, as it keeps data across all your computers consistent and up to date. You can look up various online backup reviews here to compare their features and read up user reviews.

10. Avoid public wifi and public computers.

Using public computers can be incredibly risky as malware and key loggers can be installed to track your keystrokes and cached files in order to gain access to your private information.

secure your digital life from hackersAdditionally, public wifi connections can be risky as the servers can be breached with malware additionally phantom hotspots can be set up which appear like legitimate hotspots, but are actually other ordinary laptops which act as a middleman eavesdropping into the connection.

An example on how cached data can be hijacked to login to your web accounts can be demonstrated using FireSheep.

Thankfully mobile 3G internet connections are becoming more affordable, and are often faster than public wifi hotspots. 3G connections are far more secure, additionally you may be able to tether your Smartphone internet connection to work on your laptop. I hope this article helped you all for sure. And do follow these above 10 steps and secure your digital life from hackers.

Advertisements

Rumor: Facebook wants to buy Skype

By Emil Protalinski | May 4, 2011, 5:10pm PDT

Summary

Skype wants to strike a deal with either Facebook, Google, or both, according to a new rumor. Alternatively, Facebook wants to buy Skype outright.

Skype is reportedly talking to Facebook about some sort of deal. Facebook CEO Mark Zuckerberg has been involved in internal discussions about buying Skype, while Facebook also reached out to the Luxembourg-based company about forming a joint venture, according to two sources with direct knowledge of the discussions, cited by Reuters.

Google has also reportedly held early talks for a joint venture with Skype. The discussions are in early stages and as is typical with rumors like this, all three companies are not commenting, and the sources wish to remain anonymous.

A Skype deal could be valued at $3 billion to $4 billion, while Skype’s Initial Public Offering (IPO) is expected to raise about $1 billion. In August 2010, Skype filed a registration statement to go public, but the October 2010 appointment of a new CEO, Tony Bates, delayed the IPO till the second half of 2011.

Wouldn’t it be nice to be able to start a Skype video call with your friends on Facebook? Integrating the video conferencing technology into the social network would be great for both companies, although both parties are still young and neither has a proven revenue model. I’m not quite sure Facebook has to buy Skype outright to get what it wants.

Facebook teaming up with Skype is not a new rumor (a potential partnership was discussed as far back as September 2010, but the two could not reach an agreement). When Skype 5.0 was released in October 2010, the new version offered voice calling between Facebook friends, but it did not include a video chatting feature. The integration was a one-way road: only Skype added some Facebook features to its client. If Facebook were to integrate the VoIP service on its website and its mobile apps however, the social network would suddenly be competing with many services that offer video calling, including Google’s Gmail and Apple’s FaceTime.

The rumor is a popular one because Facebook users apparently want voice (and video) chat. Just two months ago, the rumor got yet another boost: Facebook resumes talks with Skype.

Earlier this year, Skype added a group video calling feature that allows 10 people to videoconference together. Unfortunately, the option is only available as part of the Premium package, which offers group video calling together with access to live chat customer support, but sets you back $4.99/€3.49/£2.99 per day or $8.99/€5.99/£4.99 per month. Still, if this option was available via Facebook, it could make Skype very popular amongst the social network’s 600 million users.

Kick off your day with ZDNet’s daily e-mail newsletter. It’s the freshest tech news and opinion, served hot. Get it.


U should Fear The Government Instead Of Hackers

I think this post will interest the people who thought that they are save be’cos they have passwords to login into their Social Networking Sites. Well U are dead wrong. Hackers are the least u should worry about. Those u need to fear are the United States Government. To me They have control over Everything that goes on on the internet. There is no privacy with Computers now a days so stop worrying about computer hackers breaking into ur accounts rather worry about the damed fucking government. leave the Hackers alone be’cos one day u will need their help. Belife me when i say one day. Be’cos that day is almost near.
Guss u’have been watching those tech movies, u see wht the governments do in this movies. Well this movies are not just made they are messages and i think we should all try to listen other than criticize Hackers be’cos when that day comes u will be rashing to learn how to hack to be able to protect ur self. When we come to security hackers have the tight security be’cos they beak them so they make sure that theirs is unbreakable.


Social Network Analysis

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database[38], and others. These social network “maps” are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[43][44] The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents . These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people … In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
—Jason Ethier[41]

AT&T developed a programming language called “Hancock” which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database and extract “communities of interest” — groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop “marketing leads”[47], but the FBI has regularly requested such information from phone companies such as AT&T without a warrant,[47] and after using the data stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.[48]

Some people believe that the use of social networking sites is a form of “participatory surveillance”, where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments.[39] About 20% of employers have reported using social networking sites to collect personal data on prospective or current employees.[49]


well this is some piece of info i got frm a hacking site and i thought it might interest the socail networking addicts. The owner of this post if a friend of my. back in the days when we were still in high school, we use to go to war driving and defacing websites of companys and government organization to impress this hot high cheer leaders. I posted this info for educational purpose only. what ever u do with this info be it legal of illegal am not to be blamed.

