menu

Monday 29 December 2014

Why Comrade Cameron went all Russell Brand on the UK’s mobile networks

Analysis Dropped calls between President Obama to Prime Minister David Cameron on the Vodafone network over Christmas led to the government getting bossy with the mobile networks, according to industry sources.

The PM was in rural Oxfordshire over Christmas and decided that “something must be done” about rural mobile coverage. But the proposed cure is an odd one – closer to proposals floated by teenage socialist firebrand Owen Jones – to nationalise the country’s mobile infrastructure than a traditional incentive-based policy.

Mobile coverage reaches 98 per cent of the population – but around a fifth of the landmass is without a signal. Some of the operator’s own estimates put the cost of bridging the gap between £2bn and £4bn – and there aren’t enough people in those rural notspots to justify the investment.

No.10’s preferred solution isn’t better infrastructure, but giving consumers the ability to roam from network to network. The PM gave the plan to Maria Miller at the Ministry of Fun, who decided it was a rum idea. But after Miller resigned in April, her successor, ambitious business minister Sajid Javid, threw his weight behind the plan. Last night, a draft consultation went out to Britain’s big four: EE, Vodafone, Telefonica-owned O2 and Hutchinson’s 3.

The operators' objections to National Roaming broadly fall into three categories. It would create practical difficulties, they argue; it “contradicts 30 years of policy” (as one told me yesterday); and ultimately it will kill off long-term investment in rural infrastructure.

We all fall down

Leading the first set of issues is resilience: what happens when one network goes down – and everyone switches to another network? If rural mobile infrastructure is so poor that one network can’t cope with its own subscriber base – how well will it cope with two? And ultimately – with four? In the event of a single network failing, a domino effect is likely, operators say, as the entire rural subscriber base attaches at once. And this has serious repercussions, given the reliance of vital services on mobile coverage. Hence today’s briefings from the Home Office that National Roaming puts state security at risk.

There are other technical objections, too. Operators don’t support in-call handover between networks: so even a National Roaming experience is likely to be an unhappy one for the user if they’re on the move. And phones would need to be reprogrammed to search more aggressively for a higher priority network – every few minutes rather than 3GPP default of every hour – resulting in much faster battery drain. (See 3.2.2.5 in the spec

Who's calling us bumpkins?

Another pressing question is “what defines rural?” When the policy framework was established 25 years ago, lower frequency spectrum gave better coverage indoors. Today, high frequency spectrum is now used alongside it, so many users discover “notspots” in their own homes. If bumpkins can switch to another network, why can’t everyone else? Confining National Roaming to rural areas discriminates against the urban users who actually fund the network.

referensi : http://www.theregister.co.uk/2014/11/05/national_roaming_parklife/

The 30-year-old prank that became the first computer virus


To the author of ‪Elk Cloner‬, the first computer virus to be released outside of the lab, it’s sad that, 30 years after the self-replicating code's appearance, the industry has yet to come up with a secure operating system.
When Rich Skrenta, created Elk Cloner as a prank in February 1982, he was a 15-year-old high school student with a precocious ability in programming and an overwhelming interest in computers. The boot sector virus was written for Apple II systems, the dominant home computers of the time, and infected floppy discs.
If an Apple II booted from an infected floppy disk, Elk Cloner became resident in the computer’s memory. Uninfected discs inserted into the same computer were given a dose of the malware just as soon as a user keyed in the command catalog for a list of files.
Infected computers would display a short poem, also written by Skrenta, on every fiftieth boot from an infected disk:
Elk Cloner: The program with a personality
It will get on all your disks It will infiltrate your chips Yes it's Cloner!
It will stick to you like glue It will modify ram too Send in the Cloner!

Elk Cloner, which played other, more subtle tricks every five boots, caused no real harm but managed to spread widely. Computer viruses had been created before, but Skrenta’s prank app was the first to spread in the wild, outside the computer system or network on which it was created.

Elk Cloner took about two weeks to write in assembly language, Skrenta recalls. And if it’s mode of operation sounds simple, making it actually happen was quite a technical challenge. His earlier adventure game took longer but was more creative, like making a puzzle.
“It worked like a charm and spread all over the place,” Skrenta remembers with a chuckle. His cousins in Batimore and - years later, he discovered - a friend in the US Navy were among those whose computers caught the virus.
Not that there weren’t ways of avoiding infection.
“Elk Cloner created a rattling noise when the program started. If a disc was infected you could hear it. If you inserted an infected disc in an Apple II you can hear the head swoosh sound, an audible signature.
“It would infect a new disc if machine wasn’t rebooted. If an Apple II was rebooted every time, Elk Cloner wouldn’t have spread. But, given people computer habits, it spread like crazy,” Skrenta explained.

