Category Archives: Technology

How strong is your password

http://www.passwordsafepro.com/images/secure_passwords.gifIf you invited me to try and crack your password, you know the one that you use over and over for like every web page you visit, how many guesses would it take before I got it?

Let’s see… here is my top 10 list. I can obtain most of this information much easier than you think, then I might just be able to get into your e-mail, computer, or online banking. After all, if I get into one I’ll probably get into all of them.

  1. Your partner, child, or pet’s name, possibly followed by a 0 or 1 (because they’re always making you use a number, aren’t they?)
  2. The last 4 digits of your social security number.
  3. 123 or 1234 or 123456.
  4. “password”
  5. Your city, or college, football team name.
  6. Date of birth – yours, your partner’s or your child’s.
  7. “god”
  8. “letmein”
  9. “money”
  10. “love”

Statistically speaking that should probably cover about 20% of you. But don’t worry. If I didn’t get it yet it will probably only take a few more minutes before I do…

Hackers, and I’m not talking about the ethical kind, have developed a whole range of tools to get at your personal data. And the main impediment standing between your information remaining safe, or leaking out, is the password you choose. (Ironically, the best protection people have is usually the one they take least seriously.)

One of the simplest ways to gain access to your information is through the use of a Brute Force Attack. This is accomplished when a hacker uses a specially written piece of software to attempt to log into a site using your credentials. Insecure.org has a list of the Top 10 FREE Password Crackers right here.

So, how would one use this process to actually breach your personal security? Simple. Follow my logic:

  • You probably use the same password for lots of stuff right?
  • Some sites you access such as your Bank or work VPN probably have pretty decent security, so I’m not going to attack them.
  • However, other sites like the Hallmark e-mail greeting cards site, an online forum you frequent, or an e-commerce site you’ve shopped at might not be as well prepared. So those are the ones I’d work on.
  • So, all we have to do now is unleash Brutus, wwwhack, or THC Hydra on their server with instructions to try say 10,000 (or 100,000 – whatever makes you happy) different usernames and passwords as fast as possible.
  • Once we’ve got several login+password pairings we can then go back and test them on targeted sites.
  • But wait… How do I know which bank you use and what your login ID is for the sites you frequent? All those cookies are simply stored, unencrypted and nicely named, in your Web browser’s cache. (Read this post to remedy that problem.)

And how fast could this be done? Well, that depends on three main things, the length and complexity of your password, the speed of the hacker’s computer, and the speed of the hacker’s Internet connection.

Assuming the hacker has a reasonably fast connection and PC here is an estimate of the amount of time it would take to generate every possible combination of passwords for a given number of characters. After generating the list it’s just a matter of time before the computer runs through all the possibilities – or gets shut down trying.

Pay particular attention to the difference between using only lowercase characters and using all possible characters (uppercase, lowercase, and special characters – like @#$%^&*). Adding just one capital letter and one asterisk would change the processing time for an 8 character password from 2.4 days to 2.1 centuries.

Password LengthAll CharactersOnly Lowercase
3 characters
4 characters
5 characters
6 characters
7 characters
8 characters
9 characters
10 characters
11 characters
12 characters
13 characters
14 characters
0.86 seconds
1.36 minutes
2.15 hours
8.51 days
2.21 years
2.10 centuries
20 millennia
1,899 millennia
180,365 millennia
17,184,705 millennia
1,627,797,068 millennia
154,640,721,434 millennia
0.02 seconds
.046 seconds
11.9 seconds
5.15 minutes
2.23 hours
2.42 days
2.07 months
4.48 years
1.16 centuries
3.03 millennia
78.7 millennia
2,046 millennia

Remember, these are just for an average computer, and these assume you aren’t using any word in the dictionary. If Google put their computer to work on it they’d finish about 1,000 times faster.

Via One Mans Blog
image: Passwordsafepro

New Android OS for Phones, ‘Ice Cream Sandwich’

The next Android operating system for smartphones will include some features that were previously exclusive to Android tablets, Google announced Tuesday.

Dubbed “Ice Cream Sandwich,” the platform will debut some time in the fourth quarter of 2011, Google officials said during the company’s I/O developer conference.

“We want one OS that runs everywhere,” Android engineer Mike Claren said at the conference.

