Wednesday, November 21, 2007
yahoo or google?
based on our discussion in class last meeting, google outruns yahoo's services which infact, they both provide the same services at all. it is mentioned in class that considering they both provide same services, google delivers services intelligently or with class. that is why people are starting to switch from yahoo to google. but i found some interesting news from a website that hit google by storm. www.itworld.com/App/325/071115gmail/
Sunday, November 18, 2007
keygens
Typically software requests a serial number only during installation. The installation software applies an algebraic expression to the key entered to validate the key. As an example, the algorithm may define that a key entered must contain 5 numbers that have a checksum of 25, and that the key must also contain 3–5 letters that, when mapped into their numerical equivalents, have a sum of 42.
In order to write a keygen, the author typically uses a dissasemblerto look at the raw assembly code of the program they are writing the keygen for, checking either the software itself or the installer. Once they have access to the program's code, they can locate the subroutine(s) responsible for verifying that the key entered is valid. Using this knowledge, they can reverse the algorithm used to generate valid keys, which is then incorporated into the keygen. -wikipedia.orgto prevent crackers from making keygens, software companies included online registration (like adobe). some can detect a pirated software copy by checking the serial number used to register the product. if the serial number was used second time, it is automatically detected as a pirated copy (like kaspersky). on the other hand, norton focuses on the vulnerability of its code. they focused on protecting the code itself, making it hard to locate or to view to prevent crackers from making keygens.
Wednesday, November 14, 2007
Optical Media Act 2003
President Gloria Macapagal Arroyo signed into law a measure renaming the Videogram Regulatory Board (VRB) into Optical Media Board (OMB) that would be assigned to regulate the manufacture of optical media in all its forms and impose stiffer fines and penalties for its illegal reproduction.
Saturday, November 3, 2007
windows and linux (a comparison)
Windows:
- Pre-installed by default on almost all new desktop PC.
- Have a large number of pirated Windows copies.
- Estimates installation from 30mins - 1hr (due to updates).
- Often drivers must be installed separately.
- May be installed through WinPE and BartPE. However, only the former is endorsed by Microsoft.
- Some multimedia and home use software (IE, Media Player, Notepad, Paint…) are available.
- May boot to multiple operating systems through a Microsoft boot loader (NTLDR).
- User interaction with software is generally consistent between versions, releases, and editions.
- Source code may be purchased for modification, or third party tools may create modifications.
- Scheduler uses FCFS (First Come First Serve)
- Many programs are written with Windows specific frameworks.
- The majority of current major games natively support Windows and are released first for the Windows platform.
- Viruses have been written for Windows, many thousand have been propagated. Many desktop computers and laptops would crash or run slowly affecting business front offices and home users.
- Windows' code is hidden that is why bugs are hard to fix.
- Users typically ran as (full) administrator, allowing malicious programs full control over the system.
- Pre-installed by default on very few new desktop PC.
- Most linux copies are free.
- Estimates installation from 5-3mins.
- Most free drivers available are included in most distributions or can be found in online archives.
- Almost all Linux distributions now have a live CD that may be used for install all main distributions contain numerous programs: multimedia, graphics, internet, office suites, games, system utilities and alternative desktop environments. Some distributions specialise in education, games, or security.
- May boot to multiple operating systems through GRUB or LILO. Also has security features, like passwording, that is not found in the Windows boot loader.
- Consistency can be poor between distributions, versions, window managers/desktop environments, and programs. Software is highly user-customizable, however, and the user may keep the customizations between versions.
- All of the kernel source code is freely available for modification. Most other software is free software, too.
- Scheduler uses SJF (Shorter Job First).
- Some programs are written with Linux specific frameworks
- Linux can run some of Windows games but with a compatibility layer like Wine or Cedega (but accelaration ang graphics may be limited).
- File viruses have been written for Linux, none has yet propagated successfully. Propagation without root access is nearly impossible.
- Linux's code can be viewed that is why many bugs were fixed.
- Users typically run as limited accounts, preventing malicious programs from gaining total control of the system
en.wikipedia.org
Wednesday, October 24, 2007
how stalkable/hackable are you?
hi chance:
you're in friendster/my space etc.
your passwords are the same for all of your accounts
your passwords are short/weak
you tend to go to computer shops
you easily trust anyone
your friends easily trust anyone
low chance:
friendster is not your friend
you tend to change your passwords frequently
you have long/strong passwords
you only trust those whom you knew very well
you don't go to computer shops
the question is, would someone hack/stalk you?
you're in friendster/my space etc.
your passwords are the same for all of your accounts
your passwords are short/weak
you tend to go to computer shops
you easily trust anyone
your friends easily trust anyone
low chance:
friendster is not your friend
you tend to change your passwords frequently
you have long/strong passwords
you only trust those whom you knew very well
you don't go to computer shops
the question is, would someone hack/stalk you?
Monday, October 1, 2007
human factor is security's weakest link
as kevin mitnick pinpointed in his book "art of deception", human factor is the security's weakest link. why? because of carelessness and ignorance. many examples are stated in the book. some of these are like sticking confidencial notes in secretary's desk. such as this little carelessness may start a spark for a hack.
Friday, September 21, 2007
Subscribe to:
Posts (Atom)