Uncovering Personal Information over the Internet

published by aramis4kill .^_^
Hello all. This is my first article ever written for anything anywhere,
and my first real attempt at teaching anything. So any feedback is much
appreciated. You can reach me (sometimes) by e-mail at
aramis4kill@live.com You might even be lucky enough to catch me on
Google Talk. Do not e-mail me saying “it’s M-A-Y-B-E”, and please be sure
that you’ve checked for subtle humor before you complain, unless you’re
complaining about the subtle humor. I will answer any question, pertaining to
this article or not, provided it is intelligent, and I have the time. Good
luck on the latter.

Part 1 – Generic disclaimer

This information is meant for instructional purposes ONLY. This site and I
are not responsible in any way for anything you may be dumb enough to do with
any knowledge gained here, or elseware.

Part 2 – The introduction

With ‘social networking’ becoming more and more popular nowdays, it’s easy to
meet people online, and in many cases, people that you have never met face-to-
face, or ‘in real life’.

This opens quite the array of possibilities, and some questions.

What if this person isn’t who they say they are? Often times people will lie
about their identity to protect themselves from those ‘online predators’ you
hear so much about on those talk shows designed to scare mothers into locking
their children in a cage. Perhaps they are one of these people looking to do
bad things to you, the kind of bad things that are beyond the scope of this
article, and perhaps this whole site (I do have to wonder sometimes, though).

What if you want to know more about this person without revealing too much
about yourself? This is also a valid question. In many cases, there may be a
bit of information you want to know about someone, and even though you have
the best of intentions (right?), they may not want to share this information
with you.

This article is intended to help you in these situations. This topic is far
too complex for step-by-step instructions in most cases, in fact, it’s rare to
see any one method give you all the information you need, in most cases
personal information is put together by obtaining many small pieces of
seemingly useless data and putting them all together to reveal the whole, it
may even come to process of elimination.

In other words, this article is an introduction to uncovering information such
as age and location (personal information) about someone without directly
asking. Or, in a broader scope, this is an article on social engineering.

The person’s information you want will be called the ‘victim’ hereon. You
will be ‘you’. I will try to make as little assumptions as possible, but I
will assume you have the victim’s e-mail, and that the bulk of interaction is
taking place over some sort of instant messaging (Google Talk, MSN, Yahoo,
pretty much any chat room, that sort of thing). I will also assume you have a
good memory, as it’s almost essential, unless you want to waste countless
hours looking through notes and conversation logs.

Part 3 – What to do with e-mail

Obviously, you’ll want to somehow con them into sending you an e-mail. This
shouldn’t be hard, and there’s a good chance that it will happen without the
need for any fancy social-engineering. Maby not, though, but the lamest
excuses are known to work here. You may try asking them to send you a file
by e-mail so you can download it later, you might first send them an e-mail
and hope they will reply to it.

Anyhow, once you have a message they sent you, and not a message sent by some
automated service, the first thing you’ll want to do is check the ‘from’
header. Some people put their full name here, and their real one at that.
Naturally, this is useful information.

You’ll also want to flip through ALL the headers. For those that don’t know
there are many headers beyond to, from, and subject. In gmail you can view
these headers simply by clicking “show original”. There are ways to do this
on other mail services, and figuring that out is your problem. It should be
noted that many of these headers can be spoofed. The from field for example
is similar to the return address on a letter. There’s nothing preventing a
person from writing someone else’s address here

Back again, you may see a line like this

CODE :

Received: from [24.225.9.69] by web53506.mail.re2.yahoo.com via HTTP…

Those numbers in the brackets represent the victim’s IP address. This is
also useful information that will be explained later.

There is one more thing I’ll discuss here. As you may know, many social
networking services (Myspace, for example) allow you to search for users by
their e-mail. This can point you to information you don’t have, and provides
a good way to check if you have their real e-mail, if you happen to know their
page, profile, whatever on said site. You can, and should, even try to Google
the address. You may be surprised, but you should use your better judgement
with Google results. Say something you found with Google directly contradicts
something the victim told you. Were you lied to? Maby. Google could be
wrong, though. I can’t tell you the answer.

There are other things you can do with an e-mail address. Play around with it
and have fun.