Understanding Open Source Software and Licensing


When we talk about buying software there are three distinct components:
  • Ownership – Who owns the intellectual property behind the software?
  • Money transfer – How does money change hands, if at all?
  • Licensing – What do you get? What can you do with the software? Can you use it on only one computer? Can you give it to someone else?
In most cases, the ownership of the software remains with the person or company that created it. Users are only being granted a license to use the software. This is a matter of copyright law. The money transfer depends on the business model of the creator. It’s the licensing that really differentiates open source software from closed source software.
Two contrasting examples will get things started.
With Microsoft Windows, the Microsoft Corporation owns the intellectual property. The license itself, the End User License Agreement (EULA), is a custom legal document that you must click through, indicating your acceptance, in order to install the software. Microsoft keeps the source code and distributes only binary copies through authorized channels. For most consumer products you are allowed to install the software on one computer and are not allowed to make copies of the disk other than for a backup. You are not allowed to reverse engineer the software. You pay for one copy of the software, which gets you minor updates but not major upgrades.

The Free Software Foundation was founded in 1985 by Richard Stallman (RMS). The goal of the FSF is to promote Free Software. Free Software does not refer to the price, but to the freedom to share, study, and modify the underlying source code. It is the view of the FSF that proprietary software (software distributed under a closed source license) is bad. FSF also advocates that software licenses should enforce the openness of modifications. It is their view that if you modify Free Software that you should be required to share your changes. This specific philosophy is called copyleft.

Monday 22 December 2014

Linux Evolution and Popular Operating Systems

The definition of the word Linux depends on the context in which it is used. Linux means the kernel of the system, which is the central controller of everything that happens on the computer (more on this later). People that say their computer “runs Linux” usually refer to the kernel and suite of tools that come with it (called the distribution). If you have “Linux experience”, you are most likely talking about the programs themselves, though depending on the context, you might be talking about knowing how to fine-tune the kernel. Each of these components will be investigated so that you understand exactly what roles each plays.

Further complicating things is the term UNIX. UNIX was originally an operating system developed at AT&T Bell Labs in the 1970’s. It was modified and forked (that is, people modified it and those modifications served as the basis for other systems) such that at the present time there are many different variants of UNIX. However, UNIX is now both a trademark and a specification, owned by an industry consortium called the Open Group. Only software that has been certified by the Open Group may call itself UNIX. Despite adopting all the requirements of the UNIX specification, Linux has not been certified, so Linux really isn’t UNIX! It’s just… UNIX-like.

Hardware Platforms

Linux started out as something that would only run on a computer like Linus’: a 386 with a specific hard drive controller. The range of support grew, as people built support for other hardware. Eventually, Linux started supporting other chips, including hardware that was made to run competitive operating systems!
The types of hardware grew from the humble Intel chip up to supercomputers. Later, smaller-size, Linux supported, chips were developed to fit in consumer devices, called embedded devices. The support for Linux became ubiquitous such that it is often easier to build hardware to support Linux and then use Linux as a springboard for your custom software, than it is to build the custom hardware and software from scratch.

Eventually, cellular phones and tablets started running Linux. A company, later bought by Google, came up with the Android platform which is a bundle of Linux and the software necessary to run a phone or tablet. This means that the effort to get a phone to market is significantly less, and companies can spend their time innovating on the user facing software rather than reinventing the wheel each time. Android is now one of the market leaders in the space.
Aside from phones and tablets, Linux can be found in many consumer devices. Wireless routers often run Linux because it has a rich set of network features. The TiVo is a consumer digital video recorder built on Linux. Even though these devices have Linux at the core, the end users don’t have to know. The custom software interacts with the user and Linux provides the stable platform.

 



Problem Connecting and Internet Network Solution


1. Network problems because of the failure of a network cable
Which is a common network problems we encountered due to the broken network cable that can affect the performance of a computer in the network because your patch cable cuts because bitten by rats; network problems that impact on a building block for inter-switch cable cuts (uplink cable); or even have an impact on most of the computers in your LAN network for backbone cable failure.


2. Network problems because of the failure of a network device
Scale disturbances result from the failure of a network device can also vary, from just a computer because of the failure of NIC - lan card; some computers because of the failure of a switch; or even a large scale because of the failure of the central switch that connects a network server. For failure lan cards in one computer can be replaced with a backup of your network card.

3. Network problems because of the failure of the system
The failure of the system could be because there is a problem with your DHCP server so that clients do not receive an IP address. Or it could be because there is a problem with your system so that clients Directory Services could not logon to jaringan.Atau could be due to a problem with the register name on your DNS system.