Ice Cream Sandwich-powered smartphones will ship with enhancements introduced in Android Honeycomb, Google’s operating system for tablets. Some of these new features include a holographic user interface, enhanced multitasking abilities and the ability to connect the smartphone with a USB device, such as a mouse or an Xbox controller.

The release of Ice Cream Sandwich has been highly anticipated by the Android developer community. Android version 3.0 (Honeycomb) first debuted on Motorola’s Xoom tablet in February, touting a host of enhancements and features new to the Android platform. Developers have been waiting for Google to release the Honeycomb source code, in order to bring some of these features to smartphones.

So far, Google has refused to do so. After a long period of silence and a whole lot of fear, uncertainty and doubt, Google issued a statement to members of the press in March: “While we’re excited to offer these new features to Android tablets, we have more work to do before we can deliver them to other device types including phones. Until then, we’ve decided not to release Honeycomb to open source.”

http://www.wired.com/images_blogs/gadgetlab/2011/05/google_io_f31.jpg

via Wired

Disability limits marriage choices: Online survey

http://www.ifsw.org/cm_data/Disability.jpgChoices are limited for the physically disabled wanting to get married. A recent survey shows that 59% women and 48% men refuse to marry anyone with a physical disability. About 34% women and 37% men said it depended on the situation and extent of the disability. Only 7% women and 15% men and said that they would marry someone with
physical disability.

An online matrimonial site had conducted the survey over four months starting November 2010. It had more than 1.5 lakh respondents in the age group ranging between 18 to 45 years. These also include NRIs from the US, UK, Canada, Middle East, S E Asia, Australia and New Zealand.

via Times of India

Google Wants to Control Your Home

http://www.wired.com/images_blogs/gadgetlab/2011/05/AndroidAtHome.jpgGoogle’s Android operating system may have been created for phones and refined for tablets, but the OS is set to move beyond the bounds of mobile devices.

Today, Google announced a new class of Android devices for the home during the opening keynote at its annual I/O developer’s conference in San Francisco. These devices—dubbed “Tungstens”—act as an intermediary between an Android phone or tablet and a suitably enabled home appliance. They would allow users to remotely control everything from lighting to refrigerators.

The company demonstrated how a Tungsten could make playing a game on an Android tablet more immersive: explosions and gunfire set the special lights in the room flickering with every blast. New software that makes it easier for Android devices and their apps to interface with other devices and objects, including home automation equipment, was also demonstrated.

New Nanosensor Sniffs Bombs, One Molecule at a Time

http://www.wired.com/images_blogs/dangerroom/2011/05/honeybees.jpg

Imagine a piece of metal 30,000 times thinner than one of the hairs on your head. Mixed with a little protein from bee venom, that microscopic filament becomes the most powerful explosives-detection system in history, able to detect a single molecule of dangerous chemicals.

Now imagine having that in an airport. No need for taking a pornographic photograph or having your genitals massaged by the Transportation Security Agency. And a nanotechnology specialist may have hastened that happy day for homeland security.

Michael Strano, an associate professor of chemical engineering at the Massachusetts Institute of Technology, spent the past two years testing out the boundaries of nanotech in explosives detection. For less than $200,000, he took it practically to the atomic limit. “There’s no further improvement in the sensor part you can get,” Strano tells Danger Room. “It’s the last word in sensors.”

Some of his colleagues aren’t quite so sure. Strano’s system is promising, they say. But they have questions about bringing Strano’s sensor into the field.

The science behind the Strano’s sensor is complex. But here’s the simplest way of breaking it down. Put bee venom on a carbon rod and you’ve got yourself a sensor.

 

Believe it or not, bees are powerful bomb sleuths. That’s why Darpa wanted to enlist them to find explosives, landmines and “odors of interest” in the early 2000s. As it turns out, inside of every bee sting is a small fragment of a protein called a peptide that has an uncanny property.

“When it wraps around a small wire, that allows it to recognize ‘nitro-aromatics’,” Strano explains, the chemical class of explosives like TNT. That wire is a carbon nanotube, a mere one atom thick.

Put that against a nitro-aromatic treated with the bee peptide, and take a look through a near-infrared microscope. “The light from the carbon nanotube will fluoresce — so red that your eye can’t see it,” Strano says. “What you’d see in the microscope is: The nanotube would flicker off and on.” A single molecule of the explosive material would set off the sensor.

via Wired

Google Music Beta – Launched

In its long-anticipated effort to bring music storage to the cloud, Google debuted its own streaming music service at its I/O developer conference on Tuesday morning.

Dubbed “Music Beta by Google,” the service will act as a “digital locker,” where users can store their music in the cloud instead of on their local hard drives or mobile devices.

After uploading your existing music library to a remote server, you’ll be able to stream your music to your Android phone or web-connected PC. As long as you’re connected to the internet, you’ll be able to access your music wherever you go.

You’ll be able to add up to 20,000 songs, and it’s free while it’s in beta mode.

http://www.wired.com/images_blogs/epicenter/2011/05/music-beta.jpg

image: Wired.com

Why Google Does Not Own Skype

http://www.wired.com/images_blogs/epicenter/2011/05/5514628.jpegSo Microsoft is buying Skype for $8.5 billion, its biggest deal ever. It’s too soon to make a pronouncement on whether the purchase is an idiot move, a brilliant one or just something in between. All the geniuses who ripped the investors who bought Skype from eBay in 2009 don’t look so smart now.

It was almost Google who owned Skype.

Here’s more detail on the story:

In 2009 a brilliant product manager named Wesley Chan was in charge of Google Voice, which was still in development. It was Google’s revamp of Grand Central, which Chan had snared in an acquisition the year before. When some Google executives heard that eBay was selling Skype, they jumped on the opportunity and began negotiating.

As Chan helped with due diligence, even going to Europe to see Skype firsthand, he became convinced that the purchase was a bad idea for Google. He concluded that one of Skype’s key assets — its peer-to-peer technology — was a mismatch for Google, which worked on the newer paradigm of cloud computing.

Read more at Wired
The article first appeared on Wired

Facebook set for display ad lead

http://www.masternewmedia.org/images/Facebook-ads-485.gifFacebook’s large user base will make it the world’s largest online display advertising company by revenue this year, overtaking the comparable businesses of Google and Yahoo, according to analysis published on Tuesday.

Enders Analysis, based in London, in a report on Tuesday, forecasts that Facebook will lift its advertising revenues from $1.8bn to $3.5bn in 2011, a rise of 95 per cent. At the same time, Google’s display business – which includes YouTube, the video site, and DoubleClick, its banner network – is expected to rise from $2bn last year to $2.6bn this year, with Facebook extending its lead in 2012.

Display advertising includes text, images and video shown on a standard web page, although it excludes search, from which Google derives significantly larger revenues.

Although Facebook’s advertising revenues remain a fraction of Google’s search business, the social network’s 500m users and the volume of ads it shows those users has enabled it to lift revenues rapidly.

To read in depth head over to FT.com

India Defends Right to Access Personal Data

http://sunilnehra.com/wp-content/uploads/2011/04/login.jpgThe Indian government said Tuesday that new rules allowing it to access personal information available with Internet companies have inherent checks and balances against misuse.
The rules under section 43A of the Information Technology Act were enacted last month and reflect the government’s perception that security threats to the country can be countered by better access to online information.

The country is, for example, locked in a dispute with Research In Motion, demanding access to e-mails and other communications on RIM’s corporate service, called BlackBerry Enterprise Server.

Privacy groups and lawyers have described the rules as draconian and said they infringe Indians’ fundamental rights. “These are arbitrary powers that are being given to government, without any checks and balances,” said Pavan Dugga, a cyberlaw consultant and advocate in India’s Supreme Court.

The rules place controls on the gathering and use of personal data by Internet companies, including requiring permission from the provider of information for sharing such data. But the rules cite the government as an exception in this regard.

This article first appeared on The PC World

Top 7 Alternatives to Apple’s MacBook Air

Many people consider the Apple MacBook Air to be the gold standard in ultrathin laptops, but Windows users don’t have to jump to the Mac platform to get the same slim and sleek design.

The seven lightweight laptops here are each no more than about an inch thick, and in some cases they cost several hundred dollars less than the groundbreaking Apple laptop.

Here’s how these ultrathin laptops each stack up to Apple’s popular 13.3-inch ultraportable (discussed in the order of their announcement).

Complete details