Part 4 – IP addresses

Every computer has an IP address. Even ones that aren’t on the Internet.
Even ones that aren’t connected to ANY network (I’m talking about the loopback
address). I’m not going to get into internetworking here, but you need to
know that an IP is not always specific to any one computer. As if that wasn’t
enough, some computers are given IP addresses dynamically when they connect to
the Internet. This means that a computer’s IP can change from time to time.
To combat this, you should try to find out everything you can about an IP
while you can be sure the victim’s IP hasn’t changed (in most cases, if the
victim hasn’t ‘singed off’ or anything like that, the IP should be the same.
Should.), and try to get a new IP and check it every once in a while.

Getting the IP address can be done several ways, depending on the way you
converse with the victim. My personal favorite is setting up a webserver,
configuring it to log IPs, and asking the victim to ‘see if it works’ for you.
The are many other ways.

The only thing you can do with an IP is trace it, and try to map it
geographically. Neither of these are completely accurate, but can be helpful,
if you want more proof of the victim’s location. There are plenty of online
tools to do this for you, and they aren’t hard to find, so find them.

I lied earlier. There are other things you can do with an IP address, but
most of them are beyond this article, and I’ve never found them particularly
helpful in uncovering personal information.

Part 5 – Social networking

Most people make use of some social networking service nowdays. Facebook,
Twitter, Myspace . . . Many people even have more than one. Finding a ‘page’
that belongs to your victim is outright easy. Ask them, they’ll probably tell
you. There are other ways, like mentioned in the e-mail section if you don’t
want your victim to know you’ve seen their page.

These services are gold mines for people like you. Few stop to think about
unwanted viewers before posting to these things, much less what kind of
personal stuff might be in it. Even if they have it set to ‘private’ or
‘protected’ (the name varies), there may be useful info for you. Example:
Myspace allows users to set their profile to ‘private’, meaning only people
they have allowed can see their full information. However, even if they have
enabled this option, a non-allowed user still sees their age, location, and
gender as entered (yeah, smart people tend to lie here). Along with a
picture and a ‘username’ of sorts.

Alternatively, you can request that they allow you to see this page. This
usually requires you to have an account with the same service, but most people
will allow this regardless of how well they know you.

Besides that, you can use them to validate information. Think you’ve found
your victim’s real name? Search for them on Myspace. Does it turn up their
real Myspace page?

You can literally spend weeks digging in these mines, but it’s usually worth
it. At least in my experience.

Part 6 – Direct interaction

Finally. Some real social engineering. I can’t stress this enough – log your
conversations. There is no way you will remember everything, but the time
will come when you can faintly remember something said, and you’ll be able to
look it up in your logs. The most important thing is that you pay attention
and watch for things that go against eachother, and it’s nice if you can
confirm it before you confront the victim.

Anything that your victim says can potentially be useful, even if it doesn’t
seem so. For example:

CODE :

12:00:00 Hey, dude, what time is it?
12:00:01 1:00

Now you know their timezone. Which helps narrow down their location.
Timezone may not seem all that important, after all, it’s a pretty general
area. But, think about it. Many people will lie about location on social
networks and even to your face, but most won’t think to lie in telling you the
time. Seriously, this works more than you’d expect.

How about this:

CODE :

What’s up?
Gettin’ ready to go to a concert
Cool. What kind of concert?
Metallica

How does this help you location-wise? With Metallica being the most over-
played band on radio today, I’m sure you can look on the Internet to find out
where they’re playing, which is another way to narrow down their location.
Most people will not travel too far for a concert, unless they’re following a
tour, in which case you’ll probably already know.

In other words, pay attention to what events the victim attends, maby the
event will be big enough for you to find out where it’s hosted.

You should also pay attention to the way they talk. Often times, you can give
a good guess at their heritage, location, and age from how they talk, and how
mature they seem to be. Someone who says “y’all” a lot is likely from the
south. Someone who uses “eh” all the time could live in the north. Someone
who uses a lot of question marks could be French. Someone who uses a lot of
exclamation may be Irish.

Gender is usually an obvious one to pick up on. Men and women tend to have
different personalities. I think it’s safe for me to assume that anyone that
may read this article knows the differences between men and women.

It may also help you to identify phrases, punctuation, quirks and the like that
the victim tends to use more often than not. These sort of things may help
you identify the victim in certain situations, and may help you spot
impostors. Over time (years), you will be able to recognize the victim
without putting any thought into it, but in the short run, you can look for
unique tendencies, like myself and the word ‘maby’.

Part 7 – Conclusion

This may seem like a lot of information to a complete newbie, but I’ve just
scratched the surface. Uncovering personal information is a broad topic, and
an art that takes years to learn and master. The best way to learn is to make
a few online friends and see what you can learn without them knowing. Or you
can try to surprise your current friends with your skills. Be patient,
listen, and you may surprise even yourself.

Again, please provide feedback either here, or to my e-mail.