4. Network problems due to blast virus
This species is also a network problem that is not due to the failure of the physical network infrastructure, but the system will be overwhelmed with traffic your network of influence of viruses that attack and infect the server system to all computers in your network. The performance of your network system will be extremely slow even arguably collapsed. What can you do with this virus attack is to implement best practice security policy, you should be immune defense system once.

5. Connection Problems dashed
Cause: The quality of the telephone network decreases, telephone voice kemrosok or no hum
Solution: - Check the wiring of the house (from KTB up Modem)
- If you still try to report to the office nearest TELKOM

6. Slow Connection Problems
Cause: The number of shared PCs.
Activity Client-client PC Download or Upload Malware (Viruses, Trojans, Spyware) who spend your bandwidth Indeed Conditions Slow PC
Solution: Use Bandwidth management Use antivirus or anti spyware

7. The problem is on the Network Connection
  where the number of IP, Gateway dllnya nge-blank, but already in the manual settings, connected network status and still be able to access the data network via IPX / SPX / NetBIOS, but its IP number can not access the internet then stays off.
solution:
Error 1068: The dependency service or group failed to start. DHCP Client Service on Windows XP depends on the following three components: * AFD * NetBIOS over Tcpip * TCP / IP Protocol Driver If one of the above drivers fail the road, then the DHCP Client Service will fail way / not start.
Step I - Make sure that all three of the above driver files are in place Open Windows Explorer navigate to the folder% windir% \ System32 \ Drivers. Make sure the following files exist in the folder: * afd.sys * tcpip.sys * Netbt.sys
If one or more of the above missing files \ no, extrakkan from the Windows XP CD-ROM or from a folder ServicePackFiles \ i386. ---> What I do is unite from another computer that Windows XP it is still OK.
Step II - restarted Simple TCP / IP dah normal street and internet connection.


comment:
 
In a process that is on a computer network is not entirely due to provider error, but no human or human element itself is not careful in connecting to the Internet, for example:
1. Failure on the cable network bitten by rats
2. The number of users or clients that redundant data download
3. And the disruption of computer devices
We should be more careful.
 


Reference: http://www.ipanrock.info/2011/07/permasalahan-connecting-jaringan.html 

a simple way to get your password

 

: Table oF Contents :

  • [0XFF00000] Preface
  • [0XFFF0000] How to get it?
    1. Social Engineering
    2. KeyLogger
    3. Web Spoofing
    4. Menghadang Email
    5. Password Cracking
    6. Session Hijacking
    7. Menjadi Proxy Server
    8. Utilizing User Negligence In Using Browser Features
    9. Googling
  • [0XFFFF000]cover
  • [0XFFFFF00] Referensi
  • [0XFFFFFFF] Attachment [Revenge For The Admin - Social Engineering]
[1]. social Engineering

Social Engineering is the name of an information-gathering techniques by exploiting loopholes victim psychology. Or may be also described as "fraud" Social Engineering requires patience and prudence so that the unsuspecting victims. We are required to be creative and able to think like a victim.

Social Engineering is the art of "forcing" people to do things according to your expectations or desires. Of course the "coercion" that do not openly or outside the normal behavior of the victim usual.


[2]. Keylogger

Keylogger is a software that can record user activities. The results of the tape used to be stored in the form of text or images. Keylogger works by pounding the keyboard user. This application is able to recognize forms such as sensitive as a password form.

There are safe ways to avoid keyloger:

     Use passwords with special characters such as! @ # $% ^ & * () {} []. Most keyloger will ignore this character so that the offender (keyloger installer) will not get the actual password.
     Prepare passwords from home, store it in the form of text. When you wish to enter a password, copy-paste tingal ajah. Keyloger will read your password by pounding the keyboard. However, this method is rather risky. Why? because when you make a copy, your data will be stored in the clipboard. Currently found many free software that can display the data in the clipboard.


[3]. web Spoofing
 
Still remember the case of theft of customer account number BCA? Yes, that's one obvious example of Web spoofing. The essence of this technique is to utilize a user error when typing a web address in the address bar. Basically, Web Spoofing is an attempt to trick the victim into thinking he is accessing a particular site, but it's not.



[4]. Facing Email

Facing email? Yes, and very easy to do this. One way is to use a utility mailsnarf contained in dsniff. How it works is by blocking Mailsnarf data packets through the Internet and put them together into a complete email.


[5]. Password Cracking

"Hacking while sleeping." That phrase commonly used by people who do password cracking. Why? Because in general dibuthkan long time to perform password cracking. Can take hours, even days and - today! It all depends on the target, whether the target using a common password, password length unusual character, or a combination of passwords with special